Jean Lievens: Stephen Downes on Mass Collaboration

Advanced Cyber/IO
Jean Lievens
Jean Lievens

Workshop on Mass Collaboration – Day One

Introduction to the Workshop – Ulrike Cress

Why a workshop in mass collaboration? Recent mass phenomena: Wikipedia, tagging, blogging, Scratch, massive open online courses and connectivism, citizen science, maker-space

Who is creating these? Nature article on massively collaborative mathematics (see the wiki PolyMath).

How do we describe these phenomena? Is it just aggregation? What role does coordination play? Is it a mass phenomena? Is it an emergent phenomena? Is it collective intelligence? And what are the processes behind this?

Stephen Downes
Stephen Downes

In science we need new methods for this. Previously, we would passively observe – but now we want people interacting. We have to try and find what these methods can do.

Can we design mass collaboration? Is it just something that self-starts, or can we create this?

CSCL 2013, we brought together people to talk about this. This led to the larger workshop we are hosting today.

Learn more.

Continue reading “Jean Lievens: Stephen Downes on Mass Collaboration”

Robin Good: Six Key Content Curation Insights Emerging from the Leaked NY Times Executive Summary

Advanced Cyber/IO, Media
Robin Good
Robin Good

Six Key Content Curation Insights Emerging from the Leaked NY Times Executive Summary

The leaked New York Times memo of less than a week ago is making the round on the Internet, as it touches upon many of the key issues and opportunities any news journalism operation is facing today.

From my personal viewpoint the most interesting aspect of this lengthy 97-page memo is how much curation, news and content curation specifically, are part of the future view being described in it.

Since, even trying read the in-depth curated version of the leaked NY report done by the excellent Nieman Lab it may take you in excess of 30 minutes, I have extracted and highlighted here below only the points that are specifically relevant to curators and to anyone researching the future of content curation within the context of news and journalism.

Here, six key points to pay strong attention to:

  1. …resurfacing archival content. The report cites this passage: ““We can be both a daily newsletter and a library — offering news every day, as well as providing context, relevance and timeless works of journalism.”
  2. …restructuring arts and culture stories that remain relevant long after they are initially published into guides for readers.
  3. …consider tools to make it easier for journalists, and maybe even readers, to create collections and repackage the content.
  4. allow readers to easily follow certain topics or columnists.
  5. better tagging of the info and content being published.
  6. focus on the less glamorous work of creating tools, templates and permanent fixes that cumulatively can have a bigger impact by saving our digital journalists time and elevating the whole report.

Nieman Lab curated report of the NY leaked Executive Summary document:

Original leaked copy of NY report: 97-pages

Berto Jongman: CYBER – 10 Ways to Kill the Internet — and Information-Sharing Analysis Centers (ISAC)

Advanced Cyber/IO, IO Deeds of War, IO Impotency
Berto Jongman
Berto Jongman

The bad with the good.

The Plan to Kill the Internet Uncovered

10 ways web freedom is being butchered worldwide.

LIST ONLY:

Click on Image to Enlarge
Click on Image to Enlarge

1) The Death of Net Neutrality
2) Intelligence Agencies are Manipulating the Internet With Deliberate Disinformation
3) Governments are Paying Trolls to Sway Public Opinion
4) Mainstream News Websites are Killing Comment Sections
5) The Obama Administration’s “Cognitive Infiltration” of the Internet
6) False Flag Cybersecurity Attacks as a Pretext to Increase Web Regulation
7) Fairness Doctrine for the Internet
8) Homeland Security’s Internet Kill Switch
9) New Taxes and Regulations Set to Stifle Communication & Sales on the Web
10) SOPA, CISPA & The FBI’s Internet Backdoor

Read full article with elaboration and links.

ISACs: Let the Sharing Begin

A while back, I wrote about the value of information sharing, and the role of ISACs (Information Sharing and Analysis Centers) – see “The Bad Guys Are Winning: Information Sharing And Asymmetric Advantage.” I’m a huge fan of this model for sharing information about cyber threats.

A shining example of an effective ISAC is the Financial Services ISAC (FS-ISAC), but one of the lurking questions about their work is whether they are violating any anti-trust regulations in the US. Having worked with them, it was my opinion that they weren’t doing anything that felt like anti-trust, but I’m not a legal expert.  By the way – the ICS-ISAC, which deals with Industrial Control Systems, recently showed its value in an attack on the US Utility Control System infrastructure.

 

Read full article.

Stephen E. Arnold: Is Google Breaking the Internet?

IO Impotency
Stephen E. Arnold
Stephen E. Arnold

Google: Owning the Internet

I read “Google Is Breaking the Internet.” The write up addresses the issue of links between and among other Internet accessible content. The discussion focuses on search engine optimization. Google has a problem with relevance related to generating revenue. The pressure Google is exerting with regard to links is a logical reaction to the situation that Google has created. Once the relevance horse is out of the barn, Google has to send out search parties and take extraordinary actions to find the horse, get the horse under control, and put the horse back into its stall. Web sites desperate for traffic want to let horses out of the Google barn. An arms race for ad related relevance control is underway.

The author makes one of those statements that make sense from the point of view of a non Googler; for example:

Continue reading “Stephen E. Arnold: Is Google Breaking the Internet?”

Wayne Madsen: NSA Spies on US Allies — With Direct Witting Assistance of AT&T, EDS, Qwest, H-P, Motorola, Cisco, Qualcomm, Oracle, Intel, IBM, Microsoft, and Verizon

07 Other Atrocities, 10 Transnational Crime, Corruption, Idiocy, IO Deeds of War, Military, Officers Call
Wayne Madsen
Wayne Madsen

Washington Spies on NATO; Other Allies

Wayne MADSEN

Strategic Culture.org | 18.05.2014

EXTRACT

Implants are inserted by NSA into targeted computer systems and network devices through what the NSA calls «supply-chain interdiction». Equipment is intercepted between the manufacturer and the end-user. At a secret facility called a «load station», devices called «beacons» are inserted clandestinely into a device’s hardware. These pre-positioned access points permit later access by NSA into «hard target» networks around the world.

NSA names its strategic partners in its «collect-it-all», codenamed ASPHALT operations, around the world. These are AT&T, EDS, Qwest, H-P, Motorola, Cisco, Qualcomm, Oracle, Intel, IBM, Microsoft, and Verizon. In all, over 80 «major global corporations» support NSA’s worldwide collection efforts. With corporate cooperation, NSA captures Internet data from seven «international choke point» access sites in the continental United States. Their cover names are Breckenridge, Tahoe, and Sun Valley on the U.S. West Coast; Whistler in the South; and Killington, Coppermountain, and Maverick on the East Coast.

Read full article.

Continue reading “Wayne Madsen: NSA Spies on US Allies — With Direct Witting Assistance of AT&T, EDS, Qwest, H-P, Motorola, Cisco, Qualcomm, Oracle, Intel, IBM, Microsoft, and Verizon”

Sepp Hasslberger: Drones that Save Lives – Made in … Iran

Drones & UAVs
Sepp Hasslberger
Sepp Hasslberger

Who would have thought it … drones that actually can save lives. Made in … Iran. 

We've seen how drones can be a crucial asset to search and rescue operations, but Iran's RTS Lab has taken an entirely new angle. RTS's Pars drone carries a payload of life preservers that can be delivered to a drowning swimmer far faster than a lifeguard.

As we saw in testing in the Caspian Sea, the drone can also work at night, using bright lights, biothermal sensors, and a built-in camera to stream video to rescuers on shore.

The concept works well, and it's an excellent example of how powerful drones—which are cheaper and easier to use than just about any other aerial delivery vehicle—can actually be. Here in the US, where the FAA remains steadfast in its desire to squelch the nascent commercial drone industry, this Iranian drone built of Chinese parts sets an example of what can be done when we set our eyes to the skies to do good.