Standout -
USPs -
Summary of project
My propsoal is to create a digital collaboration of systems and resources that exist (extant), whilst creating new systems and resources which are purpose-specific and context-relevant. This system and attached set of resources will also serve as a collective knowledge-base which can be accessed - an open and transparent, distributed, individualisable, immutable/mutable collection of structures. The core idea is one of intangibility (there are endless tangible versions of intangibility *), but the way it would be used or through which interaction takes place is tangible. . individualised search-space is mutable - meaning individualized operationability
Application -
Investors -
Collaborators - open-source, transparent, traceable
Projects - describe, understand, convey, embed, grounded, (tangible).
The interactive system itslef will be a context-matching system and purpose-specific matching system. Translated -explanation, the context is matched with the specific purpose. From the combibnation of the two or more emerges a synergistic addition to the system and also a context specific reply to te purpose-specific inquiry of the user. synergistic here means ( ). Contemporaneously, we think of systems as zero-sum games. This is an important statement because it implies that you cant expand upon on values- i.e., redistribution of the same "thing" ( ). Therefore, this lacking in the creation mechanism inherent within systems means one is ( ).
Which supports what your literature search which supports what you are arguing for, supplements it, replaces it, or creates a completely new way of ( ). internet has ibnteconnectivity and planned reach but it lacks transparancy and intent and information.
Reference what there is.
Google phone example.
Trusting them is a one-way street. we must trust them in order to be able to use their services, whist signing away rights, but cannot asked for reciprocity.
Describe the process. One of the aspects of my proposed system that it resolves is the mutuality of exchanage - because of whatever the user supplies is automatically an anonymously an open commodity - which cannot be hidden in the "security through obscurity" method. the solution this system presents is that the information any user provides is still an open commdity and simultaneously accisble, making no prorietory rights are handed over.
One example is A.I, but what A.I doesnt do is access to the internals of the A.I. (this is the cash-cow of the proprietory system). The open-source and transparancy arrangments are guaranteed by the structure and mechinisms of my propose system. one on the principles of this system is the idea that any information or value-added to the system is a public commodity - so by default it cannot be made exclusive even it can be made private/secure. **** Example, a government secret agency wishes to control and monopolise a part of this system, they cannot hide it from the system, even though they can encrypt a particular part of the system (private compartmentization which exists within contemporary hardware devices. This is both a means of adding value to the systeme and takin from it. For example, this system is serving as a general-purpose search engibne online.
When information is provided, unlike on today's platforms (Google will not provide everything collected from your search using their system - due to a mixture of security and proprietory rights). This system handles all of your data collected through you or from you via any means - RFID localization, user statistics, market analytics (cookie-dependent of course) and anything else which has not been dislclosed specifically. Approaching this topic from another angle, some of your private information is handed to me for service use or provision, youd have the right to access any expressly provided information and (purpose-specfic) processed information. whatever processing takes place you can also access all of the information that the traditional service provider accesses. This is another standout feature of this system. this derives from the feature that this system is not one legal entity, propriatory system, but a organically-forming super-organism of users.
Organic systems and life itself orders this process through nature. The aim of this system is to more directly represent the mechahnics of this form of life. Even though one thinks of these systems such as corporate formations and corrent digital philosophies as an arcitecture which works exactly as we intented, they still obey the rules of existence and life - one of these being well-being abounds, there is no such thing as an inherent secret - once it exists it`s already out there and accesible through the right means. the ood thing being the Universe has a `failsafe` which is the means throuh which anything which is beneficial, meaningful and relevent to you is unconditional love. You cannot hurt intently without you being hurt yourself. You exist in your environment and you and your environment are inseparable - moving parts by design emphasize the indispensibilty of this arrangement. whichever environemnt you are in, logically, sustains the version of you in the present. Whenever one tries to change anything outside of oneself, changes take place intenally/externally (membrane seperation/embdied actions and language examples discussed/Beetle in the box example and contextual/purpose specifity). Context and its relevance: the language that we choose fror mediating is transcendable and transendence is neede dfor accurate information provision. (transcendence through transparancey) * This will be added to the securityicsection also. One of the main principles of an organic system which is also individually verifiable without any prior knowledge, is that language patterns are transcendent also because interactions are on multiple levels - the totality of our being. So, when we say from one interlocutor to the other interlocutor, the means and forms of this exchnage are not limited to this choice of language is because you are using the words that are being grounded in a meta-linguistic basis * - the totality of exchange. through the interaction the mutual undersatandngs sifted and created an expansion in existence and a new value is added - which is how the system works - when anything intearacts with the ssystem, the contents of this interaction are added automatically and integrated automatically also. This is a projection of the organic growth mechanism to our currently existing systems.
Security
How to stop user information being stolen. Once a user is able to access the system, s/he is already part of the system by definition, so has no incentive of doing any harm to the system, because the system serves his purpose and harm would simultaneously do damage to his/her system use. ((Language use and access - enquiry-related requests and their sense-making abilties. think of encryption by intent and value adding, but not value subtraction. Any attempt TO `hack` simply dinminished the value this user experiences, which is terefgore self-defeating. To the system this `hack` simply provides more informationa nd contrast)).
Immutable/mutabile