57.
_standard_header _standard_header.cfm
31.
__Whiteboards
     Conversation History             1969-1984
... 668/3332 ...
January 2019    Dennis R. DuBe'     668/3332


$s$ .description ()

19730912_fleenor.jpg ()

20110508_fairplay.jpg ()

20110508_fairplay_vortex.jpg ()

20110810_pedigree_1.jpg ()

20110823_the_end_of_trust.jpg ()

20111122_DSCN7995.JPG structure permissions ()

20111122_truman_view.jpg ()

20111206_trends_try.jpg ()

20111221_real_world_games.jpg ()

20120117_Permissions.jpg ()

20120222_info_slope.jpg ()

20120326_Dark_Net.jpg ()

20120326_Scott_Protocol_Stack.jpg ()

20120410_magic_glasses.jp ()

20120412_How_to_kill_Facdbook.jpg ()

20120412_Kill_facebook_1. ()

20120412_Sharing_Moment.jpg ()

20120625_next_paradigm.jpg ()

20120625_VIDEO_CAFE_LIFE_GOOD_THNIG.jpg ()

20120626_FULLY_AUTOMATED_RADIOCAFE.jpg ()

20120627_Privacy_is_BAD.jpg ()

20120627_sit_there_and_twitch_cafe.jpg ()

20120712_How_to_reveal_structure.jpg ()

20120719_Can_you_phrase_3 ()

20120719_can_you_phrase_A...jpg ()

20120719_phrase_as_a_question.jpg ()

20120724_Closed_Pond_Comforts.jpg ()

20120724_Forbin_Project.jpg ()

20120724_Residue_of_Attention.jpg ()

20120726_attention_presence.jpg ()

20120802_how_to_kill_faceook_2.jpg ()

20120807_attention_produced_realities.jpg ()

20120809_attention_field_goals.jpg ()

20120821_black_hole_pay_your_own_way.jpg ()

20120821_velcroed_consumers.jpg ()

20120911_levels_of_content.jpg ()

20120911_SM_As_Attention_Layer.jpg ()

20120912_deconstructing_apple.jpg ()

20120918_Follow_The_money.jpg ()

20120918_Velcroed_Into_Mindless.jpg ()

20120926_An_API_For_Structure.jpg ()

20120926_API_for_theory.jpg ()

20120926_Consulting_plan.jpg ()

20120926_Structure_Content_Behavior.jpg ()

20121003_What_is_attention_field.jpg ()

20121010_triangles_of_property.jp ()

20121022_Structure_Dog.jpg ()

20121022_zen_of_privacy.jpg ()

20121024_Attention_vs_privacy.jpg ()

20121024_privacy_becmes_attention.jpg ()

20121105_The_Before_Time.jpg ()

20121105_What_Do_People_Want_of_Media.jpg ()

20121107_creation_of_property.jpg ()

20121107_Fanboy_Analysis.jpg ()

20121114_moment_of_consumption.jpg ()

20121114_structure_content_triangle.jpg ()

20121119_Binding_and_Un_Binding.jpg ()

20121119_Fanboys_Progress.jpg ()

20121119_fanboy_bindings.jpg ()

20121119_Gigapop_Power_Rangers.jpg ()

20121119_totem_characteristics.jpg ()

20130110_fanboy_ecosystem.jpg ()

20130110_fanboy_the_movie.jpg ()

20130118_Then_Now.jpg ()

IN-THE-MOMENT-GRID.jpg ()

Related Publishers:
736 Aftermath
710 Behavior
772 Catalogs
748 CFS -- Walter Beckert
459 Colorado Rocks
739 Consulting
669 Consulting
709 Content
707 Dennis R. DuBe'
741 Drafts
650 Energy News
344 HTML and Web Skills
742 Key Concepts
716 LFU test
717 LFU Test 2
729 My Latest Clippings
649 New Courses
744 News Panels
721 Position
658 PPV & Gadgets
77 Rocky Mountain Ghost Mines
708 Structure
731 Synthesis
726 Thesis Notes
666 _Aggregation
702 _Determinisms and authors
728 _Papers by Others
668 __Whiteboards
698 ___FanBoy (The Movie)
718 ___Gamification
20110810_pedigree_1.jpg
     The pedigree of information is a history search
           #3332   Created 04/26/2013   Updated 08/13/2019

August 10, 2011: We defined data pedigree as the certification of the creation of a piece of content, and the history of its adaptation, editing, or modification from its beginning to its present state.

One aspect of pedigree is "source detection", the observation of the creation of the item. While a copyright springs into existence at the moment content's creation, the documentation of that creation is less certain. Content that can achieve a certain pedigree of the moment of creation can be documented and attested.

As an example, the moment of creation of a newspaper story is at the time it it written, somewhere in the bowels of the newspaper production system, and the corporate copyright exists from that moment. Yet, it is the moment of publication -- electronic or physical -- which creates the start of a document trail.

For Web content, it is conceivably possible to document the path of pieces of text or video through various stages of appropriation and reproduction across the Web. While technically feasible, it would take the search capabilities of Google. The necessary action in this regard would be to fingerprint the original at creation, and watch the modification of the fingerprint over time as the text soaks through the web's aggregation and appropriation processes.

Similarly, concerning content created by consumers in, for example, a social media context, that content can be examined, and pattern-matching algorithms applied to detect probable matches between substrings in the postings and previously published products. When significant portions of previously published text match the consumer's post, and when those portions are unique in some identifiable way from commonly occurring patterns in ordinary language, then the content can be given a numeric rating which represents both the probability that the text was copied, and an indicator of the significance of the text in terms of uniqueness.

Variations on this concept can be used to construct reflexive histories of the penetration of stolen material into Web-wide content (assuming, of course, infinite free processing power).

This idea will be loved by content creators, distributors, and lawyers. This idea will be hated by Fox News, the Huffington Post,



Images


20110810


Copyright Dennis R. DuBe'. All rights reserved. PageTwister and PubSource are registered trademarks.