1,990 Matching Annotations
  1. Apr 2020
    1. Blockchain economies are siloed and cannot transfer assets between each other.

      economies siloed

    1. collaboration is more important than competition

      collaboration competition

    2. how to build decentralized applications using the next generation of layer 1 protocols

      decentralized app next generation layer 1 protocols

    1. Quantizr uses MongoDB


    1. by cooperating with players in the ecosystem seeking ways to boundless interoperability, or even ex changeability, at the level of Capabilities, that are themselves tinkerable, even co-evolvable, acrosss emergent eco systems. Lower the barrier of entry to providing new capabilities that are designed to complete not to compete with each other by maintaining interoperablity or even exchangability.

      interoperability across ecosystems

    2. ubiquitous cryptographic enclaves

      cyptographic enclaves

    1. The Convergence Stack is a set of privacy-protecting, peer-to-peer, and open-source technologies that will decentralize the cloud and unbundle the Internet platforms.

      Convergence stack privacy-protecting peer-to-peer decentralize the cloud unbundle the internet platforms

    1. build a layer on top of the web where every person can have their mental model of how the whole world works, and they can start to share ideas across everything.

      how the world works and share

    1. very cool 'web native' apps

      web native

    2. phillmac @phillmac Apr 07 01:12 @JamieRez you will most likely need to use ipfs.swarm.connect() to connect to another peer then the data should replicate

      swarm connect

    1. API optimized for maximum interoperability and data sovereignty.

      API maximum interoperability

    2. Our next steps are to create a holistic set of tools for coordination

      holistic set of tools

    3. Users can belong to multiple communities and communities belong to networks, and it’s easy to view the aggregated content in a single stream. Similarly, a user can share a single post across all of their communities at once, creating a shared conversation that everyone in those communities can participate in — a feature not found anywhere else.

      multiple communities seen at once

    4. Holo recently acquired Hylo, and is using Hylo’s code base and user interface design as a foundation for core app libraries and for sample apps that will run on the cloud hosting marketplace for distributed applications

      Holo runs Hylo on cloud hosting marketplace for distributed applications

    1. here is also a principle of least action

      principle of least action

    1. Does the same principle of minimum entropy generation also hold when the situation is described quantum-mechanically?

      minimum entropy generation

    1. Pinning a CID tells an IPFS server that the data is important and mustn’t be thrown away.

      not throw away

    1. Holochain is the equivalent of having an IFTTT layer built underneath the entire Internet.

      IFTTT layer underneath the Internet

    2. Holochain is like having access to all of the capabilities of all of the Internet apps simultaneously without needing an API, because the languages are entirely compatible.

      without needing an API

    3. post-blockchain technology

      post-blockchain techology

    1. interpret complex datasets as a single body of knowledge that can be logically reasoned over.

      single knowledge interpret reason over

    2. knowledge base foundation to intelligent systems.

      knowledge base intelligent systems

    1. If you take care of the syntax, the semantics will take care of itself.

      syntax semantics itself

    1. On 29 October 2008, at the International Semantic Web Conference 2008, Freebase released its RDF service for generating RDF representations of Freebase topics, allowing Freebase to be used as linked data.[11]

      Freebase Linked Data

    1. the Holy Grail of becoming the go to place for trustedsocially attributable knowledge corroborated by the Interest Graphs of users

      trusted socially attributable knowledge

    1. a data scientist is expected to formulate the questions that will help a business and then proceed in solving them

      ask questions solving them

    1. he par-tially completed design will consist of inaccurate and out-of-date documentation, unwritten ‘understandings’ between groups of designers, and in late stages of the design, partially constructed components (hardware or software). The intent of the above two projects is to keep the design so formal that at each stage in the design process it is capable of objective evaluation — being machine-executable is a very practical means of achieving this goal. The machine-executable partial design is, since it can obviously not be doing the complete job required of the system, therefore just a ‘simulation’ of the complete system. As design work progresses this simulation will gradually evolve into the real system.

      partially computed design

      intellectual manageability, comprehend-ability and ability to maintain alternatives and change design decisions on the fly

    2. the problem of finding an effective methodological approach to computing system design

      effective methodological approach to computer system design

    3. Multi-level Modelling technique,

      multi-level modelling

    4. The simulation is the design.

      simulation is the design

    5. problems still to be faced in achieving an effective methodology of computer system design

      effective methodology

    6. metamorphosis in the practice of software production and its handmaiden, software design

      metamorphosis in the practice

    7. Just once to try an evolutionary step instead of a confounded revolutionary one.

      evolution not revolution

    8. the rate of increase of air traffic in Europe is such that there is a pressing need for an automated system of control

      air traffic control

    9. users who like to buy ‘futures’ in software systems,

      buy futures

    10. more complete understanding of the program design process is achieved

      understand design process

    11. sheer incompetence in software design.

      sheer incompetence

    12. continually embarking on research, yet your salesmen disguise this to the customer as being just a production job

      research vs production job

    13. In my view both OS/360 and TSS/360 were straight-through, start-to-finish, no-test-development, revolu-tions. I have never seen an engineer build a bridge of unprecedented span, with brand new materials, for a kind of traffic never seen before

      bridge unprecedented span new material

    14. because the admission of shortcomings is the primary condition for improvement

      admission shortcomings improvement

    15. the ‘software crisis’ or the ‘software gap’.

      software crisis

    1. Portable self-sovereign identityShared data schemas and definitionsInteroperable user and application data storageOpen web services, without new accounts or logins
      • identity
      • data schemas
      • interoperable storage
      • no new accounts or logins
    2. collectively enable boundless interoperability between an ecosystem of connected wallets, applications, databases, and services.

      boundless interoperability

    3. universal routing layer for storing decentralized identifiers (DIDs) and their associated metadata, data schemas, policies for usage of web services, access control permissions, and other documents

      universal routing layer for storing

    4. Ceramic unlocks information interoperability between all platforms and services across the web.

      unlock interoperability

    5. Because participants can create and resolve documents for any type of information without any centralized service

      create resolve documents without centralized service

    6. permissionless protocol for creating and accessing unstoppable documents that serve as the foundation for a connected, interoperable web without silos. Ceramic is ideal for storing information that requires guaranteed trust, cross-platform interoperability, and multi-party consumption.

      what ceramic

    1. The big general use case I see is sync and desktop management for Web2 projects.

      sync desktop management Web2

    1. Technology Partners (BTP)


    2. Amazon Quantum Ledger Database (QLDB) as a storage


    3. In cases where you don’t need a fully decentralized blockchain network, you can still use the power of immutable, programmable smart contracts but without the extra complexities.

      immutable programmable smart contracts

  2. Mar 2020
    1. subject matter expert for Networked Improvement Communities and designed Roundtables


    2. People must be at the heart of the Internet which can be an Internet of the People, by the People and for the People.

      of for by the People

    1. Software begins as diagrams on a whiteboard, NoFlo keeps it that way

      start diagram keep

    2. Code inevitably collapses of its own complexity

      code collapse complexity

    1. Builds on the Java Database Connectivity (JDBC) standard Translates SQL into Neo4j’s native, graph-optimized Cypher language Makes connected data insights accessible in real-time Is fully supported and ready for production, enterprise deployment

      JDBC, SQL 2 Cypher

    1. rather than wasting time implementing subsets of human-level intelligence.

      human-level intelligence

      human-level intelligence relies on human intellect, the capacity to comprehend a situation and articulate tacit awareness.

      Disembodied Perceptrons without the continutity of responsive viable situatedness there is no emergence of intellect.

      Hence the very conceptualization of Artificial Intelligence (punting intellect) is a born degenerative research program.

    2. avoid human-complete problems, because we know those are currently infeasible

      avoid human-complete problems

    3. A “human-complete” problem is one that is so hard that if a computer could do that, it could do anything a person can do.

      "human-complete" problems

    4. Each problem is simply to figure out what the problem is!

      figure out what the problem is

      In this sense problems define their own solutions

    5. Finding a good formulation for a problem is often most of the work of solving it.

      good formulation solving

    6. Meta-systematic cognition evaluates, chooses, combines, modifies, discovers, or creates systems—rather than working within one.

      create system not within one

    1. offset:{x:Number, y:Number} - to offset the position from the center of the canvas (in DOM units),


    1. access the previous research of the people you trust in a specific topic and compare it with others to understand nuances and break out of filter bubbles

      access previous research by people you trust

    2. Share all archived websites on IPFS, Dat or Arweave.


    3. Export/Import your data from Hypothes.is.
    4. build an entirely different social network that still can connect with people in old ones.

      build new social network can still connect to old ones

    5. full control over where and how their personal data is stored, and to access it

      control over personal data

    1. Once we have data from multiple applications stored in a single datastore, we can work more on connecting this data and experimenting with models to that. We don't want a user to have multiple separate contact lists for example, but being able to show and manipulate it from any of the installed applications that interact with the user list. This probably includes describing data with standards like RDF, figuring out what the most suitable database engine is to keep things reasonably efficient, etc.

      work on connecting and experimenting with models.

    1. Affordances show what the possible actions are, while signifiers help you discover these possibilities. “Affordances provide strong clues to the operations of things.”

      affordances sugnifiers

    1. This is a blinkered view which is literally costing the earth and the wellbeing of its inhabitants.

      costing the earth

    2. a linear or extractive economy

      linear extractive

    3. One depleted column looks like someone had played Jenga with the bricks but the old edifice had forgotten to fall down

      jenga column

    4. Finishing what you start and maintaining what you finish is not a high priority.

      maintaining finish

    5. We need intellect to solve our ingrained problems.  Intelligence to pass exams is not enough.

      We need intellect. Yes that one that no artificial intelligence can "touch"

    1. Cells, fetching, and storing. For a number of reasons it is convenient to create functions which serve as names. In particular, we shall need this facility in describing the semantics of definitions in FFP systems. To introduce naming functions, that is, the ability to fetch the contents of a cell with a given name from a store (a sequence of cells) and to store a cell with given name and contents in such a sequence, we introduce objects called cells and two new functional forms, fetch and store

      cell fetch and store a.k.a localStorage

    2. Here, however, some cells may name data rather than functions; a data name n will be used in l'n (fetch n) whereas a function name will be used as an operator itsel

      cells may name data

    3. . There is one protocol for changing the state: compute the new state by function application. Besides these communications with the state, AST se- mantics is applicative (i.e. FFP). It does not depend on state changes because the state does not change at all during a computatio

      Essence of AST

    1. probably would never notice performance problems until you start hitting thousands or hundreds of thousands of instances of a module on a page

      cost of module pattern

    1. GDPR compliance and privacy by design

      privacy by design

    1. Two-way binding means that changes of either application state or application UI (for example, with input-elements) automatically update the other.

      two-way binding in Apprun

    1. informational privacy an essential element in an individual’s autonomy

      privacy element in individual's autonomy

    2. We never stop becoming ourselves, so protecting a person’s informational privacy also means allowing that person the freedom to change, ontologically.

      never stop becoming ourselves

    3. matter of construction of one’s own informational identity

      construction of informational identity

    4. principle of private propriety but that of inviolate personality

      inviolate personaility

    5. he right not to be kidnapped

      right not kidnapped

    6. a sense of constitutive and intimate belonging, not of external and detachable ownership, a sense in which my body, my feelings and my information are part of me but are not my (legal) possessions.

      intimate belonging not detacheable

    7. a piece of information constitutes an agent,

      information constitutes an agent

    8. Heuristically, violations of informational privacy are more fruitfully comparable to kidnapping rather than trespassing:

      kidnapping rather than tresspassing

    9. protection of personal identity

      privacy protection of personal identity

    10. anything done to your information is done to you, not to your belongings.

      information not belongings its you

    11. “you are your information”

      you are your information

    12. Brain-washing is as much a privacy breach as mind-reading.

      brain washing privacy breach as mind reading

    13. This view is close to the interpretation of privacy in terms of protection of human dignity defended by Bloustein [1964]).

      privacy protection of human dignity

    14. understand the right to informational privacy as a right to personal immunity from unknown, undesired or unintentional changes in one’s own identity as an informational entity, either actively – collecting, storing, reproducing, manipulating etc. one’s information amounts now to stages in stealing, cloning or breeding someone else’s personal identity – or passively – as breaching one’s informational privacy may now consist in forcing someone to acquire unwanted data, thus altering her or his nature as an informational entity without consent

      privacy personal immmunity from altering his nature asn an informational entity

    15. the nature of a person as being constituted by that person’s information

      person constituted by person's information

    16. dampen the force of our aspirations

      dampen apirations for individuality

    17. erasing all personal identity and individuality, a “final solution”

      erasing of personal identity "final solution"

    18. multiagent system (the society) and the identity of the agents (the individuals) constituting it.

      multiagent system society agents individuals

    19. takes into account the essentially-informational nature of human beings and of their operations as social agents

      essentially-informational nature of human beings

    20. the end of privacy, for the dead past is only a synonym for “the living present”,

      end of privacy, dead past synonym for the living present

    21. atients are transformed into proficient mind-readers and telepathists.

      mind readers, telepathists

    22. radical form of re-engineering, one that not only designs, constructs or structures a system (e.g. a company, or a machine) anew, but that fundamentally transforms its intrinsic nature.

      re-ontologzing, radical re-engineering, changing intrinsic nature

    23. ICT as re-ontologizing technologies

      ICT re-ontologizing technologies

    24. the smaller the informational gap among them, and the lower the level of informational privacy implementable

      smaller gap less privacy

    25. establishing and maintaining channels of communication

      establishing channels of communication

    26. ontological friction regulating the information flow within the system

      ontological friction regulating information flow

    27. Accessibility, in its turn, is an epistemic factor that depends on the ontological features of the infosphere

      accessibility, epistemic factor, ontological features

    28. degree of accessibility of personal data.

      degree of accessibility

    29. Infosphere is a neologism I coined years ago on the basis of “biosphere”, a term referring to that limited region on our planet that supports life. It denotes the whole informational environment constituted by all informational entities (thus including informational agents as well), their properties, interactions, processes and mutual relations. It is an environment comparable to, but different from cyberspace (which is only one of its sub-regions, as it were), since it includes also off-line and analogue spaces of information.

      infosphere includes analogue spaces of information in contrast to cyberspace


    1. The ontological interpretation of informational privacy

      need an epistemological and heuristic interpretation too

    2. it is not just a technological challenge, it is above all an economical, organizational and design challenge.

      technological, economical, organizational and design challenge

    3. Trust KPI: the decision-making tool that exceeds the policy and allows to manage data and processing in a conscious and personalised way.

      Trust KPI conscious and personalised

    4. specifies the parameters of data processing in a machine-readable language

      parameters of data processing

    5. co-creation of value from data without the need for data sharing (protection by design);

      co-creation protection by design

    6. "data center" evolve towards the concept of "data borders".

      data centers, borders membranes

    7. Redesign business models for interoperability and ecosystem.

      interoperability and ecosystem

    8. Treat data as a personal capital to be invested in the creation of individual and collective value.

      data as personal capital create individual and collective value

      I did tweet recently claiming all value is knowledge thinking of all wealth is knowledge (Gilder)

    9. Monitor, manage and customize data usage in real-time

      manage data usage real-time

    10. Replace the one-time “act of faith” of the privacy policy with a real-time “act of trust”, conscious and dynamic”

      act of faith vs act of trust conscious and dynamic

      transclusion, transcopyright

    11. "trusted middleware" processing data without revealing its content.

      "trusted middleware" without revealing content That is exactly the model based on content addressable protocols like IPFS

    12. Subscribe to a new economic-organizational system of rules enabling an aware and responsible data management through protocol and code

      new economic system aware and responsible data management through code

    13. replacing the market of data acquisition affected by information asymmetry. Eliminate the very concept of data sharing.

      information asymmetry elminate data-sharing transclusion not copy paste

    14. real data pro-action (a necessary condition for data-driven economic and social growth)

      data pro-action needed for data-driven growth

    15. risk of backlashes due to data sharin


    16. not just a matter of data protection, but also of pro-action.

      not pro-tection but pro-action

    1. Creating an omniscient assistant coupled with personalized and private data stores will make them much more adoptable and convenient for the end user.

      omniscient (personal) assistant

    1. whether thought operates indwellingly within a universe of its own creation, or interprets and controls nature as given to it from outside, the same paradoxical structure prevails throughout the articulate systems so far surveyed. There is present a personal component, inarticulate and passionate, which declares our standards of values, drives us to fulfil them and judges our performance by these self-set standards.


    1. minimum vital to be able to build knowledge bases in phase with reality !!!

      minimum vital yes

    2. People normally cut reality into compartments, and so are unable to see the interdependence of all phenomena. To see one in all and all in one is to break through the great barrier which narrows one's perception of reality.

      compartments one all

    1. Hand-waving web tinkerer who cares about open source and the decentralized web.

      hand-waving web tinkerer

    1. how can smaller pieces form larger wholes that are as smart, wise, and capable as possible?

      smart wise capable

    1. how can smaller pieces form larger wholes that are as smart, wise, and capable as possible?

      smart wise capable

    1. Persistently taking beneficial chances is never beneficial at the end.

      beneficial chances not

    1. Look for a product or niche where a larger competitor (in a related market) cannot beat you using Gambler’s Ruin

      cannot be beaten

    2. Look for an application of the technology or product which is like a game

      like a game

    3. Look for some other product that is growing and become part of it

      part other product

    4. Choose the inexorable growth model and hope for the best

      inexorable growth

    5. The implementation should be fast•It should be small•It should interoperate with the programs and tools that the expected users are already using•It should be bug-free, and if that requires implementing fewer features, do it

      fast small interoperate bug-free

    6. Toward a Theory of Technology Acceptance: Design•Simplicity: The design should be simple in implementation. The interface should be simple, but anything adequate will do. Implementation simplicity is the most important consideration in a design.•Minimal Completeness: The design should cover only necessary situations. Completeness can be sacrificed in favor of any other quality. In fact, completeness should be sacrificed whenever implementation simplicity is jeopardized.•Minimal Correctness: The design should be correct in all observable aspects. •Minimal Consistency: The design should be consistent as far as it goes. Consistency is less of a problem because you should always choose the smallest scope for the first implementation.•Minimal Abstraction: The design should require limited abstraction competence. Further, abstraction gets in the way when it makes implementation too hard, too slow, or hides information that shouldn’t be hidden. (And . . . Abstractions = page-faults

      simplicity minimal abstraction

    7. Wade’s Maxim:No one ever made money by typing

      make money typing

    1. TedNelsonwasright:weneedtwo-waylinks,transclusion,andmicropayments.

      Ted was right.

    1. Can we be comfortable in the unknown and let it unfold and play?

      comfortablw with the unknown play

    1. Google essentially has the same role Microsoft did at the height of the browser wars...majority market share and lazy developers. So new shiny things tend to be Chrome-only.

      Google Microsoft Chrome only

    2. wonder whether people decide to do something in [x] framework to make their work sound cool, before even knowing what it is they are building.


    3. I mean, JavaScript being required to view pages sounds like Pandora’s already opened box

      pandora singlefile

    4. The ability to source some js and then add a <custom-element> wherever you want just like it was a built in element is one of the best things to ever happen to web design.

      custom element best thing

    1. great value in having available the associative-trail marking and following processes.

      associative-trails marking and following processes

    2. Statements very often had implicit linkages to other statements in the same group, and it would have been very useful to keep track of these associations.

      keep track of associations

    1. each individual is at once the cause for the whole and is caused by the whole

      cause and caused

    1. what is the most powerful thing we can make that is simple enough for people to use, Most engineers do not ask that question

      most powerful but simple

    1. You can also initialize a SPA project

      SPA project

    2. Use the AppRun CLI to initialize a TypeScript and webpack configured project:

      AppRun CLI

    3. npm install apprun

      step 1

    1. "I must not fear. Fear is the mind-killer. Fear is the little-death that brings total obliteration. I will face my fear. I will permit it to pass over me and through me. And when it has gone past I will turn the inner eye to see its path. Where the fear has gone there will be nothing. Only I will remain."

      Litany against fear

    1. "Thou shalt not make a machine in the likeness of a human mind,"

      machine image human mind

    1. "we can know more than we can tell."[1]

      know more than we can tell and say more then we can know

    1. simple walkthroughs that introduce users to how an app can be used and what it can accomplish.


    1. Bernard Bolzano published a booklet entitled Contributions to a Better-Grounded Presentation of Mathematics

      Bolzano better-grounded presentation

    2. n abstract theory of combinations and relations among objects whatsoever.

      abstract theory combinations relations objects

    3. mathesis to be “the science of all things that are conceivable.”

      mathesis science all conceivable

    4. “the mathesis […] shall deliver the method through which things that are conceivable can be exactly determined”

      conceivable exactly determined

    1. We don’t seek big. We seek small; tiny even. Small is the new big.

      seek small

    1. Your ideal (“perfect”) PKM will likely be some “homebrew” style/version that closely models the Zettelkasten Method.

      PKM homebrew Zetterkasten Method

    2. Writing is not a linear process but a circular one.

      writing circular

    3. demonstrates the contextual association (relations between things). I never have to remember Dynalist (a new-ish clone/alternative to Workflowy).

      contextual association


    4. “In which CONTEXT will I want to stumble upon it again?”

      which context stumble upon

    5. PKM is a systems approach to dealing with the firehose of fragmented information that bombards our headspace daily.

      firehose fragmented information

    1. We created IOI to address a gap: a gap between the promise of open scientific and scholarly infrastructure and where it is now,” said Dan Whaley, founding IOI Steering Committee member and CEO of Hypothesis. “Our belief is that working together, we can substantially improve the coordination and interoperability between projects, and dramatically expand the global funding into this critical space. We began a search for a uniquely qualified individual to lead this effort and were thrilled when Kaitlin signaled her interest. Those of us who know her achievements understand what a remarkable match she is for this role. We’re looking forward to the transformation we can achieve together.” Prior to joining Invest in Open Infrastructure, Thaney was the Endowment Director at the Wikimedia Foundation, where she worked to build a $60M endowment to support Wikipedia and other free knowledge projects. In addition to her time at Wikimedia, she has led programmatic work at Mozilla, helped launch and grow scientific software businesses for Digital Science, and built open access and open data infrastructure for Creative Commons. She also serves on the board of LYRASIS, an open technology vendor serving higher education, libraries, archives and museums, and recently served as the Board Chair of Code for Science & Society, Invest in Open Infrastructure’s fiscal sponsor. “I’ve dedicated my career advocating for, building, and sustaining open infrastructure to advance research and society,” Thaney said. “I’m excited I get to continue that mission as we ensure a healthier ecosystem for open research for years to come.”

      gap open scientific and scholarly infrastructure

    1. It was from Augustine that she borrowed the phrase amor mundi — “love of the world” — which would become a defining feature of her philosophy.

      amor mundi

    1. work, thinking, and research accretes rather than being just a function of recent memory

      research thinking accretes even accreate

    2. I’ve always considered myself to be someone who can connect the dots, but I’ve never had a tool enhance the process so well.

      tool to connect the dots

    3. way of organizing my research, thinking through tricky problems, and synthesizing that research into more cohesive chunks

      cohesive chunks

    4. The bi-directional linking is killer, and feel like I'm barely scratching the surface!

      bi-directional linking is killer

    5. Roam feels like a tool I’ve always wanted. The natural bidirectional linking is blowing my mind. Can’t wait to see it grow.

      natural bidirectional linking

    6. Treesheets
    7. loved the bidirectional intelligence

      bidirectional intelligence

    8. As easy to use as a word document or bulleted list, and as powerful for finding, collecting, and connecting related ideas as a graph database. Collaborate with others in real time, or store all your data locally.(

      roam headline

    9. retrieving specific details or following train of thought.

      following train of thought

    10. great power comes great brittleness (and inability to collaborate).

      power comes brittleness inability collaborate

    1. Technologies and Interoperability in the Built Environment:

      interoperability built environmnet

  3. www.semantic-web-journal.net www.semantic-web-journal.net
    1. Social Internet of Things for Domotics: a Knowl-edge-based Approach over LDP-CoAP

      constrained application protocol

    2. The use of semantic knowl-edge in multi-camera monitoring systems guaranteesthe protection of the user privacy by not sending norsaving any image, just extracting the knowledge fromthem.

      camera privacy extracting knowledge

    1. "Business-Driven Ontologies for Ontology-Driven Businesses".

      BDO ODB

    1. The thing to remember is that relational databases, ironically, are very slow at looking up relationships. They are sometimes called “row stores” because their primary design goal is fast row-by-row access.

      relational databases slow at looking up relationships

    2. Relationship lookups are fast!

      relationship lookups are fast

    3. lookup adjacent nodes in a graph. They do a direct walk of memory. This is called pointer hopping.

      pointer hopping

    4. “direct neighbor walk” metaphor.

      for index-free adjacency