Tag: import100207
Distributed, Factual Data
Steal This Column
|
Criticism Won’t Change the DMCA, but Breaking the Law Will Here is the plan. Everyone who hates the DMCA has to illegally copy a movie or a song, and then tell both the Congress and the U.S. Copyright Office exactly what they did. We need 10 million or so confessed and unrepentant intellectual property pirates. That’s too much illegal behavior to ignore (What could 10 million pirated copies of “Debbie Does Dallas” be worth?), but too many individual criminals to be prosecuted. Then, having pirated our movie or song, we also need to turn ourselves in to the authorities, clogging every hoosegow in America, facing our potential $10,000 fine, each of us demanding the jury trial we are guaranteed under the Constitution. If we all do this, REALLY do it, the DMCA will be gone in a year. This follows the simple principal that if you or I drive 100 miles-per-hour on the highway, we get a ticket, but if EVERYONE drives 100 miles-per-hour, they change the speed limit. “They,” whoever that is, can’t afford to annoy so much of the population. We are, after all, the folks who elect all these officials who keep telling us what we can and can’t do. But it isn’t enough to just threaten to vote against your Congressman. To make the system really change we have to work it to death by all becoming criminals. Now it’s your turn to steal this column. The trick is to present it as your own as you see it here, rather than as a quote of my work. It is my work, isn’t it? I mean, I haven’t attributed it to anyone, and I’m posting it here to see how much attention I might get – just as good as money in the Attention Economy. If you do think I stole it, then you’re obligated to turn me into the authorities. If you steal it, then let me know so I can turn you in, in case you’re too hardened to do it yourself. (By the way, don’t tell this guy about this column because if he steals it, my charge against him might not hold up in court.) Touretzky’s Syndrome David Touretzky is on a ![]() saying:
That version is much more efficient than the C code below, and, even better, it’s illegal for me to publish it. It’s also illegal for you to read it and to possess the copy you now have in your browser’s cache. Your IP number has been logged… If that’s not enough, here’s an MP3 file I put on my server in case I lose the CD version when I move it from my house to my car. I know that’s legal for me to do, since I own the original, which I’m just archiving for my own needs. If you download it, let me know so I can turn your ass in, because it’s illegal, even though there’s no market for the song, which is unavailable anywhere. We can’t have a legal copy of the song so that all the dead artists on the cut will be incentivized to create more art for us to listen to: Making it LegalI wish the following were as illegal for me to publish as the T-shirt code, but it may not be, since it’s an excerpt from a legal filing by John Hoy, president of the DVD-CCA, in the California trade secret lawsuit against Andrew McLaughlin and 92 other defendants. Let me get this straight. I can’t share the following with anyone, but it’s OK for the DVD-CCA to write it in a filing that is recorded in the public records of the state of California? EXHIBIT A readme DeCSS11.txt ASPI Problems: wnaspi32.w98.dll: Use this for Win98 😛 (Remember to rename it to wnaspi32.dll!) - Authors of DeCSS ***************************************** EXHIBIT B [Fax header: Jan-10 00 10:52-54AM; Pages 5, 6, 7, 8/12, 9/12, 10/12, 11/12, 12/12]
[Handmarked “DeCSS 10/25”]
CSSscrambleT.txt unsigned int CSStab0[11]={5,0,1,2,3,4,0,1,2,3,4}; unsigned char CSStab1[256]= unsigned char CSStab2[256]= unsigned char CSStab3[512]= unsigned char CSStab4[256]= { unsigned char CSStab5[256]= void CSSdescramble(unsigned char *sec,unsigned char *key) t1=key[0]^sec[0x54]|0x100; void CSStitlekey1(unsigned char *key,unsigned char *im) t1=im[0]|0x100; void CSStitlekey2(unsigned char *key,unsigned char *im) t1=im[0]|0x100; void CSSdecrypttitlekey(unsigned char *tkey,unsigned char *dkey) CSStitlekey1(im1,im2); |
Sex and Money
|
Have you noticed that of the many topics routinely discussed, sex and money are the two that most get our attention? My wife Tamara, a urologist, is a medical director for a major pharmaceutical company, working on a team running clinical trials on a drug to treat erectile dysfunction. Therefore we’re at a major meeting in Montreal – the 10th World Congress of the International Society for Sexual and Impotence Research. Dr. Ruth and Pele are here, raising awareness among other things, but it’s a sober crowd, perhaps the only group in the world that doesn’t crack Viagra jokes. (That’s also why the blogs have been sporadic – too much ambience here in Montreal and a persistence-averse 800 connection from my ISP.) Last night I found myself as the only layperson (pun intended) in a broad-ranging conversation among Tamara, an innovator in trigger point therapy for female pelvic floor disorders, a British male researching clinical responses to drugs and a California-based female psychologist specializing in couples’ sex therapy. For a compulsive conversationalist, this was a promising constellation of banter. Sure enough, the issues ranged from female genital mutilation in Eritrea, America’s entry into the colonialist stage of its new imperialism, Howard Bloom’s brilliant books Lucifer Principle and The Global Brain, Jared Diamond’s Guns, Germs and Steel and how men’s and women’s sexual responses differ. On that topic, these experts agreed that a major factor keeping a woman from sexual enthusiasm is financial pressure. We bloggers will have to leave sexual sattisfaction to the experts, but we can do something about the money part. What do You Mean We?Seriously, we bloggers have some collective experience with web-based data solutions. We’ll eventually get our collective minds around the fact that money is just data and the economy is just the transmission of money-data among buyers and sellers. Then we can act on the imperatives of the Peer Economy. The premise of the Peer Economy is that our peers are more likely to meet our needs than are the companies they work for. If that is true, then we should consider companies to be intermediaries which have locked up the most productive resources – people – and locked us in as customers for the work of their people. So, if the Peer Economy’s endoscope, the Internet, allows buyers to locate and transact with people inside the corporation in significant numbers, then the Internet is acting as a disintermediary in the same way it does when it connects us directly to carmakers, airlines, produce warehouses, book distributors and software publishers. Just as the retail intermediaries now being cut out of the distribution channel are screaming foul, so will the corporations whose knowledge workers depart to freelance from home, not fromm downsizing but by choice. Suppose my previous premise is accurate enough to be useful:
If so, then it’s clear that a change in the fundamental data architecture underlying transactions can be the catalyst for a renaissance in the market-based economy of customers collaborating with customizers which predated the industrial age model of passive consumers locked in by mass producers. Thanks to Doc Searls for the important distinction between enfranchised customers and passive consumers. I believe a new peer-to-peer customer-centric data architecture is inevitable and obvious. If/when it occurs, we’ll note retrospectively that the consumer era was an artifact of the seller-centric data model – an architecture that couldn’t scale to the rich data types required in a market-based economy: quality, timeliness, courtesy and expertise. Open Resources
Companies are based on closed data resources. Even when open source tools are used, they are only used to manage closed-source data, locking customers into using company resources to solve the entire class of solutions the company claims to excel at. Of course, that’s untrue and the customers know it. I’d argue that the closed-resource lock-in model cannot and is not scaling to the Internet. Whenever a web-based solution is good enough to be viral it breaks under the strain. Microsoft can’t make HotMail reliable. AOL/TW can’t deliver enough dial tones or ad-free utility. Let’s do the math.
This is quite different from Nicholas Negroponte’s vision of wireless repeater stations proliferating like lilies in a pond. In that case, the capital comes from private citizens accessing as many data servers as there are ISPs. The costs of growth are so broadly scattered that its energy is like the sun, available everywhere, and not like HotMail’s large gro-lite, dependent on Microsoft’s single electric line. If the Water Lily Model works for WiFi, it will work for a range of services. Imagine an RSS-based service index aggregated from the customer-certified reports of an exponentially expanding network of competence:
Imagine your own transactions. We all know there’s an expert in Bangalore who could finish our messy code by the end of the week and there’s someone in our zip code to build our deck masterfully, if only we could find them. |
The Peer Economy
The Merits of Simplicity
|
We’ve conjectured that there’s a dark side to the seeming perfection of our equal opportunity system – our great meritocracy. If there is a dark side, it’s the sword of complexity wielded by the meritocrats. I thinke there are two reasons. The first is Blaser’s Second Law:
The second reason is that we just love to complicate things. We make computers more complicated than they have to be. Employee manuals are unnecessarily dense (yeah – like this blog). As George Gilder put it in 1996,
And it’s only worsened since then. The meritocrats’ inscrutable processes empower the clued-in and disenfranchise the rest of us – the Procedurally Advantaged vs. the Procedurally Disadvantaged (The Dissed?). When we see how pervasive and intentional this growing complexity is, (even though that intention may not be conscious), we can feel Gilder’s rage. Most of us have almost no freedom in designing our lives, just as most of our ancestors were serfs indentured to a landowner who took most of the produce grown on his land. We have more toys and the appearance of owning our own homes, but the disparity in life choices and styles is similar. Aristocracy and meritocracy look remarkably alike to people who missed the boat. Even though they’re still too complex, computers have come a long way. Some Unix geeks still insist that you’re feeble if you don’t work from the command line, but we collectively abandoned that system because the system grows in value by the number of its participants, not by the average IQ of its participants. We’re about to make that breakthrough in economic matters, provided we can pry the meritocrat’s hands off the controls of our economy – the proprietary data structures that lock in their relative advantage. As we design our microeconomy, the high order bit is its evenhandedness, possible only through the distributed shared-custody data architecture we’ve been discussing. |
Huh?
Someone asked me the other day if this blog had to be so dense. Meaning, as only English could cast it, that it’s hard reading, especially if you’re dense. I guess this blog has to be dense. People who read blogs are not idiots. Demographically, we’re the most clued-in cohort of the most connected segment of the wealthiest economy in history.
Our choice is to spend even more time watching Celebrity Fear Factor on our Tivos and swilling Pepsi, or we can get together, think hard and invent the future. Inventing the future is not difficult, but it hurts the brain. We have to conform to the existing Internet protocols, add some standards of our own, but without requiring a wholesale adoption by the people we want to serve. We have to think hard on why things are as they are and how they might be and then design the answer to what keeps the past from becoming our future. After that we need to hack some code. And revise and revise and revise… Besides, this blog is mental exercise for me, allowing me to trot out the ideas I’ve read and conclusions I’ve reached over a lifetime of saving the ideas that seemed worth saving. So I guess my writing will continue to be dense and I’ll hope you’re patient and persistent enough to help me make sense of this design study. As Blaise Pascal said of one of his writings, “I made it longer only because I lacked the time to make it shorter.“ Hidden in Plain SightOur microeconomy design is coming along. But we still lack the Rosetta Stone that helps us apply a universal human protocol to our shared record of transactions. If people don’t use the forms we’re designing to capture our Peer-to-Peer transaction data, they won’t be used, and we’ll have designed another Edsel. The universal theme of Peer-to-Peer transactions in the open marketplace is Identify, Specify, Negotiate, Deliver, Evaluate and Pay.
We like to talk about the marketplace as our model for Internet transactions, but that’s not how it works for most of us. If the globe is to be a global village, we need to solve the sequence demanded when the seller doesn’t know the buyer:
It’s become the standard for mail and Internet orders and we don’t realize it’s a drastic revision of how things have always worked in the agora. In our P2P microeconomy, we’ll apply the traditional sequence even to distance sales. Why would a seller agree to that? Because the buyer has a published reputation the seller can rely on. It’s an extension of the role blogs are beginning to play. John Robb on blogs and reputation:
Now that his blog has introduced him, I’d send John a figurine today and let him pay me later. If the trust problem can be solved, the get first, pay later model could unlock a lot of customer reluctance and get the cash flowing again. Money velocity is the oxygen of a free market. We’ve described a totally transparent transaction model where everything is visible (initial inquiry, delivery details, promised start & finish, price, terms, in-progress remarks, actual start & finish, buyer’s grade & comment, seller’s grade & comment and anything else the parties to the transaction want to archive). Most of the data is in plain sight, though only the high points are published by the participants in their RSS feeds. Confidential data may be encrypted using the W3C’s forthcoming encryption protocols. |
What Good is a
|
microEconomy? Tim O’Reilly quoting William Gibson: The future is here. It’s just not evenly distributed yet.
If you’re dissatisfied with your microeconomy, it’s because the economy you’ld like to live in doesn’t yet exist for you, though it probably does for someone – an unevenly distributed future. Alan Kay famously said that “the best way to predict the future is to invent it“. The challenge is to design a user-friendly microeconomy and then distribute it evenly enough that it can touch any life. To build that microeconomy from scratch, what to focus on? Yesterday, I suggested that data is the heart of the problem. Every economy is data-based. Every database is forms-driven. In our lives, we say or write some things and if they fit a certain requirement, a form is presented to us, filled in, and then our Social Security Number becomes a blip in a database which causes resources to flow in ways dictated by the database rules. Maybe you get a check every two weeks. Maybe you get a phone bill every month. Most (all?) microeconomies are scarcity-based – they mine a lot of people’s too-scarce cash and distribute it to very few. They’re interesting to us for the same reason the lottery is interesting – not because it makes a difference to so many, but because it makes such a big difference to so few. Knowing how hard it is to get rich, these opportunistic microeconomies are built to be uneven – their candid goal is to make as much money as possible for a relatively few people, so that’s the purpose of the operational databases they build. Then they build a back office database called an accounting system to collect from the many and distribute to the anointed few. If our proposed microeconomy is to be even-handed, it must be built from the inside out, starting with an open source accounting system and then building the open source operational database(s) to handle the actual transactions. As a public microeconomy, there can be no central control and no definition of what work is done by this enterprise, since there’s no enterprise in the usual sense. Instead, it’s a free-for-all where we collectively track the quality of transactions and conduct the marketplace as we would in a village, where all promises and all outcomes are visible to everyone. Universal AssuranceAT&T’s old slogan, Universal Service, has been realized, but there’s still dissatisfaction with the service we’re getting. What people purchase is not a product or service, but a sense of assurance that it will give them the benefit they seek. Disappointments arise because you pay in advance for everything you get, whether it works as advertised or not. What we need is a transaction protocol so favorable to the customer that it creates an economic ambience of Universal Assurance. Here are the elements of Universal Assurance:
In that microeconomy, you won’t contract for anything unless it’s already been rated highly, which makes it worth the time and effort of trying it out, knowing your own acceptance protects you against unsuitability. Our microeconomy is designed to be peer-to-peer, so everyone is buying and selling all the time. Our peers’ competence is visible, quantifiable and are tough competition for the “Brand” names. Branding looks pretty weak compared to strong ratings from real customers. Our next challenge is to teach people how to productize whatever they might offer, whether it’s plumbing, massage, web design or managing your Wall Street Journal subscriptions. Then their skills can be describable, sellable, reputable and worth more next month than they are today. |
Design Review
|
This design study is meant to be both focused and meditative. If we’re lucky, we won’t fail at both. After the last several meditations on the evolution of leadership personalities from Attilla the Hun to John Malone, it’s time to recap our study criteria and get down to the nitty gritty of Xpertweb data structures and why they have to be so idiosyncratic. Conclusions to Date
Symmetrical DataIt’s not yet obvious how tyrannical proprietary data has become, but perhaps we’ll soon recognize that all our customer frustrations are based on the seller’s control of customer records and their disinterest and incompetence in satisfying a customer. Doc Searls was called by a Wall Street Journal salesperson after paying in advance for a two-year subscription:
Doc’s frustration is based solely on WSJ’s inability to deploy people with access to and competency with all his account data and the authority to correct data errors on the spot. But why would they ever do that? They know their primary mission is to obligate him to assign some of his cash flow to them. There’s a lower emphasis on doing what we think their mission is: delivering a fine paper to his doorstep. There’s another proprietary database lurking behind the scenes to enforce the WSJ’s one-sided rules, and it’s the most tyrannical private data in the world – the one that will hammer his credit rating if he goes to Tahiti for the winter and his subscription doesn’t get paid. If Dow Jones hires Doc to speak, they’ll probably pay him as companies usually do, 60-90 days after receiving the invoice. The Wall Street Journal will call that sound cash management. But if Doc pays his clients for their products on the same schedule they pay him, he’s labeled a deadbeat. It’s solely because they control the data. Doc has no influence over it and a US citizen is an idiot if he doesn’t cower at the magic incantation, “will be reported to a credit agency.” That’s probably why he pays his WSJ subscriptions 2 years in advance (as if that helped him in this case). How much customer money is held by companies, simply because a late payment carries such an inordinate burden? How much stronger might the economy be if the cash spent more time in customer’s accounts under symmetrical data protocols? The current data model is assymmetrical – all of the data is managed by one party. Building the Symmetrical Data Store, one datum at a timeEvery Xpertweb user maintains a complete record of every transaction they conduct, whether they’re a buyer or seller. The data for every transaction is identical on the buyer’s and the seller’s data store. That’s why every user has a web site even if all they do is buy stuff – their data record is always available and it’s stored in the open on each web site, so any attempt to change data is immediately detected by the other party’s specialized spidering software. Every Xpertweb user has a mentor, who sets up the new user’s web site, teaches him how to use the forms and provides disk space to mirror all the user’s data. That leaves four copies of each record as a redundant archive. Each user could modify any data on their own web site, but the most damage thay can do is cause a transaction record to labeled as unreliable because it’s not synched with the other 3 copies. Each user’s web site is managed by their local open source, trusted PHP scripts. When a buyer enters task data on the seller’s site, it’s immediately reviewed by the buyer’s own trusted script and written to the buyer’s Xpertweb site upon the buyer’s confirmation. Here’s the high-level data structure for an Xpertweb user. Directories are blue, data is red:
Here’s a detailed data structure depiction. Wasting Newly Abundant Resources
The Xpertweb data storage design takes that advice to heart. One reason data is proprietary is that it’s so complicated to manage efficiently. Millions of dollars are spent to make a corporation’s customer records quickly accessible to only its authorized employees and increasingly, to customers on the web. The data sit on huge dedicated server farms. It involves a lot of customers and just a little bit of data on each one. It rarely describes how happy the customer was with the last transaction, and never lets prospective customers know how happy are the past customers. When it’s accessed, it’s by using a specialized data program that knows how to read and translate all that encoded, compressed data. So transaction data has to be sketchy but archives millions of encounters. But when you or I have a transactional data store we find useful, it will have lots of data on each of just the few transactions we participate in. So the resources wasted by Xpertweb are web server hard drives. Most ISP’s give you 10, 20, up to 100 MB of storage for free, which is a lot of space for the 85-100 data items required to describe each of a few thousand transactions in enough detail to be useful to all interested parties. The data is stored as XML data, which means it takes a lot of words to describe each datum (rather than looking like a compressed Excel table, with 1 header row describing the data, XML tags each datum with its own label):
The project ID is unique because it’s a combination of the seller’s unique In order to be even more wasteful, Xpertweb puts just one datum in each XML file, so this file might be called customeremail_ADCGEFH.FHECDBAM.1003863968. Like a packet sent over the Internet, the file contains all the information needed to relate this data item to its transaction forever. |
Meritocracy – meritorious or
|
meretricious? So we see an evolution of the personality types running the show, with today’s rulers seeming to be more like James Spader than Arnold Schwarzenegger. Most of us are dancing to someone else’s tune, whether we’re resentful, accepting or in denial. Even those who seem to be masters of their destiny are usually also caught in the trap of reacting to larger forces.
The interesting question is not who runs the show, but what is the purpose of the show? What force is driving the engine of greed, fear, manipulation and capitulation that circumscribes most people’s quietly desperate lives? The Tyranny of Net Present ValueAll capitalism is based on a single strategic algorithm: calculating the Net Present Value (NPV) of a series of anticipated cash flows by discounting each future cash flow (cf) by a desired annual return % (discountRate) over the period of the expected cash flows: NPV=cf1*(1-1*discountRate)+cf2*(1-2*discountRate)+…cfn*(1-n*discountRate)
Why would this dry formula be so important to a design study for a new microeconomy? The NPV calculation lies at the center of all modern resource allocation decisions. You may resent it, but all your economic possibilities are defined and constrained by this simple calculation buried in the computers of people you will never meet. It is what they are talking about when people say “Follow the money.” Philosophers surely regret the idea that the greatest civilization in the history of civilization has been reduced to a single simplistic formula, but that is the case. If in the beginning was the Word, then in the end there’s only the Net Present Value formula. With it, managers and financiers and governments and pension plans compare any set of cash flows to any other set. Then they sell the lower one and purchase the higher one. Even though it ignores the sweep and drama of the rise of civilization, it’s a democratic yardstick. It’s also the basis of meritocracy. That is the process of “capitalizing” every cash flow, whether it’s an inflow (customer payments and collections, bond yields, corporate earnings) or an outflow (employee salaries and benefits, supplier payables, social security payments). Corporate managements have an uneven track record in growing their revenues but they are masters at reducing their expenses and making optimistic forward-looking statements. A company’s stock market valuation is some multiple of forecast earnings. To increase the value of the shareholders’ (i.e., management’s) stock holdings and options, the best strategy is to reduce expenses, which appears to instantly increase earnings. As available capital exploded in the 20th century, every discernible cash flow opportunity in the economy shows up on someone’s radar screen and is targeted for assimilation or annihilation, whether it’s mom & pop retail sales in rural Arkansas (a Wal-Mart opportunity) or a 48 year-old engineer at Chevrolet (a GM expense). The logic of meritocracy says that an electrical engineer may be a star at 27 but a liability at 48. This is the basis of the pervasive, subconscious grievance against meritocracy, even when it’s not framed in those terms. The conventional wisdom of the age is that everyone needs to re-train themselves on a moment’s notice to become a software programmer or help line staffer or home health care specialist. The question is, what is the obligation of an economy to consider and support the preferences of the majority of its participants? Naturally, the “moving hand” school of thought is that the market economy is driving all these choices, and complaining about it is unreasonable, as G.B. Shaw pointed out. Even if individuals can adapt as quickly as proposed and remain employable, they are repeatedly separated from their last company’s web of support and their only opportunity for a web of wealth – often, it appears, by intention. Even when they earn stock worth more than a million or so dollars, they may feel as far from their dream as did some Silicon Valley millionaires before the Big Bust:
The deeper problem with meritocracy in the corporate age may be that it is judged in a court of appearances no more reliable than the royal palace where the nobles fawned over the king. What appears as merit in the boardroom may not look that way to the customers, flawed as they are with their self-serving yearnings for software that’s yielding and hardware that’s durable and support that’s uplifting. What if tasks were performed in the harsh light of the global market and were rated by the customer before her tears of gratitude or rage are dry? Super-MeritocracyIt’s possible that some successor to corporate capitalism could allocate people’s time better and reward them more generously, which has happened with every previous shift in economic operating systems. If there were such an improvement, it would have to rise alongside the current system, starting as a minor solution to some pervasive need in the larger system. It might be called the Peer Economy, where you transact directly with your peer and not their company, although you’ve never met nor will, each with absolute confidence in their security and total satisfaction. The Peer Economy will appear if it has a means to weave webs of support and wealth which cut across corporate borders and are aggregated in the very fabric of the Internet, not locked inside the balance sheets of contending companies with inconstant loyalties to their people and variable reliability in the marketplace. It must depend upon a data structure free of control by any entity, open to all and shared among the participants to any transaction. Until the introduction of XML in 1998, that was technically unfeasible. Today, it is technically trivial. Xpertweb is a set of mechanics to serve the Peer Economy’s open data requirement. |
