The Mesh networks research group is formed by research and developer teams throughout all the world which are involved in active wireless mesh networks projects.
The Mesh Networks Research Group is focused in the mesh networks field and cover aspects like privacy, security, routing protocols, mobile mesh networks and roaming. All the members of this group are concerned about the importance of open source projects when sharing and spreading knowledge. The open source concept applies to use open routing protocols for ensuring interoperability among networks and open monitoring and test platforms.
Phi Beta Iota: A one-day global block party or a one-day sick-out would make much more sense. This is however an important example of both the scale that is possible and the seeding that is emergent. The times they are a-changing.
Cybercom is intended to integrate and coordinate DOD cyber defenses that previously were based in the individual military services. Led by Army Gen. Keith Alexander, Cybercom also oversees offensive cyber capabilities, and that involves developing weapons and the doctrine that governs when and how those weapons can be used. When he took command of Cybercom, Alexander retained his post as director of the nation’s largest intelligence agency, the National Security Agency, which is responsible for signals intelligence and information assurance. Source
Imagine a game in which “true cost” is the norm, and the public can see alternative realities that are fully transparent and show the art of the possible in the absence of corruption….note the “bottom up” nature of the project.
Virtual worlds have long been populated by creatures that interact, reproduce, compete, evolve and die. But by and large, they do so because their behavior is programmed by developers. These efforts can produce complex virtual ecosystems, but they’re not quite the digital reflections of what happens in nature.
Life in the real world is “programmed” by DNA, but its form and behavior are determined by the random mutation of genetic code, not by the intentions of a developer. Computer scientists have always been intrigued by the prospect of creating “artificial life” — that is, digital genetic code that can sustain itself over generations and adapt to meet the demands of a virtual environment without human interference.
Phi Beta Iota: This is the secret sauce for connecting the digital “virtual” revolutionary circles, and the same circles on the street face to face. It has been used for years at Hackers on Planet Earth (HOPE), and is a modern day version of the self-identification pins of Charles Fourier. Imagine now if every American committed to destroying the two-party tyranny and achieving Electoral Reform were to buy and wear one of these. It would create a critical mass–a constantly live, interactive, irrepressible swarm for the restoration of the Republic.
The Open Enterprise is a new organizational design. Unlike organizations using traditional management structures, Open Enterprises replace the command and control hierarchy with a meritocracy based on collaboration and open participation.
Google Voice users learned late Monday that the service now has a way of making purely Internet-based phone calls. Making a SIP call with a “sip:” prefix, the Google Voice phone number and @sip.voice.google.com skips the conventional phone network entirely, saving users cellphone minutes. Disruptive Telephony tested it and found that a call worked “great.”
Phi Beta Iota: This is in our view NSA's wet dream (they're tight with Google, which started with CIA funding, taking over Alta Vista when HP lost its mind, and stealing Yahoo's search engine). We're moving toward everyone having an IP address instead of a telephone number, and absent the Freedom Box and other non-Google options Google is well on its way to owning the 10% of the data and voice that uses the cloud. This is also a play for the three billion poor. When combined with Google's sponsorship of the O3b satellite system, one can assume they have a cell phone in the works that is simple, cheap, and can be given away in return for “owning” your voice the way the US Post Office “owns” your name. The Google Trilogy remains the best open record of all that Google seeks to conceal.
GOOD NEWS from Ivan Popovski in Hungary. It looks like they force to be @sip.voice.google.com. The idea is that every person could easily install their own SIP proxy and media server, so in that case you don't need to be ‘@sip.voice.google.com‘ user, but you could register on ‘@yourdomain.com‘. Of course, you could call people on any
domain/IP. By the way, a few months ago I bought sipware.org/sipware.net, so I could develop method to rapidly install SIP proxy/media server on any computer. Hope to get live cd or something like that soon. Not sure how many of you are interested in this? That media server will be conferencing and will use open source codecs (speex/theora) + instant messaging (conferences also) and presence. Am in development phase. Anyway, when you have something like that, it is not hard to connect it with VoIP, and people already talked about OpenBTS and stuff like that.
Addendum: This is a Google “probe;” as one member of the Autonomous Internet discussion pointed out, it is only being done in the USA. To understand Google's larger strategy there is not finer reference than The Google Trilogy by Stephen E. Arnold. Another member of the group has pointed out that Google is in the business of earning profit for its shareholders, to which we respond with two observations: 1) they are still spending more in shareholder fantasy cash than they are actually earning; and 2) cyber-space is a commons–we cannot turn it over to corporations any more than we can turn over public services to corporations. Autonomous Internet–the Open Source Tri-Fecta–is a long-needed correction to what Winn Schaurtau called Chaos on the Electronic Superhighway.