
PDF (25 Pages): George Por on Collective Intelligence and Collective Leadership

Essay of the Day: The Peer Production of Large-Scale Networked Protests
* Special Journal Issue: Organization in the crowd: peer production in large-scale networked protests. By W. Lance Bennett, Alexandra Segerberg & Shawn Walker. Information, Communication & Society. Volume 17, Issue 2, 2014, pages 232-260. Special Issue: The Networked Young Citizen.
From the Abstract:
“How is crowd organization produced? How are crowd-enabled networks activated, structured, and maintained in the absence of recognized leaders, common goals, or conventional organization, issue framing, and action coordination? We develop an analytical framework for examining the organizational processes of crowd-enabled connective action such as was found in the Arab Spring, the 15-M in Spain, and Occupy Wall Street. The analysis points to three elemental modes of peer production that operate together to create organization in crowds: the production, curation, and dynamic integration of various types of information content and other resources that become distributed and utilized across the crowd. Whereas other peer-production communities such as open-source software developers or Wikipedia typically evolve more highly structured participation environments, crowds create organization through packaging these elemental peer-production mechanisms to achieve various kinds of work. The workings of these ‘production packages’ are illustrated with a theory-driven analysis of Twitter data from the 2011–2012 US Occupy movement, using an archive of some 60 million tweets. This analysis shows how the Occupy crowd produced various organizational routines, and how the different production mechanisms were nested in each other to create relatively complex organizational results.”

Data.gov: Listing May Be Enough
I am all for slipshod work, particularly when delivered by government contractors. Hey, the emphasis is on scope changes and engineering change orders, not on delivering what the wild and crazy statement of work requires.
I was delighted to read the Hacker News thread at http://bit.ly/MW4epC about broken links and missing data sets on Data.gov at www.data.gov. The thread contains a number of interesting comments. These may be evidence that substandard attention to detail suggests digital eczema. Just Bing it.
Examples range from corrected links that fail to odd ball outputs. See, for example, http://1.usa.gov/1qiegkT. There are some gems in the comments; for instance, http://1.usa.gov/1lI1Fqj.
In the early days of www.firstgov.gov, some effort was expended to minimize the number of dead links on US government servers. In the present incarnation as www.usa.gov, there are some interesting changes.
Continue reading “Stephen A. Arnold: MIC, RAC, ZPIC Screw Over Data.gov and get away with it”

It is the nature of implemented war technologies that they create arms races that always have unintended consequences. The use of drones is the latest example. It is just a matter of time until American officials start being killed by drones, probably beginning when they are out of the country. Technologies of violence feed on themselves. Consider the epidemic of gun violence that is ! killing 10s of thousands of Americans every year. All of this violent death, of course, is immensely profitable for the few.
Predictable Backlash: Pentagon Now Fears Drones Being Used Against US
JP SOTTILE – BuzzFlash
PDF (12 Pages): Introductory Statement & Answer to Questions
Highlights:
00 The included links are a “best of the best” selection of media stories.
01 EU security agencies have created a bazaar allowing NSA to get it all.
02 There are many other undisclosed programs.
03 According to Snowden, at least ten specific individuals are liable for failing to act on his alarm — those names are being withheld by Booz Allen and the various US agencies and Snowden has not named them himself.
04 “The culture within the US Intelligence Community is such that reporting serious concerns about the legality or propriety of programs is much more likely to result in your being flagged as a troublemaker than to result in substantive reform.”
05 Oversight focuses on limiting public discovery rather than on enforcing the limits of the law.
06 Indiscrinate economic intelligence is the true purpose of such technical collection programs as do work.
07 Defensive intelligence is more important to democracies than offensive intelligence — NSA and GCHQ have been obsessing on offensive intelligence (economic and political espionage) in what they process, while continuing indiscriminate mass surveillance that does not appear to have been processed, only stored against future possible exploitation.
Full Text with Links Below the Line
Continue reading “Berto Jongman: Full Text of Edward Snowden Testimony to European Parliament”

Multiferroics could help make computer processors 1,000 times more efficient
Materials that are both ferroelectric and magnetic – hence, multiferroics – are rare.
EXTRACT
The UCLA Engineering team used multiferroic magnetic materials to lessen the amount of power consumed by “logic devices,” which are a type of circuit on a computer chip devoted to performing functions such as calculations. A multiferroic can be switched on or off by applying alternating voltage, which then carries power through the material in a cascading wave through the spins of electrons – a process referred to as a spin wave bus.
A spin wave keeps water molecules in basically the same place while the energy is carried through the water – as opposed to an electric current, which is akin to water flowing through a pipe, according to principal investigator Kang L. Wang, UCLA’s Raytheon Professor of Electrical Engineering and director of the Western Institute of Nanoelectronics (WIN).
The UCLA researchers were able to show that using this multiferroic material to produce spin waves could decrease wasted heat and therefore increase power efficiency for processing by up to 1,000 times.