Regional Metamorphosis & Social Architecture

Advanced Cyber/IO, Analysis, Augmented Reality, Budgets & Funding, Civil Society, Collective Intelligence, Collective Intelligence, Commerce, Cultural Intelligence, Earth Intelligence, Ethics, info-graphics/data-visualization, InfoOps (IO), Methods & Process, Open Government, Policies, Serious Games, Standards, Strategy, Technologies, Tools

May 10th: Let the Infinite Games Begin!

svii

At our April 6 SVII gathering Bill Veltrop, co-founder of the Monterey Institute for Social Architecture (MISA), introduced Regional Metamorphosis as a pragmatic strategy for accelerating our movement into an Age of Conscious Evolution. Jesse Clark and colleagues then produced a video that does a great job of capturing the intent and spirit of that evening.

At the conclusion of the April 6 gathering Howard asserted that Silicon Valley had what it takes to be a leader in a regional metamorphosis movement. Howard invited us to explore this possibility together at a May 10th gathering at Serena Software from 4-7 PM.

Questions for you:

  1. Are you a GRIP, a game ready infinite player? Check your “symptoms” against this profile. http://www.theinfinitegames.org/e02/02.php
  1. Does the idea of playing a key role in bootstrapping a Silicon Valley regional metamorphosis initiative intrigue you? Below are some of the key roles we see needed if we are to turn this large idea into a global movement:

TEN MOST WANTED EVOLUTIONARIES

  • Angel Investors
  • Multimedia Story-tellers
  • Transformational Leaders
  • Champions of Generative Initiative
  • Leader for a Center for Regional Metamorphosis
  • Bridge-Builders from Academia
  • Online Collaboration Web Weavers
  • Developmental Mavens
  • Providers of Generative Services
  • Regional Conveners
  1. Are you willing to join with other interested GRIPs at Serena Software from 4-7 on Tuesday, May 10? At this gathering we will be —
  • Getting to know who we are — what each of us cares about, and could bring to this emerging infinite game
  • Diving more deeply into the ideas presented on April 6
  • Exploring for the best approach to getting traction in Silicon Valley — and beyond

Requests

  • If you plan to attend, please register here.
  • Register for May 10th: Let the infinite games begin! in Redwood City, CA  on Eventbrite
  • The address is:
    Serena Software Inc
    1900 Seaport Boulevard,
    Redwood City, CA
  • If you can’t attend but are definitely interested, or if you have any questions, please contact Bill@MISA.ws or call at 831-462-1992
  • If you’ve a friend/colleague GRIP who is a good fit, please invite him/her to join us.
  • If you attended our April 6th gathering, you may find it helpful to refresh your memory with this video, http://vimeo.com/22894801
  • If you were not at the April 6th event it’s important that you invest the time to watch the video. The May 10th gathering will build on our April 6 work together.

Tip of the Hat to David Alan and Mark Roest.

WIRED WORLD: 3G, LTE, WiFi, & Land = 5G

03 Economy, 04 Education, 11 Society, Advanced Cyber/IO, Autonomous Internet, Strategy, Technologies
Venessa Miemis

From BSA listserve:  Excellent article on integration of 3G, LTE, Wifi and land lines i.e.- 5G networking. The only thing missing is this article is the 5th “G” – green networking. With so much overlapping coverage from the different wireless and wired nodes you don’t need five nines reliability for each node. Individual nodes can therefore be powered with small solar panels and micro wind mills. This is also great opportunity for R&E networks to partner with carriers like Vodafone and others who are building integrated Wifi/LTE networks and use Eduroam to extend reach of their networks for personal health research applications, sensor networks built around smart phone etc. For more details please see http://goo.gl/W9mla and http://goo.gl/a1Lpz – BSA]

21st Century Triple Networks: Ubiquitous 4G, WiFi, & Wires

The best engineers on the planet are coming to the same conclusion: a hybrid 4G/WiFi/landline network is the way to meet mobile demand.  Folks like John Donovan of AT&T and Masayoshi Son of Softbank in Japan
had this vision around 2007-2008. As the iPhone/iPad/Android made the coming demand clear, networks planners around the world evolved similar strategies.

•       4G gives wide coverage but is limited in capacity.

•       WiFi actually provides far more capacity, because the range of perhaps 100 meters means the spectrum can be reused thousands of times in a major city. (China Mobile is putting 20,000 WiFi hotspots across
Beijing.) A network builder tells me “WiFi is a solution to off load ‘portable' traffic where possible and rely on 3G/4G for ‘mobile' traffic.” Femtos and perhaps small cells will play a significant part.

•       Landlines effectively have 10x the capacity of a similar wireless network and are already ubiquitous from both telco and cable. A top engineer tells me “The general rule is the quicker you can get the byte of information onto a hard facility (copper, fiber) the cheaper it is to operate the network.” Randall Stephenson of AT&T explains “You're always going to have to have a fixed line capability to offload this traffic.”

[…]

So cell tower 3G/4G ideally is supplemented with local WiFi/femto.  Cell towers cover large areas, allowing comprehensive coverage except for a few dead spots. They offer limited bandwidth over that entire
area, with a network like Verizon's LTE offering perhaps 35 megabits to share. WiFi is much lower power, limiting range to a typical 100 meters or so, less with obstructions. Within that range, the capacity is high; 3×3 MIMO 802.11N can carry 100's of megabits in a small area.  Locally, 802.11 uses spectrum more efficiently, incorporated a limited set of “spread-spectrum” type features.

WiFi was in few phones two years ago because it ran down batteries too quickly and cost too much. Moore's Law now enables low power, low cost WiFi. The latest chips from RALINK/Trendchip, for example, cost
less than $5. Off mode power consumption is 0.012 mw, transmit power is 19dBm, and the chips are 5 to 7 mm square. Easily 3/4ths of the phones sold by a carrier like Verizon will soon have WiFi as do just
about all tablets. As Qualcomm, Broadcom and others include WiFi on their primary cellphones chips it will become ubiquitous.

[…]

Carriers are choosing different strategies to get from where they are today to triple networks. Vodafone, Europe's largest wireless company, is adding millions of DSL customers through unbundling and giving them
femto+WiFi gateways. Sky in Britain is buying a WiFi network named “The Cloud.” Free.fr enables WiFi on their millions of DSL connections and bought a wireless license. AT&T is putting WiFi hotspots from Times Square NY to San Francisco with expansion plans. China Mobile is adding 1,000,000 hotspots.

——

Tip of the Hat to original poster Bill St. Arnaud.

Phi Beta Iota: Gordon Cook thinks very highly of Bill St. Arnaud, and observes that Mr. Arnaud is a consultant for Surfnet in the Netherlands working out their wireless cloud for the research and education community in that country of some 1,000,000 out of 16,000,000 people.   He is describing some of what he is building  that is based on the  Netherlands national fiber backplane.

See Also:

Reference: Building National Knowledge Infrastructure–How Dutch Pragmatism Nurtures a 21st Century Economy (The Cook Report on Internet Protocol)

Cyber-Security Politics, Business, Ethics…

02 China, 03 Economy, 07 Other Atrocities, 10 Security, Advanced Cyber/IO, Commerce, Commercial Intelligence, Computer/online security, Corruption, Cyberscams, malware, spam, Government, InfoOps (IO), Mobile, Politics of Science & Science of Politics, Technologies
DefDog Recommends....

Is it just me, or does it appear that we're okay with selling our cyber-soul to China (and Russia), as long as we can also blow tens of billions on US firms pretending to do cyber-security?

Report: Despite status as U.S. security threat, China's Huawei partnering with Symantec

East-Asia-Intel.com, April 27, 2011

The Chinese telecom giant Huawei Technologies, which has been linked to the Chinese military, is working with the U.S. software security giant Symantec, which is engaged in securing hundreds of thousands of U.S. computer systems against outside intrusions, according to a report last week in the Diplomat newsletter.

The report said “China and Russia are leveraging U.S. multinational corporations' economic requirements to accomplish strategic goals that could quite plausibly include covert technology transfer of intellectual property, access to source code for use in malware creation and backdoor access to critical infrastructure.”

Huawei was blocked from buying the U.S. telecom 3Leaf last year by the Committee on Foreign Investment in the United States (CFIUS) and also was blocked in 2008 from buying 3Com over security concerns. The U.S. National Security Agency also stepped in to dissuade AT&T from buying Huawei telephone equipment.

Despite those actions, Huawei formed a joint venture with Symantec in 2007 called Huawei Symantec Technologies Co. Ltd. (HS), the report said. Huawei is the majority partner with 51 percent ownership, with the entity being headquartered in Chengdu, China.

The report said a 2008 report identified HS as developing “China's first laboratory of attack and defense for networks and applications.”

The result is that Symantec is assisting China's cyber development of computer warfare capability.

The report was produced by cyber security expert Jeffrey Carr, author of Inside Cyber Warfare: Mapping the Cyber Underworld (O'Reilly, 2009).

Phi Beta Iota: The US Government compounds its lack of a strategic analytic model and the requisite integrity to actually pay attention to whatever findings might emerge, with an abysmal inattention to the most basic aspects of counter-intelligence, not just within government, but across the private sector, which does not actually take counter-intelligence seriously either.  Creating a Smart and Safe Nation is not difficult–it requires only a uniform commitment to intelligence and integrity across all boundaries.

Journal: Cheery Waves Flags How Supercomputers Alter Science

Advanced Cyber/IO, Analysis, Augmented Reality, Communities of Practice, Earth Intelligence, Geospatial, History, info-graphics/data-visualization, IO Mapping, IO Sense-Making, Key Players, Maps, Methods & Process, Mobile, Policies, Policy, Politics of Science & Science of Politics, Real Time, Research resources, Serious Games, Standards, Strategy, Technologies, Threats, Tools, True Cost, Waste (materials, food, etc)
Cheery Waves Recommends....

Digging Deeper, Seeing Farther: Supercomputers Alter Science

By JOHN MARKOFF

New York Times, April 25, 2011

SAN FRANCISCO — Inside a darkened theater a viewer floats in a redwood forest displayed with Imax-like clarity on a cavernous overhead screen.

The hovering sensation gives way to vertigo as the camera dives deeper into the forest, approaches a branch of a giant redwood tree, and then plunges first into a single leaf and then into an individual cell. Inside the cell the scene is evocative of the 1966 science fiction movie “Fantastic Voyage,” in which Lilliputian humans in a minuscule capsule take a medical journey through a human body.

There is an important difference — “Life: A Cosmic Journey,” a multimedia presentation now showing at the new Morrison Planetarium here at the California Academy of Sciences, relies not just on computer animation techniques, but on a wealth of digitized scientific data as well.

Read balance of article….

Comment and Seven Graphics Below the Line…

Continue reading “Journal: Cheery Waves Flags How Supercomputers Alter Science”

Liberation Technology Snap-Shot

02 Diplomacy, Cultural Intelligence, Government, IO Multinational, IO Technologies, Technologies

Liberation technology: dreams, politics, history

Armine Ishkanian, 5 April 2011

openDemocracy

The doctrinal commitment to new cyber and social technologies as a means of solving political problems needs to learn from the past and take a more realistic view, says Armine Ishkanian.

Read full article with many links.

From Google Group The Next Net:

I just finished a conference call on the minimal mandatory requirements for liberation technology for a specific area (there are at least another 50 that would need the same stuff–a generic capability–but in 50 other languages).

1.  $169 cell phone to satellite communications converters, but structured to look like some other popular digital music device, along with a turnkey solar-powered Internet hotspot.

2.  Open satellite channel over the area in question that can receive collect calls from anyone in the area of interest using an announced number and one of the devices.

3.  Downloadable encryption for any cell phone on a use and delete basis from the satellite channel…like digital one time pads with no residue.

3.  Satellite radio into the area of interest with real news relevant to that population including news of the diaspora and exile leadership.

4.  Internet steganography.

I thought CIA, BBG, and JSOG were supposed to be able to do all that.  Evidently not.  I am being told that a fund-raising campaign is starting up to provide these capabilities to no fewer than three areas, possibly expanding to sixteen, all privately funded because the USG is not doing it.

– – – – – –

Dawn McCall

Here is a sample headline that sums up the current state of US Government attention to “liberation technology.”

Bureau of International Information Programs Coordinator Dawn L. McCall Travels to Los Angeles and San Francisco, California April 11 – April 15

Phi Beta Iota: Ms. McCall is a very accomplished Discovery Channel executive with remarkable achievements in one to many broadcasting.  She has been in her current position since 27 July 2010 and does not appear to be headed for Assistant Secretary status anytime soon.  The Undersecretary of Public Diplomacy and Public Affairs is Ms. Judith A. McHale, formerly President and CEO of Discovery Communications, parent of the Discovery Channel.

See Also:

Reference: Open Source Agency (OSA) [Sister to BBG]
2009 DoD OSINT Leadership and Staff Briefings
2006 Briefing to the Coalition Coordination Center (CCC) Leadership at the U.S. Central Command (USCENTCOM)–Multinational Intelligence: Can CENTCOM Lead the Way? Reflections on OSINT & the Coalition
2004 The New Craft of Intelligence: How “State” Should Lead
2004: Information Peacekeeping A Nobel Objective

The Emergent Open Source Revolution

Advanced Cyber/IO, Analysis, Augmented Reality, Autonomous Internet, Collaboration Zones, Collective Intelligence, Communities of Practice, Counter-Oppression/Counter-Dictatorship Practices, Ethics, info-graphics/data-visualization, InfoOps (IO), Intelligence (government), Methods & Process, Mobile, Open Government, Policies, Real Time, Reform, Strategy, Technologies, Threats, Tools
Amazon Page

REVOLUTION OS tells the inside story of the hackers who rebelled against the proprietary software model and Microsoft to create GNU/Linux and the Open Source movement.

On June 1, 2001, Microsoft CEO Steve Ballmer said “Linux is a cancer that attaches itself in an intellectual property sense to everything it touches.”

Microsoft fears GNU/Linux, and rightly so. GNU/Linux and the Open Source & Free Software movements arguably represent the greatest threat to Microsoft's way of life. Shot in cinemascope on 35mm film in Silicon Valley, REVOLUTION OS tracks down the key movers and shakers behind Linux, and finds out how and why Linux became such a potent threat.

REVOLUTION OS features interviews with Linus Torvalds, Richard Stallman, Bruce Perens, Eric Raymond, Brian Behlendorf, Michael Tiemann, Larry Augustin, Frank Hecker, and Rob Malda. To view the trailer or the first eight minutes go to the ifilm website for REVOLUTION OS.

Two books below the line…

Continue reading “The Emergent Open Source Revolution”

Cyber-IO: A New Form of Governance?

Advanced Cyber/IO, Civil Society, Collective Intelligence, Cultural Intelligence, InfoOps (IO), Methods & Process, Mobile, Technologies
Patrick Meier

Information and Communication Technology in Areas of Limited Statehood: A New Form of Governance?

I recently had the distinct pleasure of participating in a fascination workshop on “Information and Communication Technology in Areas of Limited Statehood: A New Form of Governance?” The workshop was organized by the Frei Universität’s program on Governance in Areas of Limited Statehood and co-directed by Professors Gregor Walter-Drop and Steven Livingston.

. . . . . .

My colleague Gregory Asmolov made the link explicit during his excellent presentation on “Russian Wildfires and Alternative Modes of Governance: The Role of Crowdsourcing in Areas of Limited Statehood.” Here’s a summary:

“Because of it’s geographical size, high degree of corruption, and reliance on an extraction economy, governance by government in Russia is often weak and ineffective. Russian political expert Liliya Shevtzova goes so far as to claim that the current regime is an imitation of governance. The 2010 wildfires demonstrated the limited capacity of the state to provide effective emergency response. Information technologies, and crowdsourcing platforms in particular, fulfill the gap of the limited statehood. At the same time, however, the Russian government is also trying to use ICT to increase its claims to effective governance.”

Read full posting….

Phi Beta Iota: This post is much more than a post.  To the best of our (naturally limited) knowledge, this is the first and the best statement that clearly distinguished among “imitation governance,” spontaneous “self-governance,” and the role that information technology plays in making a mockery of the first and a reality of the second.