Ontology-based Distributed Organizing: Answering the Challenges of Distributed Organizing
In: On the Nature of Distributed Organizing, S. 117-125
33505 Ergebnisse
Sortierung:
In: On the Nature of Distributed Organizing, S. 117-125
In: International studies review, Band 11, Heft 1, S. 214-218
ISSN: 1521-9488
This article discusses feature of Internet control as it relates to security threats. The author argues that two connected factors feature significantly in this discussion: the "expansion of the threat spectrum" with the growing number of ill-intentioned non state actors & societies' new vulnerabilities caused by dependency on insecure information systems. Goger, C.
Open Mind Consulting partnered with Informing Change to explore the possibilities and challenges associated with shared and distributed leadership, particularly within nonprofit organizations. Commissioned by the Performing Arts Program at the William and Flora Hewlett Foundation, the case studies explore the intersection of equity and democratization within organizations once distributed leadership is undertaken. Using a unique framework, the authors begin to parse out and identify the attributes, practices and cultural norms that accelerate more inclusive, equitable workplaces—where a genuine sense of belonging is experienced and realized. Additional video resources can be found on the Hewlett website. (Open Mind Consulting partnered with Informing Change to explore the possibilities and challenges associated with shared and distributed leadership, particularly within nonprofit organizations. Commissioned by the Performing Arts Program at the William and Flora Hewlett Foundation, the case studies explore the intersection of equity and democratization within organizations once distributed leadership is undertaken. Using a unique framework, the authors begin to parse out and identify the attributes, practices and cultural norms that accelerate more inclusive, equitable workplaces—where a genuine sense of belonging is experienced and realized. Additional video resources can be found on the Hewlett website (https://hewlett.org/case-studies-in-distributed-leadership/).
BASE
SSRN
In: TSQ: Transgender Studies Quarterly, Band 2, Heft 2, S. 280-296
ISSN: 2328-9260
Abstract
This essay is an exploration of "trans" among various transcodings of technicities, bodies, animalities, feminisms, media, and academies. The author positions the training of an artificial intelligence agent "dog" in the online virtual world Second Life as many practices of distributed being, cognition, and sensation in attunements across "trans" becomings.
In: American behavioral scientist: ABS, S. 000276422211448
ISSN: 1552-3381
In the face of a proliferation of texts framing ongoing events and experiences in terms of crisis, a new critical literature has emerged to interrogate the political, moral, and epistemological assumptions and blind spots of this way of understanding the modern world. In this special issue, we engage with this new body of work on crisis by distinguishing between two models—sovereign and distributed. While the sovereign model of crisis fleshes out the link between crisis and political power, the distributed model points to the social fragmentation and confusion that crisis-claims can provoke when they are made outside established institutional channels—when they are distributed across disparate audiences. Understanding the relationship between crisis and sovereignty on the one hand, and between crisis-claims and their audiences on the other, sheds new light on the narrative and performative effects of crisis.
In: Contributions to theoretical economics, Band 6, Heft 1
ISSN: 1534-5971
A distributed system model is studied, where individual agents play repeatedly against each other and change their strategies based upon previous play. It is shown how to model this environment in terms of continuous population densities of agent types. A complication arises because the population densities of different strategies depend upon each other not only through game payoffs, but also through the strategy distributions themselves. In spite of this, it is shown that when an agent imitates the strategy of his previous opponent at a sufficiently high rate, the system of equations which governs the dynamical evolution of agent populations can be reduced to one equation for the total population. In a sense, the dynamics 'collapse' to the dynamics of the entire system taken as a whole, which describes the behavior of all types of agents. We explore the implications of this model, and present both analytical and simulation results.
In: New political economy, Band 12, Heft 3, S. 389-403
ISSN: 1469-9923
In: New political economy, Band 12, Heft 3, S. 389-404
ISSN: 1356-3467
In: Marine corps gazette: the Marine Corps Association newsletter, Band 88, Heft 10, S. 32-33
ISSN: 0025-3170
In: https://doi.org/10.7916/D8DR33D3
Mobile Ad-hoc Networks (MANETs) are increasingly used in military tactical situations and in civil rapid-deployment networks, including emergency rescue operations and {\it ad hoc} disaster-relief networks. The flexibility of MANETs comes at a price, when compared to wired and basestation-based wireless networks: MANETs are susceptible to both insider (compromised node) and outsider attacks due to the lack of a well-defined perimeter in which to deploy firewalls, intrusion detection systems, and other mechanisms commonly used for network access and admission control. In this paper, we define a distributed firewall architecture that is designed specifically for MANETs. Our approach harnesses and extends the concept of a {\it network capability}, and is especially suited for environments where the communicating nodes have different roles and hence different communication requirements, such as in tactical networks. Our model enforces communication restrictions among MANET nodes and services, allowing hop-by-hop policy enforcement in a distributed manner. We use a ''deny-by-default'' model where compromised nodes have access only to authorized services, without the ability to disrupt or interfere with end-to-end service connectivity and nodes beyond their local communication radius. Our simulations show that our solution has minimal overhead in terms of bandwidth and latency, works well even in the presence of routing changes due to mobile nodes, and is effective in containing misbehaving nodes.
BASE
In: Commonwealth currents, Heft 2, S. 18
ISSN: 0141-8513
Erscheinungsjahre: 1991-1995 (elektronisch)