Journal: Human-Centered Computing (Not…)

Analysis, Augmented Reality, Civil Society, Collective Intelligence, Counter-Oppression/Counter-Dictatorship Practices, info-graphics/data-visualization, InfoOps (IO), IO Multinational, Open Government, Reform

Human-centered computing should be–but is not today–about connecting all humans with all information in near-real-time, while providing back office tools that elevate the human brain and more properly plan information and communications technologies in a support role.  See for example our Citizen-Centered Graphics and all of the OSS/EIN Books.  Where the emergent meme is off-target is in focusing on the relationship of the computer to the individual, rather than the whole.  Hacking Humanity is the new meme.

TRADITIONAL

Human-Centered Computing (Wikipedia)
Human-Centered Computing Cluster (HCC)
Human-Centered Computing in Education (Links)
Human-Centered Computing: A Multi-Media Perspective (PDF circa 2005)

WORLD-BRAIN ORIENTATION

Review: The World Is Open–How Web Technology Is Revolutionizing Education
Review: Making Learning Whole–How Seven Principles of Teaching can Transform Education
Review (Guest): Cognitive Surplus–Creativity and Generosity in a Connected Age
2010: Human Intelligence (HUMINT) Trilogy Updated
Review: Holistic Darwinism: Synergy, Cybernetics, and the Bioeconomics of Evolution
Review: Consilience–the Unity of Knowledge
Review: The Unfinished Revolution–Human-Centered Computers and What They Can Do For Us
Review: Philosophy and the Social Problem–The Annotated Edition

See Also:

Worth a Look: Book Reviews on Technology & Web 2.0 to 4.0

Worth a Look: CrowdMap (Beta)

Advanced Cyber/IO, Analysis, Augmented Reality, Citizen-Centered, Collective Intelligence, Collective Intelligence, Counter-Oppression/Counter-Dictatorship Practices, Earth Intelligence, Geospatial, Historic Contributions, info-graphics/data-visualization, InfoOps (IO), Intelligence (government), International Aid, IO Mapping, Journalism/Free-Press/Censorship, Maps, Methods & Process, microfinancing, Mobile, Officers Call, Open Government, Policy, Reform, Research resources, Technologies, Tools, Worth A Look

Crowdmap (Liquida)

Crowdmap allows you to…

+ Collect information from cell phones, news and the web.
+ Aggregate that information into a single platform.
+ Visualize it on a map and timeline.

Crowdmap is designed and built by the people behind Ushahidi, a platform that was originally built to crowdsource crisis information. As the platform has evolved, so have its uses. Crowdmap allows you to set up your own deployment of Ushahidi without having to install it on your own web server.

See Also:

Graphics: Twitter as an Intelligence Tool

Reference: How to Use Twitter to Build Intelligence

Journal: Tech ‘has changed foreign policy’

Continue reading “Worth a Look: CrowdMap (Beta)”

Worth a Look: Clay Shirky on Cognitive Surplus & Crisis Mapping

Augmented Reality, Collaboration Zones, Collective Intelligence, Communities of Practice, Counter-Oppression/Counter-Dictatorship Practices, info-graphics/data-visualization, InfoOps (IO), International Aid, IO Sense-Making, Journalism/Free-Press/Censorship, Maps, Methods & Process, Policies, Tools, Worth A Look

About this talk

Clay Shirky looks at “cognitive surplus” — the shared, online work we do with our spare brain cycles. While we're busy editing Wikipedia, posting to Ushahidi (and yes, making LOLcats), we're building a better, more cooperative world.  TED Video of Talk.

About Clay Sharpey

Clay Shirky believes that new technologies enabling loose ­collaboration — and taking advantage of “spare” brainpower — will change the way society works.  Learn more.

Core Point: Over a trillion hours a year in cognitive surplus–Internet and media tools are shifting all of us from consumption to production.  We like to create; we like to share.  Now we can.

More From TED on The Rise of Collaboration

Recommended by Dr. Kent Myers.  His additional commentary:

This talk gets at something that could go into the proposal for Virtual Systemic Inquiry (VSI).  I need to emphasize that the VSI products have civic value.  That motivates participation, but we also need to make it a little more obvious and easy how to participate, in order that generosity can flow more readily from more people.  That's what I was trying to get at by making projects more standardized and quick.  Software can let that flow, as Shirky says.  The process and products should probably be pretty in some way too, like IDEO (also LOL cats).

Worth a Look: F/OSS Rankings

07 Other Atrocities, 10 Transnational Crime, 11 Society, InfoOps (IO), Tools, Worth A Look

Ranking Corporations for Open Source Support

by Jason

My Rankings

Again, in the context of corporations, I would rank some commonly mentioned entities as follows:

  1. Red Hat
  2. Mandriva
  3. Canonical
  4. Google
  5. IBM
  6. Oracle
  7. Apple (Below here is active harm)
  8. Novell
  9. Microsoft

Phi Beta Iota: The author was reacting to a very strong negative comment on Google, both the spark and the fire are worth reading.  Our view is unequivocal: Google is evil.  We support Open Everything, but especially Free/Open Source Software (F/OSS), Open Source Intelligence (OSINT), and Open Spectrum.

Journal: Traitor to Some, Hero to Others

10 Security, 11 Society, InfoOps (IO), Journalism/Free-Press/Censorship, Officers Call, Open Government, Secrecy & Politics of Secrecy
Marcus Aurelius Recommends

(COMMENT:  Really too bad that individuals like this are entitled to Constitutional protections…  If he in fact compromised assets, as I have read in open press, they will be lucky if all the Taliban does is shoot them.)

Washington Post
August 14, 2010
Pg. 2

Army Analyst Celebrated As Antiwar Hero

Many rally to soldier's defense after disclosure of classified documents

By Michael W. Savage

For antiwar campaigners from Seattle to Iceland, a new name has become a byword for anti-establishment heroism: Army Pfc. Bradley E. Manning.

Manning, a 22-year-old intelligence analyst, is suspected of leaking thousands of classified documents about the Afghanistan war to the Web site WikiLeaks.

FULL STORY ONLINE

Phi Beta Iota: This needs to be evaluated at multiple levels.

Continue reading “Journal: Traitor to Some, Hero to Others”

NIGHTWATCH Extract: China – North Korea Law Enforcement…the Hybrid Model Advances

02 China, 08 Wild Cards, Collective Intelligence, InfoOps (IO), Intelligence (government), Methods & Process, Reform, Strategy

China-North Korea: China offered to help North Korea control cross-border crime and build law-enforcement forces, according to a report by Agence France-Presse on 12 August. A spokesman also said China provided military equipment to North Korea's National Defense Commission during a visit by China's Deputy Public Security Minister Liu Jing on 8 August.

North Korea's Security Ministry staff and a Chinese public security delegation met on 12 August, according to the Korean Central News Agency.

NIGHTWATCH Comment: The reports are intermittent in the public media, but cumulatively they establish a pattern of China using economic and law enforcement linkages to tie North Korea more tightly. When North Korean leadership has been strong, it strongly and successfully has resisted Chinese initiatives. That does not appear to be the case at this time.  China's admission of providing “military equipment” is unusual and rare. The actors mentioned in the report suggest the reference is to crowd control equipment.

NIGHTWATCH KGS Home

Phi Beta Iota: Hybrid and M4IS2 (along with bottom-up self-governance) will be the defining attributes of local to global governance in the 21st Century.  The USA has consistently made the mistake of selling arms and withholding information sharing and intelligence capacity building (providing stealable funds does not count).  A mix of hybrid bi-lateral (such as Australian-Cambodian task forces on human trafficking) and hybrid multi-lateral (e.g. a regional intelligence centre for Central America) will flip the international relations and national security paradigms.

See Also:

Continue reading “NIGHTWATCH Extract: China – North Korea Law Enforcement…the Hybrid Model Advances”

Journal: Just How Important is the WikiLeaks AF Dump?

04 Inter-State Conflict, 05 Civil War, 07 Other Atrocities, 08 Wild Cards, 10 Security, Analysis, Budgets & Funding, InfoOps (IO), Intelligence (government), Journalism/Free-Press/Censorship, Methods & Process, Misinformation & Propaganda, Officers Call, Reform, Secrecy & Politics of Secrecy
Chuck Spinney Recommends

OP-ED COLUMNIST

Kiss This War Goodbye

By FRANK RICH, New York Times,  July 31, 2010

A version of this op-ed appeared in print on August 1, 2010, on page WK8 of the New York edition.

IT was on a Sunday morning, June 13, 1971, that The Times published its first installment of the Pentagon Papers. Few readers may have been more excited than a circle of aspiring undergraduate journalists who’d worked at The Harvard Crimson. Though the identity of The Times’s source wouldn’t eke out for several days, we knew the whistle-blower had to be Daniel Ellsberg, an intense research fellow at M.I.T. and former Robert McNamara acolyte who’d become an antiwar activist around Boston. We recognized the papers’ contents, as reported in The Times, because we’d heard the war stories from the loquacious Ellsberg himself.
. . . . . . .

What was often forgotten last week is that the Pentagon Papers had no game-changing news about that war either and also described events predating the then-current president.

. . . . . . .

The papers’ punch was in the many inside details they added to the war’s chronicle over four previous administrations and, especially, in their shocking and irrefutable evidence that Nixon’s immediate predecessor, Lyndon Johnson, had systematically lied to the country about his intentions and the war’s progress.