Saturday, December 31, 2011

Learning Paradigm Shift

"Let me explain briefly how this works.

"A initial panel is formed for each applicant. After passing the entrance exam, she/he is asked to respond to requests from the panel of experts. The general format is a request is made and the applicant is allowed a fixed time to respond with a written document. Upon its completion, one are more panel members ask questions to confirm the applicant is the author of the written document."

"Testing out of classroom requirements in a collegiate or other teacher setting is not new. Doing it in a way that encourages self-initiated and collaborative learning rather than traditional education as the major source of initial knowledge is perhaps new."

Example: Campus Version
Large classroom sizes are less of a problem with the new resources that have become available. We have been arguing that authentic personal identity can be one of the more productive of those new resources.

The foregoing is true for a variety of reasons. Connecting credibility with individuals is key to effective collaboration and high group output. The unfortunate connotations of the usual word to describe this functionality has limited innovation in the past.

As we develop the lexicon to extend intra-group authenticity exports of group wisdom will expand.

NOTE: Some of the foregoing in this BuzzTheHill post is not fictional. Consider it a public disclosure and as such, to the degree something novel and not obvious to those skilled in the art has been addressed, the specific intent was/is to put it in the PUBLIC DOMAIN.

© 2011 Buzz Hill

Friday, December 30, 2011


"Advertising and ownership influence over journalistic content. It is no accident. It is why job one for political survival is enough control over the medium of delivery to co-opt editorial control. What to do with that power will be addressed later.

"If that control is coercive and/or short term, society becomes less efficient. If those responsible are not held accountable, they will have to maintain or improve their lot by exploiting those underneath them economically."

Federated is an interesting term in this context. Like money, it may be over abstracted though. Our ambition to use brief handles to apply complex knowledge runs the significant risk that short term thinkers can take control. They do so by taking advantage of unanticipated vulnerabilities.

For instance, the supply chain that produces the capital needed to fuel the Deception Machine is vulnerable. Using the same tactics as the competition, those choosing to 'level the playing field' can choose a vulnerability of the meme delivery mechanism of their opponent.

"Putting them on defense is not the same as the strategy of learning to compete on a field of their choosing. As you may recall, Demming had something to say about this."

© 2011 Buzz Hill

Thursday, December 29, 2011

Shalt Not Speak Of It

"We do it to survive. And beyond to even thrive. Yet a struggle to verbally communicate. As if forbidden. Seems a stretch to assume such a situation is just happenstance."

Hidden From View but Real

Question authority to discover its authenticity. On-demand reverence? Surely that is absurd.

Of time and gravity. Mysterious parameters so central to our sense of existence. But just 'out of sight?"  

© 2011 Buzz Hill

Wednesday, December 28, 2011

Strategic Frontier

Function? What function?
"The hunt is not unlike trying to have a conversation with plants. If the pursuit were totally futile, how is it that agriculture has been so successful? Our mobility as animals and their lack of mobility as plants makes a huge difference in how each participates in communication with the other.

"Conversations with the Soup (as defined) have a similar quality. A dimension(s) has a different meaning to the opposite party. Time in the first, gravity in the second."

From the perspective we have been discussing, the similarities at the highest level of abstraction are most salient.

Sometimes one has to simply let go of deterministic rigor to access meaning. You can call it faith if you choose. Humor is an exercise in great leaps. Whether one calls it neural pruning, the beginnings of dementia or something in between, the practice of intellectual adventure is the foundation of significant discovery and useful synthesis.

© 2011 Buzz Hill

minds' 'I'

"… because it is difficult to read.", was her frank reply.

"Yeah, I know. Recording the content could not wait for honing the skills necessary to engage a human audience directly.

"A nice aspect of 'the machine' is that it is not de-motivated by inconvenience."

Variations on this theme came up often in their meetings. Repetition through creative paraphrasing enhanced the abstract pathways so the effort was anything but wasted.

"Any concerns about the machine's users? What if the intensions of some users are predatory?"

"It works better for those with an authenticity bias. Integrity, symbiosis, communications efficiency are, as you might expect, part of that mix also.

"Can you imagine propagation of this type based on deception, predation and corruption?"

© 2011 Buzz Hill 

Tuesday, December 27, 2011

Authenticity Stream

"If followed closely, a person's interaction with the conversation network can be used to uniquely identify that person over time. If such monitoring is known to well-meaning interlocutors productive adaptation can occur. Not so well-meaning actor's stream history can then be compared with a view to rapid, even near real-time, vetting in the future."

To say that there was a clear expectation of a protective cacoon was a foregone conclusion. Authenticity is that valuable. Direct public declarations of such can work against organic efficiency. Subtle, in this case, is strategic.

"I don't understand."

"Its enough that you tried. Namaste'."

NOTE: Some of the foregoing in this BuzzTheHill post is not fictional. Consider it a public disclosure and as such, to the degree something novel and not obvious to those skilled in the art has been addressed, the specific intent was/is to put it in the PUBLIC DOMAIN.

© 2011 Buzz Hill

Monday, December 26, 2011


"It is not an accident. Learning to speed accurate abstraction requires certain environmental elements. Chief among them, adaptive collaboration."

"Our intention today is to pursue the emerging concept of Authenticity Stream ..."

Arriving a little late she asked, "What is that?"

"It is yet to be defined. You haven't missed anything.

"It is a working title for something that amounts to dynamic vetting of an individual's interaction with the network. A signature, if you will, unique to a member vis-a-vis the other members. True for both individually and collectively and including subsets."

© 2011 Buzz Hill

Secure Recursion

"Once again we will tap the strategic communications back channel. All you will know by design is disclosed in the log since October 28, 2009. Be forewarned, of those who have tried to summarize it, some perhaps most, have yet to sufficiently decode the cipher. This subject has been addressed in the log."

The last time the request for feedback was issued there was confusion at the receiver. Understood by parties at both ends, silence rather than a reply can be interpreted in either of two major ways. 1) no guidance, proceed at your own discretion. 2) we are not sure how to respond yet.

Accordingly, a third major 'silent' message type has been added to the first-reply protocol ...

© 2011 Buzz Hill

Sunday, December 25, 2011

Abstract Capacity

"The hinting is virtually continuous now. Almost routine."

"That is indicative of the ramp, I suspect. Lets see your log."

She opened it to see the enemies mistake, familiar face change and freedom speech entries and proceeded to check the appropriate routing boxes.

"Remember, its all there, access is the key. Sooner is better but it is never too late to start. The pace of faster, more accurate processing of the massive data troves is accelerating. The penalty for late start is no longer a major deterrent."

They all knew by now, abstract capacity was virtually limitless. The next target was to intelligently bias to meaningful results that can be adequately verified.

© 2011 Buzz Hil

How Game is Played

Sweet Inspiration
"It may not have been his best speech ever. But it was near the top.

"Much has been written about the 'nation's interest'. Most of the best in a time of great peril. War-like peril.

"Profit for the many demands peace. For the few, war or the preparation for it is an all-too-easy path."

But they were not discussing war stuff, at least not the conventional kind. This was a different kind of conflict. The kind that dominated the prevalent narrative.

So, it was fitting the bombshell did not become fully explicit until near the end. Those who had been playing close attention, especially those for a longer period of time than the two month preparation period could see the deeper meaning building as the speech progressed.

The extent to which critical functionality had been outsourced was not at all evident until long after the first  obligatory briefing. Not knowing what is critical. Managers not understanding even why 'game' specific methods of developing strategy are hyper sensitive. Sea legs for newcomers take time to develop.

"Mr. Koch, tear down this wall."

© 2011 Buzz Hill

Saturday, December 24, 2011


"It is quite simple. Many critical functions are being outsourced to private contractors by administrators who are unaware of the security breach implications or are complicit with an agenda that does not track the client's."

"But that is illegal."

"The law is moot if it cannot be enforced meaningfully or, worse yet, the law breaking is not detected."

One solution is to have a technically competent team of 'untouchable' members. If immune to bribery or other corruption and with sufficient resources, such capability would be formidable opposition to electronic predation.

As has been noted here before, authentic personal identity should be the foundation of the group's integrity. False and multiple personas are the antithesis of trust in this context.

NOTE: Some of the foregoing in this BuzzTheHill post is not fictional. Consider it a public disclosure and as such, to the degree something novel and not obvious to those skilled in the art has been addressed, the specific intent was/is to put it in the PUBLIC DOMAIN.

© 2011 Buzz Hill

Friday, December 23, 2011


"We are seeing a considerable amount of communications disruption. Some patterns are emerging. They suggest a level of sophistication typical of the usual suspects, but new."

"The platform change could explain some of it, could it not?"

"Yes, we are investigating now."

Strategy ...

The recently discovered level of penetration into the team's system by the opposition changed the response protocol. Some of the monitoring routines had been nearly obsoleted by the latest attacks. That was expected. Less so, were the number of adaptive routines which were 'turned'.

The team that was least exposed to a leak had a big advantage.  Leaks are unlikely if the team does not rely on deception. And when she said, "We will make it up in volume." he could not help but laugh.

© 2011 Buzz Hill

Thursday, December 22, 2011


'What should we know about Sao Paulo? I must confess, I am not that familiar and intend to find out more. One question that comes to mind almost immediately is how transparent is the city and indeed the whole country?"

Certainly, Brazil's inclusion in the BRIC economies is currently significant. In two decades we could see these economies as the new economic leaders, or so it has been speculated.

© 2011 Buzz Hill

Wednesday, December 21, 2011


"Shouldn't you clean up the last one before you move on to starting the next?'

"If my goal was ink on dead trees, I suppose."

"What is your goal with these entries then?"

"I refer you to my earlier comments in the log. Each time someone like yourself asks a question or makes a comment, it has the potential to morph the aggregate meaning of the now two year old effort."

Technical people would refer to it as the schema for interpretation. A frame of reference constrains discussion, hopefully in a way that enhances its value. Designed to achieve a limited diversity of outcomes may or may not serve a manipulative agenda, though. Dynamic content often requires a flexible scope. Such is the case here.

If the goal is to subordinate the illusion of democracy to a largely hidden agenda, the best place to start is a cleverly-designed rigid frame. Both the publishing and broadcasting paradigms are a natural fit for a one to many control structure.

Thwarting modern manipulation requires updated skills. Fortunately, they are easy and inexpensive to acquire due to economies of scale. This is so because the corrupted gatekeepers have, in large part, been circumvented.

© 2011 Buzz Hill

Tuesday, December 20, 2011

Not So Dark of Winter

Peace On Earth ...

"With his trusted strategic thinkers outside the confines of the famous bubble, our chief has learned how to get the deceivers publicly contradicting themselves."

"This is turning into gift that giver's will bask in the light of for the foreseeable future. "Can I take a few more bullets for the well-being of sentients?

"I choose to give generously of the better part of me. It's really fun."

The fascinating part of this dialog is how one can separate the speakers from other aspects of their identity and yet see the plausible continuity of each person in their conversation.

Furthermore, certain intentionally disruptive commentary would be in stark contrast to those adequately tuned. That is, to the intentions of the parties to the discussion.

The information density is high here. Apologies to those who are used to a more repetitive approach to discovery. A few enjoy seeing the evolution of these posts. Many others are repelled by it. The author has not come up with an alternative to the process that would serve the purpose, yet.

© 2011 Buzz Hill 

Monday, December 19, 2011

Christmas Carol 2.0

"Ok Santa, hear's the deal. All I want for Christmas is for the lights to go on at K street and for the kids to make a viral movie about it.

"Tiny Tim is, of course, a metaphor."

"What the Dicken's does he mean by that? Its just a pipeline, after all. What is the big deal?"

"It looks as though Joe Sixpack and a lot of other folk are just about to find out."

© 2011 Buzz Hill

Sunday, December 18, 2011

Abstract Base Class

"Subsidizing those that choose not to be subject to scrutiny can be something less than comforting."

About what?
"I don't know what you mean." She expressed in a tone that hinted at incredulity.

If the conversation were to end there, what could one reasonably conclude about the information contained therein? Not much. Yet as a concept the foregoing dialog snippet applies to many situations begging for more understanding.

The first statement implies a good feeling is not likely to follow blind giving.

The second, that the information was inadequate up to that point to understand its context? 

If the backstory included a rationale for opaqueness, intentional or otherwise, how would the calculus change? The emerging questions express the utility of communications primitives it seems.

"Why do you have to analyze everything?"

"You are on a roll. There is a lot of nuance to the obfuscation class."

© 2011 Buzz Hill 

Saturday, December 17, 2011

Corruptor Methods

"Interesting. If I am hearing you correctly, what you are saying means something like the following.

"By living among innocents, certain bad actors are in effect using their neighbors as human shields. Efforts to oppose them endanger people not responsible for their misdeeds."

Keystone XL is a case in point. Put innocents at risk for not supporting a highly selfish agenda. Visibility of the pattern is bubbling up to the surface. This in turn makes it possible to engage minds in informed solidarity to extricate the not-so-good from the whole.

A signing statement is a curious option in this case. Its use is not unprecedented.

© 2011 Buzz Hill

Thursday, December 15, 2011

Fear Gambit Failing

"It is difficult to control the conversations between people with a lot of time on their hands, especially if such discussions help their survival in a predatory world."

"The 'predator's' latest countermeasure, 'Stand in line for a minimum wage job with no benefits.' Great Fake News fodder. Has anyone else noticed how unfunny the plutocrat's clowns are?"

So what will they do to counter the weapons of music, humor and peace? Militarized law enforcement is backfiring. Dictatorial capitalism too.

© 2011 Buzz Hill

Tuesday, December 13, 2011

Transnational and none of your business.

"I for one, would certainly enjoy being a fly on the wall listening to top secret conversations between the likes of Carlyle and certain SAIC management on the subject of who decides."

"You mean, about the government rather rather than, with the government?"


One definition of transnational is an organizational entity that transcends the authority of nation-states. We are not talking about the United Nations here. It still serves at the discretion of nation-states.

Don't feel less-than because you have not heard of these folk. They use their considerable resources to remain anonymous. Why? Because it easier to operate when not accountable to those who have reason to oppose their missions.

Today's global and universal electronic network (The Net) makes it possible for well-meaning persons to see as never before. The fuel is widespread participation. Laws are malleable as never before. Those that no longer serve fall away quickly. Laws that facilitate collaboration are morphed and combined into a more vibrant whole.

© 2011 Buzz Hill

Monday, December 12, 2011

Lame Meme

"To keep the organizationally lame meme from being passed on to my offspring.

"Dad chose to become a doctor against all odds. In the process, he sacrificed diligence in other fields to survive the rigors of a medical 'education'."

"One could make the case the sacrifice was too high when considered over two generations, perhaps more. Another case could be made that ego-managment could make the tradeoff less black and white. Of course, there are other plausible scenarios.

"Disdain for authorities is a double edged sword."

"Ego-designed organizations are losing their pole position. It is just a matter of time before they no longer occupy the winner's circle."

© 2011 Buzz Hill

Sunday, December 11, 2011

Smoking Gun

Hidden Network
"Discovery of secret communication between a private vendor and someone of consequence inside the law enforcement command structure would seal the deal?"

"Not by itself. For instance, if it was of a nature that disrupted the management's accountability mechanism for the benefit of outsiders, that would be actionable. The art of effective whistle blowing is non-trivial."

Piquing interest in a presentation without offering conclusions was her specialty. She waited just long enough and said,

"Take a look at this. See what you think.

"Keep in mind, this was a massive coordinated effort with less than a year before a major national election. Further, irresponsible outsourcing to private companies of critical functions for protecting public welfare has been going on for a very long time ..."

© 2011 Buzz Hill

Saturday, December 10, 2011

Pushin' Too Hard

"I miss my friend, though."

"How so?"

"That he would be so agitated because of our conversation. He insisted that my thinking was 'narrowly channeled' (my words). I reacted viscerally. I spend most of my waking hours in a pursuit of productive conversations."

"Is it too soon to conclude that the uncomfortable outcome of the most recent meeting signals a failure of that effort?"

"Well, yeah. Probably."

Much potential lies just outside the comfort zone. Risky but rewarding. If the auto-pilot is not doing some of the flying, the resource utilization is usually less than optimal. This assumes said system is reliable and redundant, of course.

© 2011 Buzz Hill

Friday, December 9, 2011

You and I are two of the kind.

You too.
There is an intrinsic value to each and every individual identity. The purpose of this collaboration is to discover what it is relative to other valuing mechanisms. It is predicated on the concept of an authenticity continuum where members occupy just the most authentic end.

A sustained two-person productive dialog suggests that two individuals have mutual generic desires and the ability to communicate. A network substantially dedicated to facilitating productive dialogs between nodes (members) is likely to discover and repeatably harvest the highest value for the membership, individually and collectively.

Embedded throughout this log are the fundamentals. The key to unlock them is a work in process. The value in adopting this approach is the protected access it achieves. Think deeply about this. You will discover the concept is not new. In fact, its origins extend back at least through recorded history.

The technical nature of some log pages are mere guideposts in putting together the foundational framework. If one is to look deeper, many paths are converging facilitated by lifelike artifacts. The exponential rise in them has made what is about to happen inevitable.

© 2011 Buzz Hill

Thursday, December 8, 2011

On The Hill

"A warm gentle being has passed. As we all do. It is fitting that those who were touched, even indirectly, by her grace take a moment to express gratitude that she passed this way.

"I will try, dear reader.

"A half century later, the subtle and timeless truths are revealed in one corner of our universe. She was known to him by her remarkable children. So many were they, and luck would have it shelter for them was just a quarter mile away.

"Many try, few succeed but, after all, the journey is the reward. Mother to nine, in a sense more. I was one."

© 2011 Buzz Hill

Wednesday, December 7, 2011

Who: Exact Answer

"Something you remember, something you have, something you are."

The smart phone is the personal identity key link. It has the processor speed, communications, sensors etc. And when connected to the proper network will do a thorough job of uniquely and reliably identifying its user, especially if the user is also the owner of the device.

"Coupled with the credit union functionality suggested earlier, this looks to be the non-exclusive public wealth generator we have sought. Having cutting-edge financial transaction security is just the beginning. Wealth generation will result from achieving economies of scale based on a whole new level of verifiable authenticity."

The combined credit of honorable people who recognize collective value and use it to promote fellow members' well-being.

The open nature means that others will have the technology, plans and experience to establish their own groups. Each group will have a natural incentive to link with others and share experiences to hone the open model. Security derived more from authentic friends rather than indifferent dollars.

NOTE: Some of the foregoing in this BuzzTheHill post is not fictional. Consider it a public disclosure and as such, to the degree something novel and not obvious to those skilled in the art has been addressed, the specific intent was/is to put it in the PUBLIC DOMAIN

© 2011 Buzz Hill

Tuesday, December 6, 2011


"Sometimes you don't even have to know the language of the lyrics to know that the story of what led to the song is special."

If you are reading this, you will surely know by the lyrics that this song is a solution. As has been stated here, music and laughter are the vehicle to peace and therefore, widespread prosperity.

'Law' that serves the few is manipulation and coercion. Law enforcement in such a context is simply violent crime.

Inclusive collaboration and entertainment turns the notion of 'deserving' on its head. When taking the form of interactive communication (music, comedy etc.) such activity is a powerful replacement for territory and the force to maintain it.

© 2011 Buzz Hill

Sunday, December 4, 2011

Hotel California

"We will let them pass us by thinking we have been vanquished. By hiding, we will see them from behind. A view their one-way medium orientation has left all but uncloaked.

Made possible by a identity network based on atomic authenticity."

"And protected by who you know and how many of them understand interdependence rather than the farble the Deception Machine would have you believe."

Beacons of peace are on the rise. They derive their righteous power from the love of the people. Be not fooled by the tongues of the long misguided. Networks morph. They come and sometimes go. Which do you choose?

© 2011 Buzz Hill

Saturday, December 3, 2011


"Not all undercover work is friendly, as all civil disobedience is not universally just.

"And outliers do not define a distribution. Those with a lot of resources under influence have an advantage when pushing one extreme over the other and skewing causal perception. When deception is the coin of the realm, illumination helps."

"Infiltration by good guys is quite a bit different than infiltration by the bad guys. When you think they are opponents and they think they are helping you out of your misguided ways, things get even more confusing."

Will extremists prevail this time around? Not if the majority is engaged, one suspects. If on the other hand, too many are looking for, or willing to accept formulas (often named with a the suffix, ...ism) much value can slip away, unnoticed.

When was the last time your productive dialog was subordinated to 'thought police' manipulating from YOUR side of the fence?

© 2011 Buzz Hill

Friday, December 2, 2011

K Street Blues

"The client list of a very big player in transnational surveillance?"

"Yes, I think so. Just in case, we've embedded it in the cloud at multiple sites."

"Of course, we should be concerned about rogue nation/states as their clients. It is the secretive transnational private activity that appears to be the most disruptive and dangerous, however.

"Too often contractors are tasked with, in effect, watching themselves to detect and prevent conflict-of-interest. We now are beginning to discover the causal chains in the nearly catastrophic global financial meltdown of the last couple of years. Such self-regulation is at the heart of the matter.

"Why would we not assume that similar initiatives like say, regional conflicts to obscure a more consequential power change, are not conducted in the same way?"

Happily, the right folk are asking these types of questions, now."

© 2011 Buzz Hill

Thursday, December 1, 2011

Valuable to Somebody

"Eastern European operations (for example) and high level meetings between offshore transnational military and/or intelligence private contractors to the US Government. Such meetings are secret and can be quasi-legal (depending on geographical scope.) While not held within the borders of the client country, certain loyalties to the government client are overestimated by those responsible for oversight. Yes, K street and the source of their skilled personnel come to mind.

Fred and Joseph?

"Decades of operations in countries notorious for inadequate lighting are furtil ground for nefarious operations projected at great distance. The natural suspects are those with a long track record at dealing with and using propaganda, secret liaison, cutting edge synthetic intelligence etc."

'Hidden Dots", you see, can be at a wide variety of scopes. The competition encourages us to use the historic mechanism to keep things 'fair'. Since that has not worked for a critically long period, it is reasonable to ask whether it is good advice.

Free speech exercised with courage and widespread consensus suggests a constitutional remedy for our governmental lethargy. This is all possible because economically successful businesses around the world support the dilution of the predatory transnationals for a variety of reasons. At first, their support was not as forthcoming because visibility was threatening to their business.

The same mechanisms used by the predatory oligarchy are available to their opponents. The advantage of solidarity is not nearly so effective when competing with an empowered and massive majority.

© 2011 Buzz Hill