Just imagine it, from all the books lying around for me to pick, I picked David Peat's book, and from the 200-odd pages to pick out, I picked the page, page 33, that so fitted my current thinking mode. I have a chain of thoughts for that, which is not current, at present. It concerns anticipation, built in the firing sequences of reverberating cell assemblies, the kind John Holland deals with, in his book about emergence. The future prediction built in, in thought processing mechanisms, but leave it for now.
This is the extract that so fitted my current thought patterns, that I feel compelled to write about. It is out of the book of F. David Peat, "Pathways of Chance", published in Italy by Pari Publishing at 2007.
I will quote the extract, and follow it with my comments. "That brings me to another point; in most cases scientists see what they expect to see. Or rather they have theories and methods that allow them to make calculations for certain types of systems. These theories then become ways of seeing".
Taking on the point made beyond the isolated group of people, scientists, the same holds for every group of individuals, and for every single individual for that matter. Each one of us, either as by virtue of membership to a group we identify ourselves in, or our very own self, we hold theories, systems of beliefs, ideas that we use to explain and make sense out of the constantly unfolding events around us, they become ways of seeing , our ways of seeing.
"To take one example, for centuries scientists were able to make calculations for nice simple , linear systems that were close to equilibrium. This meant that everything they saw around them was linear and near to equilibrium. Anything else, anything that didn't fit into that way of seeing and calculating , was dismissed as an anomaly".
That is exactly the way, everyone of us, acts as well. Our built in system of beliefs and ideas, our common-sense, which we use to explain the world around us, becomes so overriding, that we quite easily dismiss everything else, that does not fit in our currently held systems of beliefs and ideas, as an anomaly.
Taking the matter further, our set frame of mind is responsible for what we see or we do not see at all, before we go on about dismissing it. As our mind is built out of the firing sequences of reverberating cell assemblies (John Holland again), in response to stimuli in the environment, if we have not built the corresponding reverberating cell assemblies, to a given sequence of stimuli, that stimuli sequence will not elicit a response, at all: leaving us, totally unaware of its presence. No response elicited, no imprint in our mind of its existence. We do not see that at all, next to the lines of, it did not and does not exist for us. Leaving us in an ignorant state of mind.
Totally unseen, or dismissed, it would have been OK, if it stopped there. However as all the beliefs, ideas in the world, are there because of individuals, acting as group or single entities, carry them on, so when we dismiss as an anomaly unfit systems of beliefs and ideas, we dismiss as well the individuals and the groups they belong, as easily too. Such an act is expressed in our lives in various ways and some of these ways are not good. They are not good at all. But anyway. Leave that for now.
Back to the extract, "But then chaos theory came along, a way of dealing with non-linear systems and systems that are far from equilibrium. Suddenly scientist began to see chaos, complexity and fractals everywhere-from the stock market to clouds, mountains and insect populations".
And there is the crunch, since scientists shown the way, so we should follow suit. Since all life systems we have built and continue to build, of whatever scale, are inherently non-linear and far from equilibrium. In the process of unfolding our life events, we should stop looking at chaos as the destruction of order, we should delve into its creative potential too. Where there is death there comes along, follows suit, rebirth.
Monday, 21 May 2007
Mind sets and their overriding influence
Computerised data of private information systems analysed
It concerns states achieved. And what are these states? Breach notifications? Trigger breach notifications. Trigger breach notifications when there is a breach in the security of the system. What system is that? The system comprised by the computerised data that include private information.
So there is a system that is defined by its content and the content is computerised data of private information. Is that a valid definition? Can we describe a system in that manner? If we accept that as a definition in that case, that should hold for other systems too, more concrete than this case of a system is.
Taking in account, that by addressing the concept of the system, we should think along the lines of agents, features of agents, conditions of its environment, its process space, the simple rules that hold, that govern the agents activity as they interact with each other and its environment Though environment might not be the correct term and "process space" is more appropriate. My suspicion is that the content of that system, the computerised data do not qualify it as a system, and as such we should accept it as a mere collection of entities and not a system.
Since to qualify as a system it should have agents, features, conditions, process space, simple rules, interactions. And by them evolve through the stages of chaos, along with sensitive dependence on initial conditions, the development of emergent states, and from these developed states some of them will be selected. States selected will multiply, re-enforce and become the norm, emergence and natural selection.
Computerised data as such can not be taken as possessing all these qualities therefore they are simply collections and not a system. There is a system though and the computerised data are the object they deal with. There are agents in such a system, and these are the individuals involved in handling the computerised data.
And who are these agents? The person or business which conducts business in a state and which owns or licences computerised data which includes private information. Private information is the object they deal with and the nature of its object, namely private information, determines the rules of engagement, so to speak.
Since they are private they should be kept secret from all apart from the person they deal with. Since the person-client, can not, or chooses not to, participate in the transactions the computerised data are used in, the person or business handles the data on its behalf, acts as a medium in a transaction that involves the person and the service or business, it transacts with.
The private information should be kept secret from any other individual or business that is not involved in the transaction. The sole owner of the private information remains the individual its content refer to. No other person or business should have knowledge of the content of the data, neither the person or business that holds the data on its behalf. They can not own what is not theirs. They can own only that part of the data that is directly relevant to their own specific transactions with the person-client.
The term computerised data can be easily translated into encrypted data. Therefore the person or business holds the private information in an encrypted form, at all times, and is only released, and more importantly released information, is only the portion that is relevant to the transaction, when a transaction takes place. Once the transaction is complete the information reverts back to its encrypted form.
The release can be effected via a code by the client at the time of the transaction, programmed by software. Such a process if not eliminate, will minimise the risk of private information been acquired by a person without valid authorisation.
Therefore to finish that deliberation here, the sole person that owns the private information is the person-client that the private information is about. The person or business keeps the computerised data, in an encrypted form, on the person's behalf, it can only own per transaction specific, portion of that data, and is only released when the transaction takes place.
The simple rule of secrecy is fulfilled.