3,473 Matching Annotations
  1. Apr 2023
  2. bafybeif256apzzimba2sy447spztswmldk3d7rj4umbchhghsy4s4xyobe.ipfs.w3s.link bafybeif256apzzimba2sy447spztswmldk3d7rj4umbchhghsy4s4xyobe.ipfs.w3s.link
    1. Fostering cooperation at global scale

      // eventual global scale need to be able to Scale Reach so that people and missions and Networked Autonomous Organi(zations|nism) Communities themselves can co-evolve to scale their collective capacities with eventual global scale/impact

      Plurality and autopoiesys of the Communications patterns are key of we wish to avoid dystopia

      Need to apply Conway's law backward:

      https://hyp.is/sXzkNt9qEe2mOod1597h0w/dev-indy0.fission.app/hyp/facet/aiframe.html?params={%22user%22:%22gyuri%22,%22group%22:%22all%22,%22url%22:%22%22,%22wildcard_uri%22:%22%22,%22tag%22:%22%22,%22any%22:%22conway%27s%20law%22,%22max%22:%2220%22,%22service%22:%22https://hypothes.is%22,%22exactTagSearch%22:%22true%22,%22expanded%22:%22true%22,%22addQuoteContext%22:%22true%22,%22format%22:%22html%22,%22_separate_replies%22:%22false%22,%22groupName%22:%22All%22,%22sortBy%22:%22recency%22}

      FAIR

      Findable, Accessible, Interoperable, Reusable

      and their work "composable" build on each others work and reorganize into larger wholes

    2. the problem with ceding access control to aggregators

      At this point we could offer access to post by offering a link to the contributors own(ed) IndySpace

      which will have links back to the original and can also encourage visitors to this page to join the aggregator by also being able to show hum much mnore is available over there

      scaling access, scaling reach

    1. Én túllépek e mai kocsmán, az értelemig és tovább! Szabad ésszel nem adom ocsmány módon a szolga ostobát.

      Szabad ésszel nem adom ocsmány módon a szolga ostobát.

    1. Scale-free networks - Math InsightMath InsightScale-free networks - Math InsightProperties of PPINs: scale-free networks | Network analysis of protein interaction dataEMBL-EBINetwork analysis of protein interaction ...File:Graph-representation-of-the-modular-scale-free-network-The-nodes-are-colored-according.png - Wikimedia CommonsWikimedia CommonsFile:Graph-representation-of-the ...python - How can I check if a network is scale free? - Stack OverflowStack Overflownetwork is scale free ...Examples of a random network and a scale-free network. Each graph has... | Download Scientific DiagramResearchGateExamples of a random network and a ...Attack Tolerance of Networks – Global4CastGlobal4CastAttack Tolerance of Networks – Global4CastRelated searchesscale free vs random networkscale free network graphsmall world scale free networkImage ResultsScale-free networks, a controversial topic solved by extreme mathematics – The Network PagesThe Network PagesScale-free networks, a controversial ...Types of Networks: Scale-Free, Power Law, and Degree Distribution – Nodus Labs Support CenterNodus Labs Support CenterNetworks: Scale-Free, Power Law ...Scarcity of scale-free topology is universal across biochemical networks | Scientific ReportsNatureScarcity of scale-free topology is ...Entropy | Free Full-Text | A Model for Scale-Free Networks: Application to TwitterMDPIA Model for Scale-Free Networks ...Scale-free networks, a controversial topic solved by extreme mathematics – The Network PagesThe Network PagesScale-free networks, a controversial ...Network Models - Random network, Scale-free network, Hiera… | FlickrLicensableFlickrNetwork Models - Random network, Scale ...Schematic representation of a scale-free network. The “hubs”, nodes... | Download Scientific DiagramResearchGatescale-free network ...9web.mit.edu9Scale-free network and power law distribution. (A, B) The U.S. highway... | Download Scientific DiagramResearchGateScale-free network and power law ...Scale-free network - WikipediaWikipediaScale-free network - WikipediaScale-free networks are rare | Nature CommunicationsNatureScale-free networks are rare | Nature ...Scale-free structure of cancer networks and their vulnerability to hub-directed combination therapy | bioRxivbioRxivScale-free structure of cancer networks ...Chapter 8 – Network Science by Albert-László BarabásiNetwork Science by Albert-László BarabásiChapter 8 – Network Science by Albert ...Scientistshave recently discoveredthat variouscomplexsystemshave antlnderlyihg~..'~tJ;i~e~tu"eg~Ye'l"rne(;lb9.$ha redBarabasiScientistshave recently discoveredthat ...Scale-free networksGreen Tea PressScale-free networksEntropy | Free Full-Text | A Model for Scale-Free Networks: Application to TwitterMDPIA Model for Scale-Free Networks ...Scant Evidence of Power Laws Found in Real-World Networks | Quanta MagazineQuanta MagazinePower Laws Found in Real-World Networks ...The birth of a scale-free network. ( Top and Middle ) The simplest... | Download Scientific DiagramResearchGateThe birth of a scale-free network ...Scale-free networks, a controversial topic solved by extreme mathematics – The Network PagesThe Network PagesScale-free networks, a controversial ...Entropy | Free Full-Text | A Model for Scale-Free Networks: Application to TwitterMDPIA Model for Scale-Free Networks ...dictionary - Python: how to generate a scale-free network with pre-defined node positions? - Stack OverflowStack Overflowhow to generate a scale-free network ...The Root of the Power Law Religion, Edward BergeIntegral WorldThe Root of the Power Law Religion ...Chapter 4 – Network Science by Albert-László BarabásiNetwork Science by Albert-László BarabásiChapter 4 – Network Science by Albert ...Scale-Free Network - Social Dynamicssocial-dynamics.orgScale-Free Network - Social DynamicsRelated searchessmall world networkrandom network degree distributionscale free imageImage ResultsComparison of random, small-world and scale free networks. Topological... | Download Scientific DiagramResearchGatescale free networks. Topological ...Types of Networks: Random, Small-World, Scale-Free | Nodus LabsNodus LabsRandom, Small-World, Scale-Free ...Scale-free networks - Math InsightMath InsightScale-free networks - Math InsightWhat are the differences between scale-free networks and random networks? - QuoraQuorascale-free networks and random networks ...Scale-free networks are rare | Nature CommunicationsNatureScale-free networks are rare | Nature ...Scale-free Networks by Giorgio Bertini - IssuuIssuuScale-free Networks by Giorgio Bertini ...Scale-free networks are rare | Nature CommunicationsNatureScale-free networks are rare | Nature ...Scale Free Networks. - ppt video online downloadSlidePlayerScale Free Networks. - ppt video online ...Scientistshave recently discoveredthat variouscomplexsystemshave antlnderlyihg~..'~tJ;i~e~tu"eg~Ye'l"rne(;lb9.$ha redBarabasiScientistshave recently discoveredthat ...Scale-free networks - Math InsightMath InsightScale-free networks - Math InsightEntropy | Free Full-Text | The Fractional Preferential Attachment Scale-Free Network ModelMDPIThe Fractional Preferential Attachment ...Scale-Free Nature of Social Networks | SpringerLinkSpringer LinkScale-Free Nature of Social Networks ...Scale-free networks – CNR-ISCCNR-ISCScale-free networks – CNR-ISCPower laws and scale-free networksusers.dimi.uniud.itPower laws and scale-free networksAn illustration of two kinds of large-scale networks. In the scale-free... | Download Scientific DiagramResearchGatelarge-scale networks ...Scale Free Network · Books From Australia - Connect with Australian PublishersBooks From AustraliaScale Free Network · Books From ...Chapter 8 – Network Science by Albert-László BarabásiNetwork Science by Albert-László BarabásiChapter 8 – Network Science by Albert ...The resilience of random and scale-free networks | Download Scientific DiagramResearchGatescale-free networks ...There is no such thing as a scale free network – Mind the PostMind the PostThere is no such thing as a scale free ...Frontiers | Opinion Formation on the Internet: The Influence of Personality, Network Structure, and Content on Sharing Messages OnlineFrontiersOpinion Formation on the Internet ...PDF] Growing scale-free networks with tunable clustering. | Semantic ScholarSemantic ScholarPDF] Growing scale-free networks with ...Visual illustration of the difference between an exponential and a... | Download Scientific DiagramResearchGatedifference between an exponential ...Network topology optimization by turning non-scale-free networks into scale-free networks using nonlinear preferential rewiring method - Feng Su, Peijiang Yuan, Yuanwei Liu, Shuangqian Cao, 2018SAGE Journals - Sage PublicationsNetwork topology optimization by ...Scale-Free Nature of Social Networks | SpringerLinkSpringer LinkScale-Free Nature of Social Networks ...Related searchesclustering coefficientpower law distributiontypes of networkImage ResultsSubnets of scale-free networks are not scale-free: Sampling properties of networks | PNASPNASSubnets of scale-free networks are not ...Network topology optimization by turning non-scale-free networks into scale-free networks using nonlinear preferential rewiring method - Feng Su, Peijiang Yuan, Yuanwei Liu, Shuangqian Cao, 2018SAGE Journals - Sage PublicationsNetwork topology optimization by ...python - How can I check if a network is scale free? - Stack OverflowStack Overflownetwork is scale free ...The role of hubs in Scale Free network. | Download Scientific DiagramResearchGateThe role of hubs in Scale Free network ...Spectra of weighted scale-free networks | Scientific ReportsNatureSpectra of weighted scale-free networks ...Scale-Free network with hubs. An example of a scale-free network.... | Download Scientific DiagramResearchGateScale-Free network with hubs. An ...Entropy | Free Full-Text | A Model for Scale-Free Networks: Application to TwitterMDPIA Model for Scale-Free Networks ...Fractal and Transfractal Scale-Free Networks | SpringerLinkSpringer LinkTransfractal Scale-Free Networks ...Example of a scale-free network. (left) The network representation.... | Download Scientific DiagramResearchGateThe network representation ...Scale-Free Networks: Complex Webs in Nature and Technology (Oxford Finance Series): Caldarelli, Guido: 9780199211517: Amazon.com: BooksAmazon.comScale-Free Networks: Complex Webs in ...Scale Free Networks. - ppt video online downloadSlidePlayerScale Free Networks. - ppt video online ...Deterministic scale-free networks - ScienceDirectScienceDirect.comDeterministic scale-free networks ...aaronclauset@fediscience.org on Twitter: "Excited to share this new work: " Scale-free networks are rare," from Anna Broido and me. We applied rigorous statistical tools to test for scale-free patterns in nearly 1000 networkTwitterScale-free networks ...Entropy | Free Full-Text | Conflict Dynamics in Scale-Free Networks with Degree Correlations and Hierarchical StructureMDPIConflict Dynamics ...Scale-Free Nature of Social Networks | SpringerLinkSpringer LinkScale-Free Nature of Social Networks ...Complexity ExplorerComplexity ExplorerComplexity ExplorerScale Free NetworksFutureLearnScale Free Networksa An example of a scale-free network. b An example of a small-world... | Download Scientific DiagramResearchGatea An example of a scale-free network. b ...Chapter 4 – Network Science by Albert-László BarabásiNetwork Science by Albert-László BarabásiChapter 4 – Network Science by Albert ...Graph database Neo4j Directed graph Degree, Scalefree Network, branch, symmetry png | PNGEggPNGEggGraph database Neo4j Directed graph ...Scale-Free Networks | ComputerworldComputerworldScale-Free Networks | ComputerworldEntropy | Free Full-Text | Generalized Ising Model on a Scale-Free Network: An Interplay of Power LawsMDPIGeneralized Ising Model on a Scale-Free ...Subnets of scale-free networks are not scale-free: Sampling properties of networks | PNASPNASSubnets of scale-free networks are not ...Complex Network IIFreeComplex Network IIPopular searchesscale free networkscale free distributionrandom networkImage ResultsExtended Scale Free Networks | FreakonometricsFreakonometrics - HypothesesExtended Scale Free Networks ...Scale-Free Nature of Social Networks | SpringerLinkSpringer LinkScale-Free Nature of Social Networks ...Simulating Scale-Free Networks using Python | by Saptarshi Chaudhuri | MediumMediumSimulating Scale-Free Networks using ...Entropy | Free Full-Text | A Model for Scale-Free Networks: Application to TwitterMDPIA Model for Scale-Free Networks ...Looks like you've reached the endLooks like you've reached the endUnable to load more. RetryWait while more content is being loadedLoading....JgfpDb.cZEg1e,.JgfpDb .cZEg1e {background-color:#171717;}.JgfpDb .hg1n7d {background-color:#171717;}.JgfpDb .T3kEIe {border-color:#3c4043;}.JgfpDb .AKESWd {fill:#9aa0a6;}.JgfpDb .w8utCe {background-color:#00000099;}.JgfpDb .gFhjPe {color:#ffffff;}.JgfpDb .QeR15e {fill:#ffffff;}.JgfpDb .WPHIuf {background-color:#8ab4f8;}.JgfpDb .Pw5kW {color:#202124;}.JgfpDb .legCh {background-color:#394457;}.JgfpDb .K8E1Be {color:#d2e3fc;}.JgfpDb .unDjgb {background-color:#303134;}.JgfpDb .MkRxHd {color:#bdc1c6;}.JgfpDb .lAteZd {fill:#bdc1c6;}.JgfpDb .gNSdQc {color:#8ab4f8;}.JgfpDb .mKq8g {color:#e8eaed;}.JgfpDb .V2CwNc {fill:#e8eaed;}.JgfpDb .goedYd {color:#bdc1c6;}.JgfpDb .FdgZ8c {fill:#bdc1c6;}.JgfpDb .ZoQenf {color:#9aa0a6;}.JgfpDb .jztYkb {background:#fdd663;}.JgfpDb .qxfcJd {background:#80868b;}.JgfpDb .b0vFpe {background-color:#000000;}.JgfpDb.cZEg1e,.JgfpDb .cZEg1e {background-color:#171717;}.JgfpDb .hg1n7d {background-color:#171717;}.JgfpDb .T3kEIe {border-color:#3c4043;}.JgfpDb .AKESWd {fill:#9aa0a6;}.JgfpDb .w8utCe {background-color:#00000099;}.JgfpDb .gFhjPe {color:#ffffff;}.JgfpDb .QeR15e {fill:#ffffff;}.JgfpDb .WPHIuf {background-color:#8ab4f8;}.JgfpDb .Pw5kW {color:#202124;}.JgfpDb .legCh {background-color:#394457;}.JgfpDb .K8E1Be {color:#d2e3fc;}.JgfpDb .unDjgb {background-color:#303134;}.JgfpDb .MkRxHd {color:#bdc1c6;}.JgfpDb .lAteZd {fill:#bdc1c6;}.JgfpDb .gNSdQc {color:#8ab4f8;}.JgfpDb .mKq8g {color:#e8eaed;}.JgfpDb .V2CwNc {fill:#e8eaed;}.JgfpDb .goedYd {color:#bdc1c6;}.JgfpDb .FdgZ8c {fill:#bdc1c6;}.JgfpDb .ZoQenf {color:#9aa0a6;}.JgfpDb .jztYkb {background:#fdd663;}.JgfpDb .qxfcJd {background:#80868b;}.JgfpDb .b0vFpe {background-color:#000000;}TwitterShareReport this result1,100 × 442Neo4j on Twitter: "Graphs take on many shapes, such as random, small-world and scale-free networks. These shapes come in different flavours, driven by specific characteristics. Find out more in chapter 2 ofVisitImages may be subject to copyright. Learn MoreLoading...Send feedbackGet help.JgfpDb.cZEg1e,.JgfpDb .cZEg1e {background-color:#171717;}.JgfpDb .hg1n7d {background-color:#171717;}.JgfpDb .T3kEIe {border-color:#3c4043;}.JgfpDb .AKESWd {fill:#9aa0a6;}.JgfpDb .w8utCe {background-color:#00000099;}.JgfpDb .gFhjPe {color:#ffffff;}.JgfpDb .QeR15e {fill:#ffffff;}.JgfpDb .WPHIuf {background-color:#8ab4f8;}.JgfpDb .Pw5kW {color:#202124;}.JgfpDb .legCh {background-color:#394457;}.JgfpDb .K8E1Be {color:#d2e3fc;}.JgfpDb .unDjgb {background-color:#303134;}.JgfpDb .MkRxHd {color:#bdc1c6;}.JgfpDb .lAteZd {fill:#bdc1c6;}.JgfpDb .gNSdQc {color:#8ab4f8;}.JgfpDb .mKq8g {color:#e8eaed;}.JgfpDb .V2CwNc {fill:#e8eaed;}.JgfpDb .goedYd {color:#bdc1c6;}.JgfpDb .FdgZ8c {fill:#bdc1c6;}.JgfpDb .ZoQenf {color:#9aa0a6;}.JgfpDb .jztYkb {background:#fdd663;}.JgfpDb .qxfcJd {background:#80868b;}.JgfpDb .b0vFpe {background-color:#000000;}HALShareReport this result901 × 864[PDF] Small world networks and clustered small world networks with random connectivityVisitImages may be subject to copyright. Learn More

      Description

    1. Decentralized lending marketplace Earn on your assets or borrow to meet your needs without intermediaries in a secure way with our platform.

    1. This was a the original promise for the web. A place where you can congregate in your preferred spaces, rather than one giant tent where everyone pretended to be normies so as to not offend the advertisers.

      for : original promise web

    1. Woods, William A (1970). "Transition Network Grammars for Natural Language Analysis" (PDF). Communications of the ACM. 13 (10): 591–606. doi:10.1145/355598.362773.

      What's in a Link Author

    2. adding a recursive mechanism

      top down recursive descent parsing as in Meta-Lisp

    3. An augmented transition network or ATN is a type of graph theoretic structure used in the operational definition of formal languages, used especially in parsing relatively complex natural languages, and having wide application in artificial intelligence.

      is a - graph theoretic structure

      used in - definition of formal languages - parsing natural languages - AI

      // TrailMarks goes in the opposite direction - practical graph overlaying intentional mark in notation working at the level of associative complexes powered by praxtical extensible co-evolving graph based affordances - progressive injection of structure and interpretational affordances in a new way of augmented writing - augmenting human intellect rather than the machines

    1. differences between Datacenter and Residential proxies.

      residential proxies

    2. How to Use Chrome Browser Proxy Settings

      Description

    1. Margaret Wheatley

    2. Margaret Wheatley[34]
    3. A simpler way, Wheatley and Kellner-Rogers, 1998, https://www.worldcat.org/oclc/634222616
    4. Relationships are the pathways

      relationships ~ are - the pathways ~ for ~ organizing

      required for - the creation and - transformation - of - information,

      the expansion of - the organizational identity, and - accumulation of wisdom.

      Relationships - are formed with - information exchange - between - identifying / identifiable entities

      in identifying / identifiable organizings.

    5. Information is

      information - is - the medium of organizing

      Life ~ uses - information - to organize itself

      when : a system - assigns : meaning - to :data

      information ~ is ~ contextual ~ to - identities in relationships

    6. identity is the sense-making capacity of organizing.

      identity ~ is - the sense making capacity of organizing - of the selves - that - organize & - the selves - that - gets organized

      • narrative in nature
      • identities assemble in relationships

      involving & producing - personally & - socially - material information

    7. mistake legal identity for 'the real thing'. The legal construct of personal data[32] is similarly mistaken
    8. There is no such thing as personal data

      no such thing as : personal data - in the game of life

    1. A simpler way 25 reviewsAuthors:Margaret J. Wheatley, Myron Kellner-RogersPrint Book, English, 2003Edition:Paperback ed., [Nachdr.] View all formats and editionsPublisher:Berrett-Koehler, San Francisco, 2003
    1. ‘personal data’ means any information relating to an identified or identifiable natural person (‘data subject’)

      // the legal concept is conceived in terms of the viewpoint of service providers where

      // a natural person is designated as 'data subject' perfect step to disgusising information related to a person as data

    1. McCray, having coined the term

      McCray ~ coined the term : visioneering

      developing - a broad and comprehensive vision

      for how - the future might be radically changed by technology,

      doing - research and engineering

      to advance - this vision, and

      promoting - one’s ideas ~ to - the public and policy makers ~ in the hopes of - generating attention and - perhaps ~ even - realization”

      // prefix mark for trailmark (intentional term): ~ // postfix mark for trailmark term // prefix mark for Noun term (subject, object)

    2. isioneering (the engineering of a clear vision

      define : visioneering - engineering a clear vision

      // problems define their own envisioning pathways to solutions

    3. he Memex as the point of departure

      memex point of departure

    4. a Memex-inspired KM concept and system

      IPKM https://docdrop.org/video/QCkm0lL-6lc/ Inter(Planterary|Personal) Over Web Research Trails and Conversations an Evergreen Memex buitl from trust for trust for the Annotated Web

      Hypothesis Annimated Intro

    5. “generations-old” methods for diffusion and review deemed “totallyinadequate for their purpose
      • method of diffusion and review
      • totally inadequate for their purpose
      • tackling a steadily "growing mountain of research"
    6. ll easily accessibleand sharable with the “Memexes” of acquaintances

      shareable with Memexes = of acquaintances =

      // progrewsive involvment - visitor - audience - acquaintance - trusted peer - huddle - group - channel

    7. Memex, envisage

      = Memex - envisioned - intimate supplement to individuals’ memory,

      facilitate - storing, - recalling, - studying, and - sharing

      the “inherited knowledge of the ages”

    8. visioneering

      visioneering

    9. mutually beneficialco-evolution between individual and institutional KM activities

      mutually co-evolution between - individual and institutional KM activitites

    10. design scienceresearch

      DSR The envisioned - workflows, - infrastructure, - affordances, and - impact

      resulting from the - progressing design science - research and prototyping efforts

      // prototyping experiments driven research

      are - consolidated and reframed

    11. current KM unsustainabilities and emerging enabling technologies

      unsustainabilities emerging enabling technologies

    12. Boisot, M. Exploring the Information Space; University of Pennsylvania: Philadelphia, PA, USA, 2004; pp. 5–8.

      Exploring the Information space

    13. I-space [ 25].

      I-space Information Space

    14. twelve renowned KM models of knowledgecreation
    15. knowledge-based five-level-visioneering-framework

      visioneering framework

      Structure of the paper following personal knowledge management system (PKMS) project's six visioneering phases [15-17].

    16. supplement the reactive behavioral (natu-ral) science paradigm with the proactive design science paradigm to provide a roadmapfor conducting, and criteria for evaluating design science research in IT.

      reactive behavioral proactive

    17. embody “longitudinal streams ofresearch” where varied contributions need to be presented and published

      longitudional streams of research

    18. DSR undertakings are based on problem statements which, usually, are not framed ashypotheses and research questions since the focus is on design and development.

      not hypothesis but design and development

    19. related design science research (DSR) and prototyping

      DSR and prototyping

    20. contributing one’s own ideas and trails of interests,

      trails of interests

      // Yes Trail(Mark)s

    1. show that the way in which information is structured affects how it flows within agroup of agents

      actors not agents

    2. 'external scaffolding' of various kind

      external scaffoldings

    3. Exploring the information space: a strategicperspective on information systemsMax Boisot (boisot@attglobal.net)Researcher (IN3-UOC)Sol Snider Center for Entrepreneurial Research (The Wharton School, University of Pennsylvania)Working Paper Series WP04-003Submission date: January 2004Published in: May 2004

    1. surface structure interconnecting the content words of thesentence can always be represented as a graph deformation of the underlyingsemantic structure. This implies that certain word orders will be unacceptableways to express certain semantic intentions. As Fig. 3c illustrates, there is nograph deformation of the semantic structure in Fig. 3a which will provide asurface structure for the sentence in Fig. 3c; No matter how this is attemptedsome branches must cross. A surface structure is, by definition, a tree structurewithout crossing branches

      for : TrailMarks

      FLIP that : as synthetic autopoietic trailgraph formation and interpretative processes - structure and trailmark existing content presenting information in a way that intents can be rendered explicit in terms that themselves can be articulated and elaborated to the point of suggesting or even rendered effective their interpretation by humans first and potentially by in(formation) processing objects

      // Putting Humans at the center with machine supported information processing in the loop

      FLIP : Human in the Loop - current paradigm empowers machines first - with human being in the loop

      need systems that put - humans at the center of it All and - put machines into the loop for serving human needs first

    2. assumes a constraint betweenthe surface structure of the sentence and the graph structure of the sentence'snetwork representation. I have called this constraint the graph deformation con-dition. This constraint is illustrated in

      gloss : graph deformation condition

    3. analysis of a sentence

      synthesize articulate intent

    4. the graph deformation condition

      // analogue in : TrailMarks implicate graph in(formation) processing modules

      or rather

      in(formation) presented through intentional graph(formation) =

      of course everything can be "represented" uniformally as a graph

      and all that can be presented as trans(formation) of graphs mathing intent and human readable morphic forms

    5. The induced A T Ngrammar can be used both for sentence generation and sentence comprehension

      induced : ATN grammar - can be used for : sentence - generation & - comprehension

      // for : Anatomy of TrailMarks the "induced" (emergent through articulation) TrailMarks Intentional Meta Graph - can be used both for - articulating, externalizing information/content created by humans for humans through augmented authoring and enhancerd comprehenstion and - intentional interpretatation when the intentional structured made explicit thorugh mark in notation as clues are combined with effective description of computational processes composition of webnative computational objects that run in the browser typically javascript but really anything that can be run in the browser comforming tho the intentiona software as a conversation model of the IndyWeb

    1. Did you see the Estes park presentation on the OriginTrail system? I was wondering what your thoughts were. What's your take on 'decentralized' services backing onto a blockchain?

      great question thanks

    1. Web sites as unintended silos: The problem with getting data in and out of the web client

      drag over & drop

    2. Web Share Target API

    1. “Self-Issued Identities” mitigate these risks by design, because individuals have their personalinformation stored locally in an ID-wallet and not with a central Identity Provider. This increases andpreserves the users’ control and privacy by preventing any centralized instances or third parties fromhaving the ability to track which web applications a user is interacting with (to create user profiles

      self-issued identities - mitigate risk by design

      because - individual personal information stored local - in an ID-wallet

      Not just wallet but vellum

    1. Why We No Longer Run an Open Proxy

      no open proxy

    1. don’t need a higher power

      It is not a question of needing

      it is only a matter of acknowledging the dignity of being and that we are part of something greater than our selves

    1. Built-in support for creating web archives via ArchiveWeb.page

      that makes me buy into it right now!

    2. Enable people to make and use local first apps using the web Be minimal (fewer built-in features, leave more to the OS) Be open to anything p2p / decentralized / local-first Rely on web extensions for extra functionality Work with mesh networks / Bluetooth Low Energy networks

      really should giver it a whirl at least for personal use

    3. Agregore Browser A minimal web browser for the distributed web

      Description

    1. Tauri Build smaller, faster, and more secure desktop applications with a web frontend

  3. Mar 2023
    1. News, Articles, Updates and GuidesEverything about the private cryptocurrency

    1. the idea of a common reader for the web has faded.

      common reader for the web faded

      // we need a commons based collaborative writer for the Web We need to Flip the current Paradigm for the Web

      Shifitng the paradigm to be DECENTralized is a decent move

      but we need to flip it entirely from being Centralized, location addressed to People Centered, and intent addressed based on content addressability with protocls that support this like IPFS

      we can build Software as a Conversation with "Intent-Addressability" on the Web as IndyWeb what we need what we want is the dual of everything there is

      to deliver on the original Hope not quite promise of the Web: Open meaningful connections between all the People and Information that they engage with this

      Bring Your Own Indy Net Dashboard to the Web BYOIND

      Description

      and co-create the commons-based, peer produced constellations for the IndyWeb

      that is People-Centric instead of Server-Centric

      puts humanity at the center of everything we do with tech

      FAIR Information, no longer disguised and extracted as data

      and FAIR Apps for our owned Dashboard for the Web

    2. solve infoglut/FOMO,

      solve - Inflogut/FOMO by deeply integrating - social web annotation like - hypotheis - WorldBrain's to start with - annotation searches - IndyWeb Net Dashboard

    3. cobble together the same kind of dashboard

      personal information diet

      [test](http://localhost:8080/rte/?concept%20-%C2%A0PlexEme}

    4. publishing and subscribing to diverse feeds in a common way,

      pub sub to diverse feeds in a common way

    5. we allowed ourselves to get herded into them in the first place

      what's wrong: - silos can shut down their feeds - we allowed ourselves to get herded into them

      we can break free with the IndyWeb

    6. what would be a really great thing

      what would be a great thing for : people - no longer denigrated to be user loosers

      make easy to connect with - friends - family - coworkers - news and other information sources

      • join emergent interest based autonomous social networks as Autnomous Actors operating their owned Hubs
    7. It seems wrong

      the closest thing is : email

    8. envision a dashboard that subscribes to, and manages notifications from, all my sources

      envision a dashboard that - subscribes to & - manages notifications from - all my sources

    9. Where’s my next dashboard?

      imagine a - next-gen reader - // make it an interpersonal collaborative writer too - bring me the open web & my social circles - with me as an Autonomous Actor operating my own(ed) interpersonal IndyHub - attend to and manage all the flow. - // contribute to as well

      example : FlowReader been around since 2013.

      ten years on : make it a collaborative Web Flow - reader & writer distributor syndicator collaborator - weawing interpersonal networks of Trust - co-creating not only information as value flows - but co-creating the very means needed to create and improve upon them

    10. able to effectively follow a wide assortment of information flows

      follow - wide assortments of - informnation flows - in my Own(ed) Net DashBoard -

      on the IndyWeb

    1. capture complexity

      of all as possiplexity - as - non-linear, - branching merging intertwingled self-organizing Linked Text articulations via meaningful connections - freeing text from rectangularity and sequece expressing plurality of individual viewpoints emerging through autonomous inter personal collaboration and sharing

      associative complexes branching merging co-created mind plexes

    1. “🧩” U+1F9E9 Jigsaw Puzzle Piece Unicode CharacterComparthttps://www.compart.com › unicodeComparthttps://www.compart.com › unicodeU+1F9E9 is the unicode hex value of the character Jigsaw Puzzle Piece. Char U+1F9E9, Encodings, HTML Entitys:🧩,🧩, UTF-8 (hex), UTF-16 (hex), UTF-32 (hex)

      compart

    1. Google's privacy policies may apply

      speech to text online notepad

      for : speech notes, speechnotes

    2. Speechnotes

      z

  4. bafybeidcega7jd646gprmmrwttiitqknz6yliebzbsewfkewvewyutk7yu.ipfs.w3s.link bafybeidcega7jd646gprmmrwttiitqknz6yliebzbsewfkewvewyutk7yu.ipfs.w3s.link
    1. Deep Humanity & BEing Journeys Theoretical BackgroundDraft Rev 1.1

      annotate html version generated from google drive presentation

    1. God and Interpersonal Knowledge Matthew A. Benton

      interpersonal knowledge

    1. Ivo Velitchkov@kvistgaard#IPFS #PKG #iPKGQuote TweetTrail Marks@TrailMarks·Apr 27, 2022Replying to @TrailMarks @TrailHub1 and 3 others
    1. best outcome of a Collabathon in one

      moving towards - interoperability - connection among members - creating the conditions to flourish - with CTA principles

    2. CTA Proposal for Ecosystem Incubator

    1. We shall not cease from exploration

      Annotating the result of annotation searches!

    1. Project DeepSpeech

    2. DeepSpeech is an open source embedded (offline, on-device) speech-to-text engine which can run in real time on devices ranging from a Raspberry Pi 4 to high power GPU servers.

    1. Decentralized network

      Decent(ralized) Networks are shifting the paradigm from Centralized custodial to Decentralized and non-Custodial (read own your own information no longer disguised as data)

      This is a DECENT move. However, we don't need no verifiable credentials, wallets, agents, Once we flip the paradigm to one that is People-Centric. for a People Centered Internet, one that works for People, where they can be Autnonomous Actors, or efven Augcors in their own rights, owning their contributions, no need for licensing tricks, possession is the law, and they can grant access to whoevern they trust, but able to verify provenance of every interaction/exchange

      and Weave InterPersonal Networks Networks of meaningful connections between Individuals and their Autonomous digital HyperMedia Spaces that they co-,create and inhabit, for their own(ed) benefit first not the aggregators. People can set their own terms instead of being imposing take it leave it terms that take away even the ownership of their own contributions.

    2. a user already has a nearly unmanageable number of identities/credentialsand wants to reuse them. Bring your own Identity (BYOID) is the keyword.

      BYOID

      Bring Your Own Identity

    3. The ownerof the identity (Holder)

      the holder of the information

      more like the parties mutually verify

    4. authoritative source

      full provenance of relevant interaction

      is self-certifying authority

    5. A “decentralized identity”

      complete it with InterPersonal Trust Networked Identity

    1. We try out different personae on different platforms, in different locations, in different contexts. This is all quite natural, part and parcel of being human.

      different persona in different contexts

      part of being human

    2. Our identities,

      selves - formed through - internal narratives - informed by the interactions.

      interactions - modulated by - the identities.

      that are - Social, - reciprocal, - concurrent, and forever in flux.

    3. trust avoidance not trust building

      SSI is about ignoring human trust

    1. Web's original promise for meaningful connection

      As Joshua in one of the CICOLAB calls responded to me pushing the idea of facilitating the emergence and evergreen presence of InterPersonal trust networks between people as autonomous a(u)ctors each operating within their own spaces as hubs, his response was, but isn't that what we wanted over the past 30 years. It was never promised as such but we were all expected to be able to create meaningful connection between each other and our interests, work and play.

    1. AuctorWikipediahttps://en.wikipedia.org › wiki › AuctorWikipediahttps://en.wikipedia.org › wiki › AuctorAn author of a work, who is proficient in the subject matter ; A scientist who first describes a species or other taxon ; The seller at an auction

    2. About 21,000,000 results (0.33 seconds)

      !- search - google : auctor

    1. Auctoritas is a Latin word which is the origin of English "authority".

    1. [test](http://localhost:8080/rte/?concept%20-%C2%A0PlexEme}

  5. gitcoin-check.com gitcoin-check.com
    1. You’re invited to join us in a new chapter.

      gitcoin

    1. imagine you're giving a speech about how you created this well you'd 01:04:50 have to then work backwards as to how you would create it in order to make it work

      imagine work backward

    1. It has been suggested that - the human species may be undergoing an evolutionary transition in individuality (ETI).

      disagreement about - how to apply the ETI framework to our species, and - whether culture is implicated - as either cause or consequence.

      Long-term gene–culture coevolution (GCC) is also poorly understood.

      argued that - culture steers human evolution,

      others proposed that - genes hold culture on a leash.

      We review - the literature and - evidence on long-term GCC in humans and - find a set of common themes.

      commons themes are - culture appears to hold greater adaptive potential than genetic inheritance and - is probably driving human evolution.

      The evolutionary impact of culture occurs mainly through culturally organized groups, which have come to dominate human affairs in recent millennia. Second, the role of culture appears to be growing, increasingly bypassing genetic evolution and weakening genetic adaptive potential. Taken together, these findings suggest that human long-term GCC is characterized by an evolutionary transition in inheritance (from genes to culture) which entails a transition in individuality (from genetic individual to cultural group). Thus, research on GCC should focus on the possibility of an ongoing transition in the human inheritance system.

    2. suggested
      • = the human species may be
        • undergoing
      • an evolutionary transition in individuality (ETI)
    1. Web3. Mainstream.A permissionless layer 1 blockchain, empowering developers to create limitless Web3 apps for mainstream adoption

    Annotators

    URL

  6. guide.fission.codes guide.fission.codes
    1. app is running
      • no DevOps
      • or server scaling
    2. can design
      • user app
      • only front end and design skills
    3. Fission powers next generation app publishing.

      next generation app publishiing

    1. Webnative applications will not need to register user emails. However, we plan to add support for account recovery in a future version of Webnative, and email may become more relevant then.

      account recovery without email?

    2. visit ucan.xyz to learn more
    3. can configure the strategy using the Components API

      configurable authentication strategy

    4. Authentication strategies for registering and linking accounts

    1. “full control”

      //customize recommendation based on people's actually current focused attention flow

      // can only do that if the algorithms run on their own private inofmation on their owned device just for their benefit

      // can promite discovery and network effect - to obtain consent to send notification - to the aggregating relevant federation syndication points-

    2. create systems that sort, filter, and promote content.

      pressure inevitable

    3. But this is also where Substack’s ideology might run them into trouble.

      Yes

    4. the noise of email.

      escape

    5. Push notifications are a much more direct and clutter-free

      full distraction

    6. push notifications

      hell no

    7. a space in readers lives that is separate from administrivia and spam. A quieter, more sacred space.

      carve out

    8. Email is good for maintaining a direct relationship between readers and writers, but it kinda sucks as a place to read.

      It sucks, period

    9. create a new top-level destination for readers.

      never go there

    10. create content discovery loops

      doing what all the others do after all

    11. Substack

      fatal flaw: no micro paymement

      so extractive by design

    12. of signing up and paying for new newsletters. This is why from the beginning it’s been so important to Substack to limit the level of customization possible within their CMS.

      reduces the friction

    13. Nobody raises money at a $640m valuation without that commitment.

      there's the rub

    14. human attention flows

      searched fo it

    15. changing the systems that human attention flows through

      commitment to

    16. I see between backing up a big valuation versus doing what is best for individual publishers.”

      fundamental tension

    17. This is straight up something Substack will never do.

      never say never

      you will be bought out even if u try to resist

      delayed extraction all that is

      remeber alphabet

    18. Twitter makes money from your attention, so they need to compel your attention.

      but attention is sacred

    19. Substack’s Ideology The point isn’t just to make money—it’s to change the systems that humanattention flows through. You can’t understand Substack without understanding this.

      search : human attention flows

    20. content has intrinsic value and that it doesn’t have to be given away for free

      = content has intrinsic value

    1. v0.18.0: Relationship graphsDiscover the great new features in Steampipe's open source v0.18.0 release!

    1. Restoring the Web's original promise for meaningful connection

      It was more like a potential that everyone percieved than a promise

    1. first-class thing imagings

      thinkimagins

    2. dependency switch but it does but it also does something else it bottles it sort of takes everything to do with the change that the event talks about and bottles it into a thing 00:07:30 an object a record or something of a cert that you can refer to and pass around it makes the change a kind of first class thingamajig now when we do when we call a function 00:07:43 that's just a very transient thing

      thinkimaginings

      refer to and [ass around

      Named Everthin(g|k)

      not imagijigs but imaginings

      Everything is possible if you can imagine it so

    1. In an age of synthetic images and synthetic emotions, the chances of an accidental encounter with reality are remote indeed.

      – Serge Daney

    1. Tag: SIOP Events identity OpenID Connect Identiverse: Where are we with SIOP and DID?

      self-issued names

    1. Self Issued OpenID Provider v2 (SIOP) with optional OpenID for Verifiable Presentations (OpenID4VP)

      4 Self-issued names

      SIO Self-Issued Open ID

    2. SIOP v2 is an OpenID specification to allow End-users to act as OpenID Providers (OPs) themselves.

      Any attempt to provide Open Id while thinking of people as users is perpetuates the broken model

    1. Todo list for Self-Issued OP to achieve #self-sovereign-identityNat Zonehttps://nat.sakimura.org › 2018 › December › 10Nat Zonehttps://nat.sakimura.org › 2018 › December › 10Dec 11, 2018 — The same applies to the Self-issued identities. If the SIID has been in use for a long time, it may earn some credit on it.

    1. All You Need is Love: Peter Russell

      Time Binding through time

    1. Annie Margaret 3rd degree connection 3rd Faculty. ATLAS Institute. University of Colorado, Boulder. ATLAS Institute at CU Boulder Northwestern University Boulder, Colorado, United States

    1. Our attention is the most valuable resource we have. It is finite, and once it is spent there is no way to get it back.

      attention most valuable

    2. can’t be stored or accrue interest over time.

      = sure it can be "stored" - can accrue interest by furthering YOUR interests, pursuit - try annotating as you read. - mine your annotation for your benefit - reflect, curate and write about your learning - share it and have deep conversations about them - just use it or loose it

      https://twitter.com/TrailMarks/status/1634817343875342338#

    3. Your attention is sacred
    4. How do we regain agency to choose where and how we give our attention?
      • reply to this annotation
      • learn about the IndyWeb
    1. Word clouds considered harmful by Jacob Harris, a New York Times senior software architect (via FlowingData).

      world clouds

  7. developer.mozilla.org developer.mozilla.org
    1. In order to use the import declaration in a source file, the file must be interpreted by the runtime as a module.

      module import

    1. The Master Switch, who coined the term “net neutrality”—a revelatory, ambitious and urgent account of how the capture and re-sale of human attention became the defining industry of our time.

    1. Your Attention Is Sacred. - MediumMediumhttps://medium.com › your-attention-is-sacred-fea8d6...Mediumhttps://medium.com › your-attention-is-sacred-fea8d6...Dec 17, 2020 — Trigger warning. You are going to die. We all are. When that final moment comes, your life will have been a collection of everything you ...attention meaningPeople also search for(function(){var uer=false;var eid='z9PoV';(function(){var a=uer,b=Date.now(),c=google.c.sxs?"load2":"load";if(google.timers&&google.timers[c].t){var d=0;if(eid){var e=document.getElementById(eid);e&&(d=Math.floor(e.getBoundingClientRect().top+window.pageYOffset))}google.tick(c,"frt",b);google.tick(c,"frts",b);d&&google.c.e(c,"frtp",String(d));google.c.whu&&!google.c.wh&&(google.c.wh=Math.floor(window.innerHeight||document.documentElement.clientHeight));var f=google.c.wh,g;g=google.c.wh0&&!f?!1:d>=f;for(var h=document.getElementsByTagName("img"),k=0,l=void 0;l=h[k++];)google.c.setup(l,!0,d);google.c.frt= !1;g&&google.c.ubr(!1,b,d,!a)};}).call(this);})();