RSS

Futures in Neuromorphic Computing

Which chip will emerge the victor in the new race to beat Moore’s law and finally give us the intelligent machines weve been told are going to be in our future; by being out-competed or forming a marriage of convenience , its still far too early to tell.Briefly some background as i may be running off with the premise of this piece even before the starting gun.

BACKGROUND

The state of transistor tech that has sustained the electronics and computer industry for the past 20 plus years has grown by leaps and bounds (thank you Moore’s Law) enabling massive computational devices to proliferate at a fraction of the cost that they would have been had at in the preceding year.And even from the earliest times when a PC took up an entire room and drew as much power as a small town , the dream of AI has been slowly gaining traction.However it was realised early on that the Positronic brains we so desire for out robot would not be realised by the current hardware at hand .Fast forward to the present to where the problem still persists , no matter how many processor cores one throws at it the crop of supercomputers built to simulate an artificial intelligence still hold to that same principle of a large roomful of boxes drawing enough power to a small town (the more things change).However a fundamental difference with the earl efforts in AI research is with advances in neuroscience we know better how the functioning of the brain can be possibly simulated by artificial means .

The hardware side of AI research has shown that a fundamental flaw in the model being the von Neumann architecture.
<”von Neumann architecture is a design model for a stored-program digital computer that uses a central processing unit (CPU) and a single separate storage structure (“memory”) to hold both instructions and data.The separation between the CPU and memory leads to the von Neumann bottleneck, the limited throughput (data transfer rate) between the CPU and memory compared to the amount of memory. In most modern computers, throughput is much smaller than the rate at which the CPU can work. This seriously limits the effective processing speed when the CPU is required to perform minimal processing on large amounts of data. The CPU is continuously forced to wait for needed data to be transferred to or from memory.”-Wiki>

This is functionally different from the way that a brain will organise its information let alone process it

<”A biological brain is able to quickly execute this massive simultaneous information orgy—and do it in a small package—because it has evolved a number of stupendous shortcuts. Here’s what happens in a brain: Neuron 1 spits out an impulse, and the resultant information is sent down the axon to the synapse of its target, Neuron 2. The synapse of Neuron 2, having stored its own state locally, evaluates the importance of the information coming from Neuron 1 by integrating it with its own previous state and the strength of its connection to Neuron 1. Then, these two pieces of information—the information from Neuron 1 and the state of Neuron 2’s synapse—flow toward the body of Neuron 2 over the dendrites. And here is the important part: By the time that information reaches the body of Neuron 2, there is only a single value—all processing has already taken place during the information transfer. There is never any need for the brain to take information out of one neuron, spend time processing it, and then return it to a different set of neurons. Instead, in the mammalian brain, storage and processing happen at the same time and in the same place.” – Spectrum IEEE>

This brings us to the first of the next generation processing elements based on memristor technology.

MEMRISTORS

From the ground up a memristor , whose existence was theorised in the 70’s and actualised by HP labs in — in application is like a FPGA ; realising functions that need several transistors in a CMOS circuit with the added advantage of non-volatile memory (no power required for state refreshing) and a structure that is remarkably defect-tolerant.

The memristor layer interacts with the CMOS logic layer of the hybrid chip and according to the circuit configurations is able to realise any number of logic gate structures.The process of creating the hybrid chip leaves the underlying CMOS layer untouched , redundant data paths of the crossbar architecture allow routing around defective areas.In neuromorphic computing application the memristor as synapse and transistors as the neurones unsupervised learning becomes an actual possibility.A current work in progress by Boston University , MoNETA where the aim is to realise a general purpose AI able to adapt to solving a problem without prior training , which essentially boils down to a brute force technique with little room for creative problem solving.Using hundreds of normal PE cores sandwiched in a memristor layer where memory is localised to a super-cache immediately accessible and relying on very little power to maintain the information.

The software in this case for modelling the neurological topology is being handled by Cog Ex Machina a special purpose Os.

CHAOGATES

The next contender to the plate of a nueromorphic chip is the Chaogate.I must confess I’m particularly attached to this one , and not just because of butterfly’s.Partial differential equations and the way their solutions arise bring some of the most beautiful patterns , and i like to think brains work similarly if we could only see.As far as chip construction is concerned a new type of gate the Chaogate has been developed recently able to reconfigure itself to provide different logic gates – hence chaogates.Different from FPGAs where switching between RCLG’s achieves reconfiguration chaogates morph via the pattern inherent in their constitutive nonlinear element. Modern computers depend on boolean logic of which any logical operation can be realised by NOR and NAND gates.The chaotic processor is taken as a 1D system whose state is represented by x and dynamics given by non-linear map f(x) , if necessary and sufficient conditions are satisfied by f(x) simultaneously it is able to implement the full set of logical operations.

It also becomes possible to implement combinational logic directly, case in point the half adder involving two AND gates (for the carry) and XOR (sums 1st digit) is implementable with one 1D chaotic element.And a full adder requires three iterations of the single chaotic element giving us efficient computational modules without cascading.

Development by ChaoLogix using standard CMOS techniques has led to an array with: a morphing ALU giving higher functions (multiplier and adder ) in less than 1 clock cycle and communication protocols morphing between 2 different communication protocols in less than 1 clock cycle ( synchronous serial data link or serial computer bus).Arrays can be conceivably be programmed on the run , with threshold values being sent from an external program for optimisation of the task at hand.

Current efforts are aimed at optimisation of the design of a chaogate to sizes similar or smaller to NAND gates , and as a caveat the developers add that programming the chaogates will require development of a new hardware description language , whose scarcity at the moment lends ideas from evolutionary algorithms to be considered as viable alternatives to achieve optimal array configurations.

CONCLUSIONS

While focusing on the hardware advances in recent months on the software side of things Numenta deserves a nod for its work in recreation of a workable model of the human neocortex using its HTM approach.On the open-source side dust seems to be gathering with the last activity on projects like OpenAI being about four years ago.

With recent advancements tackling the whole problem of AI from a new perspective its high time a proper open stack was available to enable the faintest vestiges of consciousness to be breathed into our computers.So say we all.

 

Image credits.”Positronic Brain” by Fernando Laub [ http://j.mp/gUu06E%5D
“Optical Micrograph of CMOS chip with memristor ” [ Nano Lett., 2009, 9 (10), pp 3640–3645 DOI: 10.1021/nl901874j]
“Chaogate Element” –  American Institute of Physics.[doi:10.1063/1.3489889]
 
Leave a comment

Posted by on December 26, 2010 in code, Harware, Processors

 

SBC(Single Board Computer) using 8086

The aim is to design and model an 8086 based computer and add several interfaced peripherals to it.The system has been designed to meet the following requirements :

Total 32Kx16 SRAM

Total 64Kx16 EPROM

I/O Ports Parallel

I/O Ports analog-digital

a block diagram of the system showing the functional units relationships to each other .The desccriptions that follow are based on this model and willthus be referrd to as per the module it currntly appears in And below is a preliminary sketch of the completed system.CAVEAT:This is how the completed system will look like however pin outs may change regarding the availiability of ICs.

I wıll be going through the different modules step-by-step in the upcoming posts .

ARES schematic

ARES Achematic of SBC

 
Leave a comment

Posted by on December 17, 2010 in Harware, Processors, Uncategorized

 

Simple Qt4 and PostgreSQL book catalog application

For this current project we shall create a basic book storage application using the QT toolkit and PostgreSQL.Download and install QT   http://qt.nokia.com/products/developer-tools/  it comes with its own IDE qtcreator which we shall use for the actual work although any text editor can be used.Though that would unnecessarily prolong the length of the project.

Download and install the PostgreSQL database and configure it for use http://www.yolinux.com/TUTORIAL/LinuxTutorialPostgreSQL.html gives a good rundown if you are working on the linux platform.

Step1.Select the creation of  a new project.In the projects selection choose Qt4 Gui Application.Select the location and name of the project and in the required modules include the QtSql module.

Step2.Select forms from the Navmenu and open up the mainwindow.ui for editing.Design the layout of your app by using the available widgets.In this case we select LineEdit for the input.change their object names to something meaningful.Select pushbuttons and drag onto the workspace , give them useful names.

Step3.The design phase is now over and we shall proceed to coding the internals.Switch to Signal/Slot edit mode(F4).Direct the signals from the buttons to the main layout.In the configure connection pop-up select edit and add 3 new slots one each for clear , add and search.Link the clicked() action to our newly created slots.

Step4.Select the headers and in mainwindow.h add private slots addpub() , clearpub() and searchpub().In the protected section we shall add an auxillary function openDB() for establishing the database connection.In the private section we add a QSqlDatabase object db.

private slots:
void addpub();
void clearpub();
void searchpub();

protected:
void changeEvent(QEvent *e);
bool openDB();

private:
Ui::MainWindow *ui;
QSqlDatabase db;

Step5.We define the functions from step 4 , establishing the connection and inserting records with addpub() , searching for a particular record with searchpub() and clearing the form entries using clearpub().

-openDB function to connect to the database:

bool MainWindow::openDB()
{
db  = (QSqlDatabase::addDatabase(“QPSQL”));
db.setHostName(“localhost”);
db.setDatabaseName(“storagebox”);
db.setUserName(“noob”);
bool ret = db.open();
return ret;
}

-addpub function to insert from the form to the database

void MainWindow::addpub()
{

QString args = “INSERT INTO shelf VALUES (‘ “;;
bool ret = false;
bool lck = false;

args.append(ui->titleline->text()); args.append(“‘,'”);
args.append(ui->authorline->text()); args.append(“‘,'”);
args.append(ui->publisherline->text()); args.append(“‘,'”);
args.append(ui->isbnline->text()); args.append(“‘,'”);
args.append(ui->genreline->text()); args.append( ” ‘); “);

if(!db.isOpen())
{
lck = MainWindow::openDB();
}
ui->resultline->setText(“Pub insertion starting”);
if( lck )
{
ui->resultline->setText(“Pub is being inserted”);
QSqlQuery query;
ret = query.exec(args);

if(ret)
{
qDebug() <<“Pub has been inserted”;
ui->resultline->setText(“Pub has been inserted”);
}

}

}

-searchpub function to search for a stored record:

void MainWindow::searchpub()
{
bool ret = false;

if(!db.isOpen())
{
ret = MainWindow::openDB();
}

QString outLine;
QString findr;
QSqlQuery que;
findr = “select * from shelf where “;   findr += ui->srcq->currentText();   findr += ” like ‘%”;
findr += ui->searchline->text();        findr += ” %’ ;”;
if (ret)
{

que.exec(findr);

if( que.next())
{
outLine = que.value(0).toString();  outLine +=”\n”;
outLine.append(que.value(1).toString());    outLine +=”\n”;
outLine.append(que.value(2).toString());    outLine +=”\n”;
outLine.append(que.value(3).toString());    outLine +=”\n”;
outLine.append(que.value(4).toString());    outLine +=”\n”;

ui->textEdit->setText(outLine);
}
else
{
ui->textEdit->setText(“No result found”);
}

}

Step6.At this point you are ready to compile and run your application.

To download the project files used in this example  https://bitbucket.org/ar119/dbproject/get/f1dbf7bca3cd.zip

 
1 Comment

Posted by on September 8, 2010 in code

 

Tags: , , ,

Mapping the Internet

When surfing the most annoying thing that ive had the displeasure of running into are the “nationwalls” that seem to be popping up with annoying frequency.Content that is on the web and essentially pat of a “network of networks” is increasingly starting to look like a fragmented postcolonial map or ?s that precolonial?Anyway something bad is happening and if it continues as it has there is he very likely possibility that what the internet will look like 10 years from now is not something we will like the look of.
The problem as i see it is borders and nationalism, from Wikipedia:

“Borders define geographic boundaries of political entities or legal jurisdictions, such as governments, sovereign states, federated states and other subnational entities. Some borders–such as a state’s internal administrative borders, or inter-state borders within the Schengen Area–are open and completely unguarded. Other borders are partially or fully controlled, and may be crossed legally only at designated border checkpoints.”

That mentality is increasingly being applied to the internet by a whole host of governments in what obviously an attempt to co-opt and establish de -facto controls on what should be an unfettered public resource.And by public i mean everyone from the US President to the littlest goat herder in the outback(yeah wireless net is where it’s at ).Media content providers like Hulu have been operating under this model for some time now , restricting content to geographically based ips resulting in the inevitable torrenting.For the most part it’s not Hulu’s fault , more like the content creators who are yet to realise that the game has changed and unless they change with it they may not survive.

The internet by connections

Solution?Some years ago in a pc mag i saw a map of what the writers of the time envisioned what the maps of the future would look like.Less of lines in the sand and more geographically dispersed nodes of similar interests.
Neither 19th-century balance-of-power politics nor 20th-century power blocs are useful in understanding this new world. Instead, we have to look back nearly a thousand years, to the medieval age in which cities such as Cairo and Hangzhou were the centers of global gravity, expanding their influence confidently outward in a borderless world. When Marco Polo set forth from Venice along the emergent Silk Road, he extolled the virtues not of empires, but of the cities that made them great. He admired the vineyards of Kashgar and the material abundance of Xi’an, and even foretold — correctly — that no one would believe his account of Chengdu’s merchant wealth.

Internet communities

And finally Einstein:
“we should be on our guard not to overestimate science and scientific methods when it is a question of human problems; and we should not assume that experts are the only ones who have a right to express themselves on questions affecting the organization of society”
We all have a stake in what happens next and if the debates about net neutrality in the States are any indication its a matter that cannot be left to the hands of either business interests or government bureaucracy because in either case the losers in the end will be the users.

 
Leave a comment

Posted by on September 2, 2010 in Internet & networks

 

Tags: , , ,

Technology transfer in an information economy

From the beginning when the first farmer planted then harvested her first crops in ancient egypt heralding the agrarian revolution, past the spinning jennys of the industrial revolution bringing us to the information revolution of yesteryaer.”What ?”i hear you say , “we just got used to this newfangled internet  thingee , and now your telling us its already over?” fortunately not just yet however the writing is on the wall.
The revolution will not be televised and before we fully grasp what has occured we will be in a new age.Not as radical as the changes preceding it but nevertheless it shall bring about changes in the way we conduct everything from business to all aspects of social life.The knowledge economy is imminent and unless adequete steps are taken to ensure an equal playing field developing countries risk being left to play catchup to a race that they will almost certainly never win.
The last revolution brought us intellectual property  , patents and copyrights all ostensibly designed to encourage development but as the system has gotten more beuracratic and complicated it has self sustaining behemoth that hinders as much as it helps.
So what exactly is the knowledge based economy and what does it have to do with developing countries, i thought all countries went through the same process of agrirevolution to industrial with the end goal being a shining democracy.
A couple of decades ago that might have held true but with the advent of the information age the game changed and we are still in the process of defining the next model we should all adhere to.
From the harvard business review:
“Think about it: If the Industrial Economy died and made you God (or China), what kind of IP rights would you design for the new, clean slate information economy? One knee-jerk response is to favor the same kind of regime. “Since information is so valuable,” you might say, “it must be protected with even more Draconian rules.” But the industrial paradigm isn’t a match for the information economy. The crucial difference, utterly fundamental but only in the early stages of being worked out, is the zero cost of reproduction of information goods.

You must know this already, but let’s look straight at it: if a farmer produces a bale of hay, one horse or another eats it, but not both. A steel mill’s ingot goes into a sedan or a skyscraper, but not both. So a price mechanism and market is needed to mediate the competition for a scarce resource. But when a hacker produces a new capability on Linux, any number of people can use it without taking it away from anyone else. We can all have our code and eat it, too.”

The advent of open and permissive channels of sharing knowledge vis-a-vis the internet and the open source movement have brought about a seismic shift in the way that business is seen to be done.If  a company sucha as Red Hat can package and make millions from what is essentially a free ( as in libre not gratis ) product it really changess the whole supply and demand dynamic to some degree and the underlying economy has to adapt to survive or perish a slow and painful demise.

Enter ACTA.

Arstechnica “Though countries like Morocco are involved, rich countries have driven the ACTA process. The World Trade Organization–ignored. The World Intellectual Property Organization–bypassed. Instead of using the very fora that they played such a role in establishing, countries like the US, EU, Canada, Japan, and Australia formed a coalition of the willing. ACTA has been negotiated in secret, though the recently released negotiating draft text envisions a permanent secretariat that will receive new members.According to the paper, infringement could occur “if a medicine or product is made for which a company holds a patent in any country, no matter how unclear in scope and validity of the patent is.”
With large parts of the developing world remaining largely ignorant of the slowly creeping ACTA , it remeais to th e current standard bearers to put up a fight for the future of the new economic dispensation.
What happens in the next few years may very well decide how we will live out the rest of our natural lives.As one developer put it “it would be better if everything was open-sourced, in my opinion, but I won’t run after closed-source software authors armed with an axe and whispering “little pigs, little pigs…”. It’s their choice as a developer, and I’m forced to accept it as an user if I like the software.”

Hopefully the open source movement can bring its weight to bear and help make real the shape of things to come.

UPDATE:Interesting article i read on der speigel today , gist of it is essentially the quasi agrarian Prussian states were able to catch up and for a brief period surpass the earier industrialised British due to lax copyrights.

 
Leave a comment

Posted by on August 22, 2010 in Technology Business

 

Tags: , , , ,

The End of time

Ok.not really but it may as very well be , our concept of what time is has never been absolutely clear and any number of philosophers and physicists have been grappling with that very question for decades ; what I present here is adapted from a presentation I gave in my freshman year that may shed some light on what we may be saying when we talk about time.I will touch on two things the block universe model and the quantum model.

“How, then, can these two kinds of time, the past and the future be, when the past no longer is and the future has not yet happened?”

Our senses tell us that time flows: that the past is fixed, the future unknown, and reality lives in the present the present moment has special significance. It is all that is real.As the clock ticks,the moment passes and another comes into existence–a process that we call the flow of time e.g The moon, is located at only one position around Earth.Over time, it stops existing at that position and is found at a new position.

Classical Physics and the standard model

“Classical physics” refers to the Newtonian physics which preceded relativity, i.e. the branches of physics based on principles developed before the rise of relativity and quantum mechanics.

Before the discovery of quantum mechanics, the framework of physics was this: If you tell me how things are now, I can then use the laws of physics to calculate, and hence predict, how things will be later.In this model put forward by Newton the three spatial dimensions and the one time dimension are absolute.What proponents of quantum theory have shown is that this is not so with distances and durations arent absolute but are affected by motion, this new model could have upto tens of spatial and time dimensions.This is beyond the scope of this piece but a good source is Brian Greene’s , “The Fabric of the Cosmos” , to whit the proponents of quantum theory claimed, reality consists of a haze of all possibilities – all trajectories – mutually commingling and simultaneously unfolding. And why don’t we see this? According to the quantum doctrine, when we make a measurement or perform an observation, we force the myriad possibilities to ante up, snap out of the haze and settle on a single outcome. But between observations – when we are not looking – reality consists entirely of jostling possibilities.

This is not to say that the Newtonian model was/is wrong , quite the opposite really for macroscopic events it holds remarkably well and that is the eason to date its still a part of most school curriculae whereas quantum theory which can be thought of as a finer instrument can more accurately explain the microscopic phenomenae existing at the atomic scale and at velocities smaller than the velocity of light.

Ideally by now we should have already begun incorporating the discoveries of the past decades into our collective as it would go a long way towards clarifying a host of contentious issues from time travel , teleportation to determinism.

The foundations were laid by Werner Heisenberg, Max Planck, Louis de Broglie, Albert Einstein, Niels Bohr, Erwin Schrödinger, Max Born, John von Neumann, Paul Dirac, Wolfgang Pauli, David Hilbert, and others in the mid-1920s.

So what time is it

“The past, present and future are only illusions, even if stubborn Ones.” – Albert Einstein

Einstein’s conclusion came from his special theory of relativity, which denies any absolute, universal significance to the present moment. According to the theory,simultaneity is relative. Two events that occur at the same moment if observed from one reference frame may occur at different moments if viewed from another.For the physicist, time is simply what (accurate) clocks measure.We dont really observe the passage of time what we notice is the that later states of the world differ from earlier states , as a result of entropy which gives us the “arrow of time” ; as a consequence of entropic decay where a stable systems tends towards disorder from an ordered state is the reason we are able to distinguish between past present and future.Entropy as a force is also suspected to be responsible for gravity according to ongoing research.

From some researchers (according to the classic model)comes the conclusion that all of eternity is laid out in a four-dimensional block composed of time and the three spatial dimensions.

“past” and “future” may be used as directions, just as “up” and “down” may be applied to spatial directions, but past or future are as meaningless as referring to the up or the down, the time of the physicist does not pass or flow.



The quantum model and altenate timelines

“God does not play dice with the universe.”

Picking up on the relativistic probabilities and special relativity of Einstein allows for parallel timelines to be a possibility.For example , A person living on a planet called Earth, with misty mountains, fertile fields and sprawling cities, in a solar system with eight other planets. The life of this person has been identical to yours in every way until now, that is, when your decisions signals that your two lives are diverging.

The idea is that any choice made in this universe results in the creation of another universe where an alternate choice was made.

When discussing parallel universes, we need to distinguish between two different ways of viewing a physical theory: the outside view or bird perspective of a mathematician studying its mathematical fundamental equations ant the frog perspective of the observer going about her life.

From her frog perspective, however, each observer perceives only a tiny fraction of this full reality: she can only see her own Hubble volume (Level I) .When asked a question, makes a snap decision and answers quantum effects at the neuron level in her brain lead to multiple outcomes, and from the bird perspective, her single past branches into multiple futures.

From their frog perspectives, each copy of her is unaware of the other copies.Afterwards, there are multiple copies of her that have the exact same memories up until the point when she answers the question and divergence occurs.

 
Leave a comment

Posted by on July 30, 2010 in Physics

 

The future of the Social Network pt1

THE PITCH

In an increasingly interconnected world a web presence is not only something to be desired it is absolutely necessary as envisaged by the multitude of networking sites littering the webspace.Discounting (or perhaps not) the 600 pound gorilla that is facebook , we have a bunch of up and coming contenders to the throne of social media like the appleseedproject and recently diaspora.

Watching a news blurb on the Bbc there was a talking head being interviewed and what he said struck me as quite succint , essentially he’s of the opinion that fb as a social network is unassailable by any competitors due to the massive userbase it commands and its momentum in adding hordes of new users.Th first thing I thought of was “thats what they were saying about Microsoft in the 90s” and look at where we are now with Oses a dime a dozen and something new getting remixed everytime a itch has to be scratched.The hi5’s and myspace’s cmae and went and increasingly in the area of the social webits all about having something relevant and innovative to offer your users.Acouple of years ago that position was held by facebook as evidenced by their successes to date, as all incumbents do though fb has gotten complacent as is self evident by the gripes userc shave with its quicksand of privacy debacles.

Not to seem to be ragging on fb others such as foursquare have also had their dark days.

From wired:

Foursquare is one of the most popular of a growing number of services that let people quickly report to friends, family or the entire world where they are — and is part of a growing trend of making public more information that used to be private. Foursquare’s popularity is tied to its game-like ecosystem, where users can win “badges” for certain actions or become the “mayor” of locations by checking in there more than any other users.

On pages like the one for San Francisco’s Ferry Building, Foursquare shows a random grid of 50 pictures of users who most-recently checked in at that location – no matter what their privacy settings. When a new check-in occurs, the site includes that person’s photo somewhere in the grid. So Andersen built a custom scraper that loaded the Foursquare web page for each location in San Francisco, looked for the differences and logged the changes.

Whikle tools like openid exist out there their uptake with the general users is pitifully slow and still doesnt address the fact that for every site you log into you leave a trail of breadcrumbs about yourself and given sufficient motivation there are those online that will make use of it(see rule 34 of the internets).

Or another case:

Since Facebook changes its security policies about every 3 seconds, your worries are not limited just to someone seeing a post and telling someone else. In fact, personal pages on sites like LinkedIn, Twitter, and Facebook rank pretty high in Google searches. So that means that a potential employer who’s looking at your resume could also be finding out via social networking about your membership in that Neo-Nazi Glee Club even though your account settings are “Friends only.” (Studies show that 78% of recruiters use Google to research job candidates and social networking sites rank very highly on Google.)

And don’t forget that Facebook is like “Six Degrees of Separation” on Barry Bonds-grade steroids. Even if you make a comment on someone else’s page, THAT person’s friends will see it, and then every friend of those friends will see it, etc.

Thus the question becomes how do we interactwith the social network and the internet at large , it is possible to have as many email accounts and login details as you feel you need to remain aanonymous but that is a cumbersome and highly impractical solution that ends up defeating itself in the long run , case in point which account did you use to login to a particlar site and do you have multiple account on a particular site because you forgot you were already logged on.

Additonally do you trust the custodian of your online identity to be discreet and mindful of your needs , as with most corps the larger percentage of online entities are more interesrted with the bottom line than with any ideological concerns.This is taken from the latest revision of the facebook TOS(emphasis mine):

  • For content that is covered by intellectual property rights, like photos and videos (“IP content”), you specifically give us the following permission, subject to your privacy and application settings: you grant us a non-exclusive, transferable, sub-licensable, royalty-free, worldwide license to use any IP content that you post on or in connection with Facebook (“IP License”). This IP License ends when you delete your IP content or your account unless your content has been shared with others, and they have not deleted it.
  • When you delete IP content, it is deleted in a manner similar to emptying the recycle bin on a computer. However, you understand that removed content may persist in backup copies for a reasonable period of time (but will not be available to others).
  • When you publish content or information using the “everyone” setting, it means that you are allowing everyone, including people off of Facebook, to access and use that information, and to associate it with you (i.e., your name and profile picture).

You agreed to all of the above by simply clicking on that sign up button , to be honest not a great many users read through all the privacy policies when signing up trusting to the vendor that their rights will not be violated,the preceeding chunk of legalese confers upon fb a whole host of rights that most users properly informed would think twice and then think about it once more.

What im advocating for is nothing new and there art ecountless articles online eschewing the importance of gopd data custodianship and efficient privacy controls that are understandable by users.What is lacking is a ubiquity in the implementation of a system that allows a user achieve three things without too much of a hassle.A user should be able to:

  1. .Choose what aspects of their personal data is available to online vendors
  2. .The ability to select the custodian of their data annd have an open framework to change them as they deem fit
  1. Make it as simple as possible for novice users to manage and organise their online presence

In order to foster adoption and faster uptake of such a system an open model is to be preferred to allow as much of a open community of developers and users to take advantage of it.

The first two I would consider the most important and serious issues to be tackled, so I shall try and give a brief of what I see as their role in social network webscape.

-aD-

 
Leave a comment

Posted by on July 22, 2010 in Internet & networks

 

Tags: , ,