What the hyperlink!?

These quotes come from various sources like books, articles, conversations, and observations. I’ve provided links where possible, though some may lead to commentary or related discussions rather than original sources

Letters on Ethics

Wisdom is always wanting the same thing, always rejecting the same thing.


Hyperion

He knew what had to be done. It is not always the same as knowing what to do.


Harry Truman

It is amazing what you can accomplish if you do not care who gets the credit.


jerlendds

What you spend your time on is what you get good at. How do you spend your finite time?


Do the Right Things Quietly

Avoid seeking praise. Ignore prestige and anything you’re expected to do to obtain it. If you do enough positive work, it will eventually get noticed or become inherently visible. Goodwill is also likely to compound in the wake of quiet, honorable work.

The most effective, prolific people often choose to work in the shadows. They don’t announce their intentions, claim victory, or seek attention. Instead, they make a large impact and leave imperceptible footprints.

But it’s not because they’re all humble. Stealth is strategic. … The world is noisy. It provides all the cover you need to move quietly.


Teddy Roosevelt

Speak softly and carry a big stick; you will go far.


Attention is the rarest and purest form of generosity

Simone Weil, Gravity and Grace


Who has permission to know things?

sometimes a hypocrite is just a person in the process of changing


Eliminate Noise In Your Mental Bandwidth

If your brain had a service manual, this warning would be on the first page in bold red letters: The more information you cram into this wet computer, the less bandwidth you will have to process it.

You already know that overloading on information can be addictive. The emotionally charged stuff on the news and social media doesn’t just distract you. It dilutes your thoughts, muddies your perspective, smudges the line between your soul and the flat nothingness of the screen.

We’ve all been there, stuck in those spiderwebs. Buying into narratives and briefly becoming mouthpieces for things we don’t truly believe or understand. But seriously, you don’t have time for that anymore. Let the troglodytes at the gas station argue about the shape of the earth…

Constantly interrogate the triggers that disrupt and drain you.


dependent on a cult of personality

The modern tech industry is, by the standards of capitalism, unusually dependent on a cult of personality built around a few extremely rich, very stupid white men. While finance, the kinds of consulting services that the Big Four provide and the companies that nominally provide important goods and services all have their high-and-mighty leaders, they generally aren’t that well-known, and are on the whole mostly replacable. Tech, however? The Altmans, the Pichais, the Andreesens and the Zuckerbergs of the world are outright celebrities. Moreover, the industry depends on their celebrity in a way that the others don’t: they rely heavily on this celebrity to raise money, sell their products and attract workers.


super-apps

the web’s super power is the link. It lets anyone click on it and then navigate to an experience


The Possibility Space Concept in Neuroscience

humans engage in decision-making with “universal cognitive limitations” that prevent the selection of perfectly optimized outcomes or decisions


The Possibility Manifesto

  • The possible is distributed
  • The possible is intertwined with the actual
  • The possible depends on constraint
  • The possible is mediated
  • The possible is grounded in difference
  • Experiences of the possible are multifaceted
  • Possibility related phenomena should be studied as systems
  • Possibility related phenomena are developmental
  • Experiences of the possible transform the self
  • The possible should not be romanticised
  • An ethics of possibility is imperative
  • The possible is political
  • The study of the possible requires diverse and creative methodologies
  • Pedagogies of the possible are an educational necessity

The Space of Possible Mind Designs

He observed that “behaving systems” clearly comprise more than one sort of mind and suggested that virtual machines may be a good theoretical tool for analyzing mind designs. Sloman indicated that there are many discontinuities within the space of minds meaning it is not a continuum, nor is it a dichotomy between things with minds and without minds. Sloman wanted to see two levels of exploration namely: descriptive – surveying things different minds can do and exploratory – looking at how different virtual machines and their proper-ties may explain results of the descriptive study


HOUMA -Life now orients around opening tree of possibilities not things in space

And that’s exactly what’s happening now. In the past it oriented in relationship to things in space. We now orient in respect to a tree in exponentially opening possibilities. You see. It’s a cataclysymic jump from one self-model to another. It’s an opening (inaudible). Science is at last pushed to a point where it creates it’s own self-model and when it does you have a new heroic age, which is what we’re having, a new resimplication in a grand sense, in a grand historic sense.


Spectral fingerprints of large-scale neuronal interactions

These verbal correlates are the natural points of linkage with the brain model in the full interpretation of subjective access, as needed or implicit in the model-building practice of modern science. The word is spectroscopy of the brain. The delicay with which it can reflect in its ordering, when properly trained, the smallest changes in internal wiring, or internal state of excitation, makes its a probe potentially unequalled, once we know how to break open its encoding, as we did that of spectral lines.


PROBABILITY

We know, as we know, not as the world out there per say, and not as a magical picture of the world out there, but, step by step, as the billions of neurons, each containing no information, and each linking to other neurons all containing no information, but are linked together (via Hebbian connection) to produce our words and actions. And this activity establishes or is called “reality.”

Where does probability exist in us? It exists at every junction. Since the very beginning of life on earth which is the electro/chemical fact of live existence, the beginning of life on earth with it’s primitive yet essentially electro chemical nervous system - it is probability that rules.


Peter Putnam -on Existence

Matter is unknowable because every time you cut through a layer of structure you open up another layer of structure. Structure is not objective. It is at a technological, not objective level. It is the structure of the ordering of emissions of behavior - it is behavior. It is an exaggeration to pretend otherwise. Although we do it all the time. We must do otherwise since we have no way of expressing ourselves in the world. But it is an exaggeration.


The Causes and Consequences of Ambition

There’s something to be said for being “hungry” in the sense of wanting to get a monetary reward for one’s work. Inventors and entrepreneurs have hunger like that. I lack it.


Readwise

Perhaps because it’s a business, it’s often misleadingly confident in its claims


The libbitcoin Manifesto

I was told all of these sentences in my life. That learning to accept authority is an inevitable part of growing up. That my character is defined by how I look, not how I act. That my single purpose is to be a work-slave. To avoid interaction with random unknowns outside my circle. And that responsibility starts and stops with myself.

All of them are bad values.


Mental Breakdown and Insane Asylums

culture can coordinate and use without breakdown. Our insane asylums house heroes of the battle of the mind. Their daring is as essential to the progress of our understanding as are the wounds of those hospitalized in the fight for freedom. To avoid such dangers would be to sacrifice progress, even as to have avoided all physical maiming would have been to sacrifice liberty. It is only in static cultures that large classes of the prevalent mental disorders are absent


not only education, but also thinking

It can’t just be education about the technology. It also has to also be a philosophical education

There needs to be a change on a big scale for cryptocurrency to realize its big potential. … We have to train not just hackers, but leaders


Dr. Sergei Chekanov is an ANL scientist working in the field of high-energy particle physics (HEP)

It’s a problem that everything now is built off of personality and celebrity culture. … This is going to destroy our effectiveness as a movement.


Globalization

there is really no such thing as a “global monoculture” with respect to which writers should be expected to be neutral. Maybe that will exist someday, but it doesn’t yet.


Ben Elton - liberate knowledge

The internet was supposed to liberate knowledge, but in fact it buried it, first under a vast sewer of ignorance, laziness, bigotry, superstition and filth and then beneath the cloak of political surveillance. Now…cyberspace exists exclusively to promote commerce, gossip and pornography. And of course to hunt down sedition. Only paper is safe. Books are the key. A book cannot be accessed from afar, you have to hold it, you have to read it.


Terence McKenna

In cyberspace things are built out of light.

can there be light without its absence?


the logistically hard part for most systems of political philosophy is that on any given piece of land, only one system of order can reign

See, the logistically hard part for most systems of political philosophy is that on any given piece of land, only one system of order can reign. Two people can live by wildly different epistemologies (philosophies of knowledge) but we really only get to live under one political philosophy at a time.

Until crypto anarchy.

Crypto anarchy’s logistical insight makes it a surprising political system. It asks whether or not another regime can be hidden right under the authority’s nose. That’s not entirely new (for example, see: agorism), but cryptography presented the first credible tactic to even approach the ideal.

“I think crypto anarchy is one of the few real contributions to ideology in recent memory,” May’s “Cyphernomicon” crowed in 1994. Along with Hughes’ essay and May’s prior “Crypto Anarchist Manifesto,” the three documents make up the foundational texts of this thinking.


Sensory inputs correlate Acts -they do not initiate acts directly

The sensory inputs only function to help intercorrelate associated acts, but do not initiate acts directly. Thus the ringing of a bell, followed by feeding can condition a bell dependent salivation response, but this response arises only if the dog is hungry. The sound only functions interlink a random search initiated by hunger with a salivation, it does not of itself cause salivation.


cypherpunk seems less philosophical and more like a set of best practices

On some level, cypherpunk seems less philosophical and more like a set of best practices, an approach to engineering more than a full system for understanding. But crypto anarchy extends that DIY privacy ethos to a strategy for creating new societies unobservable to existing authorities.

And the state is not the only threat. No good crypto-anarchist sees authority defined merely by the cops. They know companies like Google and Amazon are a new breed of authority, the kind that, increasingly, can kick people out of the realm that means most to them: cyberspace.

Monied interests are already taking a pass at neutering the ideas behind blockchain with their favorite opening move: co-optation.


All perspectives, relevant debates

The difference between “fake news” and “real news” is that when a “real news” outlets makes a mistake they will go out of their way to correct themselves when what is genuinely true is revealed/discovered in time


Epistemology of Testimony

For rather obvious reasons, given the levels of false information peddled by heads of states as well as advertisers, communicating false information (dubbed “fake news”) has been very much in the media. So much so, indeed, that some linguists have begun to take an interest, looking at the linguistic forms that it has taken (see e.g., Lakoff, 2004; Lakoff and Wehling, 2012 on political discourse, and Sedivy and Carlson, 2011, on advertisers’ discourse). On the opposite side, so to speak, one finds books written by political advertisers on how politicians should choose their words to make the public accept and/or support decisions that are detrimental to them (see e.g., Luntz, 2007).

Beyond politics and advertising, however, the problem of the reliability of others’ reports goes much deeper. Indeed, most of human knowledge and beliefs are acquired second-hand, through others’ reports (Lackey, 2008). As pithily put by Solan and Tiersma (2005, 2): “Even beliefs as central to our identity as those regarding our own name, where and when we were born, and our family history were acquired at second-hand, from others.” This huge proportion of information acquired through linguistic communication naturally rises the question of how reliable the process is, a question that is central in the comparatively recent philosophical field of epistemology of testimony (see, notably, Lackey and Sosa, 2006; Lackey, 2008; Shieber, 2015).


bilbo0s

It’s not as straightforward as people think, and it reaches a whole lot further than people realize. I’m a privacy activist and have studied the issue, but I still fall on the “more privacy needed” side of the fence. Likely because I’m very much in the “burn it all down” faction of privacy advocates. However, I do understand what I’m up against. There are a lot of people who are either on the other side presently, or will be on the other side as soon as they realize their pay checks will go away as the effects of closing privacy loopholes ripple through the economy. We have to be clear eyed here, and prepared for enormous opposition to these ideas when these issues become better understood. Which is why I say we should act now. It’s like Andor said, “There will never be fewer guards than there are today.” As more people gain understanding of the financial impacts, the number of people on the other side will grow.


The Russian “Firehose of Falsehood” Propaganda Model: Why It Might Work and Options to Counter It

This. They utilize the firehose of falsehood method of communication. Talking points on every possible thing in all directions.


:grimacing: :zany_face:

Someone in full “socially inept engineer mode,” with terse communication that comes across as curt or demanding via text, but are otherwise reasonable if you spend more time talking with them; in their own mind, they’re probably just being “direct” or “efficient”


UN Cybercrime Treaty ~ a blank check for surveillance abuse that can be used as a tool for human rights violations and transnational repression

The problem is, as currently written, the treaty gives governments massive surveillance and data collection powers to go after not just cybercrime, but any offense they define as a serious that involves the use of a computer or communications system. In some countries, that includes criticizing the government in a social media post, expressing support online for LGBTQ+ rights, or publishing news about protests or massacres.


Beyond Authenticity: Hannah Arendt’s final unfinished work

Our culture is now about to split into two camps; the normative and the secure. Instead of “the haves and have-nots”, there will be “the will, and the will-nots”. Those who will compromise and those who will not compromise security. Those who choose security over convenience. Those who choose security against the nagging “advice” of corporations and governments to adopt a weaker position favourable to “markets”.


a conversation recounted by Bronowski, von Neumann, the founder of modern game theory

“Real life is not like that. Real life consists of bluffing, of little tactics of deception, of asking yourself what is the other man going to think I mean to do. And that is what games are about in my theory


Eventual Consistency

Give someone state and they’ll have a bug one day, but teach them how to represent state in two separate locations that have to be kept in sync and they’ll have bugs for a lifetime.


The Hacker Mindset

It’s astounding that what amount to a “hacker mindset” is mere curiosity and reason, and how well it has been stamped out of the general populace.


Expectations versus Reality

This is the rot in the tech industry — cults of personality enabling cults of personality to pretend that they’re doing great things as they crap out the great contributions to our nation’s landfills. By all means be excited about what they might be building, celebrate their actual victories, but exile anyone who dares to try and tell you sell you their half-baked dreams.


the most common evil is the worst one


Astra Nebula

The code you write today can influence the future of technology tomorrow. ~ Margaret Hamilton


A manifesto

freedom is an issue worth some risk


Gremory

there’s a very slight difference between totally insane and a genius

I wasn’t sure

now I am

you

are both


King

my usual stance is that i’m not the shiniest diamond but fuck me, if i deem you stupid, shit has to be bad


Freelancer

really hitting the poor guy with the stealth game-rock throw


Albert Einstein

Insanity is doing the same thing over and over and expecting different results.

If at first the idea is not absurd, then there is no hope for it.


Why Tolkien Hated Dune

Many that live deserve death. Some that die deserve life. Can you give it to them, Frodo? Do not be too eager to deal out death in judgment. Even the very wise cannot see all ends.


The Ancient One

you don’t realize you’re in hell if every day is the same


Sorting the Self: Assessments and the Cult of Personality

Or maybe you have been somewhat troubled by how this peculiar term personality, derived as it is from the Latin persona (meaning the masks once worn by players on stage), has become a repository of so many adjectives—one that violates Aristotle’s cardinal metaphysical rule against reducing a substance to its properties.

The science, he argued, purported to reduce “the whole” of a person to quantifiable units of measurement, and the mathematics in play took on an “entrapping” persona that obscured this sleight of hand.

It was to isolate who you “are” and who you “will be” for the sake of deciding—and here is a telling phrase—what role you might perform

Exactingly calculated goals of marketplace competition pushed organizations into a self-deceiving embrace of measures for typologizing human beings.

How far we had come from Heinrich Heine’s caution (c.1833) that “the composition of one’s own character description would be not only an awkward task but quite simply impossible.”

Imagine now a state of affairs in which the confident, naive realism of the whole profiling agenda cements and democratizes itself in mainstream culture, where people become psychometric natives and, owing to a peculiar sort of Stockholm syndrome, learn to enjoy it—even invest themselves in assessments as an avenue of self-discovery and well-being. Imagine that, and you will have imagined the scene today, to which we now return.

Guesswork becomes confident; speculation turns to certainty; possible fallacies become matters of fact.

We mistake impressions for absolutes.

Here we enter some deeper socioexistential waters.

a cultural shift occurring within what Warren Susman called the displacement of “character” by “personality.”

Assessments have an aura of legitimacy made possible by polling data and other statistics, and these instruments borrow on the authoritative magic of “metrics,” a fixation historian Jerry Z. Muller (echoing Whyte’s early sentiments) characterizes as “the belief that it is possible and desirable to replace judgment, acquired by personal experience and talent, with numerical indicators of comparative performance based upon standardized data (metrics).” Muller red-flags a “rationalist illusion” in this creed, a faith in “the sovereignty of technique” as the means to “real knowledge.”

infographics on a slide deck cannot quite capture how life works on the sidewalks.


Someone who showed me kindness when I most needed it

So, ah, technology-civilization is I guess the loom, and people-helping-people-civilization is the fabric


jerlendds

stop noticing so much shit kid, ain’t good for you


Responding to the challenge: federated systems

Privacy and security are overlapping and complementary concepts, but they are foundationally different. Information security concerns the confidentiality, integrity and availability of information. Privacy risks may result from authorized activity that is beyond the scope of information security. Thus, protecting individuals’ privacy cannot be achieved solely by securing personal data. Security involves protecting information from unauthorized access, use, disclosure, disruption, modification or destruction. Privacy, on the other hand, is concerned with managing authorized risks to individuals associated with the creation, collection, use, processing, storage, maintenance, dissemination, disclosure or disposal of personal data.


Hyperobjects

Global warming is perhaps the most dramatic example of what Timothy Morton calls “hyperobjects”—entities of such vast temporal and spatial dimensions that they defeat traditional ideas about what a thing is in the first place. Morton explains what hyperobjects are and their impact on how we think, how we coexist, and how we experience our politics, ethics, and art.


Beyond the Faust and the Hype-Imaginaries of Large Language Text Models

From this point of view, knowledge can be described as a living organism […] And while it lives, it lives of and in the interpretations of the actors who interact with it: whether it is the people who use this knowledge for their lives or to make more of it, or whether it is the computational entities that collect this knowledge for some reason, whether it is to make it accessible in some way by a search engine, or whether it is to try to process it with the processes of artificial intelligence.

In their celebrated paper On the Dangers of Stochastic Parrots: Can Language Models Be Too Big?, a group of U.S. researchers sounded the alarm about the risks and criticalities in using so-called Large Language Models (LLMs), language models such as GPT and their derivatives. As they rightly point out, these technologies are not capable of understanding text, but cascade a series of words from previous ones, according to a certain structure and coherence. They are, to use the paper’s analogy, stochastic parrots, assigning a certain probability to the terms to be written. Making this clarification is useful to reduce the hype associated with these technologies, thus to avoid misunderstandings of their use to the general public.

The photocopy was a blurry replica of the original. The same is true for ChatGPT: a blurry copy of the entire web. Passing off an LLM as a substitute for a search engine (as proposed by Microsoft with Bing and by Google with Bard) is wrong and dangerous, because searching for references is not the task it is trained to do. Of course, there are also services that, in addition to the textual response, provide the links used to construct the response, but at that point we might as well use a search engine. On what then does a language model go strong? On what specifically relates to language: translations, summaries and rephrases. These are the activities on which it is trained, although it can obviously show reversals of meaning in particular cases.

What will an AI trained on these platforms think or feel about colonial expansion? What will it answer when someone tries to ask for advice and information about abortion or gender transition, depending on which country it refers to? The answer will always depend on what information, texts and materials were used to train the machine. The point is not to improve or correct the model, the point is that any representation of the world and any form of expression is situated, is positioned in a specific social, historical context and therefore in a specific situation of privilege. Eliminating bias is a meaningless demand, since neutral discourse does not exist. The search for a phantom fairness of AI, aligned with social canons and mores, can only reckon that canons and norms are situated geographically, socially, historically.

The Pentagon estimates that the People’s Republic is at a level of AI development equal to that of the U.S. so much so that the National Security Commission’s final report on artificial intelligence states that “China’s plans, resources, and progress should worry all Americans. In many areas, Beijing has equaled the levels of the United States and is even ahead in some.”

Technopolitical and alternative platform responses to capital must, however, come to terms with the human and environmental costs involved in these technologies, and OpenAI has not disclosed any specific data on infrastructure emissions.


Morphic minds

Of these beings (humans and otherwise) it can be said that they have a different geosensing capacity: they perceive the rhythms of the world in ways that, to some, are as far remote as those first hominids we were mentioning. A desire to break through overwrought thoughts, where the mind is caught in unbreakable, encircling infrastructures, is traceable in many poetics of these badlands. This is the place from where we would like to start speculating about the artificial, intelligence, and bodies to come. In that respect we would like to recapitulate the way cyberneticians of the Cold War, philosophers, both ancient and contemporary, contemplated intelligence while, yet, opening this conversation towards cosmic luminescent nests and galactic axes.


ACCELERATE MANIFESTO for an Accelerationist Politics

Platforms are the infrastructure of global society. They establish the basic parameters of what is possible, both behaviourally and ideologically. In this sense, they embody the material transcendental of society: they are what make possible particular sets of actions, relationships, and powers.

The choice facing us is severe: either a globalised post-capitalism or a slow fragmentation towards primitivism, perpetual crisis, and planetary ecological collapse.


Aaron peters - Inventing the future

If automation isn’t destroying jobs, your doing it wrong!


Politics and the English Language

If you are using straightforward language, the products built by these extremely profitable companies have one singular purpose - to collect as much data as possible from the user, while keeping the user in the dark about it, and then use the data to manipulate user behavior

people know what language to avoid when employing Orwellian tactics


Scientific Misconduct in Psychology: A Systematic Review of Prevalence Estimates and New Empirical Data

For example, Motyl et al. (2017, p. 10) found that their sample of social and personality psychology researchers had the impression that “the field overall might be pretty rotten”.

This study was the first empirical investigation analyzing a large number of psychological articles retracted due to scientific misconduct. Our empirical analyses revealed that the percentage of retractions that was attributable to scientific misconduct (64.84% in PsycINFO) was similar to the biomedical and life-science literature


Correspondence between Charles Darwin and Francis Galton

You have made a convert of an opponent in one sense, for I have always maintained that, excepting fools, men did not differ much in intellect, only in zeal and hard work; and I still think this is an eminently important difference.


Towards an Enlightened Centrism

Some epic “both-sides-are-the-same” from someone who doesn’t appear to know that “enlightened centrist” is an insult directed at him


HN - The shared persuasion tactics of politics and startups

Our brains are wired up in a particular set of patterns for social organization. So it’s no surprise that all kinds of different organizations and their tactics will resemble one another. What really matters is: Are the people in the organization subject to epistemic dysfunction? Does the organization pathologically warp the perceptions and emotions of its people to the point of delusion? In contrast to Drexler et al’s idea from the late 80’s early 90’s, that “hypertext would save the world” from its delusions, social media has just made the organization of information bubbles easier than ever.


Inoculate populations through media literacy training

cultural resistance to bullshit


Margaret Thatcher

Don’t follow the crowd, let the crowd follow you.

The problem with socialism is that you eventually run out of other people’s money.

Look at a day when you are supremely satisfied at the end. It’s not a day when you lounge around doing nothing; it’s a day you’ve had everything to do and you’ve done it.

Consensus: The process of abandoning all beliefs, principles, values, and policies in search of something in which no one believes, but to which no one objects; the process of avoiding the very issues that have to be solved, merely because you cannot get agreement on the way ahead. What great cause would have been fought and won under the banner: I stand for consensus?

In the end, more than freedom, they wanted security. They wanted a comfortable life, and they lost it all – security, comfort, and freedom. When the Athenians finally wanted not to give to society but for society to give to them, when the freedom they wished for most was freedom from responsibility, then Athens ceased to be free and was never free again.


Why being an open startup matters

As a founder, you’re not only building a product. You’re building an organization and its culture. If you believe code should be open and transparent, why stop there?


Working in Public: The Making and Maintenance of Open Source Software

an inside look at modern open source software development, its evolution over the last two decades, and its ramifications for an internet reorienting itself around individual creators.

over the last twenty years, open source inexplicably skewed from a collaborative to a solo endeavor. And while more people use open source code than ever before, its developers failed to capture the economic value they created: a paradox that makes them just as interesting to reexamine today.

“He told me that code is “anarchist” and “untouchable,” and that it must be able to survive beyond any one person’s desires, or their need to pay rent. “It needs to be something that nobody can take away,” he said. “It’s the system that’s important. If one developer goes away, another will step in and maintain it.” Freedom of code extends to freedom from the people who make it, too.”


Margaret Atwood - a Canadian poet, novelist, literary critic, essayist, teacher, environmental activist, and inventor

If you’re going to speak truth to power, make sure it’s the truth


What does it mean to be an Open Startup?

The Open Startup trend is a transparency and openness movement…

There’s no official definition yet, and the Oxford dictionary weren’t available for comment, so let’s write one; A product or company which operates in the open and shares their statistics publicly.

All a company needs to declare themselves an Open Startup is to share their metrics such as revenue, users, and traffic. This is usually done on a dedicated page with lots of numbers and charts hopefully showcasing growth, and it can sometimes tells a story of the company


What Is Human Nature?

Paleolithic emotions, medieval institutions, and god-like technology


You and Your Research - Richard Hamming

One who works with the door open gets all kinds of interruptions, but they also occasionally gets clues as to what the world is and what might be important.


M. Mitchell Waldrop

The edge of chaos is where life has enough stability to sustain itself and enough creativity to deserve the name of life


INTEGRAL FUTURES

Some years ago Ken Wilber found a way of integrating the central ideas from a wide variety of disciplines, including scientists, engineers, psychologists and even mystics.

If we focus our attention on the external aspects of our predicament, the global context becomes a trap for humanity.

The entire external world is constantly ‘held together’ by interior structures of meaning and value.

human activities everywhere are supported by subtle but powerful networks of value, meaning and purpose that are socially created and often maintained over long periods of time

Integral Futures frameworks acknowledge the complexity of systems, contexts and interconnected webs of awareness and activity. These all influence the behavior of individuals and groups. They also shape structures and events in the physical, social and psychological worlds.

be open to many perspectives and interpretations

engage in depth with the multiple crises that threaten our world and its nascent future

look more deeply into ourselves and into our social contexts to find the ‘levers of change,’ the strategies, the enabling contexts, the pathways to social foresight.

constructive responses to a world currently desperate for solutions to the encroaching global emergency.


John B. Thomas - modern information age

Thomas trained many graduate students who went on to become some of the most highly cited and groundbreaking researchers in the field. The internet, cellphone networks, and many other information systems that depend on detecting and evaluating information encoded in electrical or radio signals emerged from the work of his students.


Public Sphere Project

Students identify with good teachers and value their knowledge highly. This might mean, however, that students might be reluctant to “go against” the teaching of their mentor/hero/professor. to teach transgression; that is, to go against the received wisdom — to test and rebel against it. The scope of such transgression should be wide and include all of a society’s rules, prejudices, and attitudes.

Our political, economic, and technological systems have become mysterious while the real mysteries no longer carry deep meaning and connection with people and the natural world.

Even when not pursued deliberately, education promotes and replicates values. Yet, the propagation of values is typically not designed with the appropriateness of these values for the future in mind.


Congress and the states want to bring a Chinese-style police state Internet to the U.S.

Basically, both parties in Congress—and legislators in both blue and red states—want to turn the Internet into a China-style police state, where all activity is tracked and tied to government IDs. Even if you trust one party not to abuse this, imagine when the other party gets into power! All of this is being leveraged on a “protect the children” basis where the legislative demands would be ineffective at preventing children from accessing the materials of concern, trample on the rights of adults to use the Net, and actually expose children to more risks from abusive parents. That’s the bottom line.


Impact of AI on Software Development (Taylor Soper)

the composition of AI-generated code is similar to a short-term developer that doesn’t thoughtfully integrate their work into the broader project.


Our increasing reliance on digital technology for personal, economic, and government affairs has made it essential to secure the communications and devices of private citizens, businesses, and governments. This has led to pervasive use of cryptography across society. Despite its evident advantages, law enforcement and national security agencies have argued that the spread of cryptography has hindered access to evidence and intelligence. Some in industry and government now advocate a new technology to access targeted data: client-side scanning (CSS)… CSS by its nature creates serious security and privacy risks for all society, while the assistance it can provide for law enforcement is at best problematic…


Technology is driving the future… it is up to us to do the steering

If we keep following the well-trodden paths that have brought us to where we are, we’ll never get to where we want to go. Schuler and his colleagues believe that we can get out of these ruts, and better yet, they tell us how. This work goes beyond elections and demonstrations, beyond cynicism and business as usual. It asks the much deeper questions: what kind of a world do we want and what must we do to get there?


Knowledge accumulates like compound interest

“One day I discovered that John Tukey was slightly younger than I was. John was a genius and I clearly was not. Well, I went storming into Bode’s office and said, ‘How can anybody my age know as much as John Tukey does?’ He leaned back in his chair, put his hands behind his head, grinned slightly, and said, ‘You would be surprised Hamming, how much you would know if you worked as hard as he did that many years.’ I simply slunk out of the office!


It’s not just luck.

“If others would think as hard as I did, they would get similar results” - Newton


Red herring

a rhetorical device that diverts attention from a line of enquiry, topic, or suspect


Respect

Respect has great importance in everyday life.


Of Mice and Men

I ain’t so bright neither


systems thinking - why it matters for innovation today

We are currently living through VUCA (volatile, uncertain, complex and ambiguous) times.

‘No man is an island’ is a well-known phrase, yet in practice, how often do we understand the interconnectedness of everything around us?

Every firm defines innovation in a different way. I enjoy using the four-quadrant model for simplicity:

  • incremental innovation utilises your existing technology within your current market;
  • architectural innovation is applying your technology in different markets
  • disruptive innovation involves applying new technology to current markets
  • and radical innovation displaces an entire business model

this philosophy needs to enter our everyday thinking

strategy in a sustainable way


Independent thought

that’s what culture was turning everyone into—people without independent thought


System Thinking Is the Cognitive Skill of the 21st Century

One of the characteristics of the 21st century is that we’re investing more in complexity, and things are just getting damn complicated

system thinking is simply thinking about something as a system: the existence of entities—the parts, the chunks, the pieces—and the relationships between them

System thinking is for everyone on this side of the life-death line

it’s true that system thinking is prevalent in STEM fields, Professor Crawley stresses that a tremendous amount of system thinking occurs outside of science, technology, engineering, and mathematics. He rattles off a list of examples to illustrate his point: “The legal system is a system, the Constitution is a system, public health is a system, national defense is a system, finance is a system


What is Systemic Design? Practices Beyond Modelling and Analyses

Let us start by discussing what systemic design is not. Some people who are knowledgeable about systems theories tend to look at systemic design as the application of one or another systems theory or particular methodology to design. However, this is not the case. While systemic design draws from systems theories, our main position is that both domains – design and systems – have something to contribute to each other, and relating the two will (or at least should) result in novel perspectives, processes, ideas and even theories. Systemic design intends to develop multiple new practices based on intersections between multiple perspectives.

there are fundamental principles that form the bases of systemic design that should be re-expressed and further crystallised. This is neither being done to navigate towards less pluralism and variety nor to stop dynamic development. However, to avoid bleeding outside the discourse into themes that have been discussed at length and to let its nature develop organically, we need to establish an a priori platform from which we can launch a discussion instead of spending energy on repetitions, misconceptions, misunderstandings and straw arguments.


Is Open Source a diversion from what users really want?

Of course, developing software with complexity on the level of Ardour’s is never going to be easy, and finding other people willing and able to contribute to such a project is always going to be hard, whether you’re an open source project or a proprietary company.

However, underlying both of those reasons why I wanted to use the GPL was a conviction the access to the source code was critical to both:

  1. giving users the freedom they deserved
  2. attracting developers (or even just “power users”) to contribute to the project

I remain convinced that access to source code is a fundamental part of the “four freedoms” that Richard Stallman has outlined as the basis of the concept of “free/libre software”. But as described at great length and exhaustive detail by Berlin-based electronic musician and developer Louigi Verona, it’s not quite that simple.


The Formula - Albert-Laszlo Barabasi

Too often, accomplishment does not equate to success. We did the work but didn’t get the promotion; we played hard but weren’t recognized; we had the idea but didn’t get the credit. We’ve always been told that talent and a strong work ethic are the key to getting ahead, but in today’s world these efforts rarely translate into tangible results. Recognizing this disconnect, Laszlo Barabasi, one of the world’s leading experts on the science of networks, uncovers what success really is: a collective phenomenon based on the thoughts and praise of those around you.


Wicked Problem

A wicked problem is a problem, usually social or cultural, that is challenging or impossible to solve either because not enough is understood about the problem, the number of stakeholders involved, the number of varying opinions, the economic burden, or the impact of these problems with other problems. For example, poverty is closely related to education, health, and nutrition.


Neo-Cybernetics

What is Neo-Cybernetics?

an interdisciplinary movement at the vanguard of systems science, ecology, and futures studies that aims to restore the discipline of cybernetics to revive its foundational legacy.

merging systems thinking, design thinking, ecological thinking, and futures thinking, the movement strives to study evolutionary patterns and emergent behaviors in complex adaptive systems, paving the way for sustainable, equitable, and adaptive futures

What are the objectives of Neo-Cybernetics?

At its core, neo-cybernetics seeks to elevate our collective understanding of the Metamodern age, an era characterized by complex global issues and risks.

  • Bridging Knowledge Across Boundaries

  • Holistic Research and Application

Why do we need Neo-Cybernetics?

In an age of exponential technological growth, wicked problems and unprecedented societal changes, a reductionist approach to the study of systems is showing its limitations. In this context, the need for a holistic, adaptive approach is paramount.


Neo-Cybernetics Manifesto

communication, interaction and governance in networks and complex adaptive systems

The term “cybernetics” originates from the Greek word ‘kybernētēs’, which means steersman, governor, pilot, or one who guides. Established primarily in the 1940s and 1950s by pioneers such as Norbert Wiener, cybernetics was conceived as a transdisciplinary study of systems, controls, and feedback mechanisms in natural and artificial systems.

redefining old paradigms to offer a more holistic and contemporary framework, which is tailored for the challenges of the modern world

expertise operated largely within its own boundaries, making interdisciplinary comprehension a nearly impossible task

With state-of-the-art generative AI, we can seamlessly “translate” between disparate domains. It’s now possible to bridge the conceptual chasms between biology and macro-economic theories or compare patterns in neural networks in the context of sociological dynamics. These tools not only break down old barriers but enable a synthesis of diverse knowledge spheres

committed to supporting governments, enterprises, and communities in their transition towards becoming societies 5.0; where harmony between technological potential and humanistic values defines our shared future

the significance of nodes and links, exploring how individual components interact within the larger network structure. In doing so, it unravels patterns, cascading effects, and vulnerabilities. As our world becomes increasingly interconnected — from social networks to technological infrastructures — harnessing insights from network theory becomes paramount to predict, manage, and optimize these complex systems


What You Need to Know About Network Theory

According to theoretical physician Markus Schirmer, network theory involves the study of the way elements in a network interact. “A simple way of understanding a network is by assuming that a set of objects are connected by some sort of link,” he explains. “The set of objects may represent, for example, human beings, products, ingredients, diseases, or brain regions, whereas the links are relationships or structural connections.

nodes can also view their edges differently. For example, one person may feel that someone he or she is seeing socially is a close friend. The other party, however, may not believe the relationship is very close. For this reason, charting the connection’s direction, known as the path, as well as its weight is useful in network theory.


Chesterton’s Fence: A Lesson in Second Order Thinking

When we seek to intervene in any system created by someone, it’s not enough to view their decisions and choices simply as the consequences of first-order thinking because we can inadvertently create serious problems. Before changing anything, we should wonder whether they were using second-order thinking. Their reasons for making certain choices might be more complex than they seem at first. It’s best to assume they knew things we don’t or had experience we can’t fathom, so we don’t go for quick fixes and end up making things worse.


The Responsibility of Design: Adopting a Futures-Oriented Mindset to Support a More Responsible Design Practice

Conveying how things ought to be should begin with understanding how and why things are the way they are before catalyzing a transition to a future state. Meeting people where they’re at is key


Building radical consensus

When “the house is on fire,” the focus is on how best to put the fire out as quickly as possible—not the governance of the fire service. Those with the skill and clout to work at influencing the global political economy and global conservation paradigms must do so, but the focus has to be on how we can get on better trajectories and to better outcomes for nature and people now—last week, yesterday, today, and tomorrow.

one of the greatest threats to biodiversity conservation is the attitudes and behavior of conservationists. This includes linear and silo thinking; an “experts know best, so experts decide” mentality; scientism with the natural sciences seen as the only way of knowing; top-down approaches telling others what to do; black box methods; and a belief that the answer is to educate “them” and then make them rationally analyze (our) options. All these need to change—and fast.

Delivering these deliberative consensus-building processes involves a great deal of design: who is in the core deliberations; any wider engagement to feed into that; mapping out questions, techniques, flows of knowledge, decision points, and then facilitating to enable points to be taken on merit not the status, power, or behavior of who said what. This encourages greater systems thinking, builds trust and understanding across differences, and—crucially—momentum for change.

Great outcomes can come even when people have very different values and politics if they work together in a principled and collaborative way—not one side trying to educate or change the other but co-designing what change looks

Futures thinking is not a new term nor a hot new take on design thinking. Futures thinking is a “method for informed reflection on the major changes that will occur in the next 10, 20 or more years in all areas of social life, including education”—a method that “uses a multidisciplinary approach to pierce the veil of received opinion and identify the dynamics that are creating the future”


Gen Z and fears of the future

Greta Thunberg expresses despair and rage rather than offering solutions.


Richard Feynman

the first principle is that you must not fool yourself, and you are the easiest person to fool


Artificial Intelligence Attitude and Literacy Framework (AI-ALF)

The advent of Artificial Intelligence as an integral part of our lives is no longer a prediction, but a reality.

it has profound implications on our interaction with the world, our workplaces, and our economic and organisational structures.

The aim of this framework is twofold:

Firstly, it seeks categorize the diverse perspectives and levels of acceptance individuals have towards AI through the ‘Attitude’ dimension. From fatalists to enthusiasts, each attitude towards AI provides unique insights into how people perceive and interact with this technology.

Recognizing these diverse perspectives fosters an inclusive discourse around AI and its impacts, promoting societal resilience and adaptability in an era of accelerating technological change

Secondly, the framework, through the Literacy dimension, provides a taxonomy to understand where an individual sits in regards to their level of awareness and knowledge of AI systems.

By mapping out the diverse spectrum of AI literacy in the population, from the unaware to the experts, we can gain a clearer picture of the existing landscape of AI knowledge. Identifying knowledge gaps is key to informing where educational efforts should be focused to improve AI literacy across society. Additionally, understanding the varying levels of comprehension can help policy-makers design regulations and guidelines that are in line with the public’s understanding of AI, ensuring their relevance and effectiveness.

Ethics

we intend to underscore the significance of the collective contribution to the development of AI, and stress that every perspective matters. As AI continues to evolve and impact our lives in myriad ways, it is imperative that its development is informed by a diverse array of perspectives.

We must respect different opinions. The spectrum of views from fatalists to utopians provides us with a wide lens to examine the possible societal implications of AI, helping us foresee potential challenges and address them proactively. Every perspective, whether critical or supportive, adds a unique dimension to the ongoing conversation about AI.

it is within our collective power to contribute to the increase of knowledge about AI. We all have a role in promoting transparency, accessibility, and understanding of AI. This can be achieved through education, open discussions, or the development of user-friendly AI technologies. By sharing knowledge and encouraging exploration of AI, we empower each other to engage critically with this technology, fostering a more informed and resilient society.

We aspire to a society that is not only informed about AI, but also actively engages in discussions about its ethical, social, and economic impacts.

Call to action

This framework serves as a call to action for everyone to contribute to shaping the future of AI. It advocates for inclusivity, diversity, respect, and collective growth, all of which are crucial for navigating our synthetic age responsibly and equitably.

By ensuring a diverse set of stakeholders contribute to the development of AI, like generative models, we can ensure the resultant technology is more robust, fair, and representative of the global society it serves.


Hacker News

Our entire team is trained to respond to a PII incident as if it were a radiation leak at a nuclear power plant.


eIDAS 2.0 Sets a Dangerous Precedent for Web Security

the EU is mandating that browsers accept EU member state-issued Certificate Authorities (CAs) and not remove them even if they are unsafe. If you think this sounds bad, you’re right. Multiple times, EFF, along with other security experts and researchers, urged EU government regulators to reconsider the amended language that fails to provide a way for browsers to act on security incidents.


Declare your digital independence

The public square is privately owned, threatening freedom of speech and democracy.


Crypto wars

This means that even when we believe that we are communicating using trustworthy and secure methods, our information and activities may be compromised by security vulnerabilities inserted into systems by governments—often known as “backdoors” because they provide the government with access, but also leave an opening for malicious actors.


Surveillance Self Defense: Threat Modeling

It’s easy to succumb to privacy nihilism. That’s the idea that digital security and privacy are simply impossible. But that’s simply wrong. It is true that trying to protect yourself from 100% of the threats you face 100% of the time is a recipe for failure. But perfection is not the goal of digital security. Each person is faced with different threats—potential events that could undermine your efforts to defend your data.


Tor Myths and Facts

MYTH:

Tor is for criminals who want to make illegal transactions free from law enforcement’s prying eyes.

FACT:

Tor is and can be used by anyone who would benefit from online anonymity: people who do not want companies to market to them based on their browsing data, individuals who live in countries with censored Internet access, journalists who need to protect their sources, or businesses that want to keep their strategies confidential. Without Tor, a user’s location can be tracked whenever she goes online, and normal everyday Internet use creates an absurdly detailed profile of a user’s whereabouts


DRM

Corporations claim that DRM is necessary to fight copyright infringement online and keep consumers safe from viruses. But there’s no evidence that DRM helps fight either of those. Instead DRM helps big business stifle innovation and competition by making it easy to quash “unauthorized” uses of media and technology.


DMCA

the DMCA has become a serious threat that jeopardizes fair use, impedes competition and innovation, and chills free expression and scientific research.


Coders

Security and encryption researchers help build a safer future for all of us using digital technologies, but too many legitimate researchers face serious legal challenges that prevent or inhibit their work. These challenges come from laws such as the Convention on Cybercrime, the Digital Millennium Copyright Act, the Computer Fraud and Abuse Act, similar state laws, and computer crime laws in many countries around the world.


Intellectual property

When the system works, it can be an engine for creativity, innovation and consumer protection. When it doesn’t, IP rights have the opposite effect, giving IP owners a veto on innovation and free speech.

What does that veto look like? It looks like decades of litigation to try to strangle new technologies and services in the cradle, from the phonograph to mp3 players to BitTorrent to podcasting to the next technology someone’s inventing in their garage right now. It looks like lawsuits to shut down political activists simply because they’re using a corporation’s trademarks in a parody site. It looks like a web of licenses, backed up by law, that limit your ability to tinker with, sell, give away, repair and generally use your devices.


Open access

Subscription prices have outpaced inflation by over 250 percent in the past 30 years, and these fees go straight to the publisher—resulting in unbelievable profit margins. Neither the authors nor their institutions are paid a cent, and the research itself—which is largely funded by taxpayers—remains difficult to access, much less repurpose, compare, or share.


Pathological politics

the obscuration of important sociopolitical and material crises by a pathological obsession with language

persuasiveness lies in “educating” the benighted, rather than genuinely listening to what they might have to say


LIBRARY FREEDOM

Library Freedom Project is radically rethinking the library professional organization by creating a network of values-driven librarian-activists working together to build information democracy.


Judge Kathleen M. Williams granted a motion to deny the MPAA the usage of words whose appearance was primarily “pejorative”. This list included the word “piracy”, the use of which, the motion by the defense stated, serves no court purpose but to misguide and inflame the jury.


A Declaration of the Independence of Cyberspace - John Perry Barlow

Governments of the Industrial World, you weary giants of flesh and steel, I come from Cyberspace, the new home of Mind. On behalf of the future, I ask you of the past to leave us alone.

We have no elected government, nor are we likely to have one, so I address you with no greater authority than that with which liberty itself always speaks. I declare the global social space we are building to be naturally independent of the tyrannies you seek to impose on us. You have no moral right to rule us nor do you possess any methods of enforcement we have true reason to fear.

Governments derive their just powers from the consent of the governed. You have neither solicited nor received ours. We did not invite you. You do not know us, nor do you know our world. Cyberspace does not lie within your borders. Do not think that you can build it, as though it were a public construction project. You cannot. It is an act of nature and it grows itself through our collective actions.

You do not know our culture, our ethics, or the unwritten codes that already provide our society more order than could be obtained by any of your impositions.

You claim there are problems among us that you need to solve. You use this claim as an excuse to invade our precincts. Many of these problems don’t exist. Where there are real conflicts, where there are wrongs, we will identify them and address them by our means. We are forming our own Social Contract. This governance will arise according to the conditions of our world, not yours. Our world is different.

Cyberspace consists of transactions, relationships, and thought itself, arrayed like a standing wave in the web of our communications. Ours is a world that is both everywhere and nowhere, but it is not where bodies live.

We are creating a world that all may enter without privilege or prejudice accorded by race, economic power, military force, or station of birth.

We are creating a world where anyone, anywhere may express his or her beliefs, no matter how singular, without fear of being coerced into silence or conformity.

…there is no matter here.

We believe that from ethics, enlightened self-interest, and the commonweal, our governance will emerge. Our identities may be distributed across many of your jurisdictions. The only law that all our constituent cultures would generally recognize is the Golden Rule. We hope we will be able to build our particular solutions on that basis. But we cannot accept the solutions you are attempting to impose.

You are terrified of your own children, since they are natives in a world where you will always be immigrants. Because you fear them, you entrust your bureaucracies with the parental responsibilities you are too cowardly to confront yourselves. In our world, all the sentiments and expressions of humanity, from the debasing to the angelic, are parts of a seamless whole, the global conversation of bits. We cannot separate the air that chokes from the air upon which wings beat.

In China, Germany, France, Russia, Singapore, Italy and the United States, you are trying to ward off the virus of liberty by erecting guard posts at the frontiers of Cyberspace. These may keep out the contagion for a small time, but they will not work in a world that will soon be blanketed in bit-bearing media.

These increasingly hostile and colonial measures place us in the same position as those previous lovers of freedom and self-determination who had to reject the authorities of distant, uninformed powers. We must declare our virtual selves immune to your sovereignty, even as we continue to consent to your rule over our bodies. We will spread ourselves across the Planet so that no one can arrest our thoughts.

We will create a civilization of the Mind in Cyberspace. May it be more humane and fair than the world your governments have made before.


Annas Archive

Catalog all the books in existence


Mikhail Gorbachev

All agreements aimed at nuclear disarmament and the limitation of nuclear weapons must be preserved, for the sake of life on Earth


The Freedom of the Press

This kind of thing is not a good symptom. Obviously it is not desirable that a government department should have any power of censorship (except security censorship, which no one objects to in war time) over books which are not officially sponsored. But the chief danger to freedom of thought and speech at this moment is not the direct interference of the MOI or any official body. If publishers and editors exert themselves to keep certain topics out of print, it is not because they are frightened of prosecution but because they are frightened of public opinion. In this country intellectual cowardice is the worst enemy a writer or journalist has to face, and that fact does not seem to me to have had the discussion it deserves.

Any fairminded person with journalistic experience will admit that during this war official censorship has not been particularly irksome. We have not been subjected to the kind of totalitarian ‘co-ordination’ that it might have been reasonable to expect. The press has some justified grievances, but on the whole the Government has behaved well and has been surprisingly tolerant of minority opinions. The sinister fact about literary censorship in England is that it is largely voluntary.


Bell Labs

The role of ensuring Bell ran “better, cheaper, or both” was the full-time responsibility of Systems Engineering.


Lessons from history’s greatest R&D labs

Edison built his god-like reputation by dreaming in specific applications. He kept market, resource, and manufacturing constraints in mind from the earliest stages of his projects. Edison dreamed practical, realizable dreams. And when the limitations of component technologies stood in the way of his dreams, he often had the talent to invent new components or improve existing materials. Edison’s biggest dream, the light bulb, mandated that Edison solve a much broader set of problems.


Information Manipulation It follows that the current state of public discourse can no longer be examined through the lens of misinformation that can be debunked, but as an alternative reality that is shared by millions.


Patrick McKenzie

it turns out that the amount of supply-chain fraud in maple syrup is actually quite higher than zero. The chain of custody for cars of maple syrup is much less regimented than you would expect that chain of custody to be. There are smaller buyers of maple syrup — not on the scale of you or me, but on the scales like a boutique maple syrup refinery — who just don’t do as many checks as the large producers or suppliers, et cetera, do. So, it is possible to steal millions of dollars of maple syrup and sell it on the black market


THE USEFULNESS OF USELESS KNOWLEDGE

Institutions of learning should be devoted to the cultivation of curiosity and the less they are deflected by considerations of immediacy of application, the more likely they are to contribute not only to human welfare but to the equally important satisfaction of intellectual interest which may indeed be said to have become the ruling passion of intellectual life in modern times.

Out of this useless activity there come discoveries which may well prove of infinitely more importance to the human mind and to the human spirit than the accomplishment of the useful ends for which the schools were founded. The considerations upon which I have touched emphasize-if emphasis were needed-the overwhelming importance of spiritual and intellectual freedom. I have spoken of experimental science; I have spoken of mathematics; but what I say is equally true of music and art and of every other expression of the untrammeled human spirit.

The real enemy of the human race is not the fearless and irresponsible thinker, be he right or wrong. The real enemy is the man who tries to mold the human spirit so that it will not dare to spread its wings

Justification of spiritual freedom goes, however, much farther than originality whether in the realm of science or humanism, for it implies tolerance throughout the range of human dissimilarities. In the face of the history of the human race what can be more silly or ridiculous than likes or dislikes founded upon race or religion? Does humanity want symphonies and paintings and profound scientific truth, or does it want Christian symphonies, Christian paintings, Christian science, or Jewish symphonies, Jewish paintings, Jewish science, or Mohammedan or Egyptian or Japanese or Chinese or American or German or Russian or Communist or Conservative contributions to and expressions of the infinite richness of the human soul?

We cherish the hope that the unobstructed pursuit of useless knowledge will prove to have consequences in the future as in the past.


Philosophy of science and the replicability crisis

Replicability is widely taken to ground the epistemic authority of science.


Multi-armed Bandit

It was a multi-armed bandit problem. This problem, which, under a different name, had first been studied by the biologist William R. Thompson in 1933, centers on a rather surreal thought experiment. A gambler faces a slot machine (“a one-armed bandit”), except this machine doesn’t have one arm—following some twisted dream logic, it has k arms, arms sticking out in every direction. Some of these arms have a high probability of paying out the jackpot, others are worse. The problem is pulling the arms in an order that maximizes the expected total gains.

The amount of exploration that is optimal depends on the complexity of the problem and the time horizon.


notes.andymatuschak.org

Powerful enabling environments usually arise as a byproduct of projects pursuing their own intrinsically meaningful purposes

Deep collaborations between tool-makers and tool-users may support insight through making

Groups researching tools for thought need enough capacity to build prototypes suitable for serious work

Consensus networks quell radical ideas

Deep research requires a slower pace than tech industry work

it’s too easy to let others’ schema and ideas dominate your own

How can you think thoughts which have never been thought before if you’re reliant on others’ thinking?

Without being aware of it, they’ve remained prisoners of those invisible and despotic circles which delimit the universe of a certain milieu in a given era. To have broken these bounds they would have to rediscover in themselves that capability which was their birthright, as it was mine: The capacity to be alone.

That number system represents both a profound work of design and also a profound mathematical insight… This self-similarity is critical to number system’s power. It expresses both deep mathematical ideas (commutativity, associativity, distributivity) and deep ideas in design (abstract representation, parsimony, spatiality).


Ambient Co-presence

Creating a subtle, peripheral, and synchronous sense of shared space and context on the web


Hacking Technology, Hacking Communities

”Hacking” is a mode of technical and cultural production. Many undertakings might now be considered variants of hacking, from modding cars to crafting to do-it-yourself projects. A more bounded meaning centers around computer programming. In its most expansive sense, hacking is a mode of engaging with technology: breaking technology down and building it up in a new form to gain skills, to explore, to create a new useful object, or as an expression of curiosity. Rather than focusing on the output—lines of computer code, picked locks, or other artifacts—we could consider hacking as a worldview.

In their early days, free software projects of the 1990s were “experiments in coordination … [They were] exemplars of how ‘fun,’ ‘joy,’ or interest determine individual participation and how it is possible to maintain and encourage that participation … instead of narrowing the focus or eliminating possible routes for participation.” This meant that people who showed up to participate were responsible for cultivating their own routes to satisfaction: finding fun, joy, and interest in the projects. For hackers, cultural and technical artifacts should be left open to allow endless modification, reinterpretation, and re-fashioning toward purposes beyond those for which they were originally created.


Irreversibility and Heat Generation in the Computing Process

Thus at first sight it seems possible to RESTORE TO ONE without any expenditure of energy. Note, however, that in order to avoid energy expenditure we have used two different routines, depending on the initial state of the device. This is not how a computer operates. In most instances a computer pushes information around in a manner that is independent of the exact data which are being handled, and is only a function of the physical circuit connections.

The simplest class and the one to which all the arguments of subsequent sections will be addressed consists of devices which can hold information without dissipating energy.


The Forecasting Fallacy

In order to predict the future, you have to invent it


Hacker Ethics

Make public data available, protect private data.


How to Get New Ideas

Knowledge grows fractally. From a distance its edges look smooth, but when you learn enough to get close to one, you’ll notice it’s full of gaps. These gaps will seem obvious; it will seem inexplicable that no one has tried x or wondered about y. In the best case, exploring such gaps yields whole new fractal buds.


ACM Code of Ethics

Computing professionals should therefore credit the creators of ideas, inventions, work, and artifacts, and respect copyrights, patents, trade secrets, license agreements, and other methods of protecting authors’ works.


Statistical Modeling, Causal Inference, and Social Science

I really think it’s kind of irresponsible now not to use the information from all those thousands of medical trials that came before. Is that very radical?


The right to read

Today’s commercial e-books abolish readers’ traditional freedoms. Amazon’s e-book reader product, which I call the “Amazon Swindle” because it’s designed to swindle readers out of the traditional freedoms of readers of books, is run by software with several demonstrated Orwellian functionalities.

The battle for the right to read is already being fought. Although it may take 50 years for our past freedoms to fade into obscurity, most of the specific repressive laws and practices described above have already been proposed; some have been enacted into law in the US and elsewhere…


Wernher von Braun - a highly controversial figure

I have learned to use the word ‘impossible’ with the greatest caution.


Microsoft’s Software is Malware

As soon as it boots, and without asking any permission, Windows 11 starts to send data to online servers. The user’s personal details, location or hardware information are reported to Microsoft and other companies to be used as telemetry data. All of this is done is the background, and users have no easy way to prevent it—unless they switch the computer offline.