Saturday, December 31, 2011

Learning Paradigm Shift

"Let me explain briefly how this works.

"A initial panel is formed for each applicant. After passing the entrance exam, she/he is asked to respond to requests from the panel of experts. The general format is a request is made and the applicant is allowed a fixed time to respond with a written document. Upon its completion, one are more panel members ask questions to confirm the applicant is the author of the written document."

"Testing out of classroom requirements in a collegiate or other teacher setting is not new. Doing it in a way that encourages self-initiated and collaborative learning rather than traditional education as the major source of initial knowledge is perhaps new."

Example: Campus Version
Large classroom sizes are less of a problem with the new resources that have become available. We have been arguing that authentic personal identity can be one of the more productive of those new resources.

The foregoing is true for a variety of reasons. Connecting credibility with individuals is key to effective collaboration and high group output. The unfortunate connotations of the usual word to describe this functionality has limited innovation in the past.

As we develop the lexicon to extend intra-group authenticity exports of group wisdom will expand.

NOTE: Some of the foregoing in this BuzzTheHill post is not fictional. Consider it a public disclosure and as such, to the degree something novel and not obvious to those skilled in the art has been addressed, the specific intent was/is to put it in the PUBLIC DOMAIN.

© 2011 Buzz Hill

Friday, December 30, 2011

Influence

"Advertising and ownership influence over journalistic content. It is no accident. It is why job one for political survival is enough control over the medium of delivery to co-opt editorial control. What to do with that power will be addressed later.

"If that control is coercive and/or short term, society becomes less efficient. If those responsible are not held accountable, they will have to maintain or improve their lot by exploiting those underneath them economically."

Federated is an interesting term in this context. Like money, it may be over abstracted though. Our ambition to use brief handles to apply complex knowledge runs the significant risk that short term thinkers can take control. They do so by taking advantage of unanticipated vulnerabilities.

For instance, the supply chain that produces the capital needed to fuel the Deception Machine is vulnerable. Using the same tactics as the competition, those choosing to 'level the playing field' can choose a vulnerability of the meme delivery mechanism of their opponent.

"Putting them on defense is not the same as the strategy of learning to compete on a field of their choosing. As you may recall, Demming had something to say about this."

© 2011 Buzz Hill

Thursday, December 29, 2011

Shalt Not Speak Of It

"We do it to survive. And beyond to even thrive. Yet a struggle to verbally communicate. As if forbidden. Seems a stretch to assume such a situation is just happenstance."

Hidden From View but Real

Question authority to discover its authenticity. On-demand reverence? Surely that is absurd.

Of time and gravity. Mysterious parameters so central to our sense of existence. But just 'out of sight?"  

© 2011 Buzz Hill

Wednesday, December 28, 2011

Strategic Frontier

Function? What function?
"The hunt is not unlike trying to have a conversation with plants. If the pursuit were totally futile, how is it that agriculture has been so successful? Our mobility as animals and their lack of mobility as plants makes a huge difference in how each participates in communication with the other.

"Conversations with the Soup (as defined) have a similar quality. A dimension(s) has a different meaning to the opposite party. Time in the first, gravity in the second."

From the perspective we have been discussing, the similarities at the highest level of abstraction are most salient.

Sometimes one has to simply let go of deterministic rigor to access meaning. You can call it faith if you choose. Humor is an exercise in great leaps. Whether one calls it neural pruning, the beginnings of dementia or something in between, the practice of intellectual adventure is the foundation of significant discovery and useful synthesis.

© 2011 Buzz Hill

minds' 'I'

Code?
"… because it is difficult to read.", was her frank reply.

"Yeah, I know. Recording the content could not wait for honing the skills necessary to engage a human audience directly.

"A nice aspect of 'the machine' is that it is not de-motivated by inconvenience."

Variations on this theme came up often in their meetings. Repetition through creative paraphrasing enhanced the abstract pathways so the effort was anything but wasted.

"Any concerns about the machine's users? What if the intensions of some users are predatory?"

"It works better for those with an authenticity bias. Integrity, symbiosis, communications efficiency are, as you might expect, part of that mix also.

"Can you imagine propagation of this type based on deception, predation and corruption?"

© 2011 Buzz Hill 

Tuesday, December 27, 2011

Authenticity Stream

"If followed closely, a person's interaction with the conversation network can be used to uniquely identify that person over time. If such monitoring is known to well-meaning interlocutors productive adaptation can occur. Not so well-meaning actor's stream history can then be compared with a view to rapid, even near real-time, vetting in the future."


To say that there was a clear expectation of a protective cacoon was a foregone conclusion. Authenticity is that valuable. Direct public declarations of such can work against organic efficiency. Subtle, in this case, is strategic.

"I don't understand."

"Its enough that you tried. Namaste'."

NOTE: Some of the foregoing in this BuzzTheHill post is not fictional. Consider it a public disclosure and as such, to the degree something novel and not obvious to those skilled in the art has been addressed, the specific intent was/is to put it in the PUBLIC DOMAIN.

© 2011 Buzz Hill

Monday, December 26, 2011

Hattiesburg

"It is not an accident. Learning to speed accurate abstraction requires certain environmental elements. Chief among them, adaptive collaboration."


"Our intention today is to pursue the emerging concept of Authenticity Stream ..."

Arriving a little late she asked, "What is that?"

"It is yet to be defined. You haven't missed anything.

"It is a working title for something that amounts to dynamic vetting of an individual's interaction with the network. A signature, if you will, unique to a member vis-a-vis the other members. True for both individually and collectively and including subsets."

© 2011 Buzz Hill

Secure Recursion

Consequences
"Once again we will tap the strategic communications back channel. All you will know by design is disclosed in the log since October 28, 2009. Be forewarned, of those who have tried to summarize it, some perhaps most, have yet to sufficiently decode the cipher. This subject has been addressed in the log."

The last time the request for feedback was issued there was confusion at the receiver. Understood by parties at both ends, silence rather than a reply can be interpreted in either of two major ways. 1) no guidance, proceed at your own discretion. 2) we are not sure how to respond yet.

Accordingly, a third major 'silent' message type has been added to the first-reply protocol ...

© 2011 Buzz Hill

Sunday, December 25, 2011

Abstract Capacity

"The hinting is virtually continuous now. Almost routine."

"That is indicative of the ramp, I suspect. Lets see your log."

She opened it to see the enemies mistake, familiar face change and freedom speech entries and proceeded to check the appropriate routing boxes.

"Remember, its all there, access is the key. Sooner is better but it is never too late to start. The pace of faster, more accurate processing of the massive data troves is accelerating. The penalty for late start is no longer a major deterrent."

They all knew by now, abstract capacity was virtually limitless. The next target was to intelligently bias to meaningful results that can be adequately verified.

© 2011 Buzz Hil

How Game is Played

Sweet Inspiration
"It may not have been his best speech ever. But it was near the top.

"Much has been written about the 'nation's interest'. Most of the best in a time of great peril. War-like peril.

"Profit for the many demands peace. For the few, war or the preparation for it is an all-too-easy path."

But they were not discussing war stuff, at least not the conventional kind. This was a different kind of conflict. The kind that dominated the prevalent narrative.

So, it was fitting the bombshell did not become fully explicit until near the end. Those who had been playing close attention, especially those for a longer period of time than the two month preparation period could see the deeper meaning building as the speech progressed.

The extent to which critical functionality had been outsourced was not at all evident until long after the first  obligatory briefing. Not knowing what is critical. Managers not understanding even why 'game' specific methods of developing strategy are hyper sensitive. Sea legs for newcomers take time to develop.

"Mr. Koch, tear down this wall."

© 2011 Buzz Hill

Saturday, December 24, 2011

Theory?

"It is quite simple. Many critical functions are being outsourced to private contractors by administrators who are unaware of the security breach implications or are complicit with an agenda that does not track the client's."

"But that is illegal."

"The law is moot if it cannot be enforced meaningfully or, worse yet, the law breaking is not detected."

One solution is to have a technically competent team of 'untouchable' members. If immune to bribery or other corruption and with sufficient resources, such capability would be formidable opposition to electronic predation.

As has been noted here before, authentic personal identity should be the foundation of the group's integrity. False and multiple personas are the antithesis of trust in this context.

NOTE: Some of the foregoing in this BuzzTheHill post is not fictional. Consider it a public disclosure and as such, to the degree something novel and not obvious to those skilled in the art has been addressed, the specific intent was/is to put it in the PUBLIC DOMAIN.

© 2011 Buzz Hill

Friday, December 23, 2011

Escalation

"We are seeing a considerable amount of communications disruption. Some patterns are emerging. They suggest a level of sophistication typical of the usual suspects, but new."

"The platform change could explain some of it, could it not?"

"Yes, we are investigating now."

Strategy ...

The recently discovered level of penetration into the team's system by the opposition changed the response protocol. Some of the monitoring routines had been nearly obsoleted by the latest attacks. That was expected. Less so, were the number of adaptive routines which were 'turned'.

The team that was least exposed to a leak had a big advantage.  Leaks are unlikely if the team does not rely on deception. And when she said, "We will make it up in volume." he could not help but laugh.

© 2011 Buzz Hill

Thursday, December 22, 2011

Cone?

'What should we know about Sao Paulo? I must confess, I am not that familiar and intend to find out more. One question that comes to mind almost immediately is how transparent is the city and indeed the whole country?"

Certainly, Brazil's inclusion in the BRIC economies is currently significant. In two decades we could see these economies as the new economic leaders, or so it has been speculated.

© 2011 Buzz Hill

Wednesday, December 21, 2011

Framing

"Shouldn't you clean up the last one before you move on to starting the next?'

"If my goal was ink on dead trees, I suppose."

"What is your goal with these entries then?"

"I refer you to my earlier comments in the log. Each time someone like yourself asks a question or makes a comment, it has the potential to morph the aggregate meaning of the now two year old effort."

Technical people would refer to it as the schema for interpretation. A frame of reference constrains discussion, hopefully in a way that enhances its value. Designed to achieve a limited diversity of outcomes may or may not serve a manipulative agenda, though. Dynamic content often requires a flexible scope. Such is the case here.

If the goal is to subordinate the illusion of democracy to a largely hidden agenda, the best place to start is a cleverly-designed rigid frame. Both the publishing and broadcasting paradigms are a natural fit for a one to many control structure.

Thwarting modern manipulation requires updated skills. Fortunately, they are easy and inexpensive to acquire due to economies of scale. This is so because the corrupted gatekeepers have, in large part, been circumvented.

© 2011 Buzz Hill

Tuesday, December 20, 2011

Not So Dark of Winter

Peace On Earth ...

"With his trusted strategic thinkers outside the confines of the famous bubble, our chief has learned how to get the deceivers publicly contradicting themselves."

"This is turning into gift that giver's will bask in the light of for the foreseeable future. "Can I take a few more bullets for the well-being of sentients?

"I choose to give generously of the better part of me. It's really fun."

The fascinating part of this dialog is how one can separate the speakers from other aspects of their identity and yet see the plausible continuity of each person in their conversation.

Furthermore, certain intentionally disruptive commentary would be in stark contrast to those adequately tuned. That is, to the intentions of the parties to the discussion.

The information density is high here. Apologies to those who are used to a more repetitive approach to discovery. A few enjoy seeing the evolution of these posts. Many others are repelled by it. The author has not come up with an alternative to the process that would serve the purpose, yet.

© 2011 Buzz Hill 

Monday, December 19, 2011

Christmas Carol 2.0

"Ok Santa, hear's the deal. All I want for Christmas is for the lights to go on at K street and for the kids to make a viral movie about it.

"Tiny Tim is, of course, a metaphor."

"What the Dicken's does he mean by that? Its just a pipeline, after all. What is the big deal?"

"It looks as though Joe Sixpack and a lot of other folk are just about to find out."

© 2011 Buzz Hill

Sunday, December 18, 2011

Abstract Base Class

"Subsidizing those that choose not to be subject to scrutiny can be something less than comforting."

About what?
"I don't know what you mean." She expressed in a tone that hinted at incredulity.

If the conversation were to end there, what could one reasonably conclude about the information contained therein? Not much. Yet as a concept the foregoing dialog snippet applies to many situations begging for more understanding.

The first statement implies a good feeling is not likely to follow blind giving.

The second, that the information was inadequate up to that point to understand its context? 

If the backstory included a rationale for opaqueness, intentional or otherwise, how would the calculus change? The emerging questions express the utility of communications primitives it seems.

"Why do you have to analyze everything?"

"You are on a roll. There is a lot of nuance to the obfuscation class."

© 2011 Buzz Hill 

Saturday, December 17, 2011

Corruptor Methods

NYC
"Interesting. If I am hearing you correctly, what you are saying means something like the following.

"By living among innocents, certain bad actors are in effect using their neighbors as human shields. Efforts to oppose them endanger people not responsible for their misdeeds."

Keystone XL is a case in point. Put innocents at risk for not supporting a highly selfish agenda. Visibility of the pattern is bubbling up to the surface. This in turn makes it possible to engage minds in informed solidarity to extricate the not-so-good from the whole.

A signing statement is a curious option in this case. Its use is not unprecedented.

© 2011 Buzz Hill

Thursday, December 15, 2011

Fear Gambit Failing

"It is difficult to control the conversations between people with a lot of time on their hands, especially if such discussions help their survival in a predatory world."

"The 'predator's' latest countermeasure, 'Stand in line for a minimum wage job with no benefits.' Great Fake News fodder. Has anyone else noticed how unfunny the plutocrat's clowns are?"

So what will they do to counter the weapons of music, humor and peace? Militarized law enforcement is backfiring. Dictatorial capitalism too.

© 2011 Buzz Hill

Tuesday, December 13, 2011

Transnational and none of your business.

"I for one, would certainly enjoy being a fly on the wall listening to top secret conversations between the likes of Carlyle and certain SAIC management on the subject of who decides."

"You mean, about the government rather rather than, with the government?"

"Yes."

One definition of transnational is an organizational entity that transcends the authority of nation-states. We are not talking about the United Nations here. It still serves at the discretion of nation-states.

Don't feel less-than because you have not heard of these folk. They use their considerable resources to remain anonymous. Why? Because it easier to operate when not accountable to those who have reason to oppose their missions.

Today's global and universal electronic network (The Net) makes it possible for well-meaning persons to see as never before. The fuel is widespread participation. Laws are malleable as never before. Those that no longer serve fall away quickly. Laws that facilitate collaboration are morphed and combined into a more vibrant whole.

© 2011 Buzz Hill

Monday, December 12, 2011

Lame Meme

"To keep the organizationally lame meme from being passed on to my offspring.

"Dad chose to become a doctor against all odds. In the process, he sacrificed diligence in other fields to survive the rigors of a medical 'education'."

"One could make the case the sacrifice was too high when considered over two generations, perhaps more. Another case could be made that ego-managment could make the tradeoff less black and white. Of course, there are other plausible scenarios.

"Disdain for authorities is a double edged sword."


"Ego-designed organizations are losing their pole position. It is just a matter of time before they no longer occupy the winner's circle."

© 2011 Buzz Hill

Sunday, December 11, 2011

Smoking Gun

Hidden Network
"Discovery of secret communication between a private vendor and someone of consequence inside the law enforcement command structure would seal the deal?"

"Not by itself. For instance, if it was of a nature that disrupted the management's accountability mechanism for the benefit of outsiders, that would be actionable. The art of effective whistle blowing is non-trivial."

Piquing interest in a presentation without offering conclusions was her specialty. She waited just long enough and said,

"Take a look at this. See what you think.

"Keep in mind, this was a massive coordinated effort with less than a year before a major national election. Further, irresponsible outsourcing to private companies of critical functions for protecting public welfare has been going on for a very long time ..."

© 2011 Buzz Hill

Saturday, December 10, 2011

Pushin' Too Hard

"I miss my friend, though."

"How so?"

"That he would be so agitated because of our conversation. He insisted that my thinking was 'narrowly channeled' (my words). I reacted viscerally. I spend most of my waking hours in a pursuit of productive conversations."

"Is it too soon to conclude that the uncomfortable outcome of the most recent meeting signals a failure of that effort?"

"Well, yeah. Probably."

Much potential lies just outside the comfort zone. Risky but rewarding. If the auto-pilot is not doing some of the flying, the resource utilization is usually less than optimal. This assumes said system is reliable and redundant, of course.

© 2011 Buzz Hill

Friday, December 9, 2011

You and I are two of the kind.

You too.
There is an intrinsic value to each and every individual identity. The purpose of this collaboration is to discover what it is relative to other valuing mechanisms. It is predicated on the concept of an authenticity continuum where members occupy just the most authentic end.

A sustained two-person productive dialog suggests that two individuals have mutual generic desires and the ability to communicate. A network substantially dedicated to facilitating productive dialogs between nodes (members) is likely to discover and repeatably harvest the highest value for the membership, individually and collectively.

Embedded throughout this log are the fundamentals. The key to unlock them is a work in process. The value in adopting this approach is the protected access it achieves. Think deeply about this. You will discover the concept is not new. In fact, its origins extend back at least through recorded history.

The technical nature of some log pages are mere guideposts in putting together the foundational framework. If one is to look deeper, many paths are converging facilitated by lifelike artifacts. The exponential rise in them has made what is about to happen inevitable.

© 2011 Buzz Hill

Thursday, December 8, 2011

On The Hill


"A warm gentle being has passed. As we all do. It is fitting that those who were touched, even indirectly, by her grace take a moment to express gratitude that she passed this way.

"I will try, dear reader.

"A half century later, the subtle and timeless truths are revealed in one corner of our universe. She was known to him by her remarkable children. So many were they, and luck would have it shelter for them was just a quarter mile away.

"Many try, few succeed but, after all, the journey is the reward. Mother to nine, in a sense more. I was one."

© 2011 Buzz Hill

Wednesday, December 7, 2011

Who: Exact Answer

"Something you remember, something you have, something you are."

The smart phone is the personal identity key link. It has the processor speed, communications, sensors etc. And when connected to the proper network will do a thorough job of uniquely and reliably identifying its user, especially if the user is also the owner of the device.

"Coupled with the credit union functionality suggested earlier, this looks to be the non-exclusive public wealth generator we have sought. Having cutting-edge financial transaction security is just the beginning. Wealth generation will result from achieving economies of scale based on a whole new level of verifiable authenticity."

The combined credit of honorable people who recognize collective value and use it to promote fellow members' well-being.

The open nature means that others will have the technology, plans and experience to establish their own groups. Each group will have a natural incentive to link with others and share experiences to hone the open model. Security derived more from authentic friends rather than indifferent dollars.

NOTE: Some of the foregoing in this BuzzTheHill post is not fictional. Consider it a public disclosure and as such, to the degree something novel and not obvious to those skilled in the art has been addressed, the specific intent was/is to put it in the PUBLIC DOMAIN

© 2011 Buzz Hill

Tuesday, December 6, 2011

Tune


"Sometimes you don't even have to know the language of the lyrics to know that the story of what led to the song is special."

If you are reading this, you will surely know by the lyrics that this song is a solution. As has been stated here, music and laughter are the vehicle to peace and therefore, widespread prosperity.

'Law' that serves the few is manipulation and coercion. Law enforcement in such a context is simply violent crime.

Inclusive collaboration and entertainment turns the notion of 'deserving' on its head. When taking the form of interactive communication (music, comedy etc.) such activity is a powerful replacement for territory and the force to maintain it.

© 2011 Buzz Hill

Sunday, December 4, 2011

Hotel California

"We will let them pass us by thinking we have been vanquished. By hiding, we will see them from behind. A view their one-way medium orientation has left all but uncloaked.

Made possible by a identity network based on atomic authenticity."

"And protected by who you know and how many of them understand interdependence rather than the farble the Deception Machine would have you believe."

Beacons of peace are on the rise. They derive their righteous power from the love of the people. Be not fooled by the tongues of the long misguided. Networks morph. They come and sometimes go. Which do you choose?

© 2011 Buzz Hill

Saturday, December 3, 2011

Infiltration

"Not all undercover work is friendly, as all civil disobedience is not universally just.

Vermok
"And outliers do not define a distribution. Those with a lot of resources under influence have an advantage when pushing one extreme over the other and skewing causal perception. When deception is the coin of the realm, illumination helps."

"Infiltration by good guys is quite a bit different than infiltration by the bad guys. When you think they are opponents and they think they are helping you out of your misguided ways, things get even more confusing."

Will extremists prevail this time around? Not if the majority is engaged, one suspects. If on the other hand, too many are looking for, or willing to accept formulas (often named with a the suffix, ...ism) much value can slip away, unnoticed.

When was the last time your productive dialog was subordinated to 'thought police' manipulating from YOUR side of the fence?

© 2011 Buzz Hill

Friday, December 2, 2011

K Street Blues

"The client list of a very big player in transnational surveillance?"

"Yes, I think so. Just in case, we've embedded it in the cloud at multiple sites."

"Of course, we should be concerned about rogue nation/states as their clients. It is the secretive transnational private activity that appears to be the most disruptive and dangerous, however.

"Too often contractors are tasked with, in effect, watching themselves to detect and prevent conflict-of-interest. We now are beginning to discover the causal chains in the nearly catastrophic global financial meltdown of the last couple of years. Such self-regulation is at the heart of the matter.

"Why would we not assume that similar initiatives like say, regional conflicts to obscure a more consequential power change, are not conducted in the same way?"

Happily, the right folk are asking these types of questions, now."

© 2011 Buzz Hill

Thursday, December 1, 2011

Valuable to Somebody

"Eastern European operations (for example) and high level meetings between offshore transnational military and/or intelligence private contractors to the US Government. Such meetings are secret and can be quasi-legal (depending on geographical scope.) While not held within the borders of the client country, certain loyalties to the government client are overestimated by those responsible for oversight. Yes, K street and the source of their skilled personnel come to mind.

Fred and Joseph?

"Decades of operations in countries notorious for inadequate lighting are furtil ground for nefarious operations projected at great distance. The natural suspects are those with a long track record at dealing with and using propaganda, secret liaison, cutting edge synthetic intelligence etc."

'Hidden Dots", you see, can be at a wide variety of scopes. The competition encourages us to use the historic mechanism to keep things 'fair'. Since that has not worked for a critically long period, it is reasonable to ask whether it is good advice.

Free speech exercised with courage and widespread consensus suggests a constitutional remedy for our governmental lethargy. This is all possible because economically successful businesses around the world support the dilution of the predatory transnationals for a variety of reasons. At first, their support was not as forthcoming because visibility was threatening to their business.

The same mechanisms used by the predatory oligarchy are available to their opponents. The advantage of solidarity is not nearly so effective when competing with an empowered and massive majority.

© 2011 Buzz Hill

Tuesday, November 29, 2011

Connecting Hidden Dots

"If a video is used to entice the accused to admit guilt but may be doctored by the party that makes it available online while at the same time creating the illusion of a government authority? Vendor provides equipment and services and sells it as a 'turnkey package'.

"The disclaimer is significant, the video has one that includes the statement, 'cannot be used in a court of law'. Further, the vendor of the equipment, a private out-of-state company answers the toll free phone, 'Photo Enforcement."

One could argue that there is a pattern of misleading victims. But is it racketeering?

There are many variations on the theme of evading jurisdictions. Intentionally obscure networks and lack of transparency are a rich breeding ground for abuse.

© 2011 Buzz Hill

Monday, November 28, 2011

Ego, Not Ego

"Ego-management is the core issue. 

"Many suggest that ego must disappear before enlightenment can occur.

"Think for a minute how absurd that notion is if ego is defined as the best abstraction of the single most capable agent on the planet.

"If the abstraction (as defined) is true to what lies under its umbrella, it is, arguably, the best bridge to its surrounding context. Little is wasted and the transmissions both going and coming can be short and verifiable."

The question is not, "ego or not". It is "true or something less". In other words, a continuum much as entropy is in an information theory application.

Linear acceleration is, ostensibly, the most efficient way to achieve escape velocity. In the world of memes there are specific ways of achieving this ideal. Vetting efficient efficacy contributes to manageable rapid-scaling.

© 2011 Buzz Hill

Sunday, November 27, 2011

Subtle Bio-Mimicry

Same idea, scaled.
"Industrial strength nurturance, sounds like a contradiction in terms. Doesn't it?

"I kid you not. Coupling the atoms of systemic good is a major enabler of making better. Guess what? We don't even need to start from scratch. A fabulous working model honed over the ages has already done the heavy lifting."

She was mostly quiet until just the right thing needed expressing. Attentive patience is magical in the land of opportunity. Especially in the presence of tectonic shifts. Feeling when the earth 'first moves' takes practice.

One gender of human has a distinct advantage over the other should members of it choose to exercise The Option by 'collaborating' at the appropriate time. That choice also has a reputation of going very wrong at times too. And variations abound.

© 2011 Buzz Hill

Saturday, November 26, 2011

Tracking Authentic Value

Priceless of a different kind.

"If prices continue to move downward, the money supply expands, and people are paid for taking care of each other efficiently. Who loses?

"The ill-gotten wealth of hoarding property owners is diluted. Is that really a loss even to them?"

"It would force cash off the sidelines since it would be worth less as the money supply gets larger."

Testing fundamental concepts is extraordinarily speedy with a global conversation network as it stands today. The secret? Arguably, the internet has reached a critical mass of 'appropriate interconnectivity'. Interdependence is the new calculus.

© 2011 Buzz Hill

Friday, November 25, 2011

Abstractor?

"Ok, oh wise one, what would you propose as an icon of abstraction?"

"Lovers and makers of music would suggest identity (perhaps without realizing it), methinks."

Spanning the considerable distance between frontal lobes and the brain stem, one's favorite music is highly unique to the individual. The time dimension is robustly supported as well as both past and predicted behavior along it.

© 2011 Buzz Hill

Detection vs. Prevention

Letting the opposition's automation penetrate is part of the plan. Watching how it attempts to disrupt yields important clues. If the penetration was thwarted, the opportunity to detect methods and the source would be diminished.

The effort described here is not just for protection from the specific threat to the team's operations but to develop effective measures against the generic threat to others.

Prevention is, in effect, in lieu of the second objective since the perpetrator can simply make up the difference in volume. The efficiencies of destructive automation preclude tactical countermeasures. They are, after all, designed to do just that.

Re-define the game by expanding the scope. Large majorities have that power when they are able to assert it with direct action. Such is the case, now.

© 2011 Buzz Hill

Thursday, November 24, 2011

Meme Check

"Think of it this way, we want to visualize Occupy.

Horizontal
"By mapping organically propagated memes, say geographically, and making them available to a large audience, we can test for various characteristics.

"For instance, meme check would take a short phrase originating on a twitter account in a town somewhere in the US. The motion 3D display would animate the expansion as the echo chain ripples outward from its intialial location ..."

"I get it. Like when someone calls out, "Mic check" at a rally. Each time it is repeated in sequence it gets louder and further from the source. Yet, each time, there is sufficient time for each in the crowd to absorb and understand what the message means."

"Precisely. Understanding the messaging mechanism would be enhanced by the ability to visualize it using the modern conversation networking technology."

It took awhile but well worth the wait. The deep meaning of identity in global networking was emerging. In the vernacular of our time, Occupy Identity.

NOTE: Some of the foregoing in this BuzzTheHill post is not fictional. Consider it a public disclosure and as such, to the degree something novel and not obvious to those skilled in the art has been addressed, the specific intent was/is to put it in the PUBLIC DOMAIN

© 2011 Buzz Hill

Tuesday, November 22, 2011

Organic Integrity

"The fusion does not need to occur at same time and/or place in the continuum?"

"That is correct. The fusion is mandatory to complete the transaction, however."

Occupy Hope
If this were true one would assume that the system was close to 'bullet-proof'. One could consider each authentic transaction, virtual conception. The butterfly transforms one domain to the other, revealing more detail.

Real and Imaginary were fascinating labels in the same way that Dream and Awake were. Dialog identity, determined by the result, not by the plan.

In practical terms for today's applications, networked personal devices that know their users. Portable, wireless, friendly like the pets from whom we learn so much. Nurturance is synergetic.

"Now we can readily observe, many of the advanced thinkers are filling in the missing components rather than assuming the project is not ready for prime time. There is no more hesitating for fear of embarrassment. The manipulators machine for deceiving grinding down inexorably to insignificance.

Delay shipping until the product is right while keeping as much powder dry as possible. But ship. A steady supply of optimism rewarded. Cynicism is a lazy excuse.

© 2011 Buzz Hill

Infrastructure In Place

"With voice and speaker recognition on one mobile platform and face recognition on the other dominant mobile platform, it won't be long before friendly personal authentication could be a standard. Networking authentication primarily for the benefit of the persons being identified may well be one of a few 'killer apps' for the new century.

"A credit union like structure is optimal, as we have argued here before. Imagine the consequences had Microsoft's $150 million equity investment in Apple been voting shares? Control should be exclusively to the 'identifyee' members as a group if it is to stay true to the "Authentic Identity Principle".

"If one were to regard homo-sapiens as a truly exceptional design, what makes it so? I suspect the capacity for authentic consensus may have something to do with it. One human alone, given safety from predators, is quite capable of thriving. Humans sufficiently in agreement are capable of steering the entirety of life in a positive direction."

Such talk is easy to pick apart with the sophisticated machines designed to do so. Why were such mechanisms designed in the first place? There are those who believe that disembodied egos suffering from guilt and insecurity are behind the short-sighted development (predation is the intent.)

© 2011 Buzz Hill

Monday, November 21, 2011

Key

"When two go "in" together, it validates the link from one conjugate domain to the other to both of them. The fundamental concept bridge is thus established."

It was like the crack of a tremendous arc had confirmed their quest had been achieved. It would have startled any observer yet neither of them flinched. They anticipated the revelation like no one else could.

Many months had passed where the sessions at the system console seemed as natural as exhaling. Yet this was a milestone of the first-order. They felt it.

"The entire connection is obscured from conscious awareness until it occurs. Authentic has no meaning with less than two. The illusion that one alone could be the case is a fundamental constraint of ego-based executives.

NOTE: Some of the foregoing in this BuzzTheHill post is not fictional. Consider it a public disclosure and as such, to the degree something novel and not obvious to those skilled in the art has been addressed, the specific intent was/is to put it in the PUBLIC DOMAIN

© 2011 Buzz Hill

Meme Rules

Organic propagation of an idea. Meme's are funny that way. The normal rules of coercion do not always apply.


The civil behavior of the large group is a powerful counterpoint to the use of force by the few.

As we have seen, pay walls are beginning to marginalize the effectiveness of large sponsor driven broadcasters and publishers. Hopefully the few remaining ethical editorial departments will have some of their better content leak through said wall.

"Should we be concerned about the private contractor influence on domestic military operations?"

"Egypt, here or somewhere else?"

"Maybe, all of the above?"

© 2011 Buzz Hill

Sunday, November 20, 2011

Just Before The Fall

"That does not look like California."
"In many cases, the final stage of an oppressive regime is the desperate use of violence to repress the will of the people that have been systematically hurt."

From the 'outpost' the live video from around the world seems nearly surreal. And yet those who are eloquent but still in deep denial carry on as if a select audience will protect them from coming to grips with their now-failing obsession.

"Fascinating how latecomers to the meeting changed the informal and supportive initial tone. It was as if reinforcements were called in to selectively apply 'horizontal' protocol. Could it have been a somewhat justifiable suspicion of the unfamiliar demographics?"

© 2011 Buzz Hill

Saturday, November 19, 2011

Empire Strikes Back

"A credible whistleblower leak would blow the lid right off."

"How can we alert candidates that we are receptive to making it safe and worth their while to expose wrong doing?"

What exactly constitutes a hero? Sacrifice, common cause, over what time span? All could be salient yet still insufficient. You see it is more involved than can be explained away with a few adjectives.

© 2011 Buzz Hill

Friday, November 18, 2011

Cool

"You say, Turing. I say time domain. She says, enlightened. Another says, self-interest. If recall correctly, some credible person said, universal. And a person for whom I have a particularly high regard spoke eloquently to the common sense that is compassion.

"And all the while we are watching the latest on how grok appears to work. Use 237 link to identify."

"Reality distortion relative to what?"

Authentic/Unique digital persona could be a formidable tool in the cause of anti-corrpution. Though it is seldom expressed this way, one could say it is a very friendly function (if it spans the population) that deserves consideration at the very top of organizational frameworks.

This log, in part, attempts to elevate the concept of scalable altruism to a level of awareness where the confluence of free enterprise and universal compassion can be achieved. Further, it intends to expose the obstacles so that they can be circumvented - not the least of which is an entrenched status quo that can be described as predatory in nature.

© 2011 Buzz Hill 

Thursday, November 17, 2011

Code Name, 99

"Is it really possible? Within the specified field yes."

"What field?"

How would they know success? Within a defined scope it should be indistinguishable from the 'real thing'. A qualification of a credible observer is the ability to articulate something truly worth testing. More is relevant but 'worthy' goes to the energetic core.


The domain-to-complementary domain bridge, so-to-speak. Conceptually more accessible with an aesthetically driven agenda.

"One domain dominates, the other becomes all but invisible until the boundary is tested. This becomes the 'event horizon'.

It matters not from which domain the quest begins.

© 2011 Buzz Hill

"You need to."

"Awkward self-deprecation a sure sign of a humility novice?"

"Probably not a sure sign, but reasonable basis for a strong suspicion of such."

Snoop?
"Personal versus private. I am so glad someone brought that distinction to my attention. If detection systems were tuned to the contrast perhaps hidden corruption could be more easily and/or automatically identified."

Automated linguistic methods can be tested thoroughly and quickly against very large data sets now. It is a measure of faith in consensus that very large commercial players are making their technology highly accessible (often free) to the masses.

"Why do you suppose some intelligent folk would become so incensed when certain commercial interest's faith is revealed."

"As we have shown, their are vested interests in triggering anger. They have been successful at guiding those you would expect would know better to behavior counter even to their own interests."

© 2011 Buzz Hill