Efficient communication resorts to some use of specialist words and phrases. Aspiring to effective communication too, we explain those words and phrases right here so everyone can join the party.
The name given by the AKASHA Foundation to the process of moving from a social networking app to a social networking framework.
A series of libraries, tools, services and APIs used to build customized social networks.
A next-generation social media network powered by the Ethereum world computer and embedded into the Inter-Planetary File System (IPFS).
The AKASHA dapp was the product of the AKASHA Foundation's early experimentation with a social microblogging experience on Ethereum . It was a full on-chain implementation on the Rinkeby testnet.
Agency refers not to the intentions people have in doing things but to their capability of doing those things in the first place. Tools that enhance agency may be described as agentic.
The cryptography community started to use these names ( Alice , Bob , and Carol) in the 1970s to explain their designs. Now the tech community uses the names more widely for greater clarity than say user1, user2, and user3.
The opposite of a rivalrous good. When more people share an anti- rivalrous good, each person gets the more utility / benefit.
Intelligence exhibited by machines, typically developed for specific goals such as reasoning, knowledge building, planning, learning, and understanding spoken and written language.
Metrics related to human characteristics. Biometric authentication may allow Alice to access her device with her fingerprint for example. Biometrics may also help identify individuals under surveillance , for example with facial recognition.
Prohibiting or suppressing information considered to be politically unacceptable, obscene, or a threat to security.
A system with one (or very few) central components through which information flows, often with a corresponding concentration of control.
A consistency; more of a unified whole. Often then regarded as being in tension with decentralization and system responsiveness, although other system parameters can ease the trade-off.
A shared or group intelligence that emerges from the collaboration , collective efforts, and competition of many individuals. Also may refer to the heightening of an individual's intelligence in a group setting.
When individuals demonstrate thought processes and behaviours that are only manifest in social situations, and the emergence of mental states at that group level that aren’t reducible to the individual states of individuals.
A group decision-making process in which group members develop, and agree to support a decision in the best interest of the whole. It represents a broadly acceptable resolution.
A means by which a number of processes (or agents) reach agreement on a single data value. Particularly pertinent across distributed networks.
Any freely-given, specific, informed, and unambiguous indication of the subject's wishes by which they deliberately indicate agreement.
A way to store information so it can be retrieved based on its content (what it is) rather than, as is most common today, its location (where it is).
Neither surveillance (watching 'from above') or sousveillance (watching 'from below'), but watching side-by-side. Generates an awareness of the disempowering nature of surveillance .
A digital form of money that relies on cryptography . Most everyday money is fiat money, which means it's established by government regulation or law, whereas a cryptocurrency does not depend on either.
D.R.Y. ( Don't Repeat Yourself ) is a principle aimed at reducing repetition to avoid redundancy. The D.R.Y. principle is stated as "Every piece of knowledge must have a single, unambiguous, authoritative representation within a system”.
An organization represented by rules encoded as software that is transparent, controlled by stakeholders, and not influenced by a central power. They typically use crypto incentives to coordinate governance .
An application with code that runs on a decentralized network and so does not have a central point of failure.
Individual, separate, objective facts representing the properties of objects and events. Computers work with data , but humans do not so readily. (See Information .)
The relationship between the collection and dissemination of data , technology, the public expectation of privacy , and the legal and political issues surrounding them.
Progressing towards a system that doesn't have central components through which information flows, thereby avoiding a concentration of control. Extreme decentralization is sometimes referred to as fully distributed . (See Distributed .)
The manifestations and operations of human identity influenced or mediated by digital technology.
A grouping of computing or network providers agreeing upon standards of operation collectively. This may allow different systems to work differently but so they can still work together.
Philosophically, identity asks "What makes it true that you are you?" (See Digital identity and Generative identity .)
Processed data , data made useful, data made relevant. Computers work with data . Humans work more easily with information .
A field of artificial intelligence ( AI ) that uses statistical techniques to give computer systems the ability to "learn", i.e. progressively improve performance.
Passed between software for its own purposes, or for the purposes of one human conveying something to another.
States the effect of a telecommunications network is proportional to the square of the number of connected users of the system.
An interactive software module highly focused on performing just one task and doing it well.
The result of breaking frontend monoliths into many smaller, more manageable pieces, allowing many teams to work simultaneously on a large and complex product.
Something is non- rivalrous when the cost of providing it to a marginal (additional) individual is zero for any level of production.
Used to describe forms of identity that are unchanging by design — think of those developed for the legal bureaucratization of identity (e.g. birth certificate, passport, national ID card, social security number, Aadhaar identity number), those based on permanent physical features (e.g. fingerprint, face recognition), and those inventions vying to achieve similar permanence or based on such permanence (e.g. Facebook ID , Telegram passport).
A distributed architecture that regards all the things (peers) involved to have equal status and equal power of participation in the network. Such design may entail the peers sharing out tasks between themselves.
Agency refers not to the intentions people have in doing things but to their capability of doing those things in the first place.
Any information relating to an identified or identifiable natural person — one who can be identified, directly or indirectly, by reference to a name, an identification number, location data , or other identifier, or to factors specific to the physical, physiological, genetic, mental, economic, cultural, or social identity of that person. (As defined by the General Data Protection Regulation.)
Defined as "a term used to describe the digital movement that recognizes an individual should own and control their identity without the intervening administrative authorities." AKASHA contends this vision — see Generative Identity .
Technology designed to serve the needs of one person / entity under their complete control.
Defined as "a term used to describe the digital movement that recognizes an individual should own and control their identity without the intervening administrative authorities." AKASHA contends this vision — see Generative Identity .
A social ideal that values equality and the rights of people to decide the conditions under which they live and work, and a method of organizing collaborative and productive organizations. Known as Dynamic Governance in N. America.
Purposeful monitoring (recording and transmission) by an entity that is not in a position of authority with respect to the intended subject. Typified by so-called 'body cams'.
An open source tool for developing UI components in isolation for React, Vue, and Angular.
The monitoring of behavior, activities, or other changing information for the purpose of influencing, managing, directing, or protecting people.
Purposeful watching. The word is most often encountered as part of the longer words surveillance and sousveillance .
Stores the public and private keys which can be used to receive or spend a cryptocurrency . Available in a variety of forms.
Web 2.0 refers to websites that emphasize user-generated content, ease of use, participatory culture and interoperability for the people using them.
There is no concrete definition for Web 3.0 yet. It has emerged from and is made possible by new cryptographic techniques.
A digital platform used to build social relationships with other people who share similar personal or career interests, activities, backgrounds, or real-life connections.