To understand the genesis, functions, and reasons for the collapse of various types of societies, Erich Fromm’s developed theory of social character can provide significant insights. It addresses questions such as: What behavioral motives, prevalent among the masses, support a given social system, and which ones undermine it? Unlike sociological Continue Reading
Change Management
If you think you have the situation under control, it just means you’re not moving forward fast enough. Tom Peters You may decide to implement changes in your organization aimed at improving your business, which ultimately translates into greater profits. However, as we all know, the road to hell is Continue Reading
Scenarios for Regime Change
We have great faith in that which has never let down human history. principle that the system carefully constructed by the ruling class eventually makes that same class dependent on a new class—the manager of a new resource. More details on this are written. Text for translation: here. Текст для Continue Reading
The Boundaries of Privacy
Source текста.Author. Ilya Simenko Every person has an inherent right to keep secrets. A personal, inviolable informational territory that is off-limits to outsiders. Where is the boundary of this territory? The answer is always subjective. It depends on one’s profession, social status, the society itself, and the individual’s character. When Continue Reading
WikiPolitics
It is clear that we are all moving, and very quickly, towards a new social order. We don’t know what it will be called. We like the name “ reconism “From the English word reckon — to count, to take into account. Since the information infrastructure and the accounting of Continue Reading
Tracking information system
OIS. A public, independent information system that operates on the principles of blockchain, allowing for multiple duplications and distribution of information. This system will be capable of tracking, storing, and providing any user with information about legal and informational relationships between individuals, including details about who has requested information about Continue Reading
Presumption of disclosure of information
Well, we have “shocking” leaks in WikiLeaks. Sure, they’re only interesting to a narrow circle of diplomats. Yes, it’s possible that it’s all a setup and the leak was carefully planned, with Assange being a tool in the hands of those behind it. Yes, it’s possible that the U.S. itself Continue Reading
Resource social network
Table of Contents Toggle Motivation The essence of the idea Search for added value The physics of the process Sentence Value for users Monetization Examples of usage Barrier Swimming pool Wi-Fi internet at school for all children. Bus (and any group transport) Condominium Group discounts Example of functionality. Edit Creating Continue Reading
Illustration of a possible implementation of a “standard” element of the information and control system (ICS).
Before reading the description of the bare idea presented below, written in 2009, it is worth taking a look at the article in Membrane, which… refers to an already existing one project (project, but not its implementation) of this kind. (Update) — it’s been working analytical system And also ideas Continue Reading
Analysis of technical vulnerabilities
Table of Contents Toggle Critique of the requirement for registration and the resulting possibility of the existence of unregistered objects or individuals. Criticism based on the impossibility of equipping all deserts and dark corners with surveillance systems. Criticism based on the assumption of the existence of a parallel, shadow society. Continue Reading