Difference between revisions of "Our ability to create"
Baliforester (talk | contribs) |
Baliforester (talk | contribs) |
||
Line 17: | Line 17: | ||
The intentional procedure of data decision making is known as computation and is executed by organizing, processing, deploying and securing data. Organization structure gives you the ability to perceive what data inputs are relevant, processing methods give you the ability to makes sense of the data in a meaningful way, deployment instrumentation methods allow you to reflect on your computation and create the new sets of inputs for the next decision making procedure, and security measures give you confidence that you data computation procedure is consistent and trustworthy. | The intentional procedure of data decision making is known as computation and is executed by organizing, processing, deploying and securing data. Organization structure gives you the ability to perceive what data inputs are relevant, processing methods give you the ability to makes sense of the data in a meaningful way, deployment instrumentation methods allow you to reflect on your computation and create the new sets of inputs for the next decision making procedure, and security measures give you confidence that you data computation procedure is consistent and trustworthy. | ||
The validity and quality of data computation is determined by the symmetry between impact and security. If a computation has more impact than security it will be vulnerable and potentially destructive, if a computation is too secure then its ability to create impact will be restricted. Every computation will create impact and proper security measures must wrap that computation to create symmetry. | The validity and quality of data computation is determined by the symmetry between impact and security. If a computation has more impact than security it will be vulnerable and potentially destructive, if a computation is too secure then its ability to create impact will be restricted. Every computation will create impact and proper security measures must wrap that computation to create symmetry, by restricting impact into a level of correctness that's defined by contracts. | ||
Revision as of 04:09, 13 May 2021
The history of decision making
Everyday more and more of our life decisions are being automated by computers. Incredibly complex algorithms with vast amount of variables can be filtered down and processed in seconds; however there is still many decisions that computers are not able to make. Decision making is a human trait that we have delegated to machines, and in order for us to empower our machines ability to make decisions we must understand fundamentally what decision making is.
Decision making is the process of producing outputs in response to inputs by executing an intentional procedure. This is essentially what we do as humans on a day to day basis. We get the feeling of being thirsty (input) so we get up, walk to the kitchen pour a glass of water and take a drink (intentional procedure) until we are no longer thirsty (output), usually our outputs will be the inputs into the next decisions we make. If we are done drinking we may then need to use the bathroom, an example of inputs becoming the next outputs.
Transmission
As humans our ability to make internal decisions is incredibly fast, we have a wide range of senses, emotions, and thoughts that create our inputs and define our intentional procedures. Internally within our own minds these decision making procedures can happen in seconds because we have access to infrastructure that allows incredibly fast transmission speed and high levels of information density.
Computation Decision Making
The speed and density of transmitting data has doubled every two years, a phenomenon known as Moore's Law, giving the ability for anyone to collect and transmit large volumes of data. The exponential growth of data technology has allowed our global accounting system to infiltrate every aspect of human life. Every year more and more of our activities as humans are being recorded and accounted for. Recording and validating information will only create the potential of value, its when we understand how to give data the ability to make decisions that it becomes the most valuable asset of the 21st century.
Decision making is the process of producing outputs in response to inputs by executing an intentional procedure. This is essentially what we do as humans on a day to day basis. We get the feeling of being thirsty (input) so we get up, walk to the kitchen pour a glass of water and take a drink (intentional procedure) until we are no longer thirsty (output), usually our outputs will be the inputs into the next decisions we make. If we are done drinking we may then need to use the bathroom, an example of inputs becoming the next outputs, the decision making feedback loop.
The intentional procedure of data decision making is known as computation and is executed by organizing, processing, deploying and securing data. Organization structure gives you the ability to perceive what data inputs are relevant, processing methods give you the ability to makes sense of the data in a meaningful way, deployment instrumentation methods allow you to reflect on your computation and create the new sets of inputs for the next decision making procedure, and security measures give you confidence that you data computation procedure is consistent and trustworthy.
The validity and quality of data computation is determined by the symmetry between impact and security. If a computation has more impact than security it will be vulnerable and potentially destructive, if a computation is too secure then its ability to create impact will be restricted. Every computation will create impact and proper security measures must wrap that computation to create symmetry, by restricting impact into a level of correctness that's defined by contracts.
symmetry is accounting and the creation of data integrity
security reduces potentiality to reduce risk and harm. The overlap between potentiality and safety is correctness.
The correctness of the decisions being made are decided by the scale of liveness and safety. If a decision has too much liveness it will be vulnerable and potentially destructive, if the decision is too safe then it wont produce any meaningful impact. Security creates correctness
The process used to create balance is known as DevSecOps.
data ensures all participants have an equal opportunity to make decisions, and the private key mechanism delegates the decision making to a specific account.
action and response = breaking symmetry and finding symmetry
the general theory of natural equivalence