Reorganize directory, add manual dataset and sync tooling
- Move all scripts to scripts/, web assets to web/, analysis results into self-contained data/readings/<type>_<YYYYMMDD>/ directories - Add data/readings/manual_20260320/ with 32 JSON readings from git.medlab.host/ntnsndr/protocol-bicorder-data - Add scripts/json_to_csv.py to convert bicorder JSON files to CSV - Add scripts/sync_readings.sh for one-command sync + re-analysis of any dataset backed by a .sync_source config file - Add scripts/classify_readings.py to apply the LDA classifier to all readings and save per-reading cluster assignments - Add --min-coverage flag to multivariate_analysis.py for sparse/shortform datasets; also applies in lda_visualization.py - Fix lda_visualization.py NaN handling and 0-d array annotation bug - Update README.md and WORKFLOW.md to document datasets, sync workflow, shortform handling, and new scripts Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
2
analysis/data/readings/manual_20260320/.sync_source
Normal file
@@ -0,0 +1,2 @@
|
||||
REMOTE_URL=https://git.medlab.host/ntnsndr/protocol-bicorder-data
|
||||
REMOTE_SUBDIR=readings
|
||||
@@ -0,0 +1,33 @@
|
||||
Descriptor,analyst,standpoint,shortform,cluster,cluster_name,confidence,lda_score,distance_to_boundary,completeness,dimensions_provided,key_dims_provided,recommended_form
|
||||
Coffee shop as office,ntnsndr,A person using a coffee shop as an office,True,1,Relational/Cultural,0.295,-1.315,1.315,0.348,8,8,long
|
||||
Street crossing in Buenos Aires,Venkat,Tourist,False,1,Relational/Cultural,0.888,-2.724,2.724,0.957,22,9,short
|
||||
qPCR,Fotis Tsiroukis,Ethnography of Scientific Practice,False,2,Institutional/Bureaucratic,0.12,0.367,0.367,0.957,22,9,long
|
||||
High wind preemptive blackouts,ntnsndr,Power consumer who lost power at office and home during high winds,False,2,Institutional/Bureaucratic,0.978,5.905,5.905,0.957,22,9,short
|
||||
Bedtime routine with kids,ntnsndr,Parental participant,False,2,Institutional/Bureaucratic,0.906,2.84,2.84,0.913,21,8,short
|
||||
Quarantine of a sick family member,ntnsndr,Family member,False,1,Relational/Cultural,0.957,-5.803,5.803,0.913,21,8,short
|
||||
Email scheduling technique,ntnsndr,Practioner of the protocol,False,1,Relational/Cultural,0.739,-2.757,2.757,0.609,14,7,short
|
||||
Podcasting (as a social practice),ntnsndr,"Listener, occasional producer",True,1,Relational/Cultural,0.696,-8.166,8.166,0.391,9,9,long
|
||||
,Bob,,True,2,Institutional/Bureaucratic,0.696,3.167,3.167,0.391,9,9,long
|
||||
Handshake ,Owocki ,User of it ,True,2,Institutional/Bureaucratic,0.496,2.14,2.14,0.391,9,9,long
|
||||
Andrew Huberman Sleep,T,Learner,True,1,Relational/Cultural,0.558,-2.484,2.484,0.348,8,8,long
|
||||
EthBoulder,ash,contributor,True,1,Relational/Cultural,0.696,-9.204,9.204,0.391,9,9,long
|
||||
Network Assembly Protocol,Benjamin Life,"Co-Author, Network Steward",True,2,Institutional/Bureaucratic,0.662,2.856,2.856,0.391,9,9,long
|
||||
WeChat payment for food,Jon Bo,User paying for the food,True,1,Relational/Cultural,0.696,-3.542,3.542,0.391,9,9,long
|
||||
Dating Apps,Theo,Observer (former subject - now free),True,1,Relational/Cultural,0.696,-5.792,5.792,0.391,9,9,long
|
||||
On Protocols: Creating Habitat,Todd Youngblood,RegenHub Boulder - 1515 Walnut,True,1,Relational/Cultural,0.696,-3.221,3.221,0.391,9,9,long
|
||||
We* Are Agentic,Neil M Yarnal,Local* is Relative ,True,1,Relational/Cultural,0.696,-4.994,4.994,0.391,9,9,long
|
||||
The gift,Tayken,Selflessness,True,2,Institutional/Bureaucratic,0.696,5.427,5.427,0.391,9,9,long
|
||||
Claude Agent SDK ,@unforced,Active user,True,1,Relational/Cultural,0.662,-2.854,2.854,0.391,9,9,long
|
||||
Jon & Savannah Relationship Agreements,Savannah Kruger & Jonathan Borichevskiy,Co-creators,True,1,Relational/Cultural,0.674,-5.098,5.098,0.348,8,8,long
|
||||
Native protocol,proofoftom,Co-creator,True,1,Relational/Cultural,0.696,-5.997,5.997,0.391,9,9,long
|
||||
Free-range kids,ntnsndr,parent,True,1,Relational/Cultural,0.674,-8.694,8.694,0.348,8,8,long
|
||||
Passing on a sidewalk,ntnsndr,Pedestrian,True,1,Relational/Cultural,0.696,-6.494,6.494,0.391,9,9,long
|
||||
Academic job talks,ntnsndr,an academic,True,2,Institutional/Bureaucratic,0.696,3.345,3.345,0.391,9,9,long
|
||||
Magic Mountain Talks,ntnsndr,one of the organizers,False,1,Relational/Cultural,0.467,-1.432,1.432,0.957,22,9,long
|
||||
Book draft workshop,ntnsndr,The designer and victim of the protocol,False,1,Relational/Cultural,0.465,-1.427,1.427,0.957,22,9,long
|
||||
Playdate orgabizing,ntnsndr,A frequent participant,True,1,Relational/Cultural,0.696,-7.041,7.041,0.391,9,9,long
|
||||
Letters of recommendation,ntnsndr,A frequent recommender,True,2,Institutional/Bureaucratic,0.696,3.492,3.492,0.391,9,9,long
|
||||
Deciding how to get the check at a restaurant,ntnsndr,Person who often feels awkward and wants to be generous,True,1,Relational/Cultural,0.674,-8.57,8.57,0.348,8,8,long
|
||||
Office hours,ntnsndr,Professor,False,1,Relational/Cultural,0.913,-5.002,5.002,0.826,19,9,short
|
||||
Screen time,ntnsndr,parent,False,1,Relational/Cultural,0.619,-2.248,2.248,0.652,15,7,short
|
||||
Playing catch with a baseball,ntnsndr,Baseball coach,True,1,Relational/Cultural,0.674,-4.583,4.583,0.348,8,8,long
|
||||
|
@@ -0,0 +1,4 @@
|
||||
Category,Accuracy,N_Dimensions
|
||||
Design,0.8518518518518519,3
|
||||
Entanglement,1.0,4
|
||||
Experience,0.7037037037037037,1
|
||||
|
@@ -0,0 +1,9 @@
|
||||
Design_precise_vs_interpretive,Design_institutional_vs_vernacular,Design_static_vs_malleable,Entanglement_sovereign_vs_subsidiary,Entanglement_self-enforcing_vs_enforced,Entanglement_obligatory_vs_voluntary,Entanglement_flocking_vs_swarming,Experience_predictable_vs_emergent
|
||||
1.0,-0.00948330038665666,0.15918490238688207,-0.6415638337903136,-0.07621029838482958,0.1204174037362573,0.41442280980679086,0.3063603356998134
|
||||
-0.00948330038665666,1.0,-0.01865063998837495,-0.08731465382649602,-0.7085151801637848,0.3182010621936024,0.37943269092151793,-0.028510932256394873
|
||||
0.15918490238688207,-0.01865063998837495,1.0,-0.08704907510939718,-0.05220623630529541,0.38505357601444185,0.3493656041325956,0.5767763224995508
|
||||
-0.6415638337903136,-0.08731465382649602,-0.08704907510939718,1.0,0.26060569513088677,-0.32302247713396914,-0.24303539751564743,-0.06248855905045787
|
||||
-0.07621029838482958,-0.7085151801637848,-0.05220623630529541,0.26060569513088677,1.0,-0.5477529075664381,-0.3960558569111922,-0.0826446280991735
|
||||
0.1204174037362573,0.3182010621936024,0.38505357601444185,-0.32302247713396914,-0.5477529075664381,1.0,0.1777518623883244,0.23908108342634116
|
||||
0.41442280980679086,0.37943269092151793,0.3493656041325956,-0.24303539751564743,-0.3960558569111922,0.1777518623883244,1.0,0.16286409069245295
|
||||
0.3063603356998134,-0.028510932256394873,0.5767763224995508,-0.06248855905045787,-0.0826446280991735,0.23908108342634116,0.16286409069245295,1.0
|
||||
|
@@ -0,0 +1,28 @@
|
||||
Descriptor,cluster
|
||||
Street crossing in Buenos Aires,0
|
||||
qPCR,0
|
||||
High wind preemptive blackouts,0
|
||||
Bedtime routine with kids,-1
|
||||
Podcasting (as a social practice),0
|
||||
,-1
|
||||
Handshake ,0
|
||||
Andrew Huberman Sleep,0
|
||||
EthBoulder,0
|
||||
Network Assembly Protocol,0
|
||||
WeChat payment for food,0
|
||||
Dating Apps,0
|
||||
On Protocols: Creating Habitat,0
|
||||
We* Are Agentic,0
|
||||
The gift,0
|
||||
Claude Agent SDK ,0
|
||||
Native protocol,0
|
||||
Free-range kids,0
|
||||
Passing on a sidewalk,0
|
||||
Academic job talks,0
|
||||
Magic Mountain Talks,0
|
||||
Book draft workshop,0
|
||||
Playdate orgabizing,0
|
||||
Letters of recommendation,0
|
||||
Deciding how to get the check at a restaurant,0
|
||||
Office hours,0
|
||||
Playing catch with a baseball,0
|
||||
|
@@ -0,0 +1,3 @@
|
||||
Descriptor
|
||||
Bedtime routine with kids
|
||||
""
|
||||
|
@@ -0,0 +1,9 @@
|
||||
Dimension,Importance
|
||||
Entanglement_obligatory_vs_voluntary,0.254894612034441
|
||||
Entanglement_self-enforcing_vs_enforced,0.21575828870333197
|
||||
Design_institutional_vs_vernacular,0.17644208603428538
|
||||
Design_static_vs_malleable,0.11295389802456017
|
||||
Experience_predictable_vs_emergent,0.11053677548216935
|
||||
Entanglement_sovereign_vs_subsidiary,0.049324490590274904
|
||||
Design_precise_vs_interpretive,0.04580418818031551
|
||||
Entanglement_flocking_vs_swarming,0.03428566095062174
|
||||
|
@@ -0,0 +1,28 @@
|
||||
Descriptor,cluster
|
||||
Street crossing in Buenos Aires,2
|
||||
qPCR,3
|
||||
High wind preemptive blackouts,5
|
||||
Bedtime routine with kids,3
|
||||
Podcasting (as a social practice),1
|
||||
,5
|
||||
Handshake ,4
|
||||
Andrew Huberman Sleep,2
|
||||
EthBoulder,1
|
||||
Network Assembly Protocol,5
|
||||
WeChat payment for food,3
|
||||
Dating Apps,1
|
||||
On Protocols: Creating Habitat,4
|
||||
We* Are Agentic,2
|
||||
The gift,3
|
||||
Claude Agent SDK ,2
|
||||
Native protocol,2
|
||||
Free-range kids,1
|
||||
Passing on a sidewalk,2
|
||||
Academic job talks,3
|
||||
Magic Mountain Talks,2
|
||||
Book draft workshop,2
|
||||
Playdate orgabizing,1
|
||||
Letters of recommendation,3
|
||||
Deciding how to get the check at a restaurant,1
|
||||
Office hours,2
|
||||
Playing catch with a baseball,1
|
||||
|
@@ -0,0 +1,28 @@
|
||||
Descriptor,cluster
|
||||
Street crossing in Buenos Aires,2
|
||||
qPCR,1
|
||||
High wind preemptive blackouts,1
|
||||
Bedtime routine with kids,1
|
||||
Podcasting (as a social practice),2
|
||||
,1
|
||||
Handshake ,2
|
||||
Andrew Huberman Sleep,2
|
||||
EthBoulder,2
|
||||
Network Assembly Protocol,1
|
||||
WeChat payment for food,2
|
||||
Dating Apps,2
|
||||
On Protocols: Creating Habitat,2
|
||||
We* Are Agentic,2
|
||||
The gift,1
|
||||
Claude Agent SDK ,2
|
||||
Native protocol,2
|
||||
Free-range kids,2
|
||||
Passing on a sidewalk,2
|
||||
Academic job talks,1
|
||||
Magic Mountain Talks,2
|
||||
Book draft workshop,2
|
||||
Playdate orgabizing,2
|
||||
Letters of recommendation,1
|
||||
Deciding how to get the check at a restaurant,2
|
||||
Office hours,2
|
||||
Playing catch with a baseball,2
|
||||
|
@@ -0,0 +1,10 @@
|
||||
Dimension,LDA_Coefficient,Abs_Coefficient
|
||||
Entanglement_obligatory_vs_voluntary,6.104818640682529,6.104818640682529
|
||||
Entanglement_self-enforcing_vs_enforced,-4.427674472786891,4.427674472786891
|
||||
Design_precise_vs_interpretive,3.187559601619789,3.187559601619789
|
||||
Design_static_vs_malleable,2.6197343878913397,2.6197343878913397
|
||||
Entanglement_sovereign_vs_subsidiary,2.599389732008001,2.599389732008001
|
||||
Design_institutional_vs_vernacular,2.5800096946951543,2.5800096946951543
|
||||
Entanglement_flocking_vs_swarming,-1.558464477776738,1.558464477776738
|
||||
Experience_exclusion_vs_inclusion,1.3761139088891503,1.3761139088891503
|
||||
Experience_predictable_vs_emergent,1.3660485464046546,1.3660485464046546
|
||||
|
@@ -0,0 +1,28 @@
|
||||
Descriptor,LD1,Cluster
|
||||
Street crossing in Buenos Aires,1.5830705307915645,2
|
||||
qPCR,-2.3916230807080425,1
|
||||
High wind preemptive blackouts,-3.5738925536462087,1
|
||||
Bedtime routine with kids,-4.34943827150967,1
|
||||
Podcasting (as a social practice),2.9132752292704165,2
|
||||
,-3.2287167027835224,1
|
||||
Handshake ,-0.91778141232402,2
|
||||
Andrew Huberman Sleep,1.3720069516699256,2
|
||||
EthBoulder,2.6903519041174038,2
|
||||
Network Assembly Protocol,-2.993306507536437,1
|
||||
WeChat payment for food,0.7712707033639972,2
|
||||
Dating Apps,1.0398359762191327,2
|
||||
On Protocols: Creating Habitat,1.594977502513451,2
|
||||
We* Are Agentic,0.6246643894515854,2
|
||||
The gift,-5.613540584473627,1
|
||||
Claude Agent SDK ,0.3531701790467024,2
|
||||
Native protocol,0.5149180331358285,2
|
||||
Free-range kids,2.188941698688496,2
|
||||
Passing on a sidewalk,1.5309045692998287,2
|
||||
Academic job talks,-3.3055344107514686,1
|
||||
Magic Mountain Talks,1.8551005167508416,2
|
||||
Book draft workshop,1.4306890627091928,2
|
||||
Playdate orgabizing,1.3562197541340273,2
|
||||
Letters of recommendation,-2.4959665218573637,1
|
||||
Deciding how to get the check at a restaurant,2.751917936884865,2
|
||||
Office hours,2.888475689332209,2
|
||||
Playing catch with a baseball,1.4100094182108855,2
|
||||
|
@@ -0,0 +1,28 @@
|
||||
Descriptor,PC1,PC2,PC3,PC4,PC5
|
||||
,0.5081882119685507,0.2971024109462167,0.8223363322321439,-0.688713723038497,0.4994642104794254
|
||||
Street crossing in Buenos Aires,0.43857464707897387,0.22493673479381965,-1.5500623038443546,1.099533682614595,0.11176842272837058
|
||||
qPCR,3.3280031452205217,-1.4159013269658096,1.381044806858761,-0.24916862014792993,-0.3006771261087882
|
||||
High wind preemptive blackouts,3.345437196422008,1.755668732294854,-0.5434736138424321,0.9977744881234445,-0.045504593892214514
|
||||
Bedtime routine with kids,-2.113284175757168,-0.7438468828750903,0.34358979478985835,0.042894604618584714,-0.09661100773593338
|
||||
,1.6684928219466548,-2.925031499397659,1.2149590161195751,1.8583004922101665,0.3935728011625392
|
||||
,0.1697065248801878,-2.8845964745345136,-0.2520142437386387,-1.7266691163674939,-0.192579536041701
|
||||
Podcasting (as a social practice),0.6301278740259728,2.9004508039417787,1.506943207703196,-0.2134832905690586,-1.270415875142983
|
||||
,-2.5333436609034448,-0.23014641343346393,0.45755028487069754,0.2234512945951419,-0.7182650103638435
|
||||
Handshake ,1.926011439155331,0.22971403327999626,0.2425628294178404,-0.6366117258455155,-0.061588052431387784
|
||||
Andrew Huberman Sleep,-0.4725559291922061,0.6390105414368428,-1.8477610800926425,-0.7027864432997081,2.2583877202213753
|
||||
EthBoulder,-1.2258347815235313,0.3931371891416192,-0.6594652416236664,-0.25601100793840736,-2.152771816138116
|
||||
Network Assembly Protocol,-0.9570334821263692,-1.8037612155594873,0.0205345301902144,-1.0960605167080315,-0.03220385184943947
|
||||
WeChat payment for food,-0.30860506961859563,-0.7339938397967881,0.5112268223273864,0.6682622684172538,-0.30852994702675596
|
||||
Dating Apps,2.4960143033316866,-0.4181699063298779,-1.7943769563809333,1.2794292927161384,-0.4360952696965781
|
||||
On Protocols: Creating Habitat,-0.17100018880639825,0.2108840661045254,-0.05905001066537486,0.6037063838513959,0.22752458272747156
|
||||
We* Are Agentic,-0.6952035771256612,0.7104795593939374,1.089718954107896,1.827654718031263,0.20906331961802258
|
||||
The gift,-2.7852520797956495,-0.2016712358040527,-0.6206806586931916,0.6739566805269906,0.5292790397490437
|
||||
Claude Agent SDK ,-1.3400528339919038,0.6686848601799962,-0.2366275460406549,0.226626699488372,0.20280777532151678
|
||||
,1.4405988154132305,0.8125779015692758,-2.38769607341456,-0.4233338356196969,0.022200557406811417
|
||||
Native protocol,0.5352316868943041,2.4169278956977718,1.4554647379653443,-1.097370472494492,0.9648185077920054
|
||||
Free-range kids,0.2093851629499854,0.44236842770036006,2.397593271877779,-0.7258571894425137,0.5715925887777835
|
||||
Passing on a sidewalk,-2.1023836322925074,0.23997996810624364,-0.24055783848244944,1.0958089885549034,0.29135042892252266
|
||||
Academic job talks,1.3993794480239108,-0.7918540213694594,-1.3691153478937386,-1.4051428616239625,-0.43880196443803776
|
||||
Magic Mountain Talks,-2.627077572218502,-0.08993478412279489,-0.13951944432060934,-0.08758794337165507,-0.19645892460607187
|
||||
Book draft workshop,0.1074763980067324,-0.6629858667928419,1.0939398463132046,-0.29820839163981777,0.467533497314894
|
||||
Playdate orgabizing,-0.8710006919661164,0.9599703423945997,-0.837064075740649,-0.9903944556414733,-0.498860476749931
|
||||
|
@@ -0,0 +1,9 @@
|
||||
PC1,PC2,PC3,PC4,PC5
|
||||
-0.32745390852736345,-0.36210430818094036,-0.507363998518585,0.1026080175523677,0.22369112711402334
|
||||
-0.32768358226767524,0.5304577380028832,0.07576710258453992,0.21015189170819767,0.27156564198937766
|
||||
-0.3024493236577137,-0.3975612263316416,0.46806502435965947,0.05928498413886788,-0.40792870387667535
|
||||
0.3420542716156984,0.14296993434422195,0.5567731855063881,0.3521536503592922,0.09419658391201094
|
||||
0.4221394240406628,-0.45128656511370585,-0.06314038980874659,0.07964923826008329,-0.18928175477315246
|
||||
-0.4062053830065643,0.09913862535409002,0.22937081310114052,-0.597447468574366,-0.27965995938767163
|
||||
-0.40309712179561086,0.0027927586911567492,-0.0776675155967641,0.6739299829305275,-0.37512869312485475
|
||||
-0.26688741723435583,-0.44215822619354617,0.38095925023365085,0.017657111475222143,0.6679646292236432
|
||||
|
@@ -0,0 +1,21 @@
|
||||
Dimension1,Dimension2,Correlation
|
||||
Design_institutional_vs_vernacular,Entanglement_self-enforcing_vs_enforced,-0.7085151801637848
|
||||
Design_precise_vs_interpretive,Entanglement_sovereign_vs_subsidiary,-0.6415638337903136
|
||||
Design_static_vs_malleable,Experience_predictable_vs_emergent,0.5767763224995508
|
||||
Entanglement_self-enforcing_vs_enforced,Entanglement_obligatory_vs_voluntary,-0.5477529075664381
|
||||
Design_precise_vs_interpretive,Entanglement_flocking_vs_swarming,0.41442280980679086
|
||||
Entanglement_self-enforcing_vs_enforced,Entanglement_flocking_vs_swarming,-0.3960558569111922
|
||||
Design_static_vs_malleable,Entanglement_obligatory_vs_voluntary,0.38505357601444185
|
||||
Design_institutional_vs_vernacular,Entanglement_flocking_vs_swarming,0.37943269092151793
|
||||
Design_static_vs_malleable,Entanglement_flocking_vs_swarming,0.3493656041325956
|
||||
Entanglement_sovereign_vs_subsidiary,Entanglement_obligatory_vs_voluntary,-0.32302247713396914
|
||||
Design_institutional_vs_vernacular,Entanglement_obligatory_vs_voluntary,0.3182010621936024
|
||||
Design_precise_vs_interpretive,Experience_predictable_vs_emergent,0.3063603356998134
|
||||
Entanglement_sovereign_vs_subsidiary,Entanglement_self-enforcing_vs_enforced,0.26060569513088677
|
||||
Entanglement_sovereign_vs_subsidiary,Entanglement_flocking_vs_swarming,-0.24303539751564743
|
||||
Entanglement_obligatory_vs_voluntary,Experience_predictable_vs_emergent,0.23908108342634116
|
||||
Entanglement_obligatory_vs_voluntary,Entanglement_flocking_vs_swarming,0.1777518623883244
|
||||
Entanglement_flocking_vs_swarming,Experience_predictable_vs_emergent,0.16286409069245295
|
||||
Design_precise_vs_interpretive,Design_static_vs_malleable,0.15918490238688207
|
||||
Design_precise_vs_interpretive,Entanglement_obligatory_vs_voluntary,0.1204174037362573
|
||||
Design_institutional_vs_vernacular,Entanglement_sovereign_vs_subsidiary,-0.08731465382649602
|
||||
|
|
After Width: | Height: | Size: 177 KiB |
|
After Width: | Height: | Size: 255 KiB |
|
After Width: | Height: | Size: 124 KiB |
|
After Width: | Height: | Size: 399 KiB |
|
After Width: | Height: | Size: 193 KiB |
|
After Width: | Height: | Size: 323 KiB |
|
After Width: | Height: | Size: 208 KiB |
|
After Width: | Height: | Size: 258 KiB |
BIN
analysis/data/readings/manual_20260320/analysis/plots/pca_2d.png
Normal file
|
After Width: | Height: | Size: 208 KiB |
|
After Width: | Height: | Size: 200 KiB |
|
After Width: | Height: | Size: 196 KiB |
@@ -0,0 +1,41 @@
|
||||
================================================================================
|
||||
MULTIVARIATE ANALYSIS SUMMARY REPORT
|
||||
Protocol Bicorder Dataset
|
||||
================================================================================
|
||||
|
||||
Dataset: data/readings/manual_20260320/readings.csv
|
||||
Number of protocols: 27
|
||||
Number of dimensions: 8
|
||||
- Design: 3
|
||||
- Entanglement: 4
|
||||
- Experience: 1
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
ANALYSES PERFORMED
|
||||
--------------------------------------------------------------------------------
|
||||
K-Means: 2 clusters identified
|
||||
Hierarchical: 5 clusters
|
||||
DBSCAN: 2 outlier protocols identified
|
||||
|
||||
Dimensionality Reduction:
|
||||
- Principal Component Analysis (PCA)
|
||||
- t-SNE Projection
|
||||
- Factor Analysis
|
||||
|
||||
Statistical Analyses:
|
||||
- Correlation Analysis
|
||||
- Network Analysis
|
||||
- Feature Importance Analysis
|
||||
- Analyst Comparison
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
OUTPUT FILES
|
||||
--------------------------------------------------------------------------------
|
||||
All results saved to: data/readings/manual_20260320/analysis/
|
||||
- plots/ : All visualizations (PNG)
|
||||
- data/ : All numerical results (CSV)
|
||||
- reports/ : This summary report
|
||||
|
||||
================================================================================
|
||||
END OF REPORT
|
||||
================================================================================
|
||||
@@ -0,0 +1,274 @@
|
||||
{
|
||||
"name": "Protocol Bicorder",
|
||||
"schema": "bicorder.schema.json",
|
||||
"version": "1.1.0",
|
||||
"description": "A diagnostic tool for the study of protocols",
|
||||
"author": "Nathan Schneider",
|
||||
"date_modified": "2025-11-21",
|
||||
"metadata": {
|
||||
"protocol": "Coffee shop as office",
|
||||
"analyst": "ntnsndr",
|
||||
"standpoint": "A person using a coffee shop as an office",
|
||||
"timestamp": "2025-11-25T18:07:21.486Z",
|
||||
"shortform": true
|
||||
},
|
||||
"diagnostic": [
|
||||
{
|
||||
"set_name": "Design",
|
||||
"set_description": "How the protocol is created and remembered",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "explicit",
|
||||
"term_left_description": "The design is stated explicitly somewhere that is accessible to participants",
|
||||
"term_right": "implicit",
|
||||
"term_right_description": "The design is not stated explicitly but is learned by participants in another way",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "precise",
|
||||
"term_left_description": "The design is specified with a high level of precision that eliminates ambiguity in implementation",
|
||||
"term_right": "interpretive",
|
||||
"term_right_description": "The design is ambiguous, allowing participants a wide range of interpretation",
|
||||
"value": 7,
|
||||
"notes": "Some shops have specified rules for officing, but not this one.",
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "institutional",
|
||||
"term_left_description": "Design occurs through processes that involve powerful institutions and widespread recognition as normative",
|
||||
"term_right": "vernacular",
|
||||
"term_right_description": "Design occurs through evolving, peer-to-peer community interactions in order to suit participant-defined goals",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "documenting",
|
||||
"term_left_description": "The primary purpose is to document or validate activity that is occurring",
|
||||
"term_right": "enabling",
|
||||
"term_right_description": "The primary purpose is to enable activity that might not happen otherwise",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "static",
|
||||
"term_left_description": "Designed to be as fixed and unchanging as possible",
|
||||
"term_right": "malleable",
|
||||
"term_right_description": "Designed to be changed by participants according to evolving needs",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "technical",
|
||||
"term_left_description": "Primarily concerned with interactions among technologies",
|
||||
"term_right": "social",
|
||||
"term_right_description": "Primarily concerned with interactions among people or groups",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "universal",
|
||||
"term_left_description": "Addressed to a global audience",
|
||||
"term_right": "particular",
|
||||
"term_right_description": "Addressed to a specific community",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "durable",
|
||||
"term_left_description": "Designed to be persistently available",
|
||||
"term_right": "ephemeral",
|
||||
"term_right_description": "Designed to vanish when no longer needed",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Entanglement",
|
||||
"set_description": "How the protocol relates with participant agents",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "macro",
|
||||
"term_left_description": "Operates at large scales involving many participants or broad scope",
|
||||
"term_right": "micro",
|
||||
"term_right_description": "Operates at small scales with few participants or narrow scope",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "sovereign",
|
||||
"term_left_description": "A distinctive operating logic, not subject to any other entity",
|
||||
"term_right": "subsidiary",
|
||||
"term_right_description": "An operating logic under the control of a particular entity",
|
||||
"value": 4,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "self-enforcing",
|
||||
"term_left_description": "Rules are automatically enforced through its own mechanisms",
|
||||
"term_right": "enforced",
|
||||
"term_right_description": "Rules require external enforcement by authorities or institutions",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "abstract",
|
||||
"term_left_description": "Participants learn the protocol by studying it intellectually",
|
||||
"term_right": "embodied",
|
||||
"term_right_description": "Participants learn the protocol by physically practicing it",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "obligatory",
|
||||
"term_left_description": "Participation is compulsory for a certain class of agents",
|
||||
"term_right": "voluntary",
|
||||
"term_right_description": "Participation in the protocol is optional and not coerced",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "flocking",
|
||||
"term_left_description": "Coordination occurs through centralized direction or direct mimicry",
|
||||
"term_right": "swarming",
|
||||
"term_right_description": "Coordination occurs through distributed interactions without central direction",
|
||||
"value": 4,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "defensible",
|
||||
"term_left_description": "Strong boundaries and protections against external influence",
|
||||
"term_right": "exposed",
|
||||
"term_right_description": "Weak boundaries and vulnerable to external influence",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "exclusive",
|
||||
"term_left_description": "Excludes the use of other protocols that might be available to adopt",
|
||||
"term_right": "non-exclusive",
|
||||
"term_right_description": "Does not exclude the use of any other protocols",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Experience",
|
||||
"set_description": "How the protocol is perceived in the context of its implementation",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "sufficient",
|
||||
"term_left_description": "Adequately meets the needs and goals of participants",
|
||||
"term_right": "insufficient",
|
||||
"term_right_description": "Does not, on its own, adequately meet the needs and goals of participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "crystallized",
|
||||
"term_left_description": "Content and meaning are settled and widely agreed upon",
|
||||
"term_right": "contested",
|
||||
"term_right_description": "Content and meaning are disputed or under debate",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "trust-evading",
|
||||
"term_left_description": "Minimizes the need for trust among participants",
|
||||
"term_right": "trust-inducing",
|
||||
"term_right_description": "Relies on or cultivates trust among participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "predictable",
|
||||
"term_left_description": "Produces expected and consistent outcomes",
|
||||
"term_right": "emergent",
|
||||
"term_right_description": "Produces unexpected or novel outcomes",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "exclusion",
|
||||
"term_left_description": "The protocol creates barriers or excludes certain participants",
|
||||
"term_right": "inclusion",
|
||||
"term_right_description": "The protocol reduces barriers and includes diverse participants",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "Kafka",
|
||||
"term_left_description": "Fosters experiences of absurd complexity, alienation, and powerlessness",
|
||||
"term_right": "Whitehead",
|
||||
"term_right_description": "Enables participants to carry out desired activities with less work or thought",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "dead",
|
||||
"term_left_description": "Not actively utilized by relevant participants",
|
||||
"term_right": "alive",
|
||||
"term_right_description": "Actively utilized by relevant participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"analysis": [
|
||||
{
|
||||
"term_left": "hardness",
|
||||
"term_left_description": "The protocol tends toward properties characterized by hardness",
|
||||
"term_right": "softness",
|
||||
"term_right_description": "The protocol tends toward properties characterized by softness",
|
||||
"instructions": "Take all the 'value' fields in the gradients above and determine a mean. Round it to the nearest integer. That is the 'value' here.",
|
||||
"automated": true,
|
||||
"value": 5,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "polarized",
|
||||
"term_left_description": "The analyst tended toward more extreme high or low readings",
|
||||
"term_right": "centrist",
|
||||
"term_right_description": "The analyst tended toward readings at the middle of the gradients",
|
||||
"instructions": "Take all the 'value' fields in the gradients above. Assess their degree of polarization. For instance, if all the values are either 1 or 9, the output would be 1, and if all of them are 5, the output would be 9.",
|
||||
"automated": true,
|
||||
"value": 5,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "not useful",
|
||||
"term_left_description": "The bicorder was not useful or relevant for analyzing this protocol",
|
||||
"term_right": "very useful",
|
||||
"term_right_description": "The bicorder was very useful and relevant for analyzing this protocol",
|
||||
"instructions": "Evaluate the usefulness of this bicorder as a tool for analyzing this protocol, considering whether the gradient terms seemed revealing or irrelevant.",
|
||||
"automated": false,
|
||||
"value": 6,
|
||||
"notes": null
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -0,0 +1,274 @@
|
||||
{
|
||||
"name": "Protocol Bicorder",
|
||||
"schema": "bicorder.schema.json",
|
||||
"version": "1.2.1",
|
||||
"description": "A diagnostic tool for the study of protocols",
|
||||
"author": "Nathan Schneider",
|
||||
"date_modified": "2025-12-02",
|
||||
"metadata": {
|
||||
"protocol": "Street crossing in Buenos Aires",
|
||||
"analyst": "Venkat",
|
||||
"standpoint": "Tourist",
|
||||
"timestamp": "2025-12-03T17:16:54.751Z",
|
||||
"shortform": false
|
||||
},
|
||||
"diagnostic": [
|
||||
{
|
||||
"set_name": "Design",
|
||||
"set_description": "How the protocol is created and remembered",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "explicit",
|
||||
"term_left_description": "The design is stated explicitly somewhere that is accessible to participants",
|
||||
"term_right": "implicit",
|
||||
"term_right_description": "The design is not stated explicitly but is learned by participants in another way",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "precise",
|
||||
"term_left_description": "The design is specified with a high level of precision that eliminates ambiguity in implementation",
|
||||
"term_right": "interpretive",
|
||||
"term_right_description": "The design is ambiguous, allowing participants a wide range of interpretation",
|
||||
"value": 6,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "institutional",
|
||||
"term_left_description": "Design occurs through processes that involve powerful institutions and widespread recognition as normative",
|
||||
"term_right": "vernacular",
|
||||
"term_right_description": "Design occurs through evolving, peer-to-peer community interactions in order to suit participant-defined goals",
|
||||
"value": 6,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "documenting",
|
||||
"term_left_description": "The primary purpose is to document or validate activity that is occurring",
|
||||
"term_right": "enabling",
|
||||
"term_right_description": "The primary purpose is to enable activity that might not happen otherwise",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "static",
|
||||
"term_left_description": "Designed to be as fixed and unchanging as possible",
|
||||
"term_right": "malleable",
|
||||
"term_right_description": "Designed to be changed by participants according to evolving needs",
|
||||
"value": 6,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "technical",
|
||||
"term_left_description": "Primarily concerned with interactions among technologies",
|
||||
"term_right": "social",
|
||||
"term_right_description": "Primarily concerned with interactions among people or groups",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "universal",
|
||||
"term_left_description": "Addressed to a global audience",
|
||||
"term_right": "particular",
|
||||
"term_right_description": "Addressed to a specific community",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "durable",
|
||||
"term_left_description": "Designed to be persistently available",
|
||||
"term_right": "ephemeral",
|
||||
"term_right_description": "Designed to vanish when no longer needed",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Entanglement",
|
||||
"set_description": "How the protocol relates with participant agents",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "macro",
|
||||
"term_left_description": "Operates at large scales involving many participants or broad scope",
|
||||
"term_right": "micro",
|
||||
"term_right_description": "Operates at small scales with few participants or narrow scope",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "sovereign",
|
||||
"term_left_description": "A distinctive operating logic, not subject to any other entity",
|
||||
"term_right": "subsidiary",
|
||||
"term_right_description": "An operating logic under the control of a particular entity",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "self-enforcing",
|
||||
"term_left_description": "Rules are automatically enforced through its own mechanisms",
|
||||
"term_right": "enforced",
|
||||
"term_right_description": "Rules require external enforcement by authorities or institutions",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "abstract",
|
||||
"term_left_description": "Participants learn the protocol by studying it intellectually",
|
||||
"term_right": "embodied",
|
||||
"term_right_description": "Participants learn the protocol by physically practicing it",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "obligatory",
|
||||
"term_left_description": "Participation is compulsory for a certain class of agents",
|
||||
"term_right": "voluntary",
|
||||
"term_right_description": "Participation in the protocol is optional and not coerced",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "flocking",
|
||||
"term_left_description": "Coordination occurs through centralized direction or direct mimicry",
|
||||
"term_right": "swarming",
|
||||
"term_right_description": "Coordination occurs through distributed interactions without central direction",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "defensible",
|
||||
"term_left_description": "Strong boundaries and protections against external influence",
|
||||
"term_right": "exposed",
|
||||
"term_right_description": "Weak boundaries and vulnerable to external influence",
|
||||
"value": 5,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "monopolistic",
|
||||
"term_left_description": "Excludes the use of other protocols that might be available to adopt",
|
||||
"term_right": "pluralistic",
|
||||
"term_right_description": "Interoperates with other protocols and does not exclude their use",
|
||||
"value": 6,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Experience",
|
||||
"set_description": "How the protocol is perceived in the context of its implementation",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "sufficient",
|
||||
"term_left_description": "Adequately meets the needs and goals of participants",
|
||||
"term_right": "insufficient",
|
||||
"term_right_description": "Does not, on its own, adequately meet the needs and goals of participants",
|
||||
"value": 4,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "crystallized",
|
||||
"term_left_description": "Content and meaning are settled and widely agreed upon",
|
||||
"term_right": "contested",
|
||||
"term_right_description": "Content and meaning are disputed or under debate",
|
||||
"value": 6,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "trust-evading",
|
||||
"term_left_description": "Minimizes the need for trust among participants",
|
||||
"term_right": "trust-inducing",
|
||||
"term_right_description": "Relies on or cultivates trust among participants",
|
||||
"value": 6,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "predictable",
|
||||
"term_left_description": "Produces expected and consistent outcomes",
|
||||
"term_right": "emergent",
|
||||
"term_right_description": "Produces unexpected or novel outcomes",
|
||||
"value": 6,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "exclusion",
|
||||
"term_left_description": "The protocol creates barriers or excludes certain participants",
|
||||
"term_right": "inclusion",
|
||||
"term_right_description": "The protocol reduces barriers and includes diverse participants",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "Kafka",
|
||||
"term_left_description": "Fosters experiences of absurd complexity, alienation, and powerlessness",
|
||||
"term_right": "Whitehead",
|
||||
"term_right_description": "Enables participants to carry out desired activities with less work or thought",
|
||||
"value": 4,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "dead",
|
||||
"term_left_description": "Not actively utilized by relevant participants",
|
||||
"term_right": "alive",
|
||||
"term_right_description": "Actively utilized by relevant participants",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"analysis": [
|
||||
{
|
||||
"term_left": "hardness",
|
||||
"term_left_description": "The protocol tends toward properties characterized by hardness",
|
||||
"term_right": "softness",
|
||||
"term_right_description": "The protocol tends toward properties characterized by softness",
|
||||
"instructions": "Take all the 'value' fields in the gradients above and determine a mean. Round it to the nearest integer. That is the 'value' here.",
|
||||
"automated": true,
|
||||
"value": 6,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "polarized",
|
||||
"term_left_description": "The analyst tended toward more extreme high or low readings",
|
||||
"term_right": "centrist",
|
||||
"term_right_description": "The analyst tended toward readings at the middle of the gradients",
|
||||
"instructions": "Take all the 'value' fields in the gradients above. Assess their degree of polarization. For instance, if all the values are either 1 or 9, the output would be 1, and if all of them are 5, the output would be 9.",
|
||||
"automated": true,
|
||||
"value": 5,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "not useful",
|
||||
"term_left_description": "The bicorder was not useful or relevant for analyzing this protocol",
|
||||
"term_right": "very useful",
|
||||
"term_right_description": "The bicorder was very useful and relevant for analyzing this protocol",
|
||||
"instructions": "Evaluate the usefulness of this bicorder as a tool for analyzing this protocol, considering whether the gradient terms seemed revealing or irrelevant.",
|
||||
"automated": false,
|
||||
"value": 7,
|
||||
"notes": null
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -0,0 +1,274 @@
|
||||
{
|
||||
"name": "Protocol Bicorder",
|
||||
"schema": "bicorder.schema.json",
|
||||
"version": "1.2.1",
|
||||
"description": "A diagnostic tool for the study of protocols",
|
||||
"author": "Nathan Schneider",
|
||||
"date_modified": "2025-12-02",
|
||||
"metadata": {
|
||||
"protocol": "qPCR",
|
||||
"analyst": "Fotis Tsiroukis",
|
||||
"standpoint": "Ethnography of Scientific Practice",
|
||||
"timestamp": "2025-12-12T00:00:47.807Z",
|
||||
"shortform": false
|
||||
},
|
||||
"diagnostic": [
|
||||
{
|
||||
"set_name": "Design",
|
||||
"set_description": "How the protocol is created and remembered",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "explicit",
|
||||
"term_left_description": "The design is stated explicitly somewhere that is accessible to participants",
|
||||
"term_right": "implicit",
|
||||
"term_right_description": "The design is not stated explicitly but is learned by participants in another way",
|
||||
"value": 4,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "precise",
|
||||
"term_left_description": "The design is specified with a high level of precision that eliminates ambiguity in implementation",
|
||||
"term_right": "interpretive",
|
||||
"term_right_description": "The design is ambiguous, allowing participants a wide range of interpretation",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "institutional",
|
||||
"term_left_description": "Design occurs through processes that involve powerful institutions and widespread recognition as normative",
|
||||
"term_right": "vernacular",
|
||||
"term_right_description": "Design occurs through evolving, peer-to-peer community interactions in order to suit participant-defined goals",
|
||||
"value": 6,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "documenting",
|
||||
"term_left_description": "The primary purpose is to document or validate activity that is occurring",
|
||||
"term_right": "enabling",
|
||||
"term_right_description": "The primary purpose is to enable activity that might not happen otherwise",
|
||||
"value": 6,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "static",
|
||||
"term_left_description": "Designed to be as fixed and unchanging as possible",
|
||||
"term_right": "malleable",
|
||||
"term_right_description": "Designed to be changed by participants according to evolving needs",
|
||||
"value": 4,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "technical",
|
||||
"term_left_description": "Primarily concerned with interactions among technologies",
|
||||
"term_right": "social",
|
||||
"term_right_description": "Primarily concerned with interactions among people or groups",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "universal",
|
||||
"term_left_description": "Addressed to a global audience",
|
||||
"term_right": "particular",
|
||||
"term_right_description": "Addressed to a specific community",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "durable",
|
||||
"term_left_description": "Designed to be persistently available",
|
||||
"term_right": "ephemeral",
|
||||
"term_right_description": "Designed to vanish when no longer needed",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Entanglement",
|
||||
"set_description": "How the protocol relates with participant agents",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "macro",
|
||||
"term_left_description": "Operates at large scales involving many participants or broad scope",
|
||||
"term_right": "micro",
|
||||
"term_right_description": "Operates at small scales with few participants or narrow scope",
|
||||
"value": 5,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "sovereign",
|
||||
"term_left_description": "A distinctive operating logic, not subject to any other entity",
|
||||
"term_right": "subsidiary",
|
||||
"term_right_description": "An operating logic under the control of a particular entity",
|
||||
"value": 4,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "self-enforcing",
|
||||
"term_left_description": "Rules are automatically enforced through its own mechanisms",
|
||||
"term_right": "enforced",
|
||||
"term_right_description": "Rules require external enforcement by authorities or institutions",
|
||||
"value": 4,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "abstract",
|
||||
"term_left_description": "Participants learn the protocol by studying it intellectually",
|
||||
"term_right": "embodied",
|
||||
"term_right_description": "Participants learn the protocol by physically practicing it",
|
||||
"value": 5,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "obligatory",
|
||||
"term_left_description": "Participation is compulsory for a certain class of agents",
|
||||
"term_right": "voluntary",
|
||||
"term_right_description": "Participation in the protocol is optional and not coerced",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "flocking",
|
||||
"term_left_description": "Coordination occurs through centralized direction or direct mimicry",
|
||||
"term_right": "swarming",
|
||||
"term_right_description": "Coordination occurs through distributed interactions without central direction",
|
||||
"value": 6,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "defensible",
|
||||
"term_left_description": "Strong boundaries and protections against external influence",
|
||||
"term_right": "exposed",
|
||||
"term_right_description": "Weak boundaries and vulnerable to external influence",
|
||||
"value": 4,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "monopolistic",
|
||||
"term_left_description": "Excludes the use of other protocols that might be available to adopt",
|
||||
"term_right": "pluralistic",
|
||||
"term_right_description": "Interoperates with other protocols and does not exclude their use",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Experience",
|
||||
"set_description": "How the protocol is perceived in the context of its implementation",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "sufficient",
|
||||
"term_left_description": "Adequately meets the needs and goals of participants",
|
||||
"term_right": "insufficient",
|
||||
"term_right_description": "Does not, on its own, adequately meet the needs and goals of participants",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "crystallized",
|
||||
"term_left_description": "Content and meaning are settled and widely agreed upon",
|
||||
"term_right": "contested",
|
||||
"term_right_description": "Content and meaning are disputed or under debate",
|
||||
"value": 4,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "trust-evading",
|
||||
"term_left_description": "Minimizes the need for trust among participants",
|
||||
"term_right": "trust-inducing",
|
||||
"term_right_description": "Relies on or cultivates trust among participants",
|
||||
"value": 5,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "predictable",
|
||||
"term_left_description": "Produces expected and consistent outcomes",
|
||||
"term_right": "emergent",
|
||||
"term_right_description": "Produces unexpected or novel outcomes",
|
||||
"value": 4,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "exclusion",
|
||||
"term_left_description": "The protocol creates barriers or excludes certain participants",
|
||||
"term_right": "inclusion",
|
||||
"term_right_description": "The protocol reduces barriers and includes diverse participants",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "Kafka",
|
||||
"term_left_description": "Fosters experiences of absurd complexity, alienation, and powerlessness",
|
||||
"term_right": "Whitehead",
|
||||
"term_right_description": "Enables participants to carry out desired activities with less work or thought",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "dead",
|
||||
"term_left_description": "Not actively utilized by relevant participants",
|
||||
"term_right": "alive",
|
||||
"term_right_description": "Actively utilized by relevant participants",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"analysis": [
|
||||
{
|
||||
"term_left": "hardness",
|
||||
"term_left_description": "The protocol tends toward properties characterized by hardness",
|
||||
"term_right": "softness",
|
||||
"term_right_description": "The protocol tends toward properties characterized by softness",
|
||||
"instructions": "Take all the 'value' fields in the gradients above and determine a mean. Round it to the nearest integer. That is the 'value' here.",
|
||||
"automated": true,
|
||||
"value": 5,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "polarized",
|
||||
"term_left_description": "The analyst tended toward more extreme high or low readings",
|
||||
"term_right": "centrist",
|
||||
"term_right_description": "The analyst tended toward readings at the middle of the gradients",
|
||||
"instructions": "Take all the 'value' fields in the gradients above. Assess their degree of polarization. For instance, if all the values are either 1 or 9, the output would be 1, and if all of them are 5, the output would be 9.",
|
||||
"automated": true,
|
||||
"value": 6,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "not useful",
|
||||
"term_left_description": "The bicorder was not useful or relevant for analyzing this protocol",
|
||||
"term_right": "very useful",
|
||||
"term_right_description": "The bicorder was very useful and relevant for analyzing this protocol",
|
||||
"instructions": "Evaluate the usefulness of this bicorder as a tool for analyzing this protocol, considering whether the gradient terms seemed revealing or irrelevant.",
|
||||
"automated": false,
|
||||
"value": 4,
|
||||
"notes": null
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -0,0 +1,274 @@
|
||||
{
|
||||
"name": "Protocol Bicorder",
|
||||
"schema": "bicorder.schema.json",
|
||||
"version": "1.2.1",
|
||||
"description": "A diagnostic tool for the study of protocols",
|
||||
"author": "Nathan Schneider",
|
||||
"date_modified": "2025-12-02",
|
||||
"metadata": {
|
||||
"protocol": "High wind preemptive blackouts",
|
||||
"analyst": "ntnsndr",
|
||||
"standpoint": "Power consumer who lost power at office and home during high winds",
|
||||
"timestamp": "2025-12-18T12:21:09.551Z",
|
||||
"shortform": false
|
||||
},
|
||||
"diagnostic": [
|
||||
{
|
||||
"set_name": "Design",
|
||||
"set_description": "How the protocol is created and remembered",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "explicit",
|
||||
"term_left_description": "The design is stated explicitly somewhere that is accessible to participants",
|
||||
"term_right": "implicit",
|
||||
"term_right_description": "The design is not stated explicitly but is learned by participants in another way",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "precise",
|
||||
"term_left_description": "The design is specified with a high level of precision that eliminates ambiguity in implementation",
|
||||
"term_right": "interpretive",
|
||||
"term_right_description": "The design is ambiguous, allowing participants a wide range of interpretation",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "institutional",
|
||||
"term_left_description": "Design occurs through processes that involve powerful institutions and widespread recognition as normative",
|
||||
"term_right": "vernacular",
|
||||
"term_right_description": "Design occurs through evolving, peer-to-peer community interactions in order to suit participant-defined goals",
|
||||
"value": 1,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "documenting",
|
||||
"term_left_description": "The primary purpose is to document or validate activity that is occurring",
|
||||
"term_right": "enabling",
|
||||
"term_right_description": "The primary purpose is to enable activity that might not happen otherwise",
|
||||
"value": 6,
|
||||
"notes": "Enables safety but also serves the purpose of documenting power company non-liability for fires.",
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "static",
|
||||
"term_left_description": "Designed to be as fixed and unchanging as possible",
|
||||
"term_right": "malleable",
|
||||
"term_right_description": "Designed to be changed by participants according to evolving needs",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "technical",
|
||||
"term_left_description": "Primarily concerned with interactions among technologies",
|
||||
"term_right": "social",
|
||||
"term_right_description": "Primarily concerned with interactions among people or groups",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "universal",
|
||||
"term_left_description": "Addressed to a global audience",
|
||||
"term_right": "particular",
|
||||
"term_right_description": "Addressed to a specific community",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "durable",
|
||||
"term_left_description": "Designed to be persistently available",
|
||||
"term_right": "ephemeral",
|
||||
"term_right_description": "Designed to vanish when no longer needed",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Entanglement",
|
||||
"set_description": "How the protocol relates with participant agents",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "macro",
|
||||
"term_left_description": "Operates at large scales involving many participants or broad scope",
|
||||
"term_right": "micro",
|
||||
"term_right_description": "Operates at small scales with few participants or narrow scope",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "sovereign",
|
||||
"term_left_description": "A distinctive operating logic, not subject to any other entity",
|
||||
"term_right": "subsidiary",
|
||||
"term_right_description": "An operating logic under the control of a particular entity",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "self-enforcing",
|
||||
"term_left_description": "Rules are automatically enforced through its own mechanisms",
|
||||
"term_right": "enforced",
|
||||
"term_right_description": "Rules require external enforcement by authorities or institutions",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "abstract",
|
||||
"term_left_description": "Participants learn the protocol by studying it intellectually",
|
||||
"term_right": "embodied",
|
||||
"term_right_description": "Participants learn the protocol by physically practicing it",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "obligatory",
|
||||
"term_left_description": "Participation is compulsory for a certain class of agents",
|
||||
"term_right": "voluntary",
|
||||
"term_right_description": "Participation in the protocol is optional and not coerced",
|
||||
"value": 3,
|
||||
"notes": "Voluntary for power company, obligatory for everyone else",
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "flocking",
|
||||
"term_left_description": "Coordination occurs through centralized direction or direct mimicry",
|
||||
"term_right": "swarming",
|
||||
"term_right_description": "Coordination occurs through distributed interactions without central direction",
|
||||
"value": 1,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "defensible",
|
||||
"term_left_description": "Strong boundaries and protections against external influence",
|
||||
"term_right": "exposed",
|
||||
"term_right_description": "Weak boundaries and vulnerable to external influence",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "monopolistic",
|
||||
"term_left_description": "Excludes the use of other protocols that might be available to adopt",
|
||||
"term_right": "pluralistic",
|
||||
"term_right_description": "Interoperates with other protocols and does not exclude their use",
|
||||
"value": 1,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Experience",
|
||||
"set_description": "How the protocol is perceived in the context of its implementation",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "sufficient",
|
||||
"term_left_description": "Adequately meets the needs and goals of participants",
|
||||
"term_right": "insufficient",
|
||||
"term_right_description": "Does not, on its own, adequately meet the needs and goals of participants",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "crystallized",
|
||||
"term_left_description": "Content and meaning are settled and widely agreed upon",
|
||||
"term_right": "contested",
|
||||
"term_right_description": "Content and meaning are disputed or under debate",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "trust-evading",
|
||||
"term_left_description": "Minimizes the need for trust among participants",
|
||||
"term_right": "trust-inducing",
|
||||
"term_right_description": "Relies on or cultivates trust among participants",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "predictable",
|
||||
"term_left_description": "Produces expected and consistent outcomes",
|
||||
"term_right": "emergent",
|
||||
"term_right_description": "Produces unexpected or novel outcomes",
|
||||
"value": 6,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "exclusion",
|
||||
"term_left_description": "The protocol creates barriers or excludes certain participants",
|
||||
"term_right": "inclusion",
|
||||
"term_right_description": "The protocol reduces barriers and includes diverse participants",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "Kafka",
|
||||
"term_left_description": "Fosters experiences of absurd complexity, alienation, and powerlessness",
|
||||
"term_right": "Whitehead",
|
||||
"term_right_description": "Enables participants to carry out desired activities with less work or thought",
|
||||
"value": 5,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "dead",
|
||||
"term_left_description": "Not actively utilized by relevant participants",
|
||||
"term_right": "alive",
|
||||
"term_right_description": "Actively utilized by relevant participants",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"analysis": [
|
||||
{
|
||||
"term_left": "hardness",
|
||||
"term_left_description": "The protocol tends toward properties characterized by hardness",
|
||||
"term_right": "softness",
|
||||
"term_right_description": "The protocol tends toward properties characterized by softness",
|
||||
"instructions": "Take all the 'value' fields in the gradients above and determine a mean. Round it to the nearest integer. That is the 'value' here.",
|
||||
"automated": true,
|
||||
"value": 5,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "polarized",
|
||||
"term_left_description": "The analyst tended toward more extreme high or low readings",
|
||||
"term_right": "centrist",
|
||||
"term_right_description": "The analyst tended toward readings at the middle of the gradients",
|
||||
"instructions": "Take all the 'value' fields in the gradients above. Assess their degree of polarization. For instance, if all the values are either 1 or 9, the output would be 1, and if all of them are 5, the output would be 9.",
|
||||
"automated": true,
|
||||
"value": 4,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "not useful",
|
||||
"term_left_description": "The bicorder was not useful or relevant for analyzing this protocol",
|
||||
"term_right": "very useful",
|
||||
"term_right_description": "The bicorder was very useful and relevant for analyzing this protocol",
|
||||
"instructions": "Evaluate the usefulness of this bicorder as a tool for analyzing this protocol, considering whether the gradient terms seemed revealing or irrelevant.",
|
||||
"automated": false,
|
||||
"value": 5,
|
||||
"notes": null
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -0,0 +1,285 @@
|
||||
{
|
||||
"name": "Protocol Bicorder",
|
||||
"schema": "bicorder.schema.json",
|
||||
"version": "1.2.3",
|
||||
"description": "A diagnostic tool for the study of protocols",
|
||||
"author": "Nathan Schneider",
|
||||
"date_modified": "2025-12-02",
|
||||
"metadata": {
|
||||
"protocol": "Bedtime routine with kids",
|
||||
"description": "On example of this phenomenonamong many",
|
||||
"analyst": "ntnsndr",
|
||||
"standpoint": "Parental participant",
|
||||
"timestamp": "2026-01-05T04:30:04.916Z",
|
||||
"shortform": false
|
||||
},
|
||||
"diagnostic": [
|
||||
{
|
||||
"set_name": "Design",
|
||||
"set_description": "How the protocol is created and remembered",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "explicit",
|
||||
"term_left_description": "The design is stated explicitly somewhere that is accessible to participants",
|
||||
"term_right": "implicit",
|
||||
"term_right_description": "The design is not stated explicitly but is learned by participants in another way",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "precise",
|
||||
"term_left_description": "The design is specified with a high level of precision that eliminates ambiguity in implementation",
|
||||
"term_right": "interpretive",
|
||||
"term_right_description": "The design is ambiguous, allowing participants a wide range of interpretation",
|
||||
"value": 4,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "institutional",
|
||||
"term_left_description": "Design occurs through processes that involve powerful institutions and widespread recognition as normative",
|
||||
"term_right": "vernacular",
|
||||
"term_right_description": "Design occurs through evolving, peer-to-peer community interactions in order to suit participant-defined goals",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "documenting",
|
||||
"term_left_description": "The primary purpose is to document or validate activity that is occurring",
|
||||
"term_right": "enabling",
|
||||
"term_right_description": "The primary purpose is to enable activity that might not happen otherwise",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "static",
|
||||
"term_left_description": "Designed to be as fixed and unchanging as possible",
|
||||
"term_right": "malleable",
|
||||
"term_right_description": "Designed to be changed by participants according to evolving needs",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "technical",
|
||||
"term_left_description": "Primarily concerned with interactions among technologies",
|
||||
"term_right": "social",
|
||||
"term_right_description": "Primarily concerned with interactions among people or groups",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "universal",
|
||||
"term_left_description": "Addressed to a global audience",
|
||||
"term_right": "particular",
|
||||
"term_right_description": "Addressed to a specific community",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "durable",
|
||||
"term_left_description": "Designed to be persistently available",
|
||||
"term_right": "ephemeral",
|
||||
"term_right_description": "Designed to vanish when no longer needed",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Entanglement",
|
||||
"set_description": "How the protocol relates with participant agents",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "macro",
|
||||
"term_left_description": "Operates at large scales involving many participants or broad scope",
|
||||
"term_right": "micro",
|
||||
"term_right_description": "Operates at small scales with few participants or narrow scope",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "sovereign",
|
||||
"term_left_description": "A distinctive operating logic, not subject to any other entity",
|
||||
"term_right": "subsidiary",
|
||||
"term_right_description": "An operating logic under the control of a particular entity",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "self-enforcing",
|
||||
"term_left_description": "Rules are automatically enforced through its own mechanisms",
|
||||
"term_right": "enforced",
|
||||
"term_right_description": "Rules require external enforcement by authorities or institutions",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "abstract",
|
||||
"term_left_description": "Participants learn the protocol by studying it intellectually",
|
||||
"term_right": "embodied",
|
||||
"term_right_description": "Participants learn the protocol by physically practicing it",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "obligatory",
|
||||
"term_left_description": "Participation is compulsory for a certain class of agents",
|
||||
"term_right": "voluntary",
|
||||
"term_right_description": "Participation in the protocol is optional and not coerced",
|
||||
"value": 1,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "flocking",
|
||||
"term_left_description": "Coordination occurs through centralized direction or direct mimicry",
|
||||
"term_right": "swarming",
|
||||
"term_right_description": "Coordination occurs through distributed interactions without central direction",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "defensible",
|
||||
"term_left_description": "Strong boundaries and protections against external influence",
|
||||
"term_right": "exposed",
|
||||
"term_right_description": "Weak boundaries and vulnerable to external influence",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "monopolistic",
|
||||
"term_left_description": "Excludes the use of other protocols that might be available to adopt",
|
||||
"term_right": "pluralistic",
|
||||
"term_right_description": "Interoperates with other protocols and does not exclude their use",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Experience",
|
||||
"set_description": "How the protocol is perceived in the context of its implementation",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "sufficient",
|
||||
"term_left_description": "Adequately meets the needs and goals of participants",
|
||||
"term_right": "limited",
|
||||
"term_right_description": "Does not, on its own, adequately meet the needs and goals of participants",
|
||||
"value": 1,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "crystallized",
|
||||
"term_left_description": "Content and meaning are settled and widely agreed upon",
|
||||
"term_right": "contested",
|
||||
"term_right_description": "Content and meaning are disputed or under debate",
|
||||
"value": 6,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "trust-evading",
|
||||
"term_left_description": "Minimizes the need for trust among participants",
|
||||
"term_right": "trust-inducing",
|
||||
"term_right_description": "Relies on or cultivates trust among participants",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "predictable",
|
||||
"term_left_description": "Produces expected and consistent outcomes",
|
||||
"term_right": "emergent",
|
||||
"term_right_description": "Produces unexpected or novel outcomes",
|
||||
"value": 1,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "exclusion",
|
||||
"term_left_description": "The protocol creates barriers or excludes certain participants",
|
||||
"term_right": "inclusion",
|
||||
"term_right_description": "The protocol reduces barriers and includes diverse participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "restraining",
|
||||
"term_left_description": "Fosters experiences of absurd complexity, alienation, and powerlessness",
|
||||
"term_right": "liberating",
|
||||
"term_right_description": "Enables participants to carry out desired activities with less work or thought",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "dead",
|
||||
"term_left_description": "Not actively utilized by relevant participants",
|
||||
"term_right": "alive",
|
||||
"term_right_description": "Actively utilized by relevant participants",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"analysis": [
|
||||
{
|
||||
"term_left": "hardness",
|
||||
"term_left_description": "The protocol tends toward properties characterized by hardness",
|
||||
"term_right": "softness",
|
||||
"term_right_description": "The protocol tends toward properties characterized by softness",
|
||||
"instructions": "Take all the 'value' fields in the gradients above and determine a mean. Round it to the nearest integer. That is the 'value' here.",
|
||||
"automated": true,
|
||||
"value": 6,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "polarized",
|
||||
"term_left_description": "The analyst tended toward more extreme high or low readings",
|
||||
"term_right": "centrist",
|
||||
"term_right_description": "The analyst tended toward readings at the middle of the gradients",
|
||||
"instructions": "Take all the 'value' fields in the gradients above. Assess their degree of polarization. For instance, if all the values are either 1 or 9, the output would be 1, and if all of them are 5, the output would be 9.",
|
||||
"automated": true,
|
||||
"value": 3,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "bureaucratic",
|
||||
"term_left_description": "The protocol exhibits institutional, formal, top-down characteristics with centralized control and external enforcement",
|
||||
"term_right": "relational",
|
||||
"term_right_description": "The protocol exhibits community-based, emergent, bottom-up characteristics with distributed coordination and voluntary participation",
|
||||
"instructions": "Based on the diagnostic readings, calculate the protocol's position using Linear Discriminant Analysis. The LDA score is scaled to the 1-9 range, where 1 represents strongly bureaucratic/institutional protocols and 9 represents strongly relational/cultural protocols. A score of 5 indicates a protocol near the boundary exhibiting characteristics of both families.",
|
||||
"automated": true,
|
||||
"value": 9,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "not useful",
|
||||
"term_left_description": "The bicorder was not useful or relevant for analyzing this protocol",
|
||||
"term_right": "very useful",
|
||||
"term_right_description": "The bicorder was very useful and relevant for analyzing this protocol",
|
||||
"instructions": "Evaluate the usefulness of this bicorder as a tool for analyzing this protocol, considering whether the gradient terms seemed revealing or irrelevant.",
|
||||
"automated": false,
|
||||
"value": 7,
|
||||
"notes": null
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -0,0 +1,285 @@
|
||||
{
|
||||
"name": "Protocol Bicorder",
|
||||
"schema": "bicorder.schema.json",
|
||||
"version": "1.2.3",
|
||||
"description": "A diagnostic tool for the study of protocols",
|
||||
"author": "Nathan Schneider",
|
||||
"date_modified": "2025-12-02",
|
||||
"metadata": {
|
||||
"protocol": "Quarantine of a sick family member",
|
||||
"description": null,
|
||||
"analyst": "ntnsndr",
|
||||
"standpoint": "Family member",
|
||||
"timestamp": "2026-01-06T04:37:20.251Z",
|
||||
"shortform": false
|
||||
},
|
||||
"diagnostic": [
|
||||
{
|
||||
"set_name": "Design",
|
||||
"set_description": "How the protocol is created and remembered",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "explicit",
|
||||
"term_left_description": "The design is stated explicitly somewhere that is accessible to participants",
|
||||
"term_right": "implicit",
|
||||
"term_right_description": "The design is not stated explicitly but is learned by participants in another way",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "precise",
|
||||
"term_left_description": "The design is specified with a high level of precision that eliminates ambiguity in implementation",
|
||||
"term_right": "interpretive",
|
||||
"term_right_description": "The design is ambiguous, allowing participants a wide range of interpretation",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "institutional",
|
||||
"term_left_description": "Design occurs through processes that involve powerful institutions and widespread recognition as normative",
|
||||
"term_right": "vernacular",
|
||||
"term_right_description": "Design occurs through evolving, peer-to-peer community interactions in order to suit participant-defined goals",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "documenting",
|
||||
"term_left_description": "The primary purpose is to document or validate activity that is occurring",
|
||||
"term_right": "enabling",
|
||||
"term_right_description": "The primary purpose is to enable activity that might not happen otherwise",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "static",
|
||||
"term_left_description": "Designed to be as fixed and unchanging as possible",
|
||||
"term_right": "malleable",
|
||||
"term_right_description": "Designed to be changed by participants according to evolving needs",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "technical",
|
||||
"term_left_description": "Primarily concerned with interactions among technologies",
|
||||
"term_right": "social",
|
||||
"term_right_description": "Primarily concerned with interactions among people or groups",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "universal",
|
||||
"term_left_description": "Addressed to a global audience",
|
||||
"term_right": "particular",
|
||||
"term_right_description": "Addressed to a specific community",
|
||||
"value": 5,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "durable",
|
||||
"term_left_description": "Designed to be persistently available",
|
||||
"term_right": "ephemeral",
|
||||
"term_right_description": "Designed to vanish when no longer needed",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Entanglement",
|
||||
"set_description": "How the protocol relates with participant agents",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "macro",
|
||||
"term_left_description": "Operates at large scales involving many participants or broad scope",
|
||||
"term_right": "micro",
|
||||
"term_right_description": "Operates at small scales with few participants or narrow scope",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "sovereign",
|
||||
"term_left_description": "A distinctive operating logic, not subject to any other entity",
|
||||
"term_right": "subsidiary",
|
||||
"term_right_description": "An operating logic under the control of a particular entity",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "self-enforcing",
|
||||
"term_left_description": "Rules are automatically enforced through its own mechanisms",
|
||||
"term_right": "enforced",
|
||||
"term_right_description": "Rules require external enforcement by authorities or institutions",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "abstract",
|
||||
"term_left_description": "Participants learn the protocol by studying it intellectually",
|
||||
"term_right": "embodied",
|
||||
"term_right_description": "Participants learn the protocol by physically practicing it",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "obligatory",
|
||||
"term_left_description": "Participation is compulsory for a certain class of agents",
|
||||
"term_right": "voluntary",
|
||||
"term_right_description": "Participation in the protocol is optional and not coerced",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "flocking",
|
||||
"term_left_description": "Coordination occurs through centralized direction or direct mimicry",
|
||||
"term_right": "swarming",
|
||||
"term_right_description": "Coordination occurs through distributed interactions without central direction",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "defensible",
|
||||
"term_left_description": "Strong boundaries and protections against external influence",
|
||||
"term_right": "exposed",
|
||||
"term_right_description": "Weak boundaries and vulnerable to external influence",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "monopolistic",
|
||||
"term_left_description": "Excludes the use of other protocols that might be available to adopt",
|
||||
"term_right": "pluralistic",
|
||||
"term_right_description": "Interoperates with other protocols and does not exclude their use",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Experience",
|
||||
"set_description": "How the protocol is perceived in the context of its implementation",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "sufficient",
|
||||
"term_left_description": "Adequately meets the needs and goals of participants",
|
||||
"term_right": "limited",
|
||||
"term_right_description": "Does not, on its own, adequately meet the needs and goals of participants",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "crystallized",
|
||||
"term_left_description": "Content and meaning are settled and widely agreed upon",
|
||||
"term_right": "contested",
|
||||
"term_right_description": "Content and meaning are disputed or under debate",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "trust-evading",
|
||||
"term_left_description": "Minimizes the need for trust among participants",
|
||||
"term_right": "trust-inducing",
|
||||
"term_right_description": "Relies on or cultivates trust among participants",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "predictable",
|
||||
"term_left_description": "Produces expected and consistent outcomes",
|
||||
"term_right": "emergent",
|
||||
"term_right_description": "Produces unexpected or novel outcomes",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "exclusion",
|
||||
"term_left_description": "The protocol creates barriers or excludes certain participants",
|
||||
"term_right": "inclusion",
|
||||
"term_right_description": "The protocol reduces barriers and includes diverse participants",
|
||||
"value": 1,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "restraining",
|
||||
"term_left_description": "Fosters experiences of absurd complexity, alienation, and powerlessness",
|
||||
"term_right": "liberating",
|
||||
"term_right_description": "Enables participants to carry out desired activities with less work or thought",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "dead",
|
||||
"term_left_description": "Not actively utilized by relevant participants",
|
||||
"term_right": "alive",
|
||||
"term_right_description": "Actively utilized by relevant participants",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"analysis": [
|
||||
{
|
||||
"term_left": "hardness",
|
||||
"term_left_description": "The protocol tends toward properties characterized by hardness",
|
||||
"term_right": "softness",
|
||||
"term_right_description": "The protocol tends toward properties characterized by softness",
|
||||
"instructions": "Take all the 'value' fields in the gradients above and determine a mean. Round it to the nearest integer. That is the 'value' here.",
|
||||
"automated": true,
|
||||
"value": 6,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "polarized",
|
||||
"term_left_description": "The analyst tended toward more extreme high or low readings",
|
||||
"term_right": "centrist",
|
||||
"term_right_description": "The analyst tended toward readings at the middle of the gradients",
|
||||
"instructions": "Take all the 'value' fields in the gradients above. Assess their degree of polarization. For instance, if all the values are either 1 or 9, the output would be 1, and if all of them are 5, the output would be 9.",
|
||||
"automated": true,
|
||||
"value": 3,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "bureaucratic",
|
||||
"term_left_description": "The protocol exhibits institutional, formal, top-down characteristics with centralized control and external enforcement",
|
||||
"term_right": "relational",
|
||||
"term_right_description": "The protocol exhibits community-based, emergent, bottom-up characteristics with distributed coordination and voluntary participation",
|
||||
"instructions": "Based on the diagnostic readings, calculate the protocol's position using Linear Discriminant Analysis. The LDA score is scaled to the 1-9 range, where 1 represents strongly bureaucratic/institutional protocols and 9 represents strongly relational/cultural protocols. A score of 5 indicates a protocol near the boundary exhibiting characteristics of both families.",
|
||||
"automated": true,
|
||||
"value": 1,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "not useful",
|
||||
"term_left_description": "The bicorder was not useful or relevant for analyzing this protocol",
|
||||
"term_right": "very useful",
|
||||
"term_right_description": "The bicorder was very useful and relevant for analyzing this protocol",
|
||||
"instructions": "Evaluate the usefulness of this bicorder as a tool for analyzing this protocol, considering whether the gradient terms seemed revealing or irrelevant.",
|
||||
"automated": false,
|
||||
"value": 4,
|
||||
"notes": null
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -0,0 +1,285 @@
|
||||
{
|
||||
"name": "Protocol Bicorder",
|
||||
"schema": "bicorder.schema.json",
|
||||
"version": "1.2.3",
|
||||
"description": "A diagnostic tool for the study of protocols",
|
||||
"author": "Nathan Schneider",
|
||||
"date_modified": "2025-12-02",
|
||||
"metadata": {
|
||||
"protocol": "Email scheduling technique",
|
||||
"description": "Procedure: First person sends a list of meeting times, and others reply-all with a subset of the remaining options that works for them until there is consensus.",
|
||||
"analyst": "ntnsndr",
|
||||
"standpoint": "Practioner of the protocol",
|
||||
"timestamp": "2026-01-07T00:19:13.592Z",
|
||||
"shortform": false
|
||||
},
|
||||
"diagnostic": [
|
||||
{
|
||||
"set_name": "Design",
|
||||
"set_description": "How the protocol is created and remembered",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "explicit",
|
||||
"term_left_description": "The design is stated explicitly somewhere that is accessible to participants",
|
||||
"term_right": "implicit",
|
||||
"term_right_description": "The design is not stated explicitly but is learned by participants in another way",
|
||||
"value": 1,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "precise",
|
||||
"term_left_description": "The design is specified with a high level of precision that eliminates ambiguity in implementation",
|
||||
"term_right": "interpretive",
|
||||
"term_right_description": "The design is ambiguous, allowing participants a wide range of interpretation",
|
||||
"value": 1,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "institutional",
|
||||
"term_left_description": "Design occurs through processes that involve powerful institutions and widespread recognition as normative",
|
||||
"term_right": "vernacular",
|
||||
"term_right_description": "Design occurs through evolving, peer-to-peer community interactions in order to suit participant-defined goals",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "documenting",
|
||||
"term_left_description": "The primary purpose is to document or validate activity that is occurring",
|
||||
"term_right": "enabling",
|
||||
"term_right_description": "The primary purpose is to enable activity that might not happen otherwise",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "static",
|
||||
"term_left_description": "Designed to be as fixed and unchanging as possible",
|
||||
"term_right": "malleable",
|
||||
"term_right_description": "Designed to be changed by participants according to evolving needs",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "technical",
|
||||
"term_left_description": "Primarily concerned with interactions among technologies",
|
||||
"term_right": "social",
|
||||
"term_right_description": "Primarily concerned with interactions among people or groups",
|
||||
"value": 6,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "universal",
|
||||
"term_left_description": "Addressed to a global audience",
|
||||
"term_right": "particular",
|
||||
"term_right_description": "Addressed to a specific community",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "durable",
|
||||
"term_left_description": "Designed to be persistently available",
|
||||
"term_right": "ephemeral",
|
||||
"term_right_description": "Designed to vanish when no longer needed",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Entanglement",
|
||||
"set_description": "How the protocol relates with participant agents",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "macro",
|
||||
"term_left_description": "Operates at large scales involving many participants or broad scope",
|
||||
"term_right": "micro",
|
||||
"term_right_description": "Operates at small scales with few participants or narrow scope",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "sovereign",
|
||||
"term_left_description": "A distinctive operating logic, not subject to any other entity",
|
||||
"term_right": "subsidiary",
|
||||
"term_right_description": "An operating logic under the control of a particular entity",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "self-enforcing",
|
||||
"term_left_description": "Rules are automatically enforced through its own mechanisms",
|
||||
"term_right": "enforced",
|
||||
"term_right_description": "Rules require external enforcement by authorities or institutions",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "abstract",
|
||||
"term_left_description": "Participants learn the protocol by studying it intellectually",
|
||||
"term_right": "embodied",
|
||||
"term_right_description": "Participants learn the protocol by physically practicing it",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "obligatory",
|
||||
"term_left_description": "Participation is compulsory for a certain class of agents",
|
||||
"term_right": "voluntary",
|
||||
"term_right_description": "Participation in the protocol is optional and not coerced",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "flocking",
|
||||
"term_left_description": "Coordination occurs through centralized direction or direct mimicry",
|
||||
"term_right": "swarming",
|
||||
"term_right_description": "Coordination occurs through distributed interactions without central direction",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "defensible",
|
||||
"term_left_description": "Strong boundaries and protections against external influence",
|
||||
"term_right": "exposed",
|
||||
"term_right_description": "Weak boundaries and vulnerable to external influence",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "monopolistic",
|
||||
"term_left_description": "Excludes the use of other protocols that might be available to adopt",
|
||||
"term_right": "pluralistic",
|
||||
"term_right_description": "Interoperates with other protocols and does not exclude their use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Experience",
|
||||
"set_description": "How the protocol is perceived in the context of its implementation",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "sufficient",
|
||||
"term_left_description": "Adequately meets the needs and goals of participants",
|
||||
"term_right": "limited",
|
||||
"term_right_description": "Does not, on its own, adequately meet the needs and goals of participants",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "crystallized",
|
||||
"term_left_description": "Content and meaning are settled and widely agreed upon",
|
||||
"term_right": "contested",
|
||||
"term_right_description": "Content and meaning are disputed or under debate",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "trust-evading",
|
||||
"term_left_description": "Minimizes the need for trust among participants",
|
||||
"term_right": "trust-inducing",
|
||||
"term_right_description": "Relies on or cultivates trust among participants",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "predictable",
|
||||
"term_left_description": "Produces expected and consistent outcomes",
|
||||
"term_right": "emergent",
|
||||
"term_right_description": "Produces unexpected or novel outcomes",
|
||||
"value": 1,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "exclusion",
|
||||
"term_left_description": "The protocol creates barriers or excludes certain participants",
|
||||
"term_right": "inclusion",
|
||||
"term_right_description": "The protocol reduces barriers and includes diverse participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "restraining",
|
||||
"term_left_description": "Fosters experiences of absurd complexity, alienation, and powerlessness",
|
||||
"term_right": "liberating",
|
||||
"term_right_description": "Enables participants to carry out desired activities with less work or thought",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "dead",
|
||||
"term_left_description": "Not actively utilized by relevant participants",
|
||||
"term_right": "alive",
|
||||
"term_right_description": "Actively utilized by relevant participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"analysis": [
|
||||
{
|
||||
"term_left": "hardness",
|
||||
"term_left_description": "The protocol tends toward properties characterized by hardness",
|
||||
"term_right": "softness",
|
||||
"term_right_description": "The protocol tends toward properties characterized by softness",
|
||||
"instructions": "Take all the 'value' fields in the gradients above and determine a mean. Round it to the nearest integer. That is the 'value' here.",
|
||||
"automated": true,
|
||||
"value": 6,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "polarized",
|
||||
"term_left_description": "The analyst tended toward more extreme high or low readings",
|
||||
"term_right": "centrist",
|
||||
"term_right_description": "The analyst tended toward readings at the middle of the gradients",
|
||||
"instructions": "Take all the 'value' fields in the gradients above. Assess their degree of polarization. For instance, if all the values are either 1 or 9, the output would be 1, and if all of them are 5, the output would be 9.",
|
||||
"automated": true,
|
||||
"value": 2,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "bureaucratic",
|
||||
"term_left_description": "The protocol exhibits institutional, formal, top-down characteristics with centralized control and external enforcement",
|
||||
"term_right": "relational",
|
||||
"term_right_description": "The protocol exhibits community-based, emergent, bottom-up characteristics with distributed coordination and voluntary participation",
|
||||
"instructions": "Based on the diagnostic readings, calculate the protocol's position using Linear Discriminant Analysis. The LDA score is scaled to the 1-9 range, where 1 represents strongly bureaucratic/institutional protocols and 9 represents strongly relational/cultural protocols. A score of 5 indicates a protocol near the boundary exhibiting characteristics of both families.",
|
||||
"automated": true,
|
||||
"value": 4,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "not useful",
|
||||
"term_left_description": "The bicorder was not useful or relevant for analyzing this protocol",
|
||||
"term_right": "very useful",
|
||||
"term_right_description": "The bicorder was very useful and relevant for analyzing this protocol",
|
||||
"instructions": "Evaluate the usefulness of this bicorder as a tool for analyzing this protocol, considering whether the gradient terms seemed revealing or irrelevant.",
|
||||
"automated": false,
|
||||
"value": null,
|
||||
"notes": null
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -0,0 +1,285 @@
|
||||
{
|
||||
"name": "Protocol Bicorder",
|
||||
"schema": "bicorder.schema.json",
|
||||
"version": "1.2.4",
|
||||
"description": "A diagnostic tool for the study of protocols",
|
||||
"author": "Nathan Schneider",
|
||||
"date_modified": "2025-12-02",
|
||||
"metadata": {
|
||||
"protocol": "Podcasting (as a social practice)",
|
||||
"description": null,
|
||||
"analyst": "ntnsndr",
|
||||
"standpoint": "Listener, occasional producer",
|
||||
"timestamp": "2026-01-15T19:07:50.435Z",
|
||||
"shortform": true
|
||||
},
|
||||
"diagnostic": [
|
||||
{
|
||||
"set_name": "Design",
|
||||
"set_description": "How the protocol is created and remembered",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "explicit",
|
||||
"term_left_description": "The design is stated explicitly somewhere that is accessible to participants",
|
||||
"term_right": "implicit",
|
||||
"term_right_description": "The design is not stated explicitly and is learned by use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "precise",
|
||||
"term_left_description": "The design is specified with a high level of precision that eliminates ambiguity in implementation",
|
||||
"term_right": "interpretive",
|
||||
"term_right_description": "The design is ambiguous, allowing participants a wide range of interpretation",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "institutional",
|
||||
"term_left_description": "Design occurs through processes controlled by powerful institutions",
|
||||
"term_right": "vernacular",
|
||||
"term_right_description": "Design occurs through evolving community interactions",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "documenting",
|
||||
"term_left_description": "The primary purpose is to document or validate activity that is occurring",
|
||||
"term_right": "enabling",
|
||||
"term_right_description": "The primary purpose is to enable activity that might not happen otherwise",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "static",
|
||||
"term_left_description": "Designed to be as fixed and unchanging as possible",
|
||||
"term_right": "malleable",
|
||||
"term_right_description": "Designed to be changed by participants according to evolving needs",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "technical",
|
||||
"term_left_description": "Primarily concerned with interactions among technologies",
|
||||
"term_right": "social",
|
||||
"term_right_description": "Primarily concerned with interactions among people or groups",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "universal",
|
||||
"term_left_description": "Meant for global adoption across different communities",
|
||||
"term_right": "particular",
|
||||
"term_right_description": "Tailored for a specific community",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "durable",
|
||||
"term_left_description": "Designed to be persistently available",
|
||||
"term_right": "ephemeral",
|
||||
"term_right_description": "Designed to vanish when no longer needed",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Entanglement",
|
||||
"set_description": "How the protocol relates with participant agents",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "macro",
|
||||
"term_left_description": "Operates at large scales involving many participants or broad scope",
|
||||
"term_right": "micro",
|
||||
"term_right_description": "Operates at small scales with few participants or narrow scope",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "sovereign",
|
||||
"term_left_description": "A distinctive operating logic, not subject to any other entity",
|
||||
"term_right": "subsidiary",
|
||||
"term_right_description": "An operating logic under the control of a particular entity",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "self-enforcing",
|
||||
"term_left_description": "Rules are automatically enforced through its own mechanisms",
|
||||
"term_right": "enforced",
|
||||
"term_right_description": "Rules require external enforcement by authorities or institutions",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "abstract",
|
||||
"term_left_description": "Participants learn the protocol by studying it intellectually",
|
||||
"term_right": "embodied",
|
||||
"term_right_description": "Participants learn the protocol by physically practicing it",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "obligatory",
|
||||
"term_left_description": "Participation is compulsory for a certain class of agents",
|
||||
"term_right": "voluntary",
|
||||
"term_right_description": "Participation in the protocol is optional and not coerced",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "flocking",
|
||||
"term_left_description": "Coordination occurs through centralized direction or direct mimicry",
|
||||
"term_right": "swarming",
|
||||
"term_right_description": "Coordination occurs through distributed interactions without central direction",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "defensible",
|
||||
"term_left_description": "Strong boundaries and protections against external influence",
|
||||
"term_right": "exposed",
|
||||
"term_right_description": "Weak boundaries and vulnerable to external influence",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "monopolistic",
|
||||
"term_left_description": "Excludes the use of other protocols with similar purposes",
|
||||
"term_right": "pluralistic",
|
||||
"term_right_description": "Interoperates with other protocols and does not exclude their use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Experience",
|
||||
"set_description": "How the protocol is perceived in the context of its implementation",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "sufficient",
|
||||
"term_left_description": "Adequately meets the needs and goals of participants",
|
||||
"term_right": "limited",
|
||||
"term_right_description": "Does not, on its own, adequately meet the needs and goals of participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "crystallized",
|
||||
"term_left_description": "Content or meaning are settled and widely agreed upon",
|
||||
"term_right": "contested",
|
||||
"term_right_description": "Content or meaning are disputed or under debate",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "trust-evading",
|
||||
"term_left_description": "Minimizes the need for trust among participants",
|
||||
"term_right": "trust-inducing",
|
||||
"term_right_description": "Relies on or cultivates trust among participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "predictable",
|
||||
"term_left_description": "Produces expected and consistent outcomes",
|
||||
"term_right": "emergent",
|
||||
"term_right_description": "Produces unexpected or novel outcomes",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "exclusion",
|
||||
"term_left_description": "Creates barriers or excludes certain participants",
|
||||
"term_right": "inclusion",
|
||||
"term_right_description": "Reduces barriers and includes diverse participants",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "restraining",
|
||||
"term_left_description": "Fosters experiences of absurd complexity, alienation, and powerlessness",
|
||||
"term_right": "liberating",
|
||||
"term_right_description": "Enables participants to carry out desired activities with less work or thought",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "dead",
|
||||
"term_left_description": "Not actively utilized by relevant participants",
|
||||
"term_right": "alive",
|
||||
"term_right_description": "Actively utilized by relevant participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"analysis": [
|
||||
{
|
||||
"term_left": "hardness",
|
||||
"term_left_description": "The protocol tends toward properties characterized by hardness",
|
||||
"term_right": "softness",
|
||||
"term_right_description": "The protocol tends toward properties characterized by softness",
|
||||
"instructions": "Take all the 'value' fields in the gradients above and determine a mean. Round it to the nearest integer. That is the 'value' here.",
|
||||
"automated": true,
|
||||
"value": 7,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "polarized",
|
||||
"term_left_description": "The analyst tended toward more extreme high or low readings",
|
||||
"term_right": "centrist",
|
||||
"term_right_description": "The analyst tended toward readings at the middle of the gradients",
|
||||
"instructions": "Take all the 'value' fields in the gradients above. Assess their degree of polarization. For instance, if all the values are either 1 or 9, the output would be 1, and if all of them are 5, the output would be 9.",
|
||||
"automated": true,
|
||||
"value": 3,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "bureaucratic",
|
||||
"term_left_description": "The protocol exhibits institutional, formal, top-down characteristics with centralized control and external enforcement",
|
||||
"term_right": "relational",
|
||||
"term_right_description": "The protocol exhibits community-based, emergent, bottom-up characteristics with distributed coordination and voluntary participation",
|
||||
"instructions": "Based on the diagnostic readings, calculate the protocol's position using Linear Discriminant Analysis. The LDA score is scaled to the 1-9 range, where 1 represents strongly bureaucratic/institutional protocols and 9 represents strongly relational/cultural protocols. A score of 5 indicates a protocol near the boundary exhibiting characteristics of both families.",
|
||||
"automated": true,
|
||||
"value": 1,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "not useful",
|
||||
"term_left_description": "The bicorder was not useful or relevant for analyzing this protocol",
|
||||
"term_right": "very useful",
|
||||
"term_right_description": "The bicorder was very useful and relevant for analyzing this protocol",
|
||||
"instructions": "Evaluate the usefulness of this bicorder as a tool for analyzing this protocol, considering whether the gradient terms seemed revealing or irrelevant.",
|
||||
"automated": false,
|
||||
"value": null,
|
||||
"notes": null
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -0,0 +1,285 @@
|
||||
{
|
||||
"name": "Protocol Bicorder",
|
||||
"schema": "bicorder.schema.json",
|
||||
"version": "1.2.4",
|
||||
"description": "A diagnostic tool for the study of protocols",
|
||||
"author": "Nathan Schneider",
|
||||
"date_modified": "2025-12-02",
|
||||
"metadata": {
|
||||
"protocol": null,
|
||||
"description": null,
|
||||
"analyst": "Bob",
|
||||
"standpoint": null,
|
||||
"timestamp": "2026-01-16T22:58:07.449Z",
|
||||
"shortform": true
|
||||
},
|
||||
"diagnostic": [
|
||||
{
|
||||
"set_name": "Design",
|
||||
"set_description": "How the protocol is created and remembered",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "explicit",
|
||||
"term_left_description": "The design is stated explicitly somewhere that is accessible to participants",
|
||||
"term_right": "implicit",
|
||||
"term_right_description": "The design is not stated explicitly and is learned by use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "precise",
|
||||
"term_left_description": "The design is specified with a high level of precision that eliminates ambiguity in implementation",
|
||||
"term_right": "interpretive",
|
||||
"term_right_description": "The design is ambiguous, allowing participants a wide range of interpretation",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "institutional",
|
||||
"term_left_description": "Design occurs through processes controlled by powerful institutions",
|
||||
"term_right": "vernacular",
|
||||
"term_right_description": "Design occurs through evolving community interactions",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "documenting",
|
||||
"term_left_description": "The primary purpose is to document or validate activity that is occurring",
|
||||
"term_right": "enabling",
|
||||
"term_right_description": "The primary purpose is to enable activity that might not happen otherwise",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "static",
|
||||
"term_left_description": "Designed to be as fixed and unchanging as possible",
|
||||
"term_right": "malleable",
|
||||
"term_right_description": "Designed to be changed by participants according to evolving needs",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "technical",
|
||||
"term_left_description": "Primarily concerned with interactions among technologies",
|
||||
"term_right": "social",
|
||||
"term_right_description": "Primarily concerned with interactions among people or groups",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "universal",
|
||||
"term_left_description": "Meant for global adoption across different communities",
|
||||
"term_right": "particular",
|
||||
"term_right_description": "Tailored for a specific community",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "durable",
|
||||
"term_left_description": "Designed to be persistently available",
|
||||
"term_right": "ephemeral",
|
||||
"term_right_description": "Designed to vanish when no longer needed",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Entanglement",
|
||||
"set_description": "How the protocol relates with participant agents",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "macro",
|
||||
"term_left_description": "Operates at large scales involving many participants or broad scope",
|
||||
"term_right": "micro",
|
||||
"term_right_description": "Operates at small scales with few participants or narrow scope",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "sovereign",
|
||||
"term_left_description": "A distinctive operating logic, not subject to any other entity",
|
||||
"term_right": "subsidiary",
|
||||
"term_right_description": "An operating logic under the control of a particular entity",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "self-enforcing",
|
||||
"term_left_description": "Rules are automatically enforced through its own mechanisms",
|
||||
"term_right": "enforced",
|
||||
"term_right_description": "Rules require external enforcement by authorities or institutions",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "abstract",
|
||||
"term_left_description": "Participants learn the protocol by studying it intellectually",
|
||||
"term_right": "embodied",
|
||||
"term_right_description": "Participants learn the protocol by physically practicing it",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "obligatory",
|
||||
"term_left_description": "Participation is compulsory for a certain class of agents",
|
||||
"term_right": "voluntary",
|
||||
"term_right_description": "Participation in the protocol is optional and not coerced",
|
||||
"value": 1,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "flocking",
|
||||
"term_left_description": "Coordination occurs through centralized direction or direct mimicry",
|
||||
"term_right": "swarming",
|
||||
"term_right_description": "Coordination occurs through distributed interactions without central direction",
|
||||
"value": 5,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "defensible",
|
||||
"term_left_description": "Strong boundaries and protections against external influence",
|
||||
"term_right": "exposed",
|
||||
"term_right_description": "Weak boundaries and vulnerable to external influence",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "monopolistic",
|
||||
"term_left_description": "Excludes the use of other protocols with similar purposes",
|
||||
"term_right": "pluralistic",
|
||||
"term_right_description": "Interoperates with other protocols and does not exclude their use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Experience",
|
||||
"set_description": "How the protocol is perceived in the context of its implementation",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "sufficient",
|
||||
"term_left_description": "Adequately meets the needs and goals of participants",
|
||||
"term_right": "limited",
|
||||
"term_right_description": "Does not, on its own, adequately meet the needs and goals of participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "crystallized",
|
||||
"term_left_description": "Content or meaning are settled and widely agreed upon",
|
||||
"term_right": "contested",
|
||||
"term_right_description": "Content or meaning are disputed or under debate",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "trust-evading",
|
||||
"term_left_description": "Minimizes the need for trust among participants",
|
||||
"term_right": "trust-inducing",
|
||||
"term_right_description": "Relies on or cultivates trust among participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "predictable",
|
||||
"term_left_description": "Produces expected and consistent outcomes",
|
||||
"term_right": "emergent",
|
||||
"term_right_description": "Produces unexpected or novel outcomes",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "exclusion",
|
||||
"term_left_description": "Creates barriers or excludes certain participants",
|
||||
"term_right": "inclusion",
|
||||
"term_right_description": "Reduces barriers and includes diverse participants",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "restraining",
|
||||
"term_left_description": "Fosters experiences of absurd complexity, alienation, and powerlessness",
|
||||
"term_right": "liberating",
|
||||
"term_right_description": "Enables participants to carry out desired activities with less work or thought",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "dead",
|
||||
"term_left_description": "Not actively utilized by relevant participants",
|
||||
"term_right": "alive",
|
||||
"term_right_description": "Actively utilized by relevant participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"analysis": [
|
||||
{
|
||||
"term_left": "hardness",
|
||||
"term_left_description": "The protocol tends toward properties characterized by hardness",
|
||||
"term_right": "softness",
|
||||
"term_right_description": "The protocol tends toward properties characterized by softness",
|
||||
"instructions": "Take all the 'value' fields in the gradients above and determine a mean. Round it to the nearest integer. That is the 'value' here.",
|
||||
"automated": true,
|
||||
"value": 6,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "polarized",
|
||||
"term_left_description": "The analyst tended toward more extreme high or low readings",
|
||||
"term_right": "centrist",
|
||||
"term_right_description": "The analyst tended toward readings at the middle of the gradients",
|
||||
"instructions": "Take all the 'value' fields in the gradients above. Assess their degree of polarization. For instance, if all the values are either 1 or 9, the output would be 1, and if all of them are 5, the output would be 9.",
|
||||
"automated": true,
|
||||
"value": 3,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "bureaucratic",
|
||||
"term_left_description": "The protocol exhibits institutional, formal, top-down characteristics with centralized control and external enforcement",
|
||||
"term_right": "relational",
|
||||
"term_right_description": "The protocol exhibits community-based, emergent, bottom-up characteristics with distributed coordination and voluntary participation",
|
||||
"instructions": "Based on the diagnostic readings, calculate the protocol's position using Linear Discriminant Analysis. The LDA score is scaled to the 1-9 range, where 1 represents strongly bureaucratic/institutional protocols and 9 represents strongly relational/cultural protocols. A score of 5 indicates a protocol near the boundary exhibiting characteristics of both families.",
|
||||
"automated": true,
|
||||
"value": 7,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "not useful",
|
||||
"term_left_description": "The bicorder was not useful or relevant for analyzing this protocol",
|
||||
"term_right": "very useful",
|
||||
"term_right_description": "The bicorder was very useful and relevant for analyzing this protocol",
|
||||
"instructions": "Evaluate the usefulness of this bicorder as a tool for analyzing this protocol, considering whether the gradient terms seemed revealing or irrelevant.",
|
||||
"automated": false,
|
||||
"value": null,
|
||||
"notes": null
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -0,0 +1,285 @@
|
||||
{
|
||||
"name": "Protocol Bicorder",
|
||||
"schema": "bicorder.schema.json",
|
||||
"version": "1.2.4",
|
||||
"description": "A diagnostic tool for the study of protocols",
|
||||
"author": "Nathan Schneider",
|
||||
"date_modified": "2025-12-02",
|
||||
"metadata": {
|
||||
"protocol": "Handshake ",
|
||||
"description": "Shaking hands ",
|
||||
"analyst": "Owocki ",
|
||||
"standpoint": "User of it ",
|
||||
"timestamp": "2026-01-16T22:56:54.628Z",
|
||||
"shortform": true
|
||||
},
|
||||
"diagnostic": [
|
||||
{
|
||||
"set_name": "Design",
|
||||
"set_description": "How the protocol is created and remembered",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "explicit",
|
||||
"term_left_description": "The design is stated explicitly somewhere that is accessible to participants",
|
||||
"term_right": "implicit",
|
||||
"term_right_description": "The design is not stated explicitly and is learned by use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "precise",
|
||||
"term_left_description": "The design is specified with a high level of precision that eliminates ambiguity in implementation",
|
||||
"term_right": "interpretive",
|
||||
"term_right_description": "The design is ambiguous, allowing participants a wide range of interpretation",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "institutional",
|
||||
"term_left_description": "Design occurs through processes controlled by powerful institutions",
|
||||
"term_right": "vernacular",
|
||||
"term_right_description": "Design occurs through evolving community interactions",
|
||||
"value": 1,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "documenting",
|
||||
"term_left_description": "The primary purpose is to document or validate activity that is occurring",
|
||||
"term_right": "enabling",
|
||||
"term_right_description": "The primary purpose is to enable activity that might not happen otherwise",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "static",
|
||||
"term_left_description": "Designed to be as fixed and unchanging as possible",
|
||||
"term_right": "malleable",
|
||||
"term_right_description": "Designed to be changed by participants according to evolving needs",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "technical",
|
||||
"term_left_description": "Primarily concerned with interactions among technologies",
|
||||
"term_right": "social",
|
||||
"term_right_description": "Primarily concerned with interactions among people or groups",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "universal",
|
||||
"term_left_description": "Meant for global adoption across different communities",
|
||||
"term_right": "particular",
|
||||
"term_right_description": "Tailored for a specific community",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "durable",
|
||||
"term_left_description": "Designed to be persistently available",
|
||||
"term_right": "ephemeral",
|
||||
"term_right_description": "Designed to vanish when no longer needed",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Entanglement",
|
||||
"set_description": "How the protocol relates with participant agents",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "macro",
|
||||
"term_left_description": "Operates at large scales involving many participants or broad scope",
|
||||
"term_right": "micro",
|
||||
"term_right_description": "Operates at small scales with few participants or narrow scope",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "sovereign",
|
||||
"term_left_description": "A distinctive operating logic, not subject to any other entity",
|
||||
"term_right": "subsidiary",
|
||||
"term_right_description": "An operating logic under the control of a particular entity",
|
||||
"value": 1,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "self-enforcing",
|
||||
"term_left_description": "Rules are automatically enforced through its own mechanisms",
|
||||
"term_right": "enforced",
|
||||
"term_right_description": "Rules require external enforcement by authorities or institutions",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "abstract",
|
||||
"term_left_description": "Participants learn the protocol by studying it intellectually",
|
||||
"term_right": "embodied",
|
||||
"term_right_description": "Participants learn the protocol by physically practicing it",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "obligatory",
|
||||
"term_left_description": "Participation is compulsory for a certain class of agents",
|
||||
"term_right": "voluntary",
|
||||
"term_right_description": "Participation in the protocol is optional and not coerced",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "flocking",
|
||||
"term_left_description": "Coordination occurs through centralized direction or direct mimicry",
|
||||
"term_right": "swarming",
|
||||
"term_right_description": "Coordination occurs through distributed interactions without central direction",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "defensible",
|
||||
"term_left_description": "Strong boundaries and protections against external influence",
|
||||
"term_right": "exposed",
|
||||
"term_right_description": "Weak boundaries and vulnerable to external influence",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "monopolistic",
|
||||
"term_left_description": "Excludes the use of other protocols with similar purposes",
|
||||
"term_right": "pluralistic",
|
||||
"term_right_description": "Interoperates with other protocols and does not exclude their use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Experience",
|
||||
"set_description": "How the protocol is perceived in the context of its implementation",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "sufficient",
|
||||
"term_left_description": "Adequately meets the needs and goals of participants",
|
||||
"term_right": "limited",
|
||||
"term_right_description": "Does not, on its own, adequately meet the needs and goals of participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "crystallized",
|
||||
"term_left_description": "Content or meaning are settled and widely agreed upon",
|
||||
"term_right": "contested",
|
||||
"term_right_description": "Content or meaning are disputed or under debate",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "trust-evading",
|
||||
"term_left_description": "Minimizes the need for trust among participants",
|
||||
"term_right": "trust-inducing",
|
||||
"term_right_description": "Relies on or cultivates trust among participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "predictable",
|
||||
"term_left_description": "Produces expected and consistent outcomes",
|
||||
"term_right": "emergent",
|
||||
"term_right_description": "Produces unexpected or novel outcomes",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "exclusion",
|
||||
"term_left_description": "Creates barriers or excludes certain participants",
|
||||
"term_right": "inclusion",
|
||||
"term_right_description": "Reduces barriers and includes diverse participants",
|
||||
"value": 1,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "restraining",
|
||||
"term_left_description": "Fosters experiences of absurd complexity, alienation, and powerlessness",
|
||||
"term_right": "liberating",
|
||||
"term_right_description": "Enables participants to carry out desired activities with less work or thought",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "dead",
|
||||
"term_left_description": "Not actively utilized by relevant participants",
|
||||
"term_right": "alive",
|
||||
"term_right_description": "Actively utilized by relevant participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"analysis": [
|
||||
{
|
||||
"term_left": "hardness",
|
||||
"term_left_description": "The protocol tends toward properties characterized by hardness",
|
||||
"term_right": "softness",
|
||||
"term_right_description": "The protocol tends toward properties characterized by softness",
|
||||
"instructions": "Take all the 'value' fields in the gradients above and determine a mean. Round it to the nearest integer. That is the 'value' here.",
|
||||
"automated": true,
|
||||
"value": 5,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "polarized",
|
||||
"term_left_description": "The analyst tended toward more extreme high or low readings",
|
||||
"term_right": "centrist",
|
||||
"term_right_description": "The analyst tended toward readings at the middle of the gradients",
|
||||
"instructions": "Take all the 'value' fields in the gradients above. Assess their degree of polarization. For instance, if all the values are either 1 or 9, the output would be 1, and if all of them are 5, the output would be 9.",
|
||||
"automated": true,
|
||||
"value": 2,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "bureaucratic",
|
||||
"term_left_description": "The protocol exhibits institutional, formal, top-down characteristics with centralized control and external enforcement",
|
||||
"term_right": "relational",
|
||||
"term_right_description": "The protocol exhibits community-based, emergent, bottom-up characteristics with distributed coordination and voluntary participation",
|
||||
"instructions": "Based on the diagnostic readings, calculate the protocol's position using Linear Discriminant Analysis. The LDA score is scaled to the 1-9 range, where 1 represents strongly bureaucratic/institutional protocols and 9 represents strongly relational/cultural protocols. A score of 5 indicates a protocol near the boundary exhibiting characteristics of both families.",
|
||||
"automated": true,
|
||||
"value": 5,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "not useful",
|
||||
"term_left_description": "The bicorder was not useful or relevant for analyzing this protocol",
|
||||
"term_right": "very useful",
|
||||
"term_right_description": "The bicorder was very useful and relevant for analyzing this protocol",
|
||||
"instructions": "Evaluate the usefulness of this bicorder as a tool for analyzing this protocol, considering whether the gradient terms seemed revealing or irrelevant.",
|
||||
"automated": false,
|
||||
"value": null,
|
||||
"notes": null
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -0,0 +1,285 @@
|
||||
{
|
||||
"name": "Protocol Bicorder",
|
||||
"schema": "bicorder.schema.json",
|
||||
"version": "1.2.4",
|
||||
"description": "A diagnostic tool for the study of protocols",
|
||||
"author": "Nathan Schneider",
|
||||
"date_modified": "2025-12-02",
|
||||
"metadata": {
|
||||
"protocol": "Andrew Huberman Sleep",
|
||||
"description": "What the podcast recommends for better sleep",
|
||||
"analyst": "T",
|
||||
"standpoint": "Learner",
|
||||
"timestamp": "2026-01-16T22:58:23.015Z",
|
||||
"shortform": true
|
||||
},
|
||||
"diagnostic": [
|
||||
{
|
||||
"set_name": "Design",
|
||||
"set_description": "How the protocol is created and remembered",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "explicit",
|
||||
"term_left_description": "The design is stated explicitly somewhere that is accessible to participants",
|
||||
"term_right": "implicit",
|
||||
"term_right_description": "The design is not stated explicitly and is learned by use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "precise",
|
||||
"term_left_description": "The design is specified with a high level of precision that eliminates ambiguity in implementation",
|
||||
"term_right": "interpretive",
|
||||
"term_right_description": "The design is ambiguous, allowing participants a wide range of interpretation",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "institutional",
|
||||
"term_left_description": "Design occurs through processes controlled by powerful institutions",
|
||||
"term_right": "vernacular",
|
||||
"term_right_description": "Design occurs through evolving community interactions",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "documenting",
|
||||
"term_left_description": "The primary purpose is to document or validate activity that is occurring",
|
||||
"term_right": "enabling",
|
||||
"term_right_description": "The primary purpose is to enable activity that might not happen otherwise",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "static",
|
||||
"term_left_description": "Designed to be as fixed and unchanging as possible",
|
||||
"term_right": "malleable",
|
||||
"term_right_description": "Designed to be changed by participants according to evolving needs",
|
||||
"value": 5,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "technical",
|
||||
"term_left_description": "Primarily concerned with interactions among technologies",
|
||||
"term_right": "social",
|
||||
"term_right_description": "Primarily concerned with interactions among people or groups",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "universal",
|
||||
"term_left_description": "Meant for global adoption across different communities",
|
||||
"term_right": "particular",
|
||||
"term_right_description": "Tailored for a specific community",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "durable",
|
||||
"term_left_description": "Designed to be persistently available",
|
||||
"term_right": "ephemeral",
|
||||
"term_right_description": "Designed to vanish when no longer needed",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Entanglement",
|
||||
"set_description": "How the protocol relates with participant agents",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "macro",
|
||||
"term_left_description": "Operates at large scales involving many participants or broad scope",
|
||||
"term_right": "micro",
|
||||
"term_right_description": "Operates at small scales with few participants or narrow scope",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "sovereign",
|
||||
"term_left_description": "A distinctive operating logic, not subject to any other entity",
|
||||
"term_right": "subsidiary",
|
||||
"term_right_description": "An operating logic under the control of a particular entity",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "self-enforcing",
|
||||
"term_left_description": "Rules are automatically enforced through its own mechanisms",
|
||||
"term_right": "enforced",
|
||||
"term_right_description": "Rules require external enforcement by authorities or institutions",
|
||||
"value": 1,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "abstract",
|
||||
"term_left_description": "Participants learn the protocol by studying it intellectually",
|
||||
"term_right": "embodied",
|
||||
"term_right_description": "Participants learn the protocol by physically practicing it",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "obligatory",
|
||||
"term_left_description": "Participation is compulsory for a certain class of agents",
|
||||
"term_right": "voluntary",
|
||||
"term_right_description": "Participation in the protocol is optional and not coerced",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "flocking",
|
||||
"term_left_description": "Coordination occurs through centralized direction or direct mimicry",
|
||||
"term_right": "swarming",
|
||||
"term_right_description": "Coordination occurs through distributed interactions without central direction",
|
||||
"value": 5,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "defensible",
|
||||
"term_left_description": "Strong boundaries and protections against external influence",
|
||||
"term_right": "exposed",
|
||||
"term_right_description": "Weak boundaries and vulnerable to external influence",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "monopolistic",
|
||||
"term_left_description": "Excludes the use of other protocols with similar purposes",
|
||||
"term_right": "pluralistic",
|
||||
"term_right_description": "Interoperates with other protocols and does not exclude their use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Experience",
|
||||
"set_description": "How the protocol is perceived in the context of its implementation",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "sufficient",
|
||||
"term_left_description": "Adequately meets the needs and goals of participants",
|
||||
"term_right": "limited",
|
||||
"term_right_description": "Does not, on its own, adequately meet the needs and goals of participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "crystallized",
|
||||
"term_left_description": "Content or meaning are settled and widely agreed upon",
|
||||
"term_right": "contested",
|
||||
"term_right_description": "Content or meaning are disputed or under debate",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "trust-evading",
|
||||
"term_left_description": "Minimizes the need for trust among participants",
|
||||
"term_right": "trust-inducing",
|
||||
"term_right_description": "Relies on or cultivates trust among participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "predictable",
|
||||
"term_left_description": "Produces expected and consistent outcomes",
|
||||
"term_right": "emergent",
|
||||
"term_right_description": "Produces unexpected or novel outcomes",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "exclusion",
|
||||
"term_left_description": "Creates barriers or excludes certain participants",
|
||||
"term_right": "inclusion",
|
||||
"term_right_description": "Reduces barriers and includes diverse participants",
|
||||
"value": null,
|
||||
"notes": "I don't know homie",
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "restraining",
|
||||
"term_left_description": "Fosters experiences of absurd complexity, alienation, and powerlessness",
|
||||
"term_right": "liberating",
|
||||
"term_right_description": "Enables participants to carry out desired activities with less work or thought",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "dead",
|
||||
"term_left_description": "Not actively utilized by relevant participants",
|
||||
"term_right": "alive",
|
||||
"term_right_description": "Actively utilized by relevant participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"analysis": [
|
||||
{
|
||||
"term_left": "hardness",
|
||||
"term_left_description": "The protocol tends toward properties characterized by hardness",
|
||||
"term_right": "softness",
|
||||
"term_right_description": "The protocol tends toward properties characterized by softness",
|
||||
"instructions": "Take all the 'value' fields in the gradients above and determine a mean. Round it to the nearest integer. That is the 'value' here.",
|
||||
"automated": true,
|
||||
"value": 5,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "polarized",
|
||||
"term_left_description": "The analyst tended toward more extreme high or low readings",
|
||||
"term_right": "centrist",
|
||||
"term_right_description": "The analyst tended toward readings at the middle of the gradients",
|
||||
"instructions": "Take all the 'value' fields in the gradients above. Assess their degree of polarization. For instance, if all the values are either 1 or 9, the output would be 1, and if all of them are 5, the output would be 9.",
|
||||
"automated": true,
|
||||
"value": 4,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "bureaucratic",
|
||||
"term_left_description": "The protocol exhibits institutional, formal, top-down characteristics with centralized control and external enforcement",
|
||||
"term_right": "relational",
|
||||
"term_right_description": "The protocol exhibits community-based, emergent, bottom-up characteristics with distributed coordination and voluntary participation",
|
||||
"instructions": "Based on the diagnostic readings, calculate the protocol's position using Linear Discriminant Analysis. The LDA score is scaled to the 1-9 range, where 1 represents strongly bureaucratic/institutional protocols and 9 represents strongly relational/cultural protocols. A score of 5 indicates a protocol near the boundary exhibiting characteristics of both families.",
|
||||
"automated": true,
|
||||
"value": 4,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "not useful",
|
||||
"term_left_description": "The bicorder was not useful or relevant for analyzing this protocol",
|
||||
"term_right": "very useful",
|
||||
"term_right_description": "The bicorder was very useful and relevant for analyzing this protocol",
|
||||
"instructions": "Evaluate the usefulness of this bicorder as a tool for analyzing this protocol, considering whether the gradient terms seemed revealing or irrelevant.",
|
||||
"automated": false,
|
||||
"value": null,
|
||||
"notes": null
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -0,0 +1,285 @@
|
||||
{
|
||||
"name": "Protocol Bicorder",
|
||||
"schema": "bicorder.schema.json",
|
||||
"version": "1.2.4",
|
||||
"description": "A diagnostic tool for the study of protocols",
|
||||
"author": "Nathan Schneider",
|
||||
"date_modified": "2025-12-02",
|
||||
"metadata": {
|
||||
"protocol": "EthBoulder",
|
||||
"description": "community coordinated, community governed ethereum event/unconference",
|
||||
"analyst": "ash",
|
||||
"standpoint": "contributor",
|
||||
"timestamp": "2026-01-16T22:56:10.319Z",
|
||||
"shortform": true
|
||||
},
|
||||
"diagnostic": [
|
||||
{
|
||||
"set_name": "Design",
|
||||
"set_description": "How the protocol is created and remembered",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "explicit",
|
||||
"term_left_description": "The design is stated explicitly somewhere that is accessible to participants",
|
||||
"term_right": "implicit",
|
||||
"term_right_description": "The design is not stated explicitly and is learned by use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "precise",
|
||||
"term_left_description": "The design is specified with a high level of precision that eliminates ambiguity in implementation",
|
||||
"term_right": "interpretive",
|
||||
"term_right_description": "The design is ambiguous, allowing participants a wide range of interpretation",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "institutional",
|
||||
"term_left_description": "Design occurs through processes controlled by powerful institutions",
|
||||
"term_right": "vernacular",
|
||||
"term_right_description": "Design occurs through evolving community interactions",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "documenting",
|
||||
"term_left_description": "The primary purpose is to document or validate activity that is occurring",
|
||||
"term_right": "enabling",
|
||||
"term_right_description": "The primary purpose is to enable activity that might not happen otherwise",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "static",
|
||||
"term_left_description": "Designed to be as fixed and unchanging as possible",
|
||||
"term_right": "malleable",
|
||||
"term_right_description": "Designed to be changed by participants according to evolving needs",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "technical",
|
||||
"term_left_description": "Primarily concerned with interactions among technologies",
|
||||
"term_right": "social",
|
||||
"term_right_description": "Primarily concerned with interactions among people or groups",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "universal",
|
||||
"term_left_description": "Meant for global adoption across different communities",
|
||||
"term_right": "particular",
|
||||
"term_right_description": "Tailored for a specific community",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "durable",
|
||||
"term_left_description": "Designed to be persistently available",
|
||||
"term_right": "ephemeral",
|
||||
"term_right_description": "Designed to vanish when no longer needed",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Entanglement",
|
||||
"set_description": "How the protocol relates with participant agents",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "macro",
|
||||
"term_left_description": "Operates at large scales involving many participants or broad scope",
|
||||
"term_right": "micro",
|
||||
"term_right_description": "Operates at small scales with few participants or narrow scope",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "sovereign",
|
||||
"term_left_description": "A distinctive operating logic, not subject to any other entity",
|
||||
"term_right": "subsidiary",
|
||||
"term_right_description": "An operating logic under the control of a particular entity",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "self-enforcing",
|
||||
"term_left_description": "Rules are automatically enforced through its own mechanisms",
|
||||
"term_right": "enforced",
|
||||
"term_right_description": "Rules require external enforcement by authorities or institutions",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "abstract",
|
||||
"term_left_description": "Participants learn the protocol by studying it intellectually",
|
||||
"term_right": "embodied",
|
||||
"term_right_description": "Participants learn the protocol by physically practicing it",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "obligatory",
|
||||
"term_left_description": "Participation is compulsory for a certain class of agents",
|
||||
"term_right": "voluntary",
|
||||
"term_right_description": "Participation in the protocol is optional and not coerced",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "flocking",
|
||||
"term_left_description": "Coordination occurs through centralized direction or direct mimicry",
|
||||
"term_right": "swarming",
|
||||
"term_right_description": "Coordination occurs through distributed interactions without central direction",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "defensible",
|
||||
"term_left_description": "Strong boundaries and protections against external influence",
|
||||
"term_right": "exposed",
|
||||
"term_right_description": "Weak boundaries and vulnerable to external influence",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "monopolistic",
|
||||
"term_left_description": "Excludes the use of other protocols with similar purposes",
|
||||
"term_right": "pluralistic",
|
||||
"term_right_description": "Interoperates with other protocols and does not exclude their use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Experience",
|
||||
"set_description": "How the protocol is perceived in the context of its implementation",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "sufficient",
|
||||
"term_left_description": "Adequately meets the needs and goals of participants",
|
||||
"term_right": "limited",
|
||||
"term_right_description": "Does not, on its own, adequately meet the needs and goals of participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "crystallized",
|
||||
"term_left_description": "Content or meaning are settled and widely agreed upon",
|
||||
"term_right": "contested",
|
||||
"term_right_description": "Content or meaning are disputed or under debate",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "trust-evading",
|
||||
"term_left_description": "Minimizes the need for trust among participants",
|
||||
"term_right": "trust-inducing",
|
||||
"term_right_description": "Relies on or cultivates trust among participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "predictable",
|
||||
"term_left_description": "Produces expected and consistent outcomes",
|
||||
"term_right": "emergent",
|
||||
"term_right_description": "Produces unexpected or novel outcomes",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "exclusion",
|
||||
"term_left_description": "Creates barriers or excludes certain participants",
|
||||
"term_right": "inclusion",
|
||||
"term_right_description": "Reduces barriers and includes diverse participants",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "restraining",
|
||||
"term_left_description": "Fosters experiences of absurd complexity, alienation, and powerlessness",
|
||||
"term_right": "liberating",
|
||||
"term_right_description": "Enables participants to carry out desired activities with less work or thought",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "dead",
|
||||
"term_left_description": "Not actively utilized by relevant participants",
|
||||
"term_right": "alive",
|
||||
"term_right_description": "Actively utilized by relevant participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"analysis": [
|
||||
{
|
||||
"term_left": "hardness",
|
||||
"term_left_description": "The protocol tends toward properties characterized by hardness",
|
||||
"term_right": "softness",
|
||||
"term_right_description": "The protocol tends toward properties characterized by softness",
|
||||
"instructions": "Take all the 'value' fields in the gradients above and determine a mean. Round it to the nearest integer. That is the 'value' here.",
|
||||
"automated": true,
|
||||
"value": 7,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "polarized",
|
||||
"term_left_description": "The analyst tended toward more extreme high or low readings",
|
||||
"term_right": "centrist",
|
||||
"term_right_description": "The analyst tended toward readings at the middle of the gradients",
|
||||
"instructions": "Take all the 'value' fields in the gradients above. Assess their degree of polarization. For instance, if all the values are either 1 or 9, the output would be 1, and if all of them are 5, the output would be 9.",
|
||||
"automated": true,
|
||||
"value": 3,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "bureaucratic",
|
||||
"term_left_description": "The protocol exhibits institutional, formal, top-down characteristics with centralized control and external enforcement",
|
||||
"term_right": "relational",
|
||||
"term_right_description": "The protocol exhibits community-based, emergent, bottom-up characteristics with distributed coordination and voluntary participation",
|
||||
"instructions": "Based on the diagnostic readings, calculate the protocol's position using Linear Discriminant Analysis. The LDA score is scaled to the 1-9 range, where 1 represents strongly bureaucratic/institutional protocols and 9 represents strongly relational/cultural protocols. A score of 5 indicates a protocol near the boundary exhibiting characteristics of both families.",
|
||||
"automated": true,
|
||||
"value": 1,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "not useful",
|
||||
"term_left_description": "The bicorder was not useful or relevant for analyzing this protocol",
|
||||
"term_right": "very useful",
|
||||
"term_right_description": "The bicorder was very useful and relevant for analyzing this protocol",
|
||||
"instructions": "Evaluate the usefulness of this bicorder as a tool for analyzing this protocol, considering whether the gradient terms seemed revealing or irrelevant.",
|
||||
"automated": false,
|
||||
"value": null,
|
||||
"notes": null
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -0,0 +1,285 @@
|
||||
{
|
||||
"name": "Protocol Bicorder",
|
||||
"schema": "bicorder.schema.json",
|
||||
"version": "1.2.4",
|
||||
"description": "A diagnostic tool for the study of protocols",
|
||||
"author": "Nathan Schneider",
|
||||
"date_modified": "2025-12-02",
|
||||
"metadata": {
|
||||
"protocol": "Network Assembly Protocol",
|
||||
"description": "Network meets bi-weekly to support network weaving.\n\n- 20 min Spotlight on Network Member’s work\n- 20 min Network and Member Updates\n- 50 min Unconference Sessions",
|
||||
"analyst": "Benjamin Life",
|
||||
"standpoint": "Co-Author, Network Steward",
|
||||
"timestamp": "2026-01-16T23:00:21.620Z",
|
||||
"shortform": true
|
||||
},
|
||||
"diagnostic": [
|
||||
{
|
||||
"set_name": "Design",
|
||||
"set_description": "How the protocol is created and remembered",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "explicit",
|
||||
"term_left_description": "The design is stated explicitly somewhere that is accessible to participants",
|
||||
"term_right": "implicit",
|
||||
"term_right_description": "The design is not stated explicitly and is learned by use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "precise",
|
||||
"term_left_description": "The design is specified with a high level of precision that eliminates ambiguity in implementation",
|
||||
"term_right": "interpretive",
|
||||
"term_right_description": "The design is ambiguous, allowing participants a wide range of interpretation",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "institutional",
|
||||
"term_left_description": "Design occurs through processes controlled by powerful institutions",
|
||||
"term_right": "vernacular",
|
||||
"term_right_description": "Design occurs through evolving community interactions",
|
||||
"value": 4,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "documenting",
|
||||
"term_left_description": "The primary purpose is to document or validate activity that is occurring",
|
||||
"term_right": "enabling",
|
||||
"term_right_description": "The primary purpose is to enable activity that might not happen otherwise",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "static",
|
||||
"term_left_description": "Designed to be as fixed and unchanging as possible",
|
||||
"term_right": "malleable",
|
||||
"term_right_description": "Designed to be changed by participants according to evolving needs",
|
||||
"value": 5,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "technical",
|
||||
"term_left_description": "Primarily concerned with interactions among technologies",
|
||||
"term_right": "social",
|
||||
"term_right_description": "Primarily concerned with interactions among people or groups",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "universal",
|
||||
"term_left_description": "Meant for global adoption across different communities",
|
||||
"term_right": "particular",
|
||||
"term_right_description": "Tailored for a specific community",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "durable",
|
||||
"term_left_description": "Designed to be persistently available",
|
||||
"term_right": "ephemeral",
|
||||
"term_right_description": "Designed to vanish when no longer needed",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Entanglement",
|
||||
"set_description": "How the protocol relates with participant agents",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "macro",
|
||||
"term_left_description": "Operates at large scales involving many participants or broad scope",
|
||||
"term_right": "micro",
|
||||
"term_right_description": "Operates at small scales with few participants or narrow scope",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "sovereign",
|
||||
"term_left_description": "A distinctive operating logic, not subject to any other entity",
|
||||
"term_right": "subsidiary",
|
||||
"term_right_description": "An operating logic under the control of a particular entity",
|
||||
"value": 4,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "self-enforcing",
|
||||
"term_left_description": "Rules are automatically enforced through its own mechanisms",
|
||||
"term_right": "enforced",
|
||||
"term_right_description": "Rules require external enforcement by authorities or institutions",
|
||||
"value": 5,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "abstract",
|
||||
"term_left_description": "Participants learn the protocol by studying it intellectually",
|
||||
"term_right": "embodied",
|
||||
"term_right_description": "Participants learn the protocol by physically practicing it",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "obligatory",
|
||||
"term_left_description": "Participation is compulsory for a certain class of agents",
|
||||
"term_right": "voluntary",
|
||||
"term_right_description": "Participation in the protocol is optional and not coerced",
|
||||
"value": 4,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "flocking",
|
||||
"term_left_description": "Coordination occurs through centralized direction or direct mimicry",
|
||||
"term_right": "swarming",
|
||||
"term_right_description": "Coordination occurs through distributed interactions without central direction",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "defensible",
|
||||
"term_left_description": "Strong boundaries and protections against external influence",
|
||||
"term_right": "exposed",
|
||||
"term_right_description": "Weak boundaries and vulnerable to external influence",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "monopolistic",
|
||||
"term_left_description": "Excludes the use of other protocols with similar purposes",
|
||||
"term_right": "pluralistic",
|
||||
"term_right_description": "Interoperates with other protocols and does not exclude their use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Experience",
|
||||
"set_description": "How the protocol is perceived in the context of its implementation",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "sufficient",
|
||||
"term_left_description": "Adequately meets the needs and goals of participants",
|
||||
"term_right": "limited",
|
||||
"term_right_description": "Does not, on its own, adequately meet the needs and goals of participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "crystallized",
|
||||
"term_left_description": "Content or meaning are settled and widely agreed upon",
|
||||
"term_right": "contested",
|
||||
"term_right_description": "Content or meaning are disputed or under debate",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "trust-evading",
|
||||
"term_left_description": "Minimizes the need for trust among participants",
|
||||
"term_right": "trust-inducing",
|
||||
"term_right_description": "Relies on or cultivates trust among participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "predictable",
|
||||
"term_left_description": "Produces expected and consistent outcomes",
|
||||
"term_right": "emergent",
|
||||
"term_right_description": "Produces unexpected or novel outcomes",
|
||||
"value": 5,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "exclusion",
|
||||
"term_left_description": "Creates barriers or excludes certain participants",
|
||||
"term_right": "inclusion",
|
||||
"term_right_description": "Reduces barriers and includes diverse participants",
|
||||
"value": 5,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "restraining",
|
||||
"term_left_description": "Fosters experiences of absurd complexity, alienation, and powerlessness",
|
||||
"term_right": "liberating",
|
||||
"term_right_description": "Enables participants to carry out desired activities with less work or thought",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "dead",
|
||||
"term_left_description": "Not actively utilized by relevant participants",
|
||||
"term_right": "alive",
|
||||
"term_right_description": "Actively utilized by relevant participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"analysis": [
|
||||
{
|
||||
"term_left": "hardness",
|
||||
"term_left_description": "The protocol tends toward properties characterized by hardness",
|
||||
"term_right": "softness",
|
||||
"term_right_description": "The protocol tends toward properties characterized by softness",
|
||||
"instructions": "Take all the 'value' fields in the gradients above and determine a mean. Round it to the nearest integer. That is the 'value' here.",
|
||||
"automated": true,
|
||||
"value": 4,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "polarized",
|
||||
"term_left_description": "The analyst tended toward more extreme high or low readings",
|
||||
"term_right": "centrist",
|
||||
"term_right_description": "The analyst tended toward readings at the middle of the gradients",
|
||||
"instructions": "Take all the 'value' fields in the gradients above. Assess their degree of polarization. For instance, if all the values are either 1 or 9, the output would be 1, and if all of them are 5, the output would be 9.",
|
||||
"automated": true,
|
||||
"value": 7,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "bureaucratic",
|
||||
"term_left_description": "The protocol exhibits institutional, formal, top-down characteristics with centralized control and external enforcement",
|
||||
"term_right": "relational",
|
||||
"term_right_description": "The protocol exhibits community-based, emergent, bottom-up characteristics with distributed coordination and voluntary participation",
|
||||
"instructions": "Based on the diagnostic readings, calculate the protocol's position using Linear Discriminant Analysis. The LDA score is scaled to the 1-9 range, where 1 represents strongly bureaucratic/institutional protocols and 9 represents strongly relational/cultural protocols. A score of 5 indicates a protocol near the boundary exhibiting characteristics of both families.",
|
||||
"automated": true,
|
||||
"value": 8,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "not useful",
|
||||
"term_left_description": "The bicorder was not useful or relevant for analyzing this protocol",
|
||||
"term_right": "very useful",
|
||||
"term_right_description": "The bicorder was very useful and relevant for analyzing this protocol",
|
||||
"instructions": "Evaluate the usefulness of this bicorder as a tool for analyzing this protocol, considering whether the gradient terms seemed revealing or irrelevant.",
|
||||
"automated": false,
|
||||
"value": null,
|
||||
"notes": null
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -0,0 +1,285 @@
|
||||
{
|
||||
"name": "Protocol Bicorder",
|
||||
"schema": "bicorder.schema.json",
|
||||
"version": "1.2.4",
|
||||
"description": "A diagnostic tool for the study of protocols",
|
||||
"author": "Nathan Schneider",
|
||||
"date_modified": "2025-12-02",
|
||||
"metadata": {
|
||||
"protocol": "WeChat payment for food",
|
||||
"description": "Paying for food in China",
|
||||
"analyst": "Jon Bo",
|
||||
"standpoint": "User paying for the food",
|
||||
"timestamp": "2026-01-16T22:57:20.966Z",
|
||||
"shortform": true
|
||||
},
|
||||
"diagnostic": [
|
||||
{
|
||||
"set_name": "Design",
|
||||
"set_description": "How the protocol is created and remembered",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "explicit",
|
||||
"term_left_description": "The design is stated explicitly somewhere that is accessible to participants",
|
||||
"term_right": "implicit",
|
||||
"term_right_description": "The design is not stated explicitly and is learned by use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "precise",
|
||||
"term_left_description": "The design is specified with a high level of precision that eliminates ambiguity in implementation",
|
||||
"term_right": "interpretive",
|
||||
"term_right_description": "The design is ambiguous, allowing participants a wide range of interpretation",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "institutional",
|
||||
"term_left_description": "Design occurs through processes controlled by powerful institutions",
|
||||
"term_right": "vernacular",
|
||||
"term_right_description": "Design occurs through evolving community interactions",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "documenting",
|
||||
"term_left_description": "The primary purpose is to document or validate activity that is occurring",
|
||||
"term_right": "enabling",
|
||||
"term_right_description": "The primary purpose is to enable activity that might not happen otherwise",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "static",
|
||||
"term_left_description": "Designed to be as fixed and unchanging as possible",
|
||||
"term_right": "malleable",
|
||||
"term_right_description": "Designed to be changed by participants according to evolving needs",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "technical",
|
||||
"term_left_description": "Primarily concerned with interactions among technologies",
|
||||
"term_right": "social",
|
||||
"term_right_description": "Primarily concerned with interactions among people or groups",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "universal",
|
||||
"term_left_description": "Meant for global adoption across different communities",
|
||||
"term_right": "particular",
|
||||
"term_right_description": "Tailored for a specific community",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "durable",
|
||||
"term_left_description": "Designed to be persistently available",
|
||||
"term_right": "ephemeral",
|
||||
"term_right_description": "Designed to vanish when no longer needed",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Entanglement",
|
||||
"set_description": "How the protocol relates with participant agents",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "macro",
|
||||
"term_left_description": "Operates at large scales involving many participants or broad scope",
|
||||
"term_right": "micro",
|
||||
"term_right_description": "Operates at small scales with few participants or narrow scope",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "sovereign",
|
||||
"term_left_description": "A distinctive operating logic, not subject to any other entity",
|
||||
"term_right": "subsidiary",
|
||||
"term_right_description": "An operating logic under the control of a particular entity",
|
||||
"value": 1,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "self-enforcing",
|
||||
"term_left_description": "Rules are automatically enforced through its own mechanisms",
|
||||
"term_right": "enforced",
|
||||
"term_right_description": "Rules require external enforcement by authorities or institutions",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "abstract",
|
||||
"term_left_description": "Participants learn the protocol by studying it intellectually",
|
||||
"term_right": "embodied",
|
||||
"term_right_description": "Participants learn the protocol by physically practicing it",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "obligatory",
|
||||
"term_left_description": "Participation is compulsory for a certain class of agents",
|
||||
"term_right": "voluntary",
|
||||
"term_right_description": "Participation in the protocol is optional and not coerced",
|
||||
"value": 5,
|
||||
"notes": "This one is interesting. I don't need to buy food but if I want to buy food I'm gonna need to use WeChat pay, modulo cash",
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "flocking",
|
||||
"term_left_description": "Coordination occurs through centralized direction or direct mimicry",
|
||||
"term_right": "swarming",
|
||||
"term_right_description": "Coordination occurs through distributed interactions without central direction",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "defensible",
|
||||
"term_left_description": "Strong boundaries and protections against external influence",
|
||||
"term_right": "exposed",
|
||||
"term_right_description": "Weak boundaries and vulnerable to external influence",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "monopolistic",
|
||||
"term_left_description": "Excludes the use of other protocols with similar purposes",
|
||||
"term_right": "pluralistic",
|
||||
"term_right_description": "Interoperates with other protocols and does not exclude their use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Experience",
|
||||
"set_description": "How the protocol is perceived in the context of its implementation",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "sufficient",
|
||||
"term_left_description": "Adequately meets the needs and goals of participants",
|
||||
"term_right": "limited",
|
||||
"term_right_description": "Does not, on its own, adequately meet the needs and goals of participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "crystallized",
|
||||
"term_left_description": "Content or meaning are settled and widely agreed upon",
|
||||
"term_right": "contested",
|
||||
"term_right_description": "Content or meaning are disputed or under debate",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "trust-evading",
|
||||
"term_left_description": "Minimizes the need for trust among participants",
|
||||
"term_right": "trust-inducing",
|
||||
"term_right_description": "Relies on or cultivates trust among participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "predictable",
|
||||
"term_left_description": "Produces expected and consistent outcomes",
|
||||
"term_right": "emergent",
|
||||
"term_right_description": "Produces unexpected or novel outcomes",
|
||||
"value": 7,
|
||||
"notes": "Good luck if you have a foreign card",
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "exclusion",
|
||||
"term_left_description": "Creates barriers or excludes certain participants",
|
||||
"term_right": "inclusion",
|
||||
"term_right_description": "Reduces barriers and includes diverse participants",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "restraining",
|
||||
"term_left_description": "Fosters experiences of absurd complexity, alienation, and powerlessness",
|
||||
"term_right": "liberating",
|
||||
"term_right_description": "Enables participants to carry out desired activities with less work or thought",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "dead",
|
||||
"term_left_description": "Not actively utilized by relevant participants",
|
||||
"term_right": "alive",
|
||||
"term_right_description": "Actively utilized by relevant participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"analysis": [
|
||||
{
|
||||
"term_left": "hardness",
|
||||
"term_left_description": "The protocol tends toward properties characterized by hardness",
|
||||
"term_right": "softness",
|
||||
"term_right_description": "The protocol tends toward properties characterized by softness",
|
||||
"instructions": "Take all the 'value' fields in the gradients above and determine a mean. Round it to the nearest integer. That is the 'value' here.",
|
||||
"automated": true,
|
||||
"value": 5,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "polarized",
|
||||
"term_left_description": "The analyst tended toward more extreme high or low readings",
|
||||
"term_right": "centrist",
|
||||
"term_right_description": "The analyst tended toward readings at the middle of the gradients",
|
||||
"instructions": "Take all the 'value' fields in the gradients above. Assess their degree of polarization. For instance, if all the values are either 1 or 9, the output would be 1, and if all of them are 5, the output would be 9.",
|
||||
"automated": true,
|
||||
"value": 3,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "bureaucratic",
|
||||
"term_left_description": "The protocol exhibits institutional, formal, top-down characteristics with centralized control and external enforcement",
|
||||
"term_right": "relational",
|
||||
"term_right_description": "The protocol exhibits community-based, emergent, bottom-up characteristics with distributed coordination and voluntary participation",
|
||||
"instructions": "Based on the diagnostic readings, calculate the protocol's position using Linear Discriminant Analysis. The LDA score is scaled to the 1-9 range, where 1 represents strongly bureaucratic/institutional protocols and 9 represents strongly relational/cultural protocols. A score of 5 indicates a protocol near the boundary exhibiting characteristics of both families.",
|
||||
"automated": true,
|
||||
"value": 3,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "not useful",
|
||||
"term_left_description": "The bicorder was not useful or relevant for analyzing this protocol",
|
||||
"term_right": "very useful",
|
||||
"term_right_description": "The bicorder was very useful and relevant for analyzing this protocol",
|
||||
"instructions": "Evaluate the usefulness of this bicorder as a tool for analyzing this protocol, considering whether the gradient terms seemed revealing or irrelevant.",
|
||||
"automated": false,
|
||||
"value": null,
|
||||
"notes": null
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -0,0 +1,285 @@
|
||||
{
|
||||
"name": "Protocol Bicorder",
|
||||
"schema": "bicorder.schema.json",
|
||||
"version": "1.2.4",
|
||||
"description": "A diagnostic tool for the study of protocols",
|
||||
"author": "Nathan Schneider",
|
||||
"date_modified": "2025-12-02",
|
||||
"metadata": {
|
||||
"protocol": "Dating Apps",
|
||||
"description": "Scheduling a date from a dating app",
|
||||
"analyst": "Theo",
|
||||
"standpoint": "Observer (former subject - now free)",
|
||||
"timestamp": "2026-01-16T22:57:57.758Z",
|
||||
"shortform": true
|
||||
},
|
||||
"diagnostic": [
|
||||
{
|
||||
"set_name": "Design",
|
||||
"set_description": "How the protocol is created and remembered",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "explicit",
|
||||
"term_left_description": "The design is stated explicitly somewhere that is accessible to participants",
|
||||
"term_right": "implicit",
|
||||
"term_right_description": "The design is not stated explicitly and is learned by use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "precise",
|
||||
"term_left_description": "The design is specified with a high level of precision that eliminates ambiguity in implementation",
|
||||
"term_right": "interpretive",
|
||||
"term_right_description": "The design is ambiguous, allowing participants a wide range of interpretation",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "institutional",
|
||||
"term_left_description": "Design occurs through processes controlled by powerful institutions",
|
||||
"term_right": "vernacular",
|
||||
"term_right_description": "Design occurs through evolving community interactions",
|
||||
"value": 6,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "documenting",
|
||||
"term_left_description": "The primary purpose is to document or validate activity that is occurring",
|
||||
"term_right": "enabling",
|
||||
"term_right_description": "The primary purpose is to enable activity that might not happen otherwise",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "static",
|
||||
"term_left_description": "Designed to be as fixed and unchanging as possible",
|
||||
"term_right": "malleable",
|
||||
"term_right_description": "Designed to be changed by participants according to evolving needs",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "technical",
|
||||
"term_left_description": "Primarily concerned with interactions among technologies",
|
||||
"term_right": "social",
|
||||
"term_right_description": "Primarily concerned with interactions among people or groups",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "universal",
|
||||
"term_left_description": "Meant for global adoption across different communities",
|
||||
"term_right": "particular",
|
||||
"term_right_description": "Tailored for a specific community",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "durable",
|
||||
"term_left_description": "Designed to be persistently available",
|
||||
"term_right": "ephemeral",
|
||||
"term_right_description": "Designed to vanish when no longer needed",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Entanglement",
|
||||
"set_description": "How the protocol relates with participant agents",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "macro",
|
||||
"term_left_description": "Operates at large scales involving many participants or broad scope",
|
||||
"term_right": "micro",
|
||||
"term_right_description": "Operates at small scales with few participants or narrow scope",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "sovereign",
|
||||
"term_left_description": "A distinctive operating logic, not subject to any other entity",
|
||||
"term_right": "subsidiary",
|
||||
"term_right_description": "An operating logic under the control of a particular entity",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "self-enforcing",
|
||||
"term_left_description": "Rules are automatically enforced through its own mechanisms",
|
||||
"term_right": "enforced",
|
||||
"term_right_description": "Rules require external enforcement by authorities or institutions",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "abstract",
|
||||
"term_left_description": "Participants learn the protocol by studying it intellectually",
|
||||
"term_right": "embodied",
|
||||
"term_right_description": "Participants learn the protocol by physically practicing it",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "obligatory",
|
||||
"term_left_description": "Participation is compulsory for a certain class of agents",
|
||||
"term_right": "voluntary",
|
||||
"term_right_description": "Participation in the protocol is optional and not coerced",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "flocking",
|
||||
"term_left_description": "Coordination occurs through centralized direction or direct mimicry",
|
||||
"term_right": "swarming",
|
||||
"term_right_description": "Coordination occurs through distributed interactions without central direction",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "defensible",
|
||||
"term_left_description": "Strong boundaries and protections against external influence",
|
||||
"term_right": "exposed",
|
||||
"term_right_description": "Weak boundaries and vulnerable to external influence",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "monopolistic",
|
||||
"term_left_description": "Excludes the use of other protocols with similar purposes",
|
||||
"term_right": "pluralistic",
|
||||
"term_right_description": "Interoperates with other protocols and does not exclude their use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Experience",
|
||||
"set_description": "How the protocol is perceived in the context of its implementation",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "sufficient",
|
||||
"term_left_description": "Adequately meets the needs and goals of participants",
|
||||
"term_right": "limited",
|
||||
"term_right_description": "Does not, on its own, adequately meet the needs and goals of participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "crystallized",
|
||||
"term_left_description": "Content or meaning are settled and widely agreed upon",
|
||||
"term_right": "contested",
|
||||
"term_right_description": "Content or meaning are disputed or under debate",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "trust-evading",
|
||||
"term_left_description": "Minimizes the need for trust among participants",
|
||||
"term_right": "trust-inducing",
|
||||
"term_right_description": "Relies on or cultivates trust among participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "predictable",
|
||||
"term_left_description": "Produces expected and consistent outcomes",
|
||||
"term_right": "emergent",
|
||||
"term_right_description": "Produces unexpected or novel outcomes",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "exclusion",
|
||||
"term_left_description": "Creates barriers or excludes certain participants",
|
||||
"term_right": "inclusion",
|
||||
"term_right_description": "Reduces barriers and includes diverse participants",
|
||||
"value": 5,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "restraining",
|
||||
"term_left_description": "Fosters experiences of absurd complexity, alienation, and powerlessness",
|
||||
"term_right": "liberating",
|
||||
"term_right_description": "Enables participants to carry out desired activities with less work or thought",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "dead",
|
||||
"term_left_description": "Not actively utilized by relevant participants",
|
||||
"term_right": "alive",
|
||||
"term_right_description": "Actively utilized by relevant participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"analysis": [
|
||||
{
|
||||
"term_left": "hardness",
|
||||
"term_left_description": "The protocol tends toward properties characterized by hardness",
|
||||
"term_right": "softness",
|
||||
"term_right_description": "The protocol tends toward properties characterized by softness",
|
||||
"instructions": "Take all the 'value' fields in the gradients above and determine a mean. Round it to the nearest integer. That is the 'value' here.",
|
||||
"automated": true,
|
||||
"value": 5,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "polarized",
|
||||
"term_left_description": "The analyst tended toward more extreme high or low readings",
|
||||
"term_right": "centrist",
|
||||
"term_right_description": "The analyst tended toward readings at the middle of the gradients",
|
||||
"instructions": "Take all the 'value' fields in the gradients above. Assess their degree of polarization. For instance, if all the values are either 1 or 9, the output would be 1, and if all of them are 5, the output would be 9.",
|
||||
"automated": true,
|
||||
"value": 5,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "bureaucratic",
|
||||
"term_left_description": "The protocol exhibits institutional, formal, top-down characteristics with centralized control and external enforcement",
|
||||
"term_right": "relational",
|
||||
"term_right_description": "The protocol exhibits community-based, emergent, bottom-up characteristics with distributed coordination and voluntary participation",
|
||||
"instructions": "Based on the diagnostic readings, calculate the protocol's position using Linear Discriminant Analysis. The LDA score is scaled to the 1-9 range, where 1 represents strongly bureaucratic/institutional protocols and 9 represents strongly relational/cultural protocols. A score of 5 indicates a protocol near the boundary exhibiting characteristics of both families.",
|
||||
"automated": true,
|
||||
"value": 1,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "not useful",
|
||||
"term_left_description": "The bicorder was not useful or relevant for analyzing this protocol",
|
||||
"term_right": "very useful",
|
||||
"term_right_description": "The bicorder was very useful and relevant for analyzing this protocol",
|
||||
"instructions": "Evaluate the usefulness of this bicorder as a tool for analyzing this protocol, considering whether the gradient terms seemed revealing or irrelevant.",
|
||||
"automated": false,
|
||||
"value": null,
|
||||
"notes": null
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -0,0 +1,285 @@
|
||||
{
|
||||
"name": "Protocol Bicorder",
|
||||
"schema": "bicorder.schema.json",
|
||||
"version": "1.2.4",
|
||||
"description": "A diagnostic tool for the study of protocols",
|
||||
"author": "Nathan Schneider",
|
||||
"date_modified": "2025-12-02",
|
||||
"metadata": {
|
||||
"protocol": "On Protocols: Creating Habitat",
|
||||
"description": "How does our understanding with and relationships with protocols understand or constrain individual and collective agency?",
|
||||
"analyst": "Todd Youngblood",
|
||||
"standpoint": "RegenHub Boulder - 1515 Walnut",
|
||||
"timestamp": "2026-01-16T22:56:12.944Z",
|
||||
"shortform": true
|
||||
},
|
||||
"diagnostic": [
|
||||
{
|
||||
"set_name": "Design",
|
||||
"set_description": "How the protocol is created and remembered",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "explicit",
|
||||
"term_left_description": "The design is stated explicitly somewhere that is accessible to participants",
|
||||
"term_right": "implicit",
|
||||
"term_right_description": "The design is not stated explicitly and is learned by use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "precise",
|
||||
"term_left_description": "The design is specified with a high level of precision that eliminates ambiguity in implementation",
|
||||
"term_right": "interpretive",
|
||||
"term_right_description": "The design is ambiguous, allowing participants a wide range of interpretation",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "institutional",
|
||||
"term_left_description": "Design occurs through processes controlled by powerful institutions",
|
||||
"term_right": "vernacular",
|
||||
"term_right_description": "Design occurs through evolving community interactions",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "documenting",
|
||||
"term_left_description": "The primary purpose is to document or validate activity that is occurring",
|
||||
"term_right": "enabling",
|
||||
"term_right_description": "The primary purpose is to enable activity that might not happen otherwise",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "static",
|
||||
"term_left_description": "Designed to be as fixed and unchanging as possible",
|
||||
"term_right": "malleable",
|
||||
"term_right_description": "Designed to be changed by participants according to evolving needs",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "technical",
|
||||
"term_left_description": "Primarily concerned with interactions among technologies",
|
||||
"term_right": "social",
|
||||
"term_right_description": "Primarily concerned with interactions among people or groups",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "universal",
|
||||
"term_left_description": "Meant for global adoption across different communities",
|
||||
"term_right": "particular",
|
||||
"term_right_description": "Tailored for a specific community",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "durable",
|
||||
"term_left_description": "Designed to be persistently available",
|
||||
"term_right": "ephemeral",
|
||||
"term_right_description": "Designed to vanish when no longer needed",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Entanglement",
|
||||
"set_description": "How the protocol relates with participant agents",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "macro",
|
||||
"term_left_description": "Operates at large scales involving many participants or broad scope",
|
||||
"term_right": "micro",
|
||||
"term_right_description": "Operates at small scales with few participants or narrow scope",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "sovereign",
|
||||
"term_left_description": "A distinctive operating logic, not subject to any other entity",
|
||||
"term_right": "subsidiary",
|
||||
"term_right_description": "An operating logic under the control of a particular entity",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "self-enforcing",
|
||||
"term_left_description": "Rules are automatically enforced through its own mechanisms",
|
||||
"term_right": "enforced",
|
||||
"term_right_description": "Rules require external enforcement by authorities or institutions",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "abstract",
|
||||
"term_left_description": "Participants learn the protocol by studying it intellectually",
|
||||
"term_right": "embodied",
|
||||
"term_right_description": "Participants learn the protocol by physically practicing it",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "obligatory",
|
||||
"term_left_description": "Participation is compulsory for a certain class of agents",
|
||||
"term_right": "voluntary",
|
||||
"term_right_description": "Participation in the protocol is optional and not coerced",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "flocking",
|
||||
"term_left_description": "Coordination occurs through centralized direction or direct mimicry",
|
||||
"term_right": "swarming",
|
||||
"term_right_description": "Coordination occurs through distributed interactions without central direction",
|
||||
"value": 4,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "defensible",
|
||||
"term_left_description": "Strong boundaries and protections against external influence",
|
||||
"term_right": "exposed",
|
||||
"term_right_description": "Weak boundaries and vulnerable to external influence",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "monopolistic",
|
||||
"term_left_description": "Excludes the use of other protocols with similar purposes",
|
||||
"term_right": "pluralistic",
|
||||
"term_right_description": "Interoperates with other protocols and does not exclude their use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Experience",
|
||||
"set_description": "How the protocol is perceived in the context of its implementation",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "sufficient",
|
||||
"term_left_description": "Adequately meets the needs and goals of participants",
|
||||
"term_right": "limited",
|
||||
"term_right_description": "Does not, on its own, adequately meet the needs and goals of participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "crystallized",
|
||||
"term_left_description": "Content or meaning are settled and widely agreed upon",
|
||||
"term_right": "contested",
|
||||
"term_right_description": "Content or meaning are disputed or under debate",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "trust-evading",
|
||||
"term_left_description": "Minimizes the need for trust among participants",
|
||||
"term_right": "trust-inducing",
|
||||
"term_right_description": "Relies on or cultivates trust among participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "predictable",
|
||||
"term_left_description": "Produces expected and consistent outcomes",
|
||||
"term_right": "emergent",
|
||||
"term_right_description": "Produces unexpected or novel outcomes",
|
||||
"value": 8,
|
||||
"notes": "So organic.",
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "exclusion",
|
||||
"term_left_description": "Creates barriers or excludes certain participants",
|
||||
"term_right": "inclusion",
|
||||
"term_right_description": "Reduces barriers and includes diverse participants",
|
||||
"value": 8,
|
||||
"notes": "I am here now.",
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "restraining",
|
||||
"term_left_description": "Fosters experiences of absurd complexity, alienation, and powerlessness",
|
||||
"term_right": "liberating",
|
||||
"term_right_description": "Enables participants to carry out desired activities with less work or thought",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "dead",
|
||||
"term_left_description": "Not actively utilized by relevant participants",
|
||||
"term_right": "alive",
|
||||
"term_right_description": "Actively utilized by relevant participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"analysis": [
|
||||
{
|
||||
"term_left": "hardness",
|
||||
"term_left_description": "The protocol tends toward properties characterized by hardness",
|
||||
"term_right": "softness",
|
||||
"term_right_description": "The protocol tends toward properties characterized by softness",
|
||||
"instructions": "Take all the 'value' fields in the gradients above and determine a mean. Round it to the nearest integer. That is the 'value' here.",
|
||||
"automated": true,
|
||||
"value": 6,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "polarized",
|
||||
"term_left_description": "The analyst tended toward more extreme high or low readings",
|
||||
"term_right": "centrist",
|
||||
"term_right_description": "The analyst tended toward readings at the middle of the gradients",
|
||||
"instructions": "Take all the 'value' fields in the gradients above. Assess their degree of polarization. For instance, if all the values are either 1 or 9, the output would be 1, and if all of them are 5, the output would be 9.",
|
||||
"automated": true,
|
||||
"value": 4,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "bureaucratic",
|
||||
"term_left_description": "The protocol exhibits institutional, formal, top-down characteristics with centralized control and external enforcement",
|
||||
"term_right": "relational",
|
||||
"term_right_description": "The protocol exhibits community-based, emergent, bottom-up characteristics with distributed coordination and voluntary participation",
|
||||
"instructions": "Based on the diagnostic readings, calculate the protocol's position using Linear Discriminant Analysis. The LDA score is scaled to the 1-9 range, where 1 represents strongly bureaucratic/institutional protocols and 9 represents strongly relational/cultural protocols. A score of 5 indicates a protocol near the boundary exhibiting characteristics of both families.",
|
||||
"automated": true,
|
||||
"value": 1,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "not useful",
|
||||
"term_left_description": "The bicorder was not useful or relevant for analyzing this protocol",
|
||||
"term_right": "very useful",
|
||||
"term_right_description": "The bicorder was very useful and relevant for analyzing this protocol",
|
||||
"instructions": "Evaluate the usefulness of this bicorder as a tool for analyzing this protocol, considering whether the gradient terms seemed revealing or irrelevant.",
|
||||
"automated": false,
|
||||
"value": null,
|
||||
"notes": null
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -0,0 +1,285 @@
|
||||
{
|
||||
"name": "Protocol Bicorder",
|
||||
"schema": "bicorder.schema.json",
|
||||
"version": "1.2.4",
|
||||
"description": "A diagnostic tool for the study of protocols",
|
||||
"author": "Nathan Schneider",
|
||||
"date_modified": "2025-12-02",
|
||||
"metadata": {
|
||||
"protocol": "We* Are Agentic",
|
||||
"description": "Moving through 6 years of study, from *I have Agency, to We* Have Agency, to We* Are Agentic in 2026- providing *Agency to people is the most critical layer to Designing value-based Communication ",
|
||||
"analyst": "Neil M Yarnal",
|
||||
"standpoint": "Local* is Relative ",
|
||||
"timestamp": "2026-01-16T22:56:25.350Z",
|
||||
"shortform": true
|
||||
},
|
||||
"diagnostic": [
|
||||
{
|
||||
"set_name": "Design",
|
||||
"set_description": "How the protocol is created and remembered",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "explicit",
|
||||
"term_left_description": "The design is stated explicitly somewhere that is accessible to participants",
|
||||
"term_right": "implicit",
|
||||
"term_right_description": "The design is not stated explicitly and is learned by use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "precise",
|
||||
"term_left_description": "The design is specified with a high level of precision that eliminates ambiguity in implementation",
|
||||
"term_right": "interpretive",
|
||||
"term_right_description": "The design is ambiguous, allowing participants a wide range of interpretation",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "institutional",
|
||||
"term_left_description": "Design occurs through processes controlled by powerful institutions",
|
||||
"term_right": "vernacular",
|
||||
"term_right_description": "Design occurs through evolving community interactions",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "documenting",
|
||||
"term_left_description": "The primary purpose is to document or validate activity that is occurring",
|
||||
"term_right": "enabling",
|
||||
"term_right_description": "The primary purpose is to enable activity that might not happen otherwise",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "static",
|
||||
"term_left_description": "Designed to be as fixed and unchanging as possible",
|
||||
"term_right": "malleable",
|
||||
"term_right_description": "Designed to be changed by participants according to evolving needs",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "technical",
|
||||
"term_left_description": "Primarily concerned with interactions among technologies",
|
||||
"term_right": "social",
|
||||
"term_right_description": "Primarily concerned with interactions among people or groups",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "universal",
|
||||
"term_left_description": "Meant for global adoption across different communities",
|
||||
"term_right": "particular",
|
||||
"term_right_description": "Tailored for a specific community",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "durable",
|
||||
"term_left_description": "Designed to be persistently available",
|
||||
"term_right": "ephemeral",
|
||||
"term_right_description": "Designed to vanish when no longer needed",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Entanglement",
|
||||
"set_description": "How the protocol relates with participant agents",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "macro",
|
||||
"term_left_description": "Operates at large scales involving many participants or broad scope",
|
||||
"term_right": "micro",
|
||||
"term_right_description": "Operates at small scales with few participants or narrow scope",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "sovereign",
|
||||
"term_left_description": "A distinctive operating logic, not subject to any other entity",
|
||||
"term_right": "subsidiary",
|
||||
"term_right_description": "An operating logic under the control of a particular entity",
|
||||
"value": 5,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "self-enforcing",
|
||||
"term_left_description": "Rules are automatically enforced through its own mechanisms",
|
||||
"term_right": "enforced",
|
||||
"term_right_description": "Rules require external enforcement by authorities or institutions",
|
||||
"value": 5,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "abstract",
|
||||
"term_left_description": "Participants learn the protocol by studying it intellectually",
|
||||
"term_right": "embodied",
|
||||
"term_right_description": "Participants learn the protocol by physically practicing it",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "obligatory",
|
||||
"term_left_description": "Participation is compulsory for a certain class of agents",
|
||||
"term_right": "voluntary",
|
||||
"term_right_description": "Participation in the protocol is optional and not coerced",
|
||||
"value": 5,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "flocking",
|
||||
"term_left_description": "Coordination occurs through centralized direction or direct mimicry",
|
||||
"term_right": "swarming",
|
||||
"term_right_description": "Coordination occurs through distributed interactions without central direction",
|
||||
"value": 5,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "defensible",
|
||||
"term_left_description": "Strong boundaries and protections against external influence",
|
||||
"term_right": "exposed",
|
||||
"term_right_description": "Weak boundaries and vulnerable to external influence",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "monopolistic",
|
||||
"term_left_description": "Excludes the use of other protocols with similar purposes",
|
||||
"term_right": "pluralistic",
|
||||
"term_right_description": "Interoperates with other protocols and does not exclude their use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Experience",
|
||||
"set_description": "How the protocol is perceived in the context of its implementation",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "sufficient",
|
||||
"term_left_description": "Adequately meets the needs and goals of participants",
|
||||
"term_right": "limited",
|
||||
"term_right_description": "Does not, on its own, adequately meet the needs and goals of participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "crystallized",
|
||||
"term_left_description": "Content or meaning are settled and widely agreed upon",
|
||||
"term_right": "contested",
|
||||
"term_right_description": "Content or meaning are disputed or under debate",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "trust-evading",
|
||||
"term_left_description": "Minimizes the need for trust among participants",
|
||||
"term_right": "trust-inducing",
|
||||
"term_right_description": "Relies on or cultivates trust among participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "predictable",
|
||||
"term_left_description": "Produces expected and consistent outcomes",
|
||||
"term_right": "emergent",
|
||||
"term_right_description": "Produces unexpected or novel outcomes",
|
||||
"value": 6,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "exclusion",
|
||||
"term_left_description": "Creates barriers or excludes certain participants",
|
||||
"term_right": "inclusion",
|
||||
"term_right_description": "Reduces barriers and includes diverse participants",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "restraining",
|
||||
"term_left_description": "Fosters experiences of absurd complexity, alienation, and powerlessness",
|
||||
"term_right": "liberating",
|
||||
"term_right_description": "Enables participants to carry out desired activities with less work or thought",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "dead",
|
||||
"term_left_description": "Not actively utilized by relevant participants",
|
||||
"term_right": "alive",
|
||||
"term_right_description": "Actively utilized by relevant participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"analysis": [
|
||||
{
|
||||
"term_left": "hardness",
|
||||
"term_left_description": "The protocol tends toward properties characterized by hardness",
|
||||
"term_right": "softness",
|
||||
"term_right_description": "The protocol tends toward properties characterized by softness",
|
||||
"instructions": "Take all the 'value' fields in the gradients above and determine a mean. Round it to the nearest integer. That is the 'value' here.",
|
||||
"automated": true,
|
||||
"value": 6,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "polarized",
|
||||
"term_left_description": "The analyst tended toward more extreme high or low readings",
|
||||
"term_right": "centrist",
|
||||
"term_right_description": "The analyst tended toward readings at the middle of the gradients",
|
||||
"instructions": "Take all the 'value' fields in the gradients above. Assess their degree of polarization. For instance, if all the values are either 1 or 9, the output would be 1, and if all of them are 5, the output would be 9.",
|
||||
"automated": true,
|
||||
"value": 6,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "bureaucratic",
|
||||
"term_left_description": "The protocol exhibits institutional, formal, top-down characteristics with centralized control and external enforcement",
|
||||
"term_right": "relational",
|
||||
"term_right_description": "The protocol exhibits community-based, emergent, bottom-up characteristics with distributed coordination and voluntary participation",
|
||||
"instructions": "Based on the diagnostic readings, calculate the protocol's position using Linear Discriminant Analysis. The LDA score is scaled to the 1-9 range, where 1 represents strongly bureaucratic/institutional protocols and 9 represents strongly relational/cultural protocols. A score of 5 indicates a protocol near the boundary exhibiting characteristics of both families.",
|
||||
"automated": true,
|
||||
"value": 1,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "not useful",
|
||||
"term_left_description": "The bicorder was not useful or relevant for analyzing this protocol",
|
||||
"term_right": "very useful",
|
||||
"term_right_description": "The bicorder was very useful and relevant for analyzing this protocol",
|
||||
"instructions": "Evaluate the usefulness of this bicorder as a tool for analyzing this protocol, considering whether the gradient terms seemed revealing or irrelevant.",
|
||||
"automated": false,
|
||||
"value": null,
|
||||
"notes": null
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -0,0 +1,285 @@
|
||||
{
|
||||
"name": "Protocol Bicorder",
|
||||
"schema": "bicorder.schema.json",
|
||||
"version": "1.2.4",
|
||||
"description": "A diagnostic tool for the study of protocols",
|
||||
"author": "Nathan Schneider",
|
||||
"date_modified": "2025-12-02",
|
||||
"metadata": {
|
||||
"protocol": "The gift",
|
||||
"description": "Offer prior to receipt. ",
|
||||
"analyst": "Tayken",
|
||||
"standpoint": "Selflessness",
|
||||
"timestamp": "2026-01-16T22:56:14.318Z",
|
||||
"shortform": true
|
||||
},
|
||||
"diagnostic": [
|
||||
{
|
||||
"set_name": "Design",
|
||||
"set_description": "How the protocol is created and remembered",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "explicit",
|
||||
"term_left_description": "The design is stated explicitly somewhere that is accessible to participants",
|
||||
"term_right": "implicit",
|
||||
"term_right_description": "The design is not stated explicitly and is learned by use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "precise",
|
||||
"term_left_description": "The design is specified with a high level of precision that eliminates ambiguity in implementation",
|
||||
"term_right": "interpretive",
|
||||
"term_right_description": "The design is ambiguous, allowing participants a wide range of interpretation",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "institutional",
|
||||
"term_left_description": "Design occurs through processes controlled by powerful institutions",
|
||||
"term_right": "vernacular",
|
||||
"term_right_description": "Design occurs through evolving community interactions",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "documenting",
|
||||
"term_left_description": "The primary purpose is to document or validate activity that is occurring",
|
||||
"term_right": "enabling",
|
||||
"term_right_description": "The primary purpose is to enable activity that might not happen otherwise",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "static",
|
||||
"term_left_description": "Designed to be as fixed and unchanging as possible",
|
||||
"term_right": "malleable",
|
||||
"term_right_description": "Designed to be changed by participants according to evolving needs",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "technical",
|
||||
"term_left_description": "Primarily concerned with interactions among technologies",
|
||||
"term_right": "social",
|
||||
"term_right_description": "Primarily concerned with interactions among people or groups",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "universal",
|
||||
"term_left_description": "Meant for global adoption across different communities",
|
||||
"term_right": "particular",
|
||||
"term_right_description": "Tailored for a specific community",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "durable",
|
||||
"term_left_description": "Designed to be persistently available",
|
||||
"term_right": "ephemeral",
|
||||
"term_right_description": "Designed to vanish when no longer needed",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Entanglement",
|
||||
"set_description": "How the protocol relates with participant agents",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "macro",
|
||||
"term_left_description": "Operates at large scales involving many participants or broad scope",
|
||||
"term_right": "micro",
|
||||
"term_right_description": "Operates at small scales with few participants or narrow scope",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "sovereign",
|
||||
"term_left_description": "A distinctive operating logic, not subject to any other entity",
|
||||
"term_right": "subsidiary",
|
||||
"term_right_description": "An operating logic under the control of a particular entity",
|
||||
"value": 6,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "self-enforcing",
|
||||
"term_left_description": "Rules are automatically enforced through its own mechanisms",
|
||||
"term_right": "enforced",
|
||||
"term_right_description": "Rules require external enforcement by authorities or institutions",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "abstract",
|
||||
"term_left_description": "Participants learn the protocol by studying it intellectually",
|
||||
"term_right": "embodied",
|
||||
"term_right_description": "Participants learn the protocol by physically practicing it",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "obligatory",
|
||||
"term_left_description": "Participation is compulsory for a certain class of agents",
|
||||
"term_right": "voluntary",
|
||||
"term_right_description": "Participation in the protocol is optional and not coerced",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "flocking",
|
||||
"term_left_description": "Coordination occurs through centralized direction or direct mimicry",
|
||||
"term_right": "swarming",
|
||||
"term_right_description": "Coordination occurs through distributed interactions without central direction",
|
||||
"value": 6,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "defensible",
|
||||
"term_left_description": "Strong boundaries and protections against external influence",
|
||||
"term_right": "exposed",
|
||||
"term_right_description": "Weak boundaries and vulnerable to external influence",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "monopolistic",
|
||||
"term_left_description": "Excludes the use of other protocols with similar purposes",
|
||||
"term_right": "pluralistic",
|
||||
"term_right_description": "Interoperates with other protocols and does not exclude their use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Experience",
|
||||
"set_description": "How the protocol is perceived in the context of its implementation",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "sufficient",
|
||||
"term_left_description": "Adequately meets the needs and goals of participants",
|
||||
"term_right": "limited",
|
||||
"term_right_description": "Does not, on its own, adequately meet the needs and goals of participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "crystallized",
|
||||
"term_left_description": "Content or meaning are settled and widely agreed upon",
|
||||
"term_right": "contested",
|
||||
"term_right_description": "Content or meaning are disputed or under debate",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "trust-evading",
|
||||
"term_left_description": "Minimizes the need for trust among participants",
|
||||
"term_right": "trust-inducing",
|
||||
"term_right_description": "Relies on or cultivates trust among participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "predictable",
|
||||
"term_left_description": "Produces expected and consistent outcomes",
|
||||
"term_right": "emergent",
|
||||
"term_right_description": "Produces unexpected or novel outcomes",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "exclusion",
|
||||
"term_left_description": "Creates barriers or excludes certain participants",
|
||||
"term_right": "inclusion",
|
||||
"term_right_description": "Reduces barriers and includes diverse participants",
|
||||
"value": 1,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "restraining",
|
||||
"term_left_description": "Fosters experiences of absurd complexity, alienation, and powerlessness",
|
||||
"term_right": "liberating",
|
||||
"term_right_description": "Enables participants to carry out desired activities with less work or thought",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "dead",
|
||||
"term_left_description": "Not actively utilized by relevant participants",
|
||||
"term_right": "alive",
|
||||
"term_right_description": "Actively utilized by relevant participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"analysis": [
|
||||
{
|
||||
"term_left": "hardness",
|
||||
"term_left_description": "The protocol tends toward properties characterized by hardness",
|
||||
"term_right": "softness",
|
||||
"term_right_description": "The protocol tends toward properties characterized by softness",
|
||||
"instructions": "Take all the 'value' fields in the gradients above and determine a mean. Round it to the nearest integer. That is the 'value' here.",
|
||||
"automated": true,
|
||||
"value": 4,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "polarized",
|
||||
"term_left_description": "The analyst tended toward more extreme high or low readings",
|
||||
"term_right": "centrist",
|
||||
"term_right_description": "The analyst tended toward readings at the middle of the gradients",
|
||||
"instructions": "Take all the 'value' fields in the gradients above. Assess their degree of polarization. For instance, if all the values are either 1 or 9, the output would be 1, and if all of them are 5, the output would be 9.",
|
||||
"automated": true,
|
||||
"value": 4,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "bureaucratic",
|
||||
"term_left_description": "The protocol exhibits institutional, formal, top-down characteristics with centralized control and external enforcement",
|
||||
"term_right": "relational",
|
||||
"term_right_description": "The protocol exhibits community-based, emergent, bottom-up characteristics with distributed coordination and voluntary participation",
|
||||
"instructions": "Based on the diagnostic readings, calculate the protocol's position using Linear Discriminant Analysis. The LDA score is scaled to the 1-9 range, where 1 represents strongly bureaucratic/institutional protocols and 9 represents strongly relational/cultural protocols. A score of 5 indicates a protocol near the boundary exhibiting characteristics of both families.",
|
||||
"automated": true,
|
||||
"value": 9,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "not useful",
|
||||
"term_left_description": "The bicorder was not useful or relevant for analyzing this protocol",
|
||||
"term_right": "very useful",
|
||||
"term_right_description": "The bicorder was very useful and relevant for analyzing this protocol",
|
||||
"instructions": "Evaluate the usefulness of this bicorder as a tool for analyzing this protocol, considering whether the gradient terms seemed revealing or irrelevant.",
|
||||
"automated": false,
|
||||
"value": null,
|
||||
"notes": null
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -0,0 +1,285 @@
|
||||
{
|
||||
"name": "Protocol Bicorder",
|
||||
"schema": "bicorder.schema.json",
|
||||
"version": "1.2.4",
|
||||
"description": "A diagnostic tool for the study of protocols",
|
||||
"author": "Nathan Schneider",
|
||||
"date_modified": "2025-12-02",
|
||||
"metadata": {
|
||||
"protocol": "Claude Agent SDK ",
|
||||
"description": "A protocol for communicating agentically with Anthropics Claude API ",
|
||||
"analyst": "@unforced",
|
||||
"standpoint": "Active user",
|
||||
"timestamp": "2026-01-16T23:03:14.147Z",
|
||||
"shortform": true
|
||||
},
|
||||
"diagnostic": [
|
||||
{
|
||||
"set_name": "Design",
|
||||
"set_description": "How the protocol is created and remembered",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "explicit",
|
||||
"term_left_description": "The design is stated explicitly somewhere that is accessible to participants",
|
||||
"term_right": "implicit",
|
||||
"term_right_description": "The design is not stated explicitly and is learned by use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "precise",
|
||||
"term_left_description": "The design is specified with a high level of precision that eliminates ambiguity in implementation",
|
||||
"term_right": "interpretive",
|
||||
"term_right_description": "The design is ambiguous, allowing participants a wide range of interpretation",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "institutional",
|
||||
"term_left_description": "Design occurs through processes controlled by powerful institutions",
|
||||
"term_right": "vernacular",
|
||||
"term_right_description": "Design occurs through evolving community interactions",
|
||||
"value": 6,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "documenting",
|
||||
"term_left_description": "The primary purpose is to document or validate activity that is occurring",
|
||||
"term_right": "enabling",
|
||||
"term_right_description": "The primary purpose is to enable activity that might not happen otherwise",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "static",
|
||||
"term_left_description": "Designed to be as fixed and unchanging as possible",
|
||||
"term_right": "malleable",
|
||||
"term_right_description": "Designed to be changed by participants according to evolving needs",
|
||||
"value": 5,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "technical",
|
||||
"term_left_description": "Primarily concerned with interactions among technologies",
|
||||
"term_right": "social",
|
||||
"term_right_description": "Primarily concerned with interactions among people or groups",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "universal",
|
||||
"term_left_description": "Meant for global adoption across different communities",
|
||||
"term_right": "particular",
|
||||
"term_right_description": "Tailored for a specific community",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "durable",
|
||||
"term_left_description": "Designed to be persistently available",
|
||||
"term_right": "ephemeral",
|
||||
"term_right_description": "Designed to vanish when no longer needed",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Entanglement",
|
||||
"set_description": "How the protocol relates with participant agents",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "macro",
|
||||
"term_left_description": "Operates at large scales involving many participants or broad scope",
|
||||
"term_right": "micro",
|
||||
"term_right_description": "Operates at small scales with few participants or narrow scope",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "sovereign",
|
||||
"term_left_description": "A distinctive operating logic, not subject to any other entity",
|
||||
"term_right": "subsidiary",
|
||||
"term_right_description": "An operating logic under the control of a particular entity",
|
||||
"value": 6,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "self-enforcing",
|
||||
"term_left_description": "Rules are automatically enforced through its own mechanisms",
|
||||
"term_right": "enforced",
|
||||
"term_right_description": "Rules require external enforcement by authorities or institutions",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "abstract",
|
||||
"term_left_description": "Participants learn the protocol by studying it intellectually",
|
||||
"term_right": "embodied",
|
||||
"term_right_description": "Participants learn the protocol by physically practicing it",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "obligatory",
|
||||
"term_left_description": "Participation is compulsory for a certain class of agents",
|
||||
"term_right": "voluntary",
|
||||
"term_right_description": "Participation in the protocol is optional and not coerced",
|
||||
"value": 6,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "flocking",
|
||||
"term_left_description": "Coordination occurs through centralized direction or direct mimicry",
|
||||
"term_right": "swarming",
|
||||
"term_right_description": "Coordination occurs through distributed interactions without central direction",
|
||||
"value": 6,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "defensible",
|
||||
"term_left_description": "Strong boundaries and protections against external influence",
|
||||
"term_right": "exposed",
|
||||
"term_right_description": "Weak boundaries and vulnerable to external influence",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "monopolistic",
|
||||
"term_left_description": "Excludes the use of other protocols with similar purposes",
|
||||
"term_right": "pluralistic",
|
||||
"term_right_description": "Interoperates with other protocols and does not exclude their use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Experience",
|
||||
"set_description": "How the protocol is perceived in the context of its implementation",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "sufficient",
|
||||
"term_left_description": "Adequately meets the needs and goals of participants",
|
||||
"term_right": "limited",
|
||||
"term_right_description": "Does not, on its own, adequately meet the needs and goals of participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "crystallized",
|
||||
"term_left_description": "Content or meaning are settled and widely agreed upon",
|
||||
"term_right": "contested",
|
||||
"term_right_description": "Content or meaning are disputed or under debate",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "trust-evading",
|
||||
"term_left_description": "Minimizes the need for trust among participants",
|
||||
"term_right": "trust-inducing",
|
||||
"term_right_description": "Relies on or cultivates trust among participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "predictable",
|
||||
"term_left_description": "Produces expected and consistent outcomes",
|
||||
"term_right": "emergent",
|
||||
"term_right_description": "Produces unexpected or novel outcomes",
|
||||
"value": 6,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "exclusion",
|
||||
"term_left_description": "Creates barriers or excludes certain participants",
|
||||
"term_right": "inclusion",
|
||||
"term_right_description": "Reduces barriers and includes diverse participants",
|
||||
"value": 6,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "restraining",
|
||||
"term_left_description": "Fosters experiences of absurd complexity, alienation, and powerlessness",
|
||||
"term_right": "liberating",
|
||||
"term_right_description": "Enables participants to carry out desired activities with less work or thought",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "dead",
|
||||
"term_left_description": "Not actively utilized by relevant participants",
|
||||
"term_right": "alive",
|
||||
"term_right_description": "Actively utilized by relevant participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"analysis": [
|
||||
{
|
||||
"term_left": "hardness",
|
||||
"term_left_description": "The protocol tends toward properties characterized by hardness",
|
||||
"term_right": "softness",
|
||||
"term_right_description": "The protocol tends toward properties characterized by softness",
|
||||
"instructions": "Take all the 'value' fields in the gradients above and determine a mean. Round it to the nearest integer. That is the 'value' here.",
|
||||
"automated": true,
|
||||
"value": 6,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "polarized",
|
||||
"term_left_description": "The analyst tended toward more extreme high or low readings",
|
||||
"term_right": "centrist",
|
||||
"term_right_description": "The analyst tended toward readings at the middle of the gradients",
|
||||
"instructions": "Take all the 'value' fields in the gradients above. Assess their degree of polarization. For instance, if all the values are either 1 or 9, the output would be 1, and if all of them are 5, the output would be 9.",
|
||||
"automated": true,
|
||||
"value": 7,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "bureaucratic",
|
||||
"term_left_description": "The protocol exhibits institutional, formal, top-down characteristics with centralized control and external enforcement",
|
||||
"term_right": "relational",
|
||||
"term_right_description": "The protocol exhibits community-based, emergent, bottom-up characteristics with distributed coordination and voluntary participation",
|
||||
"instructions": "Based on the diagnostic readings, calculate the protocol's position using Linear Discriminant Analysis. The LDA score is scaled to the 1-9 range, where 1 represents strongly bureaucratic/institutional protocols and 9 represents strongly relational/cultural protocols. A score of 5 indicates a protocol near the boundary exhibiting characteristics of both families.",
|
||||
"automated": true,
|
||||
"value": 2,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "not useful",
|
||||
"term_left_description": "The bicorder was not useful or relevant for analyzing this protocol",
|
||||
"term_right": "very useful",
|
||||
"term_right_description": "The bicorder was very useful and relevant for analyzing this protocol",
|
||||
"instructions": "Evaluate the usefulness of this bicorder as a tool for analyzing this protocol, considering whether the gradient terms seemed revealing or irrelevant.",
|
||||
"automated": false,
|
||||
"value": null,
|
||||
"notes": null
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -0,0 +1,285 @@
|
||||
{
|
||||
"name": "Protocol Bicorder",
|
||||
"schema": "bicorder.schema.json",
|
||||
"version": "1.2.4",
|
||||
"description": "A diagnostic tool for the study of protocols",
|
||||
"author": "Nathan Schneider",
|
||||
"date_modified": "2025-12-02",
|
||||
"metadata": {
|
||||
"protocol": "Jon & Savannah Relationship Agreements",
|
||||
"description": "These are the relationship agreements that Jon and Savannah (romantic partners) wrote together at the start of our relationship. We wanted to define what we mean when we say words like \"I love you\" and \"boyfriend\" and \"girlfriend\" and \"partner\" – what does that actually mean to both of us in the practice of how we treat each other. These agreements function as the overarching protocol of our relationship. \n\nhttps://docs.google.com/document/d/1fmZsEXHagTkY2DlMJbwkKY6ZYQrC1LwLu5GKFNYHjio/edit?usp=sharing\n\n",
|
||||
"analyst": "Savannah Kruger & Jonathan Borichevskiy",
|
||||
"standpoint": "Co-creators",
|
||||
"timestamp": "2026-01-16T22:59:28.744Z",
|
||||
"shortform": true
|
||||
},
|
||||
"diagnostic": [
|
||||
{
|
||||
"set_name": "Design",
|
||||
"set_description": "How the protocol is created and remembered",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "explicit",
|
||||
"term_left_description": "The design is stated explicitly somewhere that is accessible to participants",
|
||||
"term_right": "implicit",
|
||||
"term_right_description": "The design is not stated explicitly and is learned by use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "precise",
|
||||
"term_left_description": "The design is specified with a high level of precision that eliminates ambiguity in implementation",
|
||||
"term_right": "interpretive",
|
||||
"term_right_description": "The design is ambiguous, allowing participants a wide range of interpretation",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "institutional",
|
||||
"term_left_description": "Design occurs through processes controlled by powerful institutions",
|
||||
"term_right": "vernacular",
|
||||
"term_right_description": "Design occurs through evolving community interactions",
|
||||
"value": 9,
|
||||
"notes": "Design occurs exclusively between Jon and Savannah.",
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "documenting",
|
||||
"term_left_description": "The primary purpose is to document or validate activity that is occurring",
|
||||
"term_right": "enabling",
|
||||
"term_right_description": "The primary purpose is to enable activity that might not happen otherwise",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "static",
|
||||
"term_left_description": "Designed to be as fixed and unchanging as possible",
|
||||
"term_right": "malleable",
|
||||
"term_right_description": "Designed to be changed by participants according to evolving needs",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "technical",
|
||||
"term_left_description": "Primarily concerned with interactions among technologies",
|
||||
"term_right": "social",
|
||||
"term_right_description": "Primarily concerned with interactions among people or groups",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "universal",
|
||||
"term_left_description": "Meant for global adoption across different communities",
|
||||
"term_right": "particular",
|
||||
"term_right_description": "Tailored for a specific community",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "durable",
|
||||
"term_left_description": "Designed to be persistently available",
|
||||
"term_right": "ephemeral",
|
||||
"term_right_description": "Designed to vanish when no longer needed",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Entanglement",
|
||||
"set_description": "How the protocol relates with participant agents",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "macro",
|
||||
"term_left_description": "Operates at large scales involving many participants or broad scope",
|
||||
"term_right": "micro",
|
||||
"term_right_description": "Operates at small scales with few participants or narrow scope",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "sovereign",
|
||||
"term_left_description": "A distinctive operating logic, not subject to any other entity",
|
||||
"term_right": "subsidiary",
|
||||
"term_right_description": "An operating logic under the control of a particular entity",
|
||||
"value": 1,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "self-enforcing",
|
||||
"term_left_description": "Rules are automatically enforced through its own mechanisms",
|
||||
"term_right": "enforced",
|
||||
"term_right_description": "Rules require external enforcement by authorities or institutions",
|
||||
"value": 1,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "abstract",
|
||||
"term_left_description": "Participants learn the protocol by studying it intellectually",
|
||||
"term_right": "embodied",
|
||||
"term_right_description": "Participants learn the protocol by physically practicing it",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "obligatory",
|
||||
"term_left_description": "Participation is compulsory for a certain class of agents",
|
||||
"term_right": "voluntary",
|
||||
"term_right_description": "Participation in the protocol is optional and not coerced",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "flocking",
|
||||
"term_left_description": "Coordination occurs through centralized direction or direct mimicry",
|
||||
"term_right": "swarming",
|
||||
"term_right_description": "Coordination occurs through distributed interactions without central direction",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "defensible",
|
||||
"term_left_description": "Strong boundaries and protections against external influence",
|
||||
"term_right": "exposed",
|
||||
"term_right_description": "Weak boundaries and vulnerable to external influence",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "monopolistic",
|
||||
"term_left_description": "Excludes the use of other protocols with similar purposes",
|
||||
"term_right": "pluralistic",
|
||||
"term_right_description": "Interoperates with other protocols and does not exclude their use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Experience",
|
||||
"set_description": "How the protocol is perceived in the context of its implementation",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "sufficient",
|
||||
"term_left_description": "Adequately meets the needs and goals of participants",
|
||||
"term_right": "limited",
|
||||
"term_right_description": "Does not, on its own, adequately meet the needs and goals of participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "crystallized",
|
||||
"term_left_description": "Content or meaning are settled and widely agreed upon",
|
||||
"term_right": "contested",
|
||||
"term_right_description": "Content or meaning are disputed or under debate",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "trust-evading",
|
||||
"term_left_description": "Minimizes the need for trust among participants",
|
||||
"term_right": "trust-inducing",
|
||||
"term_right_description": "Relies on or cultivates trust among participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "predictable",
|
||||
"term_left_description": "Produces expected and consistent outcomes",
|
||||
"term_right": "emergent",
|
||||
"term_right_description": "Produces unexpected or novel outcomes",
|
||||
"value": 5,
|
||||
"notes": "Feels like a mix for sure.",
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "exclusion",
|
||||
"term_left_description": "Creates barriers or excludes certain participants",
|
||||
"term_right": "inclusion",
|
||||
"term_right_description": "Reduces barriers and includes diverse participants",
|
||||
"value": 1,
|
||||
"notes": "Heavily exclusive as it's just for Jon and Savannah",
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "restraining",
|
||||
"term_left_description": "Fosters experiences of absurd complexity, alienation, and powerlessness",
|
||||
"term_right": "liberating",
|
||||
"term_right_description": "Enables participants to carry out desired activities with less work or thought",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "dead",
|
||||
"term_left_description": "Not actively utilized by relevant participants",
|
||||
"term_right": "alive",
|
||||
"term_right_description": "Actively utilized by relevant participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"analysis": [
|
||||
{
|
||||
"term_left": "hardness",
|
||||
"term_left_description": "The protocol tends toward properties characterized by hardness",
|
||||
"term_right": "softness",
|
||||
"term_right_description": "The protocol tends toward properties characterized by softness",
|
||||
"instructions": "Take all the 'value' fields in the gradients above and determine a mean. Round it to the nearest integer. That is the 'value' here.",
|
||||
"automated": true,
|
||||
"value": 5,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "polarized",
|
||||
"term_left_description": "The analyst tended toward more extreme high or low readings",
|
||||
"term_right": "centrist",
|
||||
"term_right_description": "The analyst tended toward readings at the middle of the gradients",
|
||||
"instructions": "Take all the 'value' fields in the gradients above. Assess their degree of polarization. For instance, if all the values are either 1 or 9, the output would be 1, and if all of them are 5, the output would be 9.",
|
||||
"automated": true,
|
||||
"value": 2,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "bureaucratic",
|
||||
"term_left_description": "The protocol exhibits institutional, formal, top-down characteristics with centralized control and external enforcement",
|
||||
"term_right": "relational",
|
||||
"term_right_description": "The protocol exhibits community-based, emergent, bottom-up characteristics with distributed coordination and voluntary participation",
|
||||
"instructions": "Based on the diagnostic readings, calculate the protocol's position using Linear Discriminant Analysis. The LDA score is scaled to the 1-9 range, where 1 represents strongly bureaucratic/institutional protocols and 9 represents strongly relational/cultural protocols. A score of 5 indicates a protocol near the boundary exhibiting characteristics of both families.",
|
||||
"automated": true,
|
||||
"value": 1,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "not useful",
|
||||
"term_left_description": "The bicorder was not useful or relevant for analyzing this protocol",
|
||||
"term_right": "very useful",
|
||||
"term_right_description": "The bicorder was very useful and relevant for analyzing this protocol",
|
||||
"instructions": "Evaluate the usefulness of this bicorder as a tool for analyzing this protocol, considering whether the gradient terms seemed revealing or irrelevant.",
|
||||
"automated": false,
|
||||
"value": null,
|
||||
"notes": null
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -0,0 +1,285 @@
|
||||
{
|
||||
"name": "Protocol Bicorder",
|
||||
"schema": "bicorder.schema.json",
|
||||
"version": "1.2.4",
|
||||
"description": "A diagnostic tool for the study of protocols",
|
||||
"author": "Nathan Schneider",
|
||||
"date_modified": "2025-12-02",
|
||||
"metadata": {
|
||||
"protocol": "Native protocol",
|
||||
"description": "Web3 community currency network with community currencies based on a network token",
|
||||
"analyst": "proofoftom",
|
||||
"standpoint": "Co-creator",
|
||||
"timestamp": "2026-01-16T22:58:38.756Z",
|
||||
"shortform": true
|
||||
},
|
||||
"diagnostic": [
|
||||
{
|
||||
"set_name": "Design",
|
||||
"set_description": "How the protocol is created and remembered",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "explicit",
|
||||
"term_left_description": "The design is stated explicitly somewhere that is accessible to participants",
|
||||
"term_right": "implicit",
|
||||
"term_right_description": "The design is not stated explicitly and is learned by use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "precise",
|
||||
"term_left_description": "The design is specified with a high level of precision that eliminates ambiguity in implementation",
|
||||
"term_right": "interpretive",
|
||||
"term_right_description": "The design is ambiguous, allowing participants a wide range of interpretation",
|
||||
"value": 5,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "institutional",
|
||||
"term_left_description": "Design occurs through processes controlled by powerful institutions",
|
||||
"term_right": "vernacular",
|
||||
"term_right_description": "Design occurs through evolving community interactions",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "documenting",
|
||||
"term_left_description": "The primary purpose is to document or validate activity that is occurring",
|
||||
"term_right": "enabling",
|
||||
"term_right_description": "The primary purpose is to enable activity that might not happen otherwise",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "static",
|
||||
"term_left_description": "Designed to be as fixed and unchanging as possible",
|
||||
"term_right": "malleable",
|
||||
"term_right_description": "Designed to be changed by participants according to evolving needs",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "technical",
|
||||
"term_left_description": "Primarily concerned with interactions among technologies",
|
||||
"term_right": "social",
|
||||
"term_right_description": "Primarily concerned with interactions among people or groups",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "universal",
|
||||
"term_left_description": "Meant for global adoption across different communities",
|
||||
"term_right": "particular",
|
||||
"term_right_description": "Tailored for a specific community",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "durable",
|
||||
"term_left_description": "Designed to be persistently available",
|
||||
"term_right": "ephemeral",
|
||||
"term_right_description": "Designed to vanish when no longer needed",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Entanglement",
|
||||
"set_description": "How the protocol relates with participant agents",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "macro",
|
||||
"term_left_description": "Operates at large scales involving many participants or broad scope",
|
||||
"term_right": "micro",
|
||||
"term_right_description": "Operates at small scales with few participants or narrow scope",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "sovereign",
|
||||
"term_left_description": "A distinctive operating logic, not subject to any other entity",
|
||||
"term_right": "subsidiary",
|
||||
"term_right_description": "An operating logic under the control of a particular entity",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "self-enforcing",
|
||||
"term_left_description": "Rules are automatically enforced through its own mechanisms",
|
||||
"term_right": "enforced",
|
||||
"term_right_description": "Rules require external enforcement by authorities or institutions",
|
||||
"value": 1,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "abstract",
|
||||
"term_left_description": "Participants learn the protocol by studying it intellectually",
|
||||
"term_right": "embodied",
|
||||
"term_right_description": "Participants learn the protocol by physically practicing it",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "obligatory",
|
||||
"term_left_description": "Participation is compulsory for a certain class of agents",
|
||||
"term_right": "voluntary",
|
||||
"term_right_description": "Participation in the protocol is optional and not coerced",
|
||||
"value": 4,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "flocking",
|
||||
"term_left_description": "Coordination occurs through centralized direction or direct mimicry",
|
||||
"term_right": "swarming",
|
||||
"term_right_description": "Coordination occurs through distributed interactions without central direction",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "defensible",
|
||||
"term_left_description": "Strong boundaries and protections against external influence",
|
||||
"term_right": "exposed",
|
||||
"term_right_description": "Weak boundaries and vulnerable to external influence",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "monopolistic",
|
||||
"term_left_description": "Excludes the use of other protocols with similar purposes",
|
||||
"term_right": "pluralistic",
|
||||
"term_right_description": "Interoperates with other protocols and does not exclude their use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Experience",
|
||||
"set_description": "How the protocol is perceived in the context of its implementation",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "sufficient",
|
||||
"term_left_description": "Adequately meets the needs and goals of participants",
|
||||
"term_right": "limited",
|
||||
"term_right_description": "Does not, on its own, adequately meet the needs and goals of participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "crystallized",
|
||||
"term_left_description": "Content or meaning are settled and widely agreed upon",
|
||||
"term_right": "contested",
|
||||
"term_right_description": "Content or meaning are disputed or under debate",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "trust-evading",
|
||||
"term_left_description": "Minimizes the need for trust among participants",
|
||||
"term_right": "trust-inducing",
|
||||
"term_right_description": "Relies on or cultivates trust among participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "predictable",
|
||||
"term_left_description": "Produces expected and consistent outcomes",
|
||||
"term_right": "emergent",
|
||||
"term_right_description": "Produces unexpected or novel outcomes",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "exclusion",
|
||||
"term_left_description": "Creates barriers or excludes certain participants",
|
||||
"term_right": "inclusion",
|
||||
"term_right_description": "Reduces barriers and includes diverse participants",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "restraining",
|
||||
"term_left_description": "Fosters experiences of absurd complexity, alienation, and powerlessness",
|
||||
"term_right": "liberating",
|
||||
"term_right_description": "Enables participants to carry out desired activities with less work or thought",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "dead",
|
||||
"term_left_description": "Not actively utilized by relevant participants",
|
||||
"term_right": "alive",
|
||||
"term_right_description": "Actively utilized by relevant participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"analysis": [
|
||||
{
|
||||
"term_left": "hardness",
|
||||
"term_left_description": "The protocol tends toward properties characterized by hardness",
|
||||
"term_right": "softness",
|
||||
"term_right_description": "The protocol tends toward properties characterized by softness",
|
||||
"instructions": "Take all the 'value' fields in the gradients above and determine a mean. Round it to the nearest integer. That is the 'value' here.",
|
||||
"automated": true,
|
||||
"value": 6,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "polarized",
|
||||
"term_left_description": "The analyst tended toward more extreme high or low readings",
|
||||
"term_right": "centrist",
|
||||
"term_right_description": "The analyst tended toward readings at the middle of the gradients",
|
||||
"instructions": "Take all the 'value' fields in the gradients above. Assess their degree of polarization. For instance, if all the values are either 1 or 9, the output would be 1, and if all of them are 5, the output would be 9.",
|
||||
"automated": true,
|
||||
"value": 5,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "bureaucratic",
|
||||
"term_left_description": "The protocol exhibits institutional, formal, top-down characteristics with centralized control and external enforcement",
|
||||
"term_right": "relational",
|
||||
"term_right_description": "The protocol exhibits community-based, emergent, bottom-up characteristics with distributed coordination and voluntary participation",
|
||||
"instructions": "Based on the diagnostic readings, calculate the protocol's position using Linear Discriminant Analysis. The LDA score is scaled to the 1-9 range, where 1 represents strongly bureaucratic/institutional protocols and 9 represents strongly relational/cultural protocols. A score of 5 indicates a protocol near the boundary exhibiting characteristics of both families.",
|
||||
"automated": true,
|
||||
"value": 1,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "not useful",
|
||||
"term_left_description": "The bicorder was not useful or relevant for analyzing this protocol",
|
||||
"term_right": "very useful",
|
||||
"term_right_description": "The bicorder was very useful and relevant for analyzing this protocol",
|
||||
"instructions": "Evaluate the usefulness of this bicorder as a tool for analyzing this protocol, considering whether the gradient terms seemed revealing or irrelevant.",
|
||||
"automated": false,
|
||||
"value": null,
|
||||
"notes": null
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -0,0 +1,285 @@
|
||||
{
|
||||
"name": "Protocol Bicorder",
|
||||
"schema": "bicorder.schema.json",
|
||||
"version": "1.2.4",
|
||||
"description": "A diagnostic tool for the study of protocols",
|
||||
"author": "Nathan Schneider",
|
||||
"date_modified": "2025-12-02",
|
||||
"metadata": {
|
||||
"protocol": "Free-range kids",
|
||||
"description": "The protocol of allowing kids to wander a neighborhood themselves, supported by adults they might encounter.",
|
||||
"analyst": "ntnsndr",
|
||||
"standpoint": "parent",
|
||||
"timestamp": "2026-01-18T23:25:49.803Z",
|
||||
"shortform": true
|
||||
},
|
||||
"diagnostic": [
|
||||
{
|
||||
"set_name": "Design",
|
||||
"set_description": "How the protocol is created and remembered",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "explicit",
|
||||
"term_left_description": "The design is stated explicitly somewhere that is accessible to participants",
|
||||
"term_right": "implicit",
|
||||
"term_right_description": "The design is not stated explicitly and is learned by use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "precise",
|
||||
"term_left_description": "The design is specified with a high level of precision that eliminates ambiguity in implementation",
|
||||
"term_right": "interpretive",
|
||||
"term_right_description": "The design is ambiguous, allowing participants a wide range of interpretation",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "institutional",
|
||||
"term_left_description": "Design occurs through processes controlled by powerful institutions",
|
||||
"term_right": "vernacular",
|
||||
"term_right_description": "Design occurs through evolving community interactions",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "documenting",
|
||||
"term_left_description": "The primary purpose is to document or validate activity that is occurring",
|
||||
"term_right": "enabling",
|
||||
"term_right_description": "The primary purpose is to enable activity that might not happen otherwise",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "static",
|
||||
"term_left_description": "Designed to be as fixed and unchanging as possible",
|
||||
"term_right": "malleable",
|
||||
"term_right_description": "Designed to be changed by participants according to evolving needs",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "technical",
|
||||
"term_left_description": "Primarily concerned with interactions among technologies",
|
||||
"term_right": "social",
|
||||
"term_right_description": "Primarily concerned with interactions among people or groups",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "universal",
|
||||
"term_left_description": "Meant for global adoption across different communities",
|
||||
"term_right": "particular",
|
||||
"term_right_description": "Tailored for a specific community",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "durable",
|
||||
"term_left_description": "Designed to be persistently available",
|
||||
"term_right": "ephemeral",
|
||||
"term_right_description": "Designed to vanish when no longer needed",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Entanglement",
|
||||
"set_description": "How the protocol relates with participant agents",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "macro",
|
||||
"term_left_description": "Operates at large scales involving many participants or broad scope",
|
||||
"term_right": "micro",
|
||||
"term_right_description": "Operates at small scales with few participants or narrow scope",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "sovereign",
|
||||
"term_left_description": "A distinctive operating logic, not subject to any other entity",
|
||||
"term_right": "subsidiary",
|
||||
"term_right_description": "An operating logic under the control of a particular entity",
|
||||
"value": 1,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "self-enforcing",
|
||||
"term_left_description": "Rules are automatically enforced through its own mechanisms",
|
||||
"term_right": "enforced",
|
||||
"term_right_description": "Rules require external enforcement by authorities or institutions",
|
||||
"value": 1,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "abstract",
|
||||
"term_left_description": "Participants learn the protocol by studying it intellectually",
|
||||
"term_right": "embodied",
|
||||
"term_right_description": "Participants learn the protocol by physically practicing it",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "obligatory",
|
||||
"term_left_description": "Participation is compulsory for a certain class of agents",
|
||||
"term_right": "voluntary",
|
||||
"term_right_description": "Participation in the protocol is optional and not coerced",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "flocking",
|
||||
"term_left_description": "Coordination occurs through centralized direction or direct mimicry",
|
||||
"term_right": "swarming",
|
||||
"term_right_description": "Coordination occurs through distributed interactions without central direction",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "defensible",
|
||||
"term_left_description": "Strong boundaries and protections against external influence",
|
||||
"term_right": "exposed",
|
||||
"term_right_description": "Weak boundaries and vulnerable to external influence",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "monopolistic",
|
||||
"term_left_description": "Excludes the use of other protocols with similar purposes",
|
||||
"term_right": "pluralistic",
|
||||
"term_right_description": "Interoperates with other protocols and does not exclude their use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Experience",
|
||||
"set_description": "How the protocol is perceived in the context of its implementation",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "sufficient",
|
||||
"term_left_description": "Adequately meets the needs and goals of participants",
|
||||
"term_right": "limited",
|
||||
"term_right_description": "Does not, on its own, adequately meet the needs and goals of participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "crystallized",
|
||||
"term_left_description": "Content or meaning are settled and widely agreed upon",
|
||||
"term_right": "contested",
|
||||
"term_right_description": "Content or meaning are disputed or under debate",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "trust-evading",
|
||||
"term_left_description": "Minimizes the need for trust among participants",
|
||||
"term_right": "trust-inducing",
|
||||
"term_right_description": "Relies on or cultivates trust among participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "predictable",
|
||||
"term_left_description": "Produces expected and consistent outcomes",
|
||||
"term_right": "emergent",
|
||||
"term_right_description": "Produces unexpected or novel outcomes",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "exclusion",
|
||||
"term_left_description": "Creates barriers or excludes certain participants",
|
||||
"term_right": "inclusion",
|
||||
"term_right_description": "Reduces barriers and includes diverse participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "restraining",
|
||||
"term_left_description": "Fosters experiences of absurd complexity, alienation, and powerlessness",
|
||||
"term_right": "liberating",
|
||||
"term_right_description": "Enables participants to carry out desired activities with less work or thought",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "dead",
|
||||
"term_left_description": "Not actively utilized by relevant participants",
|
||||
"term_right": "alive",
|
||||
"term_right_description": "Actively utilized by relevant participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"analysis": [
|
||||
{
|
||||
"term_left": "hardness",
|
||||
"term_left_description": "The protocol tends toward properties characterized by hardness",
|
||||
"term_right": "softness",
|
||||
"term_right_description": "The protocol tends toward properties characterized by softness",
|
||||
"instructions": "Take all the 'value' fields in the gradients above and determine a mean. Round it to the nearest integer. That is the 'value' here.",
|
||||
"automated": true,
|
||||
"value": 6,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "polarized",
|
||||
"term_left_description": "The analyst tended toward more extreme high or low readings",
|
||||
"term_right": "centrist",
|
||||
"term_right_description": "The analyst tended toward readings at the middle of the gradients",
|
||||
"instructions": "Take all the 'value' fields in the gradients above. Assess their degree of polarization. For instance, if all the values are either 1 or 9, the output would be 1, and if all of them are 5, the output would be 9.",
|
||||
"automated": true,
|
||||
"value": 3,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "bureaucratic",
|
||||
"term_left_description": "The protocol exhibits institutional, formal, top-down characteristics with centralized control and external enforcement",
|
||||
"term_right": "relational",
|
||||
"term_right_description": "The protocol exhibits community-based, emergent, bottom-up characteristics with distributed coordination and voluntary participation",
|
||||
"instructions": "Based on the diagnostic readings, calculate the protocol's position using Linear Discriminant Analysis. The LDA score is scaled to the 1-9 range, where 1 represents strongly bureaucratic/institutional protocols and 9 represents strongly relational/cultural protocols. A score of 5 indicates a protocol near the boundary exhibiting characteristics of both families.",
|
||||
"automated": true,
|
||||
"value": 1,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "not useful",
|
||||
"term_left_description": "The bicorder was not useful or relevant for analyzing this protocol",
|
||||
"term_right": "very useful",
|
||||
"term_right_description": "The bicorder was very useful and relevant for analyzing this protocol",
|
||||
"instructions": "Evaluate the usefulness of this bicorder as a tool for analyzing this protocol, considering whether the gradient terms seemed revealing or irrelevant.",
|
||||
"automated": false,
|
||||
"value": null,
|
||||
"notes": null
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -0,0 +1,285 @@
|
||||
{
|
||||
"name": "Protocol Bicorder",
|
||||
"schema": "bicorder.schema.json",
|
||||
"version": "1.2.4",
|
||||
"description": "A diagnostic tool for the study of protocols",
|
||||
"author": "Nathan Schneider",
|
||||
"date_modified": "2025-12-02",
|
||||
"metadata": {
|
||||
"protocol": "Passing on a sidewalk",
|
||||
"description": null,
|
||||
"analyst": "ntnsndr",
|
||||
"standpoint": "Pedestrian",
|
||||
"timestamp": "2026-01-22T00:34:13.309Z",
|
||||
"shortform": true
|
||||
},
|
||||
"diagnostic": [
|
||||
{
|
||||
"set_name": "Design",
|
||||
"set_description": "How the protocol is created and remembered",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "explicit",
|
||||
"term_left_description": "The design is stated explicitly somewhere that is accessible to participants",
|
||||
"term_right": "implicit",
|
||||
"term_right_description": "The design is not stated explicitly and is learned by use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "precise",
|
||||
"term_left_description": "The design is specified with a high level of precision that eliminates ambiguity in implementation",
|
||||
"term_right": "interpretive",
|
||||
"term_right_description": "The design is ambiguous, allowing participants a wide range of interpretation",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "institutional",
|
||||
"term_left_description": "Design occurs through processes controlled by powerful institutions",
|
||||
"term_right": "vernacular",
|
||||
"term_right_description": "Design occurs through evolving community interactions",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "documenting",
|
||||
"term_left_description": "The primary purpose is to document or validate activity that is occurring",
|
||||
"term_right": "enabling",
|
||||
"term_right_description": "The primary purpose is to enable activity that might not happen otherwise",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "static",
|
||||
"term_left_description": "Designed to be as fixed and unchanging as possible",
|
||||
"term_right": "malleable",
|
||||
"term_right_description": "Designed to be changed by participants according to evolving needs",
|
||||
"value": 6,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "technical",
|
||||
"term_left_description": "Primarily concerned with interactions among technologies",
|
||||
"term_right": "social",
|
||||
"term_right_description": "Primarily concerned with interactions among people or groups",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "universal",
|
||||
"term_left_description": "Meant for global adoption across different communities",
|
||||
"term_right": "particular",
|
||||
"term_right_description": "Tailored for a specific community",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "durable",
|
||||
"term_left_description": "Designed to be persistently available",
|
||||
"term_right": "ephemeral",
|
||||
"term_right_description": "Designed to vanish when no longer needed",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Entanglement",
|
||||
"set_description": "How the protocol relates with participant agents",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "macro",
|
||||
"term_left_description": "Operates at large scales involving many participants or broad scope",
|
||||
"term_right": "micro",
|
||||
"term_right_description": "Operates at small scales with few participants or narrow scope",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "sovereign",
|
||||
"term_left_description": "A distinctive operating logic, not subject to any other entity",
|
||||
"term_right": "subsidiary",
|
||||
"term_right_description": "An operating logic under the control of a particular entity",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "self-enforcing",
|
||||
"term_left_description": "Rules are automatically enforced through its own mechanisms",
|
||||
"term_right": "enforced",
|
||||
"term_right_description": "Rules require external enforcement by authorities or institutions",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "abstract",
|
||||
"term_left_description": "Participants learn the protocol by studying it intellectually",
|
||||
"term_right": "embodied",
|
||||
"term_right_description": "Participants learn the protocol by physically practicing it",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "obligatory",
|
||||
"term_left_description": "Participation is compulsory for a certain class of agents",
|
||||
"term_right": "voluntary",
|
||||
"term_right_description": "Participation in the protocol is optional and not coerced",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "flocking",
|
||||
"term_left_description": "Coordination occurs through centralized direction or direct mimicry",
|
||||
"term_right": "swarming",
|
||||
"term_right_description": "Coordination occurs through distributed interactions without central direction",
|
||||
"value": 6,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "defensible",
|
||||
"term_left_description": "Strong boundaries and protections against external influence",
|
||||
"term_right": "exposed",
|
||||
"term_right_description": "Weak boundaries and vulnerable to external influence",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "monopolistic",
|
||||
"term_left_description": "Excludes the use of other protocols with similar purposes",
|
||||
"term_right": "pluralistic",
|
||||
"term_right_description": "Interoperates with other protocols and does not exclude their use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Experience",
|
||||
"set_description": "How the protocol is perceived in the context of its implementation",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "sufficient",
|
||||
"term_left_description": "Adequately meets the needs and goals of participants",
|
||||
"term_right": "limited",
|
||||
"term_right_description": "Does not, on its own, adequately meet the needs and goals of participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "crystallized",
|
||||
"term_left_description": "Content or meaning are settled and widely agreed upon",
|
||||
"term_right": "contested",
|
||||
"term_right_description": "Content or meaning are disputed or under debate",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "trust-evading",
|
||||
"term_left_description": "Minimizes the need for trust among participants",
|
||||
"term_right": "trust-inducing",
|
||||
"term_right_description": "Relies on or cultivates trust among participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "predictable",
|
||||
"term_left_description": "Produces expected and consistent outcomes",
|
||||
"term_right": "emergent",
|
||||
"term_right_description": "Produces unexpected or novel outcomes",
|
||||
"value": 6,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "exclusion",
|
||||
"term_left_description": "Creates barriers or excludes certain participants",
|
||||
"term_right": "inclusion",
|
||||
"term_right_description": "Reduces barriers and includes diverse participants",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "restraining",
|
||||
"term_left_description": "Fosters experiences of absurd complexity, alienation, and powerlessness",
|
||||
"term_right": "liberating",
|
||||
"term_right_description": "Enables participants to carry out desired activities with less work or thought",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "dead",
|
||||
"term_left_description": "Not actively utilized by relevant participants",
|
||||
"term_right": "alive",
|
||||
"term_right_description": "Actively utilized by relevant participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"analysis": [
|
||||
{
|
||||
"term_left": "hardness",
|
||||
"term_left_description": "The protocol tends toward properties characterized by hardness",
|
||||
"term_right": "softness",
|
||||
"term_right_description": "The protocol tends toward properties characterized by softness",
|
||||
"instructions": "Take all the 'value' fields in the gradients above and determine a mean. Round it to the nearest integer. That is the 'value' here.",
|
||||
"automated": true,
|
||||
"value": 6,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "polarized",
|
||||
"term_left_description": "The analyst tended toward more extreme high or low readings",
|
||||
"term_right": "centrist",
|
||||
"term_right_description": "The analyst tended toward readings at the middle of the gradients",
|
||||
"instructions": "Take all the 'value' fields in the gradients above. Assess their degree of polarization. For instance, if all the values are either 1 or 9, the output would be 1, and if all of them are 5, the output would be 9.",
|
||||
"automated": true,
|
||||
"value": 5,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "bureaucratic",
|
||||
"term_left_description": "The protocol exhibits institutional, formal, top-down characteristics with centralized control and external enforcement",
|
||||
"term_right": "relational",
|
||||
"term_right_description": "The protocol exhibits community-based, emergent, bottom-up characteristics with distributed coordination and voluntary participation",
|
||||
"instructions": "Based on the diagnostic readings, calculate the protocol's position using Linear Discriminant Analysis. The LDA score is scaled to the 1-9 range, where 1 represents strongly bureaucratic/institutional protocols and 9 represents strongly relational/cultural protocols. A score of 5 indicates a protocol near the boundary exhibiting characteristics of both families.",
|
||||
"automated": true,
|
||||
"value": 1,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "not useful",
|
||||
"term_left_description": "The bicorder was not useful or relevant for analyzing this protocol",
|
||||
"term_right": "very useful",
|
||||
"term_right_description": "The bicorder was very useful and relevant for analyzing this protocol",
|
||||
"instructions": "Evaluate the usefulness of this bicorder as a tool for analyzing this protocol, considering whether the gradient terms seemed revealing or irrelevant.",
|
||||
"automated": false,
|
||||
"value": null,
|
||||
"notes": null
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -0,0 +1,285 @@
|
||||
{
|
||||
"name": "Protocol Bicorder",
|
||||
"schema": "bicorder.schema.json",
|
||||
"version": "1.2.4",
|
||||
"description": "A diagnostic tool for the study of protocols",
|
||||
"author": "Nathan Schneider",
|
||||
"date_modified": "2025-12-02",
|
||||
"metadata": {
|
||||
"protocol": "Academic job talks",
|
||||
"description": "The norms for talks by job candidates for university departments",
|
||||
"analyst": "ntnsndr",
|
||||
"standpoint": "an academic",
|
||||
"timestamp": "2026-02-04T05:17:44.193Z",
|
||||
"shortform": true
|
||||
},
|
||||
"diagnostic": [
|
||||
{
|
||||
"set_name": "Design",
|
||||
"set_description": "How the protocol is created and remembered",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "explicit",
|
||||
"term_left_description": "The design is stated explicitly somewhere that is accessible to participants",
|
||||
"term_right": "implicit",
|
||||
"term_right_description": "The design is not stated explicitly and is learned by use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "precise",
|
||||
"term_left_description": "The design is specified with a high level of precision that eliminates ambiguity in implementation",
|
||||
"term_right": "interpretive",
|
||||
"term_right_description": "The design is ambiguous, allowing participants a wide range of interpretation",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "institutional",
|
||||
"term_left_description": "Design occurs through processes controlled by powerful institutions",
|
||||
"term_right": "vernacular",
|
||||
"term_right_description": "Design occurs through evolving community interactions",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "documenting",
|
||||
"term_left_description": "The primary purpose is to document or validate activity that is occurring",
|
||||
"term_right": "enabling",
|
||||
"term_right_description": "The primary purpose is to enable activity that might not happen otherwise",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "static",
|
||||
"term_left_description": "Designed to be as fixed and unchanging as possible",
|
||||
"term_right": "malleable",
|
||||
"term_right_description": "Designed to be changed by participants according to evolving needs",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "technical",
|
||||
"term_left_description": "Primarily concerned with interactions among technologies",
|
||||
"term_right": "social",
|
||||
"term_right_description": "Primarily concerned with interactions among people or groups",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "universal",
|
||||
"term_left_description": "Meant for global adoption across different communities",
|
||||
"term_right": "particular",
|
||||
"term_right_description": "Tailored for a specific community",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "durable",
|
||||
"term_left_description": "Designed to be persistently available",
|
||||
"term_right": "ephemeral",
|
||||
"term_right_description": "Designed to vanish when no longer needed",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Entanglement",
|
||||
"set_description": "How the protocol relates with participant agents",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "macro",
|
||||
"term_left_description": "Operates at large scales involving many participants or broad scope",
|
||||
"term_right": "micro",
|
||||
"term_right_description": "Operates at small scales with few participants or narrow scope",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "sovereign",
|
||||
"term_left_description": "A distinctive operating logic, not subject to any other entity",
|
||||
"term_right": "subsidiary",
|
||||
"term_right_description": "An operating logic under the control of a particular entity",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "self-enforcing",
|
||||
"term_left_description": "Rules are automatically enforced through its own mechanisms",
|
||||
"term_right": "enforced",
|
||||
"term_right_description": "Rules require external enforcement by authorities or institutions",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "abstract",
|
||||
"term_left_description": "Participants learn the protocol by studying it intellectually",
|
||||
"term_right": "embodied",
|
||||
"term_right_description": "Participants learn the protocol by physically practicing it",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "obligatory",
|
||||
"term_left_description": "Participation is compulsory for a certain class of agents",
|
||||
"term_right": "voluntary",
|
||||
"term_right_description": "Participation in the protocol is optional and not coerced",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "flocking",
|
||||
"term_left_description": "Coordination occurs through centralized direction or direct mimicry",
|
||||
"term_right": "swarming",
|
||||
"term_right_description": "Coordination occurs through distributed interactions without central direction",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "defensible",
|
||||
"term_left_description": "Strong boundaries and protections against external influence",
|
||||
"term_right": "exposed",
|
||||
"term_right_description": "Weak boundaries and vulnerable to external influence",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "monopolistic",
|
||||
"term_left_description": "Excludes the use of other protocols with similar purposes",
|
||||
"term_right": "pluralistic",
|
||||
"term_right_description": "Interoperates with other protocols and does not exclude their use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Experience",
|
||||
"set_description": "How the protocol is perceived in the context of its implementation",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "sufficient",
|
||||
"term_left_description": "Adequately meets the needs and goals of participants",
|
||||
"term_right": "limited",
|
||||
"term_right_description": "Does not, on its own, adequately meet the needs and goals of participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "crystallized",
|
||||
"term_left_description": "Content or meaning are settled and widely agreed upon",
|
||||
"term_right": "contested",
|
||||
"term_right_description": "Content or meaning are disputed or under debate",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "trust-evading",
|
||||
"term_left_description": "Minimizes the need for trust among participants",
|
||||
"term_right": "trust-inducing",
|
||||
"term_right_description": "Relies on or cultivates trust among participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "predictable",
|
||||
"term_left_description": "Produces expected and consistent outcomes",
|
||||
"term_right": "emergent",
|
||||
"term_right_description": "Produces unexpected or novel outcomes",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "exclusion",
|
||||
"term_left_description": "Creates barriers or excludes certain participants",
|
||||
"term_right": "inclusion",
|
||||
"term_right_description": "Reduces barriers and includes diverse participants",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "restraining",
|
||||
"term_left_description": "Fosters experiences of absurd complexity, alienation, and powerlessness",
|
||||
"term_right": "liberating",
|
||||
"term_right_description": "Enables participants to carry out desired activities with less work or thought",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "dead",
|
||||
"term_left_description": "Not actively utilized by relevant participants",
|
||||
"term_right": "alive",
|
||||
"term_right_description": "Actively utilized by relevant participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"analysis": [
|
||||
{
|
||||
"term_left": "hardness",
|
||||
"term_left_description": "The protocol tends toward properties characterized by hardness",
|
||||
"term_right": "softness",
|
||||
"term_right_description": "The protocol tends toward properties characterized by softness",
|
||||
"instructions": "Take all the 'value' fields in the gradients above and determine a mean. Round it to the nearest integer. That is the 'value' here.",
|
||||
"automated": true,
|
||||
"value": 3,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "polarized",
|
||||
"term_left_description": "The analyst tended toward more extreme high or low readings",
|
||||
"term_right": "centrist",
|
||||
"term_right_description": "The analyst tended toward readings at the middle of the gradients",
|
||||
"instructions": "Take all the 'value' fields in the gradients above. Assess their degree of polarization. For instance, if all the values are either 1 or 9, the output would be 1, and if all of them are 5, the output would be 9.",
|
||||
"automated": true,
|
||||
"value": 4,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "bureaucratic",
|
||||
"term_left_description": "The protocol exhibits institutional, formal, top-down characteristics with centralized control and external enforcement",
|
||||
"term_right": "relational",
|
||||
"term_right_description": "The protocol exhibits community-based, emergent, bottom-up characteristics with distributed coordination and voluntary participation",
|
||||
"instructions": "Based on the diagnostic readings, calculate the protocol's position using Linear Discriminant Analysis. The LDA score is scaled to the 1-9 range, where 1 represents strongly bureaucratic/institutional protocols and 9 represents strongly relational/cultural protocols. A score of 5 indicates a protocol near the boundary exhibiting characteristics of both families.",
|
||||
"automated": true,
|
||||
"value": 8,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "not useful",
|
||||
"term_left_description": "The bicorder was not useful or relevant for analyzing this protocol",
|
||||
"term_right": "very useful",
|
||||
"term_right_description": "The bicorder was very useful and relevant for analyzing this protocol",
|
||||
"instructions": "Evaluate the usefulness of this bicorder as a tool for analyzing this protocol, considering whether the gradient terms seemed revealing or irrelevant.",
|
||||
"automated": false,
|
||||
"value": null,
|
||||
"notes": null
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -0,0 +1,285 @@
|
||||
{
|
||||
"name": "Protocol Bicorder",
|
||||
"schema": "bicorder.schema.json",
|
||||
"version": "1.2.4",
|
||||
"description": "A diagnostic tool for the study of protocols",
|
||||
"author": "Nathan Schneider",
|
||||
"date_modified": "2025-12-02",
|
||||
"metadata": {
|
||||
"protocol": "Magic Mountain Talks",
|
||||
"description": "A protocol for a literary event series",
|
||||
"analyst": "ntnsndr",
|
||||
"standpoint": "one of the organizers",
|
||||
"timestamp": "2026-02-10T04:24:36.353Z",
|
||||
"shortform": false
|
||||
},
|
||||
"diagnostic": [
|
||||
{
|
||||
"set_name": "Design",
|
||||
"set_description": "How the protocol is created and remembered",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "explicit",
|
||||
"term_left_description": "The design is stated explicitly somewhere that is accessible to participants",
|
||||
"term_right": "implicit",
|
||||
"term_right_description": "The design is not stated explicitly and is learned by use",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "precise",
|
||||
"term_left_description": "The design is specified with a high level of precision that eliminates ambiguity in implementation",
|
||||
"term_right": "interpretive",
|
||||
"term_right_description": "The design is ambiguous, allowing participants a wide range of interpretation",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "institutional",
|
||||
"term_left_description": "Design occurs through processes controlled by powerful institutions",
|
||||
"term_right": "vernacular",
|
||||
"term_right_description": "Design occurs through evolving community interactions",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "documenting",
|
||||
"term_left_description": "The primary purpose is to document or validate activity that is occurring",
|
||||
"term_right": "enabling",
|
||||
"term_right_description": "The primary purpose is to enable activity that might not happen otherwise",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "static",
|
||||
"term_left_description": "Designed to be as fixed and unchanging as possible",
|
||||
"term_right": "malleable",
|
||||
"term_right_description": "Designed to be changed by participants according to evolving needs",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "technical",
|
||||
"term_left_description": "Primarily concerned with interactions among technologies",
|
||||
"term_right": "social",
|
||||
"term_right_description": "Primarily concerned with interactions among people or groups",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "universal",
|
||||
"term_left_description": "Meant for global adoption across different communities",
|
||||
"term_right": "particular",
|
||||
"term_right_description": "Tailored for a specific community",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "durable",
|
||||
"term_left_description": "Designed to be persistently available",
|
||||
"term_right": "ephemeral",
|
||||
"term_right_description": "Designed to vanish when no longer needed",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Entanglement",
|
||||
"set_description": "How the protocol relates with participant agents",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "macro",
|
||||
"term_left_description": "Operates at large scales involving many participants or broad scope",
|
||||
"term_right": "micro",
|
||||
"term_right_description": "Operates at small scales with few participants or narrow scope",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "sovereign",
|
||||
"term_left_description": "A distinctive operating logic, not subject to any other entity",
|
||||
"term_right": "subsidiary",
|
||||
"term_right_description": "An operating logic under the control of a particular entity",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "self-enforcing",
|
||||
"term_left_description": "Rules are automatically enforced through its own mechanisms",
|
||||
"term_right": "enforced",
|
||||
"term_right_description": "Rules require external enforcement by authorities or institutions",
|
||||
"value": 1,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "abstract",
|
||||
"term_left_description": "Participants learn the protocol by studying it intellectually",
|
||||
"term_right": "embodied",
|
||||
"term_right_description": "Participants learn the protocol by physically practicing it",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "obligatory",
|
||||
"term_left_description": "Participation is compulsory for a certain class of agents",
|
||||
"term_right": "voluntary",
|
||||
"term_right_description": "Participation in the protocol is optional and not coerced",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "flocking",
|
||||
"term_left_description": "Coordination occurs through centralized direction or direct mimicry",
|
||||
"term_right": "swarming",
|
||||
"term_right_description": "Coordination occurs through distributed interactions without central direction",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "defensible",
|
||||
"term_left_description": "Strong boundaries and protections against external influence",
|
||||
"term_right": "exposed",
|
||||
"term_right_description": "Weak boundaries and vulnerable to external influence",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "monopolistic",
|
||||
"term_left_description": "Excludes the use of other protocols with similar purposes",
|
||||
"term_right": "pluralistic",
|
||||
"term_right_description": "Interoperates with other protocols and does not exclude their use",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Experience",
|
||||
"set_description": "How the protocol is perceived in the context of its implementation",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "sufficient",
|
||||
"term_left_description": "Adequately meets the needs and goals of participants",
|
||||
"term_right": "limited",
|
||||
"term_right_description": "Does not, on its own, adequately meet the needs and goals of participants",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "crystallized",
|
||||
"term_left_description": "Content or meaning are settled and widely agreed upon",
|
||||
"term_right": "contested",
|
||||
"term_right_description": "Content or meaning are disputed or under debate",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "trust-evading",
|
||||
"term_left_description": "Minimizes the need for trust among participants",
|
||||
"term_right": "trust-inducing",
|
||||
"term_right_description": "Relies on or cultivates trust among participants",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "predictable",
|
||||
"term_left_description": "Produces expected and consistent outcomes",
|
||||
"term_right": "emergent",
|
||||
"term_right_description": "Produces unexpected or novel outcomes",
|
||||
"value": 6,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "exclusion",
|
||||
"term_left_description": "Creates barriers or excludes certain participants",
|
||||
"term_right": "inclusion",
|
||||
"term_right_description": "Reduces barriers and includes diverse participants",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "restraining",
|
||||
"term_left_description": "Fosters experiences of absurd complexity, alienation, and powerlessness",
|
||||
"term_right": "liberating",
|
||||
"term_right_description": "Enables participants to carry out desired activities with less work or thought",
|
||||
"value": 5,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "dead",
|
||||
"term_left_description": "Not actively utilized by relevant participants",
|
||||
"term_right": "alive",
|
||||
"term_right_description": "Actively utilized by relevant participants",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"analysis": [
|
||||
{
|
||||
"term_left": "hardness",
|
||||
"term_left_description": "The protocol tends toward properties characterized by hardness",
|
||||
"term_right": "softness",
|
||||
"term_right_description": "The protocol tends toward properties characterized by softness",
|
||||
"instructions": "Take all the 'value' fields in the gradients above and determine a mean. Round it to the nearest integer. That is the 'value' here.",
|
||||
"automated": true,
|
||||
"value": 6,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "polarized",
|
||||
"term_left_description": "The analyst tended toward more extreme high or low readings",
|
||||
"term_right": "centrist",
|
||||
"term_right_description": "The analyst tended toward readings at the middle of the gradients",
|
||||
"instructions": "Take all the 'value' fields in the gradients above. Assess their degree of polarization. For instance, if all the values are either 1 or 9, the output would be 1, and if all of them are 5, the output would be 9.",
|
||||
"automated": true,
|
||||
"value": 4,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "bureaucratic",
|
||||
"term_left_description": "The protocol exhibits institutional, formal, top-down characteristics with centralized control and external enforcement",
|
||||
"term_right": "relational",
|
||||
"term_right_description": "The protocol exhibits community-based, emergent, bottom-up characteristics with distributed coordination and voluntary participation",
|
||||
"instructions": "Based on the diagnostic readings, calculate the protocol's position using Linear Discriminant Analysis. The LDA score is scaled to the 1-9 range, where 1 represents strongly bureaucratic/institutional protocols and 9 represents strongly relational/cultural protocols. A score of 5 indicates a protocol near the boundary exhibiting characteristics of both families.",
|
||||
"automated": true,
|
||||
"value": 6,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "not useful",
|
||||
"term_left_description": "The bicorder was not useful or relevant for analyzing this protocol",
|
||||
"term_right": "very useful",
|
||||
"term_right_description": "The bicorder was very useful and relevant for analyzing this protocol",
|
||||
"instructions": "Evaluate the usefulness of this bicorder as a tool for analyzing this protocol, considering whether the gradient terms seemed revealing or irrelevant.",
|
||||
"automated": false,
|
||||
"value": null,
|
||||
"notes": null
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -0,0 +1,285 @@
|
||||
{
|
||||
"name": "Protocol Bicorder",
|
||||
"schema": "bicorder.schema.json",
|
||||
"version": "1.2.4",
|
||||
"description": "A diagnostic tool for the study of protocols",
|
||||
"author": "Nathan Schneider",
|
||||
"date_modified": "2025-12-02",
|
||||
"metadata": {
|
||||
"protocol": "Book draft workshop",
|
||||
"description": "A specific protocol for workshopping a book draft",
|
||||
"analyst": "ntnsndr",
|
||||
"standpoint": "The designer and victim of the protocol",
|
||||
"timestamp": "2026-02-21T20:48:59.352Z",
|
||||
"shortform": false
|
||||
},
|
||||
"diagnostic": [
|
||||
{
|
||||
"set_name": "Design",
|
||||
"set_description": "How the protocol is created and remembered",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "explicit",
|
||||
"term_left_description": "The design is stated explicitly somewhere that is accessible to participants",
|
||||
"term_right": "implicit",
|
||||
"term_right_description": "The design is not stated explicitly and is learned by use",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "precise",
|
||||
"term_left_description": "The design is specified with a high level of precision that eliminates ambiguity in implementation",
|
||||
"term_right": "interpretive",
|
||||
"term_right_description": "The design is ambiguous, allowing participants a wide range of interpretation",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "institutional",
|
||||
"term_left_description": "Design occurs through processes controlled by powerful institutions",
|
||||
"term_right": "vernacular",
|
||||
"term_right_description": "Design occurs through evolving community interactions",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "documenting",
|
||||
"term_left_description": "The primary purpose is to document or validate activity that is occurring",
|
||||
"term_right": "enabling",
|
||||
"term_right_description": "The primary purpose is to enable activity that might not happen otherwise",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "static",
|
||||
"term_left_description": "Designed to be as fixed and unchanging as possible",
|
||||
"term_right": "malleable",
|
||||
"term_right_description": "Designed to be changed by participants according to evolving needs",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "technical",
|
||||
"term_left_description": "Primarily concerned with interactions among technologies",
|
||||
"term_right": "social",
|
||||
"term_right_description": "Primarily concerned with interactions among people or groups",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "universal",
|
||||
"term_left_description": "Meant for global adoption across different communities",
|
||||
"term_right": "particular",
|
||||
"term_right_description": "Tailored for a specific community",
|
||||
"value": 6,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "durable",
|
||||
"term_left_description": "Designed to be persistently available",
|
||||
"term_right": "ephemeral",
|
||||
"term_right_description": "Designed to vanish when no longer needed",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Entanglement",
|
||||
"set_description": "How the protocol relates with participant agents",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "macro",
|
||||
"term_left_description": "Operates at large scales involving many participants or broad scope",
|
||||
"term_right": "micro",
|
||||
"term_right_description": "Operates at small scales with few participants or narrow scope",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "sovereign",
|
||||
"term_left_description": "A distinctive operating logic, not subject to any other entity",
|
||||
"term_right": "subsidiary",
|
||||
"term_right_description": "An operating logic under the control of a particular entity",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "self-enforcing",
|
||||
"term_left_description": "Rules are automatically enforced through its own mechanisms",
|
||||
"term_right": "enforced",
|
||||
"term_right_description": "Rules require external enforcement by authorities or institutions",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "abstract",
|
||||
"term_left_description": "Participants learn the protocol by studying it intellectually",
|
||||
"term_right": "embodied",
|
||||
"term_right_description": "Participants learn the protocol by physically practicing it",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "obligatory",
|
||||
"term_left_description": "Participation is compulsory for a certain class of agents",
|
||||
"term_right": "voluntary",
|
||||
"term_right_description": "Participation in the protocol is optional and not coerced",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "flocking",
|
||||
"term_left_description": "Coordination occurs through centralized direction or direct mimicry",
|
||||
"term_right": "swarming",
|
||||
"term_right_description": "Coordination occurs through distributed interactions without central direction",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "defensible",
|
||||
"term_left_description": "Strong boundaries and protections against external influence",
|
||||
"term_right": "exposed",
|
||||
"term_right_description": "Weak boundaries and vulnerable to external influence",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "monopolistic",
|
||||
"term_left_description": "Excludes the use of other protocols with similar purposes",
|
||||
"term_right": "pluralistic",
|
||||
"term_right_description": "Interoperates with other protocols and does not exclude their use",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Experience",
|
||||
"set_description": "How the protocol is perceived in the context of its implementation",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "sufficient",
|
||||
"term_left_description": "Adequately meets the needs and goals of participants",
|
||||
"term_right": "limited",
|
||||
"term_right_description": "Does not, on its own, adequately meet the needs and goals of participants",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "crystallized",
|
||||
"term_left_description": "Content or meaning are settled and widely agreed upon",
|
||||
"term_right": "contested",
|
||||
"term_right_description": "Content or meaning are disputed or under debate",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "trust-evading",
|
||||
"term_left_description": "Minimizes the need for trust among participants",
|
||||
"term_right": "trust-inducing",
|
||||
"term_right_description": "Relies on or cultivates trust among participants",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "predictable",
|
||||
"term_left_description": "Produces expected and consistent outcomes",
|
||||
"term_right": "emergent",
|
||||
"term_right_description": "Produces unexpected or novel outcomes",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "exclusion",
|
||||
"term_left_description": "Creates barriers or excludes certain participants",
|
||||
"term_right": "inclusion",
|
||||
"term_right_description": "Reduces barriers and includes diverse participants",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "restraining",
|
||||
"term_left_description": "Fosters experiences of absurd complexity, alienation, and powerlessness",
|
||||
"term_right": "liberating",
|
||||
"term_right_description": "Enables participants to carry out desired activities with less work or thought",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "dead",
|
||||
"term_left_description": "Not actively utilized by relevant participants",
|
||||
"term_right": "alive",
|
||||
"term_right_description": "Actively utilized by relevant participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"analysis": [
|
||||
{
|
||||
"term_left": "hardness",
|
||||
"term_left_description": "The protocol tends toward properties characterized by hardness",
|
||||
"term_right": "softness",
|
||||
"term_right_description": "The protocol tends toward properties characterized by softness",
|
||||
"instructions": "Take all the 'value' fields in the gradients above and determine a mean. Round it to the nearest integer. That is the 'value' here.",
|
||||
"automated": true,
|
||||
"value": 5,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "polarized",
|
||||
"term_left_description": "The analyst tended toward more extreme high or low readings",
|
||||
"term_right": "centrist",
|
||||
"term_right_description": "The analyst tended toward readings at the middle of the gradients",
|
||||
"instructions": "Take all the 'value' fields in the gradients above. Assess their degree of polarization. For instance, if all the values are either 1 or 9, the output would be 1, and if all of them are 5, the output would be 9.",
|
||||
"automated": true,
|
||||
"value": 4,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "bureaucratic",
|
||||
"term_left_description": "The protocol exhibits institutional, formal, top-down characteristics with centralized control and external enforcement",
|
||||
"term_right": "relational",
|
||||
"term_right_description": "The protocol exhibits community-based, emergent, bottom-up characteristics with distributed coordination and voluntary participation",
|
||||
"instructions": "Based on the diagnostic readings, calculate the protocol's position using Linear Discriminant Analysis. The LDA score is scaled to the 1-9 range, where 1 represents strongly bureaucratic/institutional protocols and 9 represents strongly relational/cultural protocols. A score of 5 indicates a protocol near the boundary exhibiting characteristics of both families.",
|
||||
"automated": true,
|
||||
"value": 5,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "not useful",
|
||||
"term_left_description": "The bicorder was not useful or relevant for analyzing this protocol",
|
||||
"term_right": "very useful",
|
||||
"term_right_description": "The bicorder was very useful and relevant for analyzing this protocol",
|
||||
"instructions": "Evaluate the usefulness of this bicorder as a tool for analyzing this protocol, considering whether the gradient terms seemed revealing or irrelevant.",
|
||||
"automated": false,
|
||||
"value": null,
|
||||
"notes": null
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -0,0 +1,285 @@
|
||||
{
|
||||
"name": "Protocol Bicorder",
|
||||
"schema": "bicorder.schema.json",
|
||||
"version": "1.2.4",
|
||||
"description": "A diagnostic tool for the study of protocols",
|
||||
"author": "Nathan Schneider",
|
||||
"date_modified": "2025-12-02",
|
||||
"metadata": {
|
||||
"protocol": "Playdate orgabizing",
|
||||
"description": "On the practice of parents organizing gatherings for their kids",
|
||||
"analyst": "ntnsndr",
|
||||
"standpoint": "A frequent participant",
|
||||
"timestamp": "2026-02-21T20:54:34.875Z",
|
||||
"shortform": true
|
||||
},
|
||||
"diagnostic": [
|
||||
{
|
||||
"set_name": "Design",
|
||||
"set_description": "How the protocol is created and remembered",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "explicit",
|
||||
"term_left_description": "The design is stated explicitly somewhere that is accessible to participants",
|
||||
"term_right": "implicit",
|
||||
"term_right_description": "The design is not stated explicitly and is learned by use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "precise",
|
||||
"term_left_description": "The design is specified with a high level of precision that eliminates ambiguity in implementation",
|
||||
"term_right": "interpretive",
|
||||
"term_right_description": "The design is ambiguous, allowing participants a wide range of interpretation",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "institutional",
|
||||
"term_left_description": "Design occurs through processes controlled by powerful institutions",
|
||||
"term_right": "vernacular",
|
||||
"term_right_description": "Design occurs through evolving community interactions",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "documenting",
|
||||
"term_left_description": "The primary purpose is to document or validate activity that is occurring",
|
||||
"term_right": "enabling",
|
||||
"term_right_description": "The primary purpose is to enable activity that might not happen otherwise",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "static",
|
||||
"term_left_description": "Designed to be as fixed and unchanging as possible",
|
||||
"term_right": "malleable",
|
||||
"term_right_description": "Designed to be changed by participants according to evolving needs",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "technical",
|
||||
"term_left_description": "Primarily concerned with interactions among technologies",
|
||||
"term_right": "social",
|
||||
"term_right_description": "Primarily concerned with interactions among people or groups",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "universal",
|
||||
"term_left_description": "Meant for global adoption across different communities",
|
||||
"term_right": "particular",
|
||||
"term_right_description": "Tailored for a specific community",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "durable",
|
||||
"term_left_description": "Designed to be persistently available",
|
||||
"term_right": "ephemeral",
|
||||
"term_right_description": "Designed to vanish when no longer needed",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Entanglement",
|
||||
"set_description": "How the protocol relates with participant agents",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "macro",
|
||||
"term_left_description": "Operates at large scales involving many participants or broad scope",
|
||||
"term_right": "micro",
|
||||
"term_right_description": "Operates at small scales with few participants or narrow scope",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "sovereign",
|
||||
"term_left_description": "A distinctive operating logic, not subject to any other entity",
|
||||
"term_right": "subsidiary",
|
||||
"term_right_description": "An operating logic under the control of a particular entity",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "self-enforcing",
|
||||
"term_left_description": "Rules are automatically enforced through its own mechanisms",
|
||||
"term_right": "enforced",
|
||||
"term_right_description": "Rules require external enforcement by authorities or institutions",
|
||||
"value": 1,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "abstract",
|
||||
"term_left_description": "Participants learn the protocol by studying it intellectually",
|
||||
"term_right": "embodied",
|
||||
"term_right_description": "Participants learn the protocol by physically practicing it",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "obligatory",
|
||||
"term_left_description": "Participation is compulsory for a certain class of agents",
|
||||
"term_right": "voluntary",
|
||||
"term_right_description": "Participation in the protocol is optional and not coerced",
|
||||
"value": 6,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "flocking",
|
||||
"term_left_description": "Coordination occurs through centralized direction or direct mimicry",
|
||||
"term_right": "swarming",
|
||||
"term_right_description": "Coordination occurs through distributed interactions without central direction",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "defensible",
|
||||
"term_left_description": "Strong boundaries and protections against external influence",
|
||||
"term_right": "exposed",
|
||||
"term_right_description": "Weak boundaries and vulnerable to external influence",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "monopolistic",
|
||||
"term_left_description": "Excludes the use of other protocols with similar purposes",
|
||||
"term_right": "pluralistic",
|
||||
"term_right_description": "Interoperates with other protocols and does not exclude their use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Experience",
|
||||
"set_description": "How the protocol is perceived in the context of its implementation",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "sufficient",
|
||||
"term_left_description": "Adequately meets the needs and goals of participants",
|
||||
"term_right": "limited",
|
||||
"term_right_description": "Does not, on its own, adequately meet the needs and goals of participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "crystallized",
|
||||
"term_left_description": "Content or meaning are settled and widely agreed upon",
|
||||
"term_right": "contested",
|
||||
"term_right_description": "Content or meaning are disputed or under debate",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "trust-evading",
|
||||
"term_left_description": "Minimizes the need for trust among participants",
|
||||
"term_right": "trust-inducing",
|
||||
"term_right_description": "Relies on or cultivates trust among participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "predictable",
|
||||
"term_left_description": "Produces expected and consistent outcomes",
|
||||
"term_right": "emergent",
|
||||
"term_right_description": "Produces unexpected or novel outcomes",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "exclusion",
|
||||
"term_left_description": "Creates barriers or excludes certain participants",
|
||||
"term_right": "inclusion",
|
||||
"term_right_description": "Reduces barriers and includes diverse participants",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "restraining",
|
||||
"term_left_description": "Fosters experiences of absurd complexity, alienation, and powerlessness",
|
||||
"term_right": "liberating",
|
||||
"term_right_description": "Enables participants to carry out desired activities with less work or thought",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "dead",
|
||||
"term_left_description": "Not actively utilized by relevant participants",
|
||||
"term_right": "alive",
|
||||
"term_right_description": "Actively utilized by relevant participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"analysis": [
|
||||
{
|
||||
"term_left": "hardness",
|
||||
"term_left_description": "The protocol tends toward properties characterized by hardness",
|
||||
"term_right": "softness",
|
||||
"term_right_description": "The protocol tends toward properties characterized by softness",
|
||||
"instructions": "Take all the 'value' fields in the gradients above and determine a mean. Round it to the nearest integer. That is the 'value' here.",
|
||||
"automated": true,
|
||||
"value": 6,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "polarized",
|
||||
"term_left_description": "The analyst tended toward more extreme high or low readings",
|
||||
"term_right": "centrist",
|
||||
"term_right_description": "The analyst tended toward readings at the middle of the gradients",
|
||||
"instructions": "Take all the 'value' fields in the gradients above. Assess their degree of polarization. For instance, if all the values are either 1 or 9, the output would be 1, and if all of them are 5, the output would be 9.",
|
||||
"automated": true,
|
||||
"value": 4,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "bureaucratic",
|
||||
"term_left_description": "The protocol exhibits institutional, formal, top-down characteristics with centralized control and external enforcement",
|
||||
"term_right": "relational",
|
||||
"term_right_description": "The protocol exhibits community-based, emergent, bottom-up characteristics with distributed coordination and voluntary participation",
|
||||
"instructions": "Based on the diagnostic readings, calculate the protocol's position using Linear Discriminant Analysis. The LDA score is scaled to the 1-9 range, where 1 represents strongly bureaucratic/institutional protocols and 9 represents strongly relational/cultural protocols. A score of 5 indicates a protocol near the boundary exhibiting characteristics of both families.",
|
||||
"automated": true,
|
||||
"value": 1,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "not useful",
|
||||
"term_left_description": "The bicorder was not useful or relevant for analyzing this protocol",
|
||||
"term_right": "very useful",
|
||||
"term_right_description": "The bicorder was very useful and relevant for analyzing this protocol",
|
||||
"instructions": "Evaluate the usefulness of this bicorder as a tool for analyzing this protocol, considering whether the gradient terms seemed revealing or irrelevant.",
|
||||
"automated": false,
|
||||
"value": null,
|
||||
"notes": null
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -0,0 +1,285 @@
|
||||
{
|
||||
"name": "Protocol Bicorder",
|
||||
"schema": "bicorder.schema.json",
|
||||
"version": "1.2.6",
|
||||
"description": "A diagnostic tool for the study of protocols",
|
||||
"author": "Nathan Schneider",
|
||||
"date_modified": "2026-02-21",
|
||||
"metadata": {
|
||||
"protocol": "Letters of recommendation",
|
||||
"description": "The practice of recommending people for jobs and fellowships, especially in academia",
|
||||
"analyst": "ntnsndr",
|
||||
"standpoint": "A frequent recommender",
|
||||
"timestamp": "2026-02-24T01:55:07.661Z",
|
||||
"shortform": true
|
||||
},
|
||||
"diagnostic": [
|
||||
{
|
||||
"set_name": "Design",
|
||||
"set_description": "How the protocol is created and remembered",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "explicit",
|
||||
"term_left_description": "Design is stated explicitly somewhere that is accessible to participants",
|
||||
"term_right": "implicit",
|
||||
"term_right_description": "Design is not stated explicitly and is learned by use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "precise",
|
||||
"term_left_description": "Specified with a high level of precision that eliminates ambiguity in implementation",
|
||||
"term_right": "interpretive",
|
||||
"term_right_description": "Ambiguous design, allowing participants a wide range of interpretation",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "institutional",
|
||||
"term_left_description": "Design occurs through processes controlled by powerful institutions",
|
||||
"term_right": "vernacular",
|
||||
"term_right_description": "Design occurs through evolving community interactions",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "documenting",
|
||||
"term_left_description": "Intended to document or validate activity that is occurring",
|
||||
"term_right": "enabling",
|
||||
"term_right_description": "Intended to enable activity that might not happen otherwise",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "static",
|
||||
"term_left_description": "Designed to be as fixed and unchanging as possible",
|
||||
"term_right": "malleable",
|
||||
"term_right_description": "Designed to be changed by participants according to evolving needs",
|
||||
"value": 4,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "technical",
|
||||
"term_left_description": "Primarily concerned with interactions among technologies",
|
||||
"term_right": "social",
|
||||
"term_right_description": "Primarily concerned with interactions among people or groups",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "universal",
|
||||
"term_left_description": "Meant for global adoption across different communities",
|
||||
"term_right": "particular",
|
||||
"term_right_description": "Tailored for a specific community",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "durable",
|
||||
"term_left_description": "Designed to be persistently available",
|
||||
"term_right": "ephemeral",
|
||||
"term_right_description": "Designed to vanish when no longer needed",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Entanglement",
|
||||
"set_description": "How the protocol relates with participant agents",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "macro",
|
||||
"term_left_description": "Operates at large scales involving many participants or broad scope",
|
||||
"term_right": "micro",
|
||||
"term_right_description": "Operates at small scales with few participants or narrow scope",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "sovereign",
|
||||
"term_left_description": "A distinctive operating logic, not subject to any other entity",
|
||||
"term_right": "subsidiary",
|
||||
"term_right_description": "An operating logic under the control of a particular entity",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "self-enforcing",
|
||||
"term_left_description": "Rules automatically enforced through its own mechanisms",
|
||||
"term_right": "enforced",
|
||||
"term_right_description": "Rules require external enforcement by authorities or institutions",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "abstract",
|
||||
"term_left_description": "Participants learn the protocol by studying it intellectually",
|
||||
"term_right": "embodied",
|
||||
"term_right_description": "Participants learn the protocol by physically practicing it",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "obligatory",
|
||||
"term_left_description": "Compulsory participation for a certain class of agents",
|
||||
"term_right": "voluntary",
|
||||
"term_right_description": "Participation is optional and not coerced",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "flocking",
|
||||
"term_left_description": "Coordination occurs through centralized direction or direct mimicry",
|
||||
"term_right": "swarming",
|
||||
"term_right_description": "Coordination occurs through distributed interactions without central direction",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "defensible",
|
||||
"term_left_description": "Strong boundaries and protections against external influence",
|
||||
"term_right": "exposed",
|
||||
"term_right_description": "Weak boundaries and vulnerable to external influence",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "monopolistic",
|
||||
"term_left_description": "Excludes the use of other protocols with similar purposes",
|
||||
"term_right": "pluralistic",
|
||||
"term_right_description": "Interoperates with other protocols and does not exclude their use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Experience",
|
||||
"set_description": "How the protocol is perceived in the context of its implementation",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "sufficient",
|
||||
"term_left_description": "Adequately meets the needs and goals of participants",
|
||||
"term_right": "limited",
|
||||
"term_right_description": "Does not, on its own, adequately meet the needs and goals of participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "crystallized",
|
||||
"term_left_description": "Content or meaning are settled and widely agreed upon",
|
||||
"term_right": "contested",
|
||||
"term_right_description": "Content or meaning are disputed or under debate",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "trust-evading",
|
||||
"term_left_description": "Minimizes the need for trust among participants",
|
||||
"term_right": "trust-inducing",
|
||||
"term_right_description": "Relies on or cultivates trust among participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "predictable",
|
||||
"term_left_description": "Produces expected and consistent outcomes",
|
||||
"term_right": "emergent",
|
||||
"term_right_description": "Produces unexpected or novel outcomes",
|
||||
"value": 4,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "exclusion",
|
||||
"term_left_description": "Creates barriers or excludes certain participants",
|
||||
"term_right": "inclusion",
|
||||
"term_right_description": "Reduces barriers and includes diverse participants",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "restraining",
|
||||
"term_left_description": "Fosters experiences of absurd complexity, alienation, and powerlessness",
|
||||
"term_right": "liberating",
|
||||
"term_right_description": "Enables participants to carry out desired activities with less work or thought",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "dead",
|
||||
"term_left_description": "Not actively utilized by relevant participants",
|
||||
"term_right": "alive",
|
||||
"term_right_description": "Actively utilized by relevant participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"analysis": [
|
||||
{
|
||||
"term_left": "hardness",
|
||||
"term_left_description": "The protocol tends toward properties characterized by hardness",
|
||||
"term_right": "softness",
|
||||
"term_right_description": "The protocol tends toward properties characterized by softness",
|
||||
"instructions": "Take all the 'value' fields in the gradients above and determine a mean. Round it to the nearest integer. That is the 'value' here.",
|
||||
"automated": true,
|
||||
"value": 4,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "polarized",
|
||||
"term_left_description": "The analyst tended toward more extreme high or low readings",
|
||||
"term_right": "centrist",
|
||||
"term_right_description": "The analyst tended toward readings at the middle of the gradients",
|
||||
"instructions": "Take all the 'value' fields in the gradients above. Assess their degree of polarization. For instance, if all the values are either 1 or 9, the output would be 1, and if all of them are 5, the output would be 9.",
|
||||
"automated": true,
|
||||
"value": 5,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "formal",
|
||||
"term_left_description": "Exhibits bureaucratic characteristics with centralized control and predictable enforcement",
|
||||
"term_right": "informal",
|
||||
"term_right_description": "Exhibits relational characteristics with distributed coordination embedded in culture",
|
||||
"instructions": "Based on the diagnostic readings, calculate the protocol's position using Linear Discriminant Analysis. The LDA score is scaled to the 1-9 range, where 1 represents strongly formal protocols and 9 represents strongly informal protocols. A score of 5 indicates a protocol near the boundary exhibiting characteristics of both families.",
|
||||
"automated": true,
|
||||
"value": 8,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "not useful",
|
||||
"term_left_description": "The bicorder was not useful or relevant for analyzing this protocol",
|
||||
"term_right": "very useful",
|
||||
"term_right_description": "The bicorder was very useful and relevant for analyzing this protocol",
|
||||
"instructions": "Evaluate the usefulness of this bicorder as a tool for analyzing this protocol, considering whether the gradient terms seemed revealing or irrelevant.",
|
||||
"automated": false,
|
||||
"value": null,
|
||||
"notes": null
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -0,0 +1,285 @@
|
||||
{
|
||||
"name": "Protocol Bicorder",
|
||||
"schema": "bicorder.schema.json",
|
||||
"version": "1.2.6",
|
||||
"description": "A diagnostic tool for the study of protocols",
|
||||
"author": "Nathan Schneider",
|
||||
"date_modified": "2026-02-21",
|
||||
"metadata": {
|
||||
"protocol": "Deciding how to get the check at a restaurant",
|
||||
"description": null,
|
||||
"analyst": "ntnsndr",
|
||||
"standpoint": "Person who often feels awkward and wants to be generous",
|
||||
"timestamp": "2026-02-25T03:43:22.857Z",
|
||||
"shortform": true
|
||||
},
|
||||
"diagnostic": [
|
||||
{
|
||||
"set_name": "Design",
|
||||
"set_description": "How the protocol is created and remembered",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "explicit",
|
||||
"term_left_description": "Design is stated explicitly somewhere that is accessible to participants",
|
||||
"term_right": "implicit",
|
||||
"term_right_description": "Design is not stated explicitly and is learned by use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "precise",
|
||||
"term_left_description": "Specified with a high level of precision that eliminates ambiguity in implementation",
|
||||
"term_right": "interpretive",
|
||||
"term_right_description": "Ambiguous design, allowing participants a wide range of interpretation",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "institutional",
|
||||
"term_left_description": "Design occurs through processes controlled by powerful institutions",
|
||||
"term_right": "vernacular",
|
||||
"term_right_description": "Design occurs through evolving community interactions",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "documenting",
|
||||
"term_left_description": "Intended to document or validate activity that is occurring",
|
||||
"term_right": "enabling",
|
||||
"term_right_description": "Intended to enable activity that might not happen otherwise",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "static",
|
||||
"term_left_description": "Designed to be as fixed and unchanging as possible",
|
||||
"term_right": "malleable",
|
||||
"term_right_description": "Designed to be changed by participants according to evolving needs",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "technical",
|
||||
"term_left_description": "Primarily concerned with interactions among technologies",
|
||||
"term_right": "social",
|
||||
"term_right_description": "Primarily concerned with interactions among people or groups",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "universal",
|
||||
"term_left_description": "Meant for global adoption across different communities",
|
||||
"term_right": "particular",
|
||||
"term_right_description": "Tailored for a specific community",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "durable",
|
||||
"term_left_description": "Designed to be persistently available",
|
||||
"term_right": "ephemeral",
|
||||
"term_right_description": "Designed to vanish when no longer needed",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Entanglement",
|
||||
"set_description": "How the protocol relates with participant agents",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "macro",
|
||||
"term_left_description": "Operates at large scales involving many participants or broad scope",
|
||||
"term_right": "micro",
|
||||
"term_right_description": "Operates at small scales with few participants or narrow scope",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "sovereign",
|
||||
"term_left_description": "A distinctive operating logic, not subject to any other entity",
|
||||
"term_right": "subsidiary",
|
||||
"term_right_description": "An operating logic under the control of a particular entity",
|
||||
"value": 1,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "self-enforcing",
|
||||
"term_left_description": "Rules automatically enforced through its own mechanisms",
|
||||
"term_right": "enforced",
|
||||
"term_right_description": "Rules require external enforcement by authorities or institutions",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "abstract",
|
||||
"term_left_description": "Participants learn the protocol by studying it intellectually",
|
||||
"term_right": "embodied",
|
||||
"term_right_description": "Participants learn the protocol by physically practicing it",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "obligatory",
|
||||
"term_left_description": "Compulsory participation for a certain class of agents",
|
||||
"term_right": "voluntary",
|
||||
"term_right_description": "Participation is optional and not coerced",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "flocking",
|
||||
"term_left_description": "Coordination occurs through centralized direction or direct mimicry",
|
||||
"term_right": "swarming",
|
||||
"term_right_description": "Coordination occurs through distributed interactions without central direction",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "defensible",
|
||||
"term_left_description": "Strong boundaries and protections against external influence",
|
||||
"term_right": "exposed",
|
||||
"term_right_description": "Weak boundaries and vulnerable to external influence",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "monopolistic",
|
||||
"term_left_description": "Excludes the use of other protocols with similar purposes",
|
||||
"term_right": "pluralistic",
|
||||
"term_right_description": "Interoperates with other protocols and does not exclude their use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Experience",
|
||||
"set_description": "How the protocol is perceived in the context of its implementation",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "sufficient",
|
||||
"term_left_description": "Adequately meets the needs and goals of participants",
|
||||
"term_right": "limited",
|
||||
"term_right_description": "Does not, on its own, adequately meet the needs and goals of participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "crystallized",
|
||||
"term_left_description": "Content or meaning are settled and widely agreed upon",
|
||||
"term_right": "contested",
|
||||
"term_right_description": "Content or meaning are disputed or under debate",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "trust-evading",
|
||||
"term_left_description": "Minimizes the need for trust among participants",
|
||||
"term_right": "trust-inducing",
|
||||
"term_right_description": "Relies on or cultivates trust among participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "predictable",
|
||||
"term_left_description": "Produces expected and consistent outcomes",
|
||||
"term_right": "emergent",
|
||||
"term_right_description": "Produces unexpected or novel outcomes",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "exclusion",
|
||||
"term_left_description": "Creates barriers or excludes certain participants",
|
||||
"term_right": "inclusion",
|
||||
"term_right_description": "Reduces barriers and includes diverse participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "restraining",
|
||||
"term_left_description": "Fosters experiences of absurd complexity, alienation, and powerlessness",
|
||||
"term_right": "liberating",
|
||||
"term_right_description": "Enables participants to carry out desired activities with less work or thought",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "dead",
|
||||
"term_left_description": "Not actively utilized by relevant participants",
|
||||
"term_right": "alive",
|
||||
"term_right_description": "Actively utilized by relevant participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"analysis": [
|
||||
{
|
||||
"term_left": "hardness",
|
||||
"term_left_description": "The protocol tends toward properties characterized by hardness",
|
||||
"term_right": "softness",
|
||||
"term_right_description": "The protocol tends toward properties characterized by softness",
|
||||
"instructions": "Take all the 'value' fields in the gradients above and determine a mean. Round it to the nearest integer. That is the 'value' here.",
|
||||
"automated": true,
|
||||
"value": 6,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "polarized",
|
||||
"term_left_description": "The analyst tended toward more extreme high or low readings",
|
||||
"term_right": "centrist",
|
||||
"term_right_description": "The analyst tended toward readings at the middle of the gradients",
|
||||
"instructions": "Take all the 'value' fields in the gradients above. Assess their degree of polarization. For instance, if all the values are either 1 or 9, the output would be 1, and if all of them are 5, the output would be 9.",
|
||||
"automated": true,
|
||||
"value": 3,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "formal",
|
||||
"term_left_description": "Exhibits bureaucratic characteristics with centralized control and predictable enforcement",
|
||||
"term_right": "informal",
|
||||
"term_right_description": "Exhibits relational characteristics with distributed coordination embedded in culture",
|
||||
"instructions": "Based on the diagnostic readings, calculate the protocol's position using Linear Discriminant Analysis. The LDA score is scaled to the 1-9 range, where 1 represents strongly formal protocols and 9 represents strongly informal protocols. A score of 5 indicates a protocol near the boundary exhibiting characteristics of both families.",
|
||||
"automated": true,
|
||||
"value": 1,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "not useful",
|
||||
"term_left_description": "The bicorder was not useful or relevant for analyzing this protocol",
|
||||
"term_right": "very useful",
|
||||
"term_right_description": "The bicorder was very useful and relevant for analyzing this protocol",
|
||||
"instructions": "Evaluate the usefulness of this bicorder as a tool for analyzing this protocol, considering whether the gradient terms seemed revealing or irrelevant.",
|
||||
"automated": false,
|
||||
"value": null,
|
||||
"notes": null
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -0,0 +1,285 @@
|
||||
{
|
||||
"name": "Protocol Bicorder",
|
||||
"schema": "bicorder.schema.json",
|
||||
"version": "1.2.6",
|
||||
"description": "A diagnostic tool for the study of protocols",
|
||||
"author": "Nathan Schneider",
|
||||
"date_modified": "2026-02-21",
|
||||
"metadata": {
|
||||
"protocol": "Office hours",
|
||||
"description": "A ritual and expectation whereby professors are available at certain times to meet with students",
|
||||
"analyst": "ntnsndr",
|
||||
"standpoint": "Professor",
|
||||
"timestamp": "2026-03-04T22:46:56.138Z",
|
||||
"shortform": false
|
||||
},
|
||||
"diagnostic": [
|
||||
{
|
||||
"set_name": "Design",
|
||||
"set_description": "How the protocol is created and remembered",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "explicit",
|
||||
"term_left_description": "Design is stated explicitly somewhere that is accessible to participants",
|
||||
"term_right": "implicit",
|
||||
"term_right_description": "Design is not stated explicitly and is learned by use",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "precise",
|
||||
"term_left_description": "Specified with a high level of precision that eliminates ambiguity in implementation",
|
||||
"term_right": "interpretive",
|
||||
"term_right_description": "Ambiguous design, allowing participants a wide range of interpretation",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "institutional",
|
||||
"term_left_description": "Design occurs through processes controlled by powerful institutions",
|
||||
"term_right": "vernacular",
|
||||
"term_right_description": "Design occurs through evolving community interactions",
|
||||
"value": 5,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "documenting",
|
||||
"term_left_description": "Intended to document or validate activity that is occurring",
|
||||
"term_right": "enabling",
|
||||
"term_right_description": "Intended to enable activity that might not happen otherwise",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "static",
|
||||
"term_left_description": "Designed to be as fixed and unchanging as possible",
|
||||
"term_right": "malleable",
|
||||
"term_right_description": "Designed to be changed by participants according to evolving needs",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "technical",
|
||||
"term_left_description": "Primarily concerned with interactions among technologies",
|
||||
"term_right": "social",
|
||||
"term_right_description": "Primarily concerned with interactions among people or groups",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "universal",
|
||||
"term_left_description": "Meant for global adoption across different communities",
|
||||
"term_right": "particular",
|
||||
"term_right_description": "Tailored for a specific community",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "durable",
|
||||
"term_left_description": "Designed to be persistently available",
|
||||
"term_right": "ephemeral",
|
||||
"term_right_description": "Designed to vanish when no longer needed",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Entanglement",
|
||||
"set_description": "How the protocol relates with participant agents",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "macro",
|
||||
"term_left_description": "Operates at large scales involving many participants or broad scope",
|
||||
"term_right": "micro",
|
||||
"term_right_description": "Operates at small scales with few participants or narrow scope",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "sovereign",
|
||||
"term_left_description": "A distinctive operating logic, not subject to any other entity",
|
||||
"term_right": "subsidiary",
|
||||
"term_right_description": "An operating logic under the control of a particular entity",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "self-enforcing",
|
||||
"term_left_description": "Rules automatically enforced through its own mechanisms",
|
||||
"term_right": "enforced",
|
||||
"term_right_description": "Rules require external enforcement by authorities or institutions",
|
||||
"value": 4,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "abstract",
|
||||
"term_left_description": "Participants learn the protocol by studying it intellectually",
|
||||
"term_right": "embodied",
|
||||
"term_right_description": "Participants learn the protocol by physically practicing it",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "obligatory",
|
||||
"term_left_description": "Compulsory participation for a certain class of agents",
|
||||
"term_right": "voluntary",
|
||||
"term_right_description": "Participation is optional and not coerced",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "flocking",
|
||||
"term_left_description": "Coordination occurs through centralized direction or direct mimicry",
|
||||
"term_right": "swarming",
|
||||
"term_right_description": "Coordination occurs through distributed interactions without central direction",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "defensible",
|
||||
"term_left_description": "Strong boundaries and protections against external influence",
|
||||
"term_right": "exposed",
|
||||
"term_right_description": "Weak boundaries and vulnerable to external influence",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "monopolistic",
|
||||
"term_left_description": "Excludes the use of other protocols with similar purposes",
|
||||
"term_right": "pluralistic",
|
||||
"term_right_description": "Interoperates with other protocols and does not exclude their use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Experience",
|
||||
"set_description": "How the protocol is perceived in the context of its implementation",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "sufficient",
|
||||
"term_left_description": "Adequately meets the needs and goals of participants",
|
||||
"term_right": "limited",
|
||||
"term_right_description": "Does not, on its own, adequately meet the needs and goals of participants",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "crystallized",
|
||||
"term_left_description": "Content or meaning are settled and widely agreed upon",
|
||||
"term_right": "contested",
|
||||
"term_right_description": "Content or meaning are disputed or under debate",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "trust-evading",
|
||||
"term_left_description": "Minimizes the need for trust among participants",
|
||||
"term_right": "trust-inducing",
|
||||
"term_right_description": "Relies on or cultivates trust among participants",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "predictable",
|
||||
"term_left_description": "Produces expected and consistent outcomes",
|
||||
"term_right": "emergent",
|
||||
"term_right_description": "Produces unexpected or novel outcomes",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "exclusion",
|
||||
"term_left_description": "Creates barriers or excludes certain participants",
|
||||
"term_right": "inclusion",
|
||||
"term_right_description": "Reduces barriers and includes diverse participants",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "restraining",
|
||||
"term_left_description": "Fosters experiences of absurd complexity, alienation, and powerlessness",
|
||||
"term_right": "liberating",
|
||||
"term_right_description": "Enables participants to carry out desired activities with less work or thought",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "dead",
|
||||
"term_left_description": "Not actively utilized by relevant participants",
|
||||
"term_right": "alive",
|
||||
"term_right_description": "Actively utilized by relevant participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"analysis": [
|
||||
{
|
||||
"term_left": "hardness",
|
||||
"term_left_description": "The protocol tends toward properties characterized by hardness",
|
||||
"term_right": "softness",
|
||||
"term_right_description": "The protocol tends toward properties characterized by softness",
|
||||
"instructions": "Take all the 'value' fields in the gradients above and determine a mean. Round it to the nearest integer. That is the 'value' here.",
|
||||
"automated": true,
|
||||
"value": 7,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "polarized",
|
||||
"term_left_description": "The analyst tended toward more extreme high or low readings",
|
||||
"term_right": "centrist",
|
||||
"term_right_description": "The analyst tended toward readings at the middle of the gradients",
|
||||
"instructions": "Take all the 'value' fields in the gradients above. Assess their degree of polarization. For instance, if all the values are either 1 or 9, the output would be 1, and if all of them are 5, the output would be 9.",
|
||||
"automated": true,
|
||||
"value": 4,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "formal",
|
||||
"term_left_description": "Exhibits bureaucratic characteristics with centralized control and predictable enforcement",
|
||||
"term_right": "informal",
|
||||
"term_right_description": "Exhibits relational characteristics with distributed coordination embedded in culture",
|
||||
"instructions": "Based on the diagnostic readings, calculate the protocol's position using Linear Discriminant Analysis. The LDA score is scaled to the 1-9 range, where 1 represents strongly formal protocols and 9 represents strongly informal protocols. A score of 5 indicates a protocol near the boundary exhibiting characteristics of both families.",
|
||||
"automated": true,
|
||||
"value": 1,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "not useful",
|
||||
"term_left_description": "The bicorder was not useful or relevant for analyzing this protocol",
|
||||
"term_right": "very useful",
|
||||
"term_right_description": "The bicorder was very useful and relevant for analyzing this protocol",
|
||||
"instructions": "Evaluate the usefulness of this bicorder as a tool for analyzing this protocol, considering whether the gradient terms seemed revealing or irrelevant.",
|
||||
"automated": false,
|
||||
"value": null,
|
||||
"notes": null
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -0,0 +1,285 @@
|
||||
{
|
||||
"name": "Protocol Bicorder",
|
||||
"schema": "bicorder.schema.json",
|
||||
"version": "1.2.6",
|
||||
"description": "A diagnostic tool for the study of protocols",
|
||||
"author": "Nathan Schneider",
|
||||
"date_modified": "2026-02-21",
|
||||
"metadata": {
|
||||
"protocol": "Screen time",
|
||||
"description": "Parents setting boundaries on kids' use of screens",
|
||||
"analyst": "ntnsndr",
|
||||
"standpoint": "parent",
|
||||
"timestamp": "2026-03-09T14:42:00.368Z",
|
||||
"shortform": false
|
||||
},
|
||||
"diagnostic": [
|
||||
{
|
||||
"set_name": "Design",
|
||||
"set_description": "How the protocol is created and remembered",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "explicit",
|
||||
"term_left_description": "Design is stated explicitly somewhere that is accessible to participants",
|
||||
"term_right": "implicit",
|
||||
"term_right_description": "Design is not stated explicitly and is learned by use",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "precise",
|
||||
"term_left_description": "Specified with a high level of precision that eliminates ambiguity in implementation",
|
||||
"term_right": "interpretive",
|
||||
"term_right_description": "Ambiguous design, allowing participants a wide range of interpretation",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "institutional",
|
||||
"term_left_description": "Design occurs through processes controlled by powerful institutions",
|
||||
"term_right": "vernacular",
|
||||
"term_right_description": "Design occurs through evolving community interactions",
|
||||
"value": 6,
|
||||
"notes": "Mostly per family, but also sometimes enabled by corporate technologies and government laws.",
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "documenting",
|
||||
"term_left_description": "Intended to document or validate activity that is occurring",
|
||||
"term_right": "enabling",
|
||||
"term_right_description": "Intended to enable activity that might not happen otherwise",
|
||||
"value": 6,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "static",
|
||||
"term_left_description": "Designed to be as fixed and unchanging as possible",
|
||||
"term_right": "malleable",
|
||||
"term_right_description": "Designed to be changed by participants according to evolving needs",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "technical",
|
||||
"term_left_description": "Primarily concerned with interactions among technologies",
|
||||
"term_right": "social",
|
||||
"term_right_description": "Primarily concerned with interactions among people or groups",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "universal",
|
||||
"term_left_description": "Meant for global adoption across different communities",
|
||||
"term_right": "particular",
|
||||
"term_right_description": "Tailored for a specific community",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "durable",
|
||||
"term_left_description": "Designed to be persistently available",
|
||||
"term_right": "ephemeral",
|
||||
"term_right_description": "Designed to vanish when no longer needed",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Entanglement",
|
||||
"set_description": "How the protocol relates with participant agents",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "macro",
|
||||
"term_left_description": "Operates at large scales involving many participants or broad scope",
|
||||
"term_right": "micro",
|
||||
"term_right_description": "Operates at small scales with few participants or narrow scope",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "sovereign",
|
||||
"term_left_description": "A distinctive operating logic, not subject to any other entity",
|
||||
"term_right": "subsidiary",
|
||||
"term_right_description": "An operating logic under the control of a particular entity",
|
||||
"value": 4,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "self-enforcing",
|
||||
"term_left_description": "Rules automatically enforced through its own mechanisms",
|
||||
"term_right": "enforced",
|
||||
"term_right_description": "Rules require external enforcement by authorities or institutions",
|
||||
"value": 5,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "abstract",
|
||||
"term_left_description": "Participants learn the protocol by studying it intellectually",
|
||||
"term_right": "embodied",
|
||||
"term_right_description": "Participants learn the protocol by physically practicing it",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "obligatory",
|
||||
"term_left_description": "Compulsory participation for a certain class of agents",
|
||||
"term_right": "voluntary",
|
||||
"term_right_description": "Participation is optional and not coerced",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "flocking",
|
||||
"term_left_description": "Coordination occurs through centralized direction or direct mimicry",
|
||||
"term_right": "swarming",
|
||||
"term_right_description": "Coordination occurs through distributed interactions without central direction",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "defensible",
|
||||
"term_left_description": "Strong boundaries and protections against external influence",
|
||||
"term_right": "exposed",
|
||||
"term_right_description": "Weak boundaries and vulnerable to external influence",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "monopolistic",
|
||||
"term_left_description": "Excludes the use of other protocols with similar purposes",
|
||||
"term_right": "pluralistic",
|
||||
"term_right_description": "Interoperates with other protocols and does not exclude their use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Experience",
|
||||
"set_description": "How the protocol is perceived in the context of its implementation",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "sufficient",
|
||||
"term_left_description": "Adequately meets the needs and goals of participants",
|
||||
"term_right": "limited",
|
||||
"term_right_description": "Does not, on its own, adequately meet the needs and goals of participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "crystallized",
|
||||
"term_left_description": "Content or meaning are settled and widely agreed upon",
|
||||
"term_right": "contested",
|
||||
"term_right_description": "Content or meaning are disputed or under debate",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "trust-evading",
|
||||
"term_left_description": "Minimizes the need for trust among participants",
|
||||
"term_right": "trust-inducing",
|
||||
"term_right_description": "Relies on or cultivates trust among participants",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "predictable",
|
||||
"term_left_description": "Produces expected and consistent outcomes",
|
||||
"term_right": "emergent",
|
||||
"term_right_description": "Produces unexpected or novel outcomes",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "exclusion",
|
||||
"term_left_description": "Creates barriers or excludes certain participants",
|
||||
"term_right": "inclusion",
|
||||
"term_right_description": "Reduces barriers and includes diverse participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "restraining",
|
||||
"term_left_description": "Fosters experiences of absurd complexity, alienation, and powerlessness",
|
||||
"term_right": "liberating",
|
||||
"term_right_description": "Enables participants to carry out desired activities with less work or thought",
|
||||
"value": 5,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "dead",
|
||||
"term_left_description": "Not actively utilized by relevant participants",
|
||||
"term_right": "alive",
|
||||
"term_right_description": "Actively utilized by relevant participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"analysis": [
|
||||
{
|
||||
"term_left": "hardness",
|
||||
"term_left_description": "The protocol tends toward properties characterized by hardness",
|
||||
"term_right": "softness",
|
||||
"term_right_description": "The protocol tends toward properties characterized by softness",
|
||||
"instructions": "Take all the 'value' fields in the gradients above and determine a mean. Round it to the nearest integer. That is the 'value' here.",
|
||||
"automated": true,
|
||||
"value": 6,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "polarized",
|
||||
"term_left_description": "The analyst tended toward more extreme high or low readings",
|
||||
"term_right": "centrist",
|
||||
"term_right_description": "The analyst tended toward readings at the middle of the gradients",
|
||||
"instructions": "Take all the 'value' fields in the gradients above. Assess their degree of polarization. For instance, if all the values are either 1 or 9, the output would be 1, and if all of them are 5, the output would be 9.",
|
||||
"automated": true,
|
||||
"value": 6,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "formal",
|
||||
"term_left_description": "Exhibits bureaucratic characteristics with centralized control and predictable enforcement",
|
||||
"term_right": "informal",
|
||||
"term_right_description": "Exhibits relational characteristics with distributed coordination embedded in culture",
|
||||
"instructions": "Based on the diagnostic readings, calculate the protocol's position using Linear Discriminant Analysis. The LDA score is scaled to the 1-9 range, where 1 represents strongly formal protocols and 9 represents strongly informal protocols. A score of 5 indicates a protocol near the boundary exhibiting characteristics of both families.",
|
||||
"automated": true,
|
||||
"value": 3,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "not useful",
|
||||
"term_left_description": "The bicorder was not useful or relevant for analyzing this protocol",
|
||||
"term_right": "very useful",
|
||||
"term_right_description": "The bicorder was very useful and relevant for analyzing this protocol",
|
||||
"instructions": "Evaluate the usefulness of this bicorder as a tool for analyzing this protocol, considering whether the gradient terms seemed revealing or irrelevant.",
|
||||
"automated": false,
|
||||
"value": null,
|
||||
"notes": null
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -0,0 +1,285 @@
|
||||
{
|
||||
"name": "Protocol Bicorder",
|
||||
"schema": "bicorder.schema.json",
|
||||
"version": "1.2.6",
|
||||
"description": "A diagnostic tool for the study of protocols",
|
||||
"author": "Nathan Schneider",
|
||||
"date_modified": "2026-02-21",
|
||||
"metadata": {
|
||||
"protocol": "Playing catch with a baseball",
|
||||
"description": null,
|
||||
"analyst": "ntnsndr",
|
||||
"standpoint": "Baseball coach",
|
||||
"timestamp": "2026-03-20T23:13:29.924Z",
|
||||
"shortform": true
|
||||
},
|
||||
"diagnostic": [
|
||||
{
|
||||
"set_name": "Design",
|
||||
"set_description": "How the protocol is created and remembered",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "explicit",
|
||||
"term_left_description": "Design is stated explicitly somewhere that is accessible to participants",
|
||||
"term_right": "implicit",
|
||||
"term_right_description": "Design is not stated explicitly and is learned by use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "precise",
|
||||
"term_left_description": "Specified with a high level of precision that eliminates ambiguity in implementation",
|
||||
"term_right": "interpretive",
|
||||
"term_right_description": "Ambiguous design, allowing participants a wide range of interpretation",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "institutional",
|
||||
"term_left_description": "Design occurs through processes controlled by powerful institutions",
|
||||
"term_right": "vernacular",
|
||||
"term_right_description": "Design occurs through evolving community interactions",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "documenting",
|
||||
"term_left_description": "Intended to document or validate activity that is occurring",
|
||||
"term_right": "enabling",
|
||||
"term_right_description": "Intended to enable activity that might not happen otherwise",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "static",
|
||||
"term_left_description": "Designed to be as fixed and unchanging as possible",
|
||||
"term_right": "malleable",
|
||||
"term_right_description": "Designed to be changed by participants according to evolving needs",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "technical",
|
||||
"term_left_description": "Primarily concerned with interactions among technologies",
|
||||
"term_right": "social",
|
||||
"term_right_description": "Primarily concerned with interactions among people or groups",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "universal",
|
||||
"term_left_description": "Meant for global adoption across different communities",
|
||||
"term_right": "particular",
|
||||
"term_right_description": "Tailored for a specific community",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "durable",
|
||||
"term_left_description": "Designed to be persistently available",
|
||||
"term_right": "ephemeral",
|
||||
"term_right_description": "Designed to vanish when no longer needed",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Entanglement",
|
||||
"set_description": "How the protocol relates with participant agents",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "macro",
|
||||
"term_left_description": "Operates at large scales involving many participants or broad scope",
|
||||
"term_right": "micro",
|
||||
"term_right_description": "Operates at small scales with few participants or narrow scope",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "sovereign",
|
||||
"term_left_description": "A distinctive operating logic, not subject to any other entity",
|
||||
"term_right": "subsidiary",
|
||||
"term_right_description": "An operating logic under the control of a particular entity",
|
||||
"value": 1,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "self-enforcing",
|
||||
"term_left_description": "Rules automatically enforced through its own mechanisms",
|
||||
"term_right": "enforced",
|
||||
"term_right_description": "Rules require external enforcement by authorities or institutions",
|
||||
"value": 1,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "abstract",
|
||||
"term_left_description": "Participants learn the protocol by studying it intellectually",
|
||||
"term_right": "embodied",
|
||||
"term_right_description": "Participants learn the protocol by physically practicing it",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "obligatory",
|
||||
"term_left_description": "Compulsory participation for a certain class of agents",
|
||||
"term_right": "voluntary",
|
||||
"term_right_description": "Participation is optional and not coerced",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "flocking",
|
||||
"term_left_description": "Coordination occurs through centralized direction or direct mimicry",
|
||||
"term_right": "swarming",
|
||||
"term_right_description": "Coordination occurs through distributed interactions without central direction",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "defensible",
|
||||
"term_left_description": "Strong boundaries and protections against external influence",
|
||||
"term_right": "exposed",
|
||||
"term_right_description": "Weak boundaries and vulnerable to external influence",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "monopolistic",
|
||||
"term_left_description": "Excludes the use of other protocols with similar purposes",
|
||||
"term_right": "pluralistic",
|
||||
"term_right_description": "Interoperates with other protocols and does not exclude their use",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Experience",
|
||||
"set_description": "How the protocol is perceived in the context of its implementation",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "sufficient",
|
||||
"term_left_description": "Adequately meets the needs and goals of participants",
|
||||
"term_right": "limited",
|
||||
"term_right_description": "Does not, on its own, adequately meet the needs and goals of participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "crystallized",
|
||||
"term_left_description": "Content or meaning are settled and widely agreed upon",
|
||||
"term_right": "contested",
|
||||
"term_right_description": "Content or meaning are disputed or under debate",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "trust-evading",
|
||||
"term_left_description": "Minimizes the need for trust among participants",
|
||||
"term_right": "trust-inducing",
|
||||
"term_right_description": "Relies on or cultivates trust among participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "predictable",
|
||||
"term_left_description": "Produces expected and consistent outcomes",
|
||||
"term_right": "emergent",
|
||||
"term_right_description": "Produces unexpected or novel outcomes",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "exclusion",
|
||||
"term_left_description": "Creates barriers or excludes certain participants",
|
||||
"term_right": "inclusion",
|
||||
"term_right_description": "Reduces barriers and includes diverse participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "restraining",
|
||||
"term_left_description": "Fosters experiences of absurd complexity, alienation, and powerlessness",
|
||||
"term_right": "liberating",
|
||||
"term_right_description": "Enables participants to carry out desired activities with less work or thought",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "dead",
|
||||
"term_left_description": "Not actively utilized by relevant participants",
|
||||
"term_right": "alive",
|
||||
"term_right_description": "Actively utilized by relevant participants",
|
||||
"value": null,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"analysis": [
|
||||
{
|
||||
"term_left": "hardness",
|
||||
"term_left_description": "The protocol tends toward properties characterized by hardness",
|
||||
"term_right": "softness",
|
||||
"term_right_description": "The protocol tends toward properties characterized by softness",
|
||||
"instructions": "Take all the 'value' fields in the gradients above and determine a mean. Round it to the nearest integer. That is the 'value' here.",
|
||||
"automated": true,
|
||||
"value": 5,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "polarized",
|
||||
"term_left_description": "The analyst tended toward more extreme high or low readings",
|
||||
"term_right": "centrist",
|
||||
"term_right_description": "The analyst tended toward readings at the middle of the gradients",
|
||||
"instructions": "Take all the 'value' fields in the gradients above. Assess their degree of polarization. For instance, if all the values are either 1 or 9, the output would be 1, and if all of them are 5, the output would be 9.",
|
||||
"automated": true,
|
||||
"value": 4,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "formal",
|
||||
"term_left_description": "Exhibits bureaucratic characteristics with centralized control and predictable enforcement",
|
||||
"term_right": "informal",
|
||||
"term_right_description": "Exhibits relational characteristics with distributed coordination embedded in culture",
|
||||
"instructions": "Based on the diagnostic readings, calculate the protocol's position using Linear Discriminant Analysis. The LDA score is scaled to the 1-9 range, where 1 represents strongly formal protocols and 9 represents strongly informal protocols. A score of 5 indicates a protocol near the boundary exhibiting characteristics of both families.",
|
||||
"automated": true,
|
||||
"value": 1,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "not useful",
|
||||
"term_left_description": "The bicorder was not useful or relevant for analyzing this protocol",
|
||||
"term_right": "very useful",
|
||||
"term_right_description": "The bicorder was very useful and relevant for analyzing this protocol",
|
||||
"instructions": "Evaluate the usefulness of this bicorder as a tool for analyzing this protocol, considering whether the gradient terms seemed revealing or irrelevant.",
|
||||
"automated": false,
|
||||
"value": null,
|
||||
"notes": null
|
||||
}
|
||||
]
|
||||
}
|
||||
33
analysis/data/readings/manual_20260320/readings.csv
Normal file
@@ -0,0 +1,33 @@
|
||||
Descriptor,Description,analyst,standpoint,timestamp,shortform,version,Design_explicit_vs_implicit,Design_precise_vs_interpretive,Design_institutional_vs_vernacular,Design_documenting_vs_enabling,Design_static_vs_malleable,Design_technical_vs_social,Design_universal_vs_particular,Design_durable_vs_ephemeral,Entanglement_macro_vs_micro,Entanglement_sovereign_vs_subsidiary,Entanglement_self-enforcing_vs_enforced,Entanglement_abstract_vs_embodied,Entanglement_obligatory_vs_voluntary,Entanglement_flocking_vs_swarming,Entanglement_defensible_vs_exposed,Entanglement_monopolistic_vs_pluralistic,Experience_sufficient_vs_limited,Experience_crystallized_vs_contested,Experience_trust-evading_vs_trust-inducing,Experience_predictable_vs_emergent,Experience_exclusion_vs_inclusion,Experience_restraining_vs_liberating,Experience_dead_vs_alive
|
||||
Coffee shop as office,,ntnsndr,A person using a coffee shop as an office,2025-11-25T18:07:21.486Z,True,1.1.0,,7,7,,3,,,,,4,3,,8,4,,,,,,,3,,
|
||||
Street crossing in Buenos Aires,,Venkat,Tourist,2025-12-03T17:16:54.751Z,False,1.2.1,8,6,6,9,6,8,8,2,8,7,3,7,7,2,5,6,,6,6,6,7,4,8
|
||||
qPCR,,Fotis Tsiroukis,Ethnography of Scientific Practice,2025-12-12T00:00:47.807Z,False,1.2.1,4,8,6,6,4,3,9,2,5,4,4,5,3,6,4,8,,4,5,4,2,7,9
|
||||
High wind preemptive blackouts,,ntnsndr,Power consumer who lost power at office and home during high winds,2025-12-18T12:21:09.551Z,False,1.2.1,2,3,1,6,7,3,7,8,3,8,9,8,3,1,2,1,,7,7,6,8,5,9
|
||||
Bedtime routine with kids,,ntnsndr,Parental participant,2026-01-05T04:30:04.916Z,False,1.2.3,2,4,9,9,3,9,7,3,9,8,8,9,1,2,,8,1,6,7,1,,8,9
|
||||
Quarantine of a sick family member,,ntnsndr,Family member,2026-01-06T04:37:20.251Z,False,1.2.3,8,8,7,9,9,9,5,7,8,3,2,9,8,,,8,2,7,8,2,1,3,9
|
||||
Email scheduling technique,,ntnsndr,Practioner of the protocol,2026-01-07T00:19:13.592Z,False,1.2.3,1,1,9,9,9,6,,,9,3,9,,7,,9,,2,,3,1,,,
|
||||
Podcasting (as a social practice),,ntnsndr,"Listener, occasional producer",2026-01-15T19:07:50.435Z,True,1.2.4,,8,7,,8,,,,,3,3,,9,7,,,,,,8,9,,
|
||||
,,Bob,,2026-01-16T22:58:07.449Z,True,1.2.4,,7,2,,9,,,,,9,9,,1,5,,,,,,9,2,,
|
||||
Handshake ,,Owocki ,User of it ,2026-01-16T22:56:54.628Z,True,1.2.4,,8,1,,8,,,,,1,8,,8,2,,,,,,8,1,,
|
||||
Andrew Huberman Sleep,,T,Learner,2026-01-16T22:58:23.015Z,True,1.2.4,,2,8,,5,,,,,9,1,,9,5,,,,,,2,,,
|
||||
EthBoulder,,ash,contributor,2026-01-16T22:56:10.319Z,True,1.2.4,,7,8,,9,,,,,2,2,,9,8,,,,,,7,7,,
|
||||
Network Assembly Protocol,,Benjamin Life,"Co-Author, Network Steward",2026-01-16T23:00:21.620Z,True,1.2.4,,3,4,,5,,,,,4,5,,4,2,,,,,,5,5,,
|
||||
WeChat payment for food,,Jon Bo,User paying for the food,2026-01-16T22:57:20.966Z,True,1.2.4,,9,9,,2,,,,,1,2,,5,2,,,,,,7,9,,
|
||||
Dating Apps,,Theo,Observer (former subject - now free),2026-01-16T22:57:57.758Z,True,1.2.4,,7,6,,8,,,,,2,3,,9,7,,,,,,2,5,,
|
||||
On Protocols: Creating Habitat,,Todd Youngblood,RegenHub Boulder - 1515 Walnut,2026-01-16T22:56:12.944Z,True,1.2.4,,8,2,,8,,,,,2,3,,8,4,,,,,,8,8,,
|
||||
We* Are Agentic,,Neil M Yarnal,Local* is Relative ,2026-01-16T22:56:25.350Z,True,1.2.4,,7,7,,9,,,,,5,5,,5,5,,,,,,6,9,,
|
||||
The gift,,Tayken,Selflessness,2026-01-16T22:56:14.318Z,True,1.2.4,,7,2,,2,,,,,6,8,,2,6,,,,,,3,1,,
|
||||
Claude Agent SDK ,,@unforced,Active user,2026-01-16T23:03:14.147Z,True,1.2.4,,7,6,,5,,,,,6,3,,6,6,,,,,,6,6,,
|
||||
Jon & Savannah Relationship Agreements,,Savannah Kruger & Jonathan Borichevskiy,Co-creators,2026-01-16T22:59:28.744Z,True,1.2.4,,2,9,,9,,,,,1,1,,9,,,,,,,5,1,,
|
||||
Native protocol,,proofoftom,Co-creator,2026-01-16T22:58:38.756Z,True,1.2.4,,5,8,,7,,,,,7,1,,4,8,,,,,,7,8,,
|
||||
Free-range kids,,ntnsndr,parent,2026-01-18T23:25:49.803Z,True,1.2.4,,9,9,,7,,,,,1,1,,7,8,,,,,,8,,,
|
||||
Passing on a sidewalk,,ntnsndr,Pedestrian,2026-01-22T00:34:13.309Z,True,1.2.4,,7,9,,6,,,,,3,2,,7,6,,,,,,6,7,,
|
||||
Academic job talks,,ntnsndr,an academic,2026-02-04T05:17:44.193Z,True,1.2.4,,7,3,,2,,,,,2,2,,3,3,,,,,,2,2,,
|
||||
Magic Mountain Talks,,ntnsndr,one of the organizers,2026-02-10T04:24:36.353Z,False,1.2.4,7,3,9,8,3,8,9,3,9,8,1,7,9,2,,7,2,2,7,6,3,5,9
|
||||
Book draft workshop,,ntnsndr,The designer and victim of the protocol,2026-02-21T20:48:59.352Z,False,1.2.4,2,3,7,7,8,9,6,3,9,7,2,7,7,2,3,7,2,2,7,8,3,8,
|
||||
Playdate orgabizing,,ntnsndr,A frequent participant,2026-02-21T20:54:34.875Z,True,1.2.4,,8,9,,7,,,,,3,1,,6,8,,,,,,7,3,,
|
||||
Letters of recommendation,,ntnsndr,A frequent recommender,2026-02-24T01:55:07.661Z,True,1.2.6,,7,3,,4,,,,,2,8,,7,2,,,,,,4,2,,
|
||||
Deciding how to get the check at a restaurant,,ntnsndr,Person who often feels awkward and wants to be generous,2026-02-25T03:43:22.857Z,True,1.2.6,,8,9,,8,,,,,1,2,,9,7,,,,,,7,,,
|
||||
Office hours,,ntnsndr,Professor,2026-03-04T22:46:56.138Z,False,1.2.6,7,8,5,9,7,9,3,,8,9,4,9,8,3,,,3,7,8,7,8,9,
|
||||
Screen time,,ntnsndr,parent,2026-03-09T14:42:00.368Z,False,1.2.6,3,3,6,6,8,7,7,,8,4,5,,3,7,,,,8,3,,,5,
|
||||
Playing catch with a baseball,,ntnsndr,Baseball coach,2026-03-20T23:13:29.924Z,True,1.2.6,,7,8,,7,,,,,1,1,,7,3,,,,,,3,,,
|
||||
|
@@ -0,0 +1,2 @@
|
||||
Design_explicit_vs_implicit,Design_precise_vs_interpretive,Design_elite_vs_vernacular,Design_documenting_vs_enabling,Design_static_vs_malleable,Design_technical_vs_social,Design_universal_vs_particular,Design_durable_vs_ephemeral,Entanglement_macro_vs_micro,Entanglement_sovereign_vs_subsidiary,Entanglement_self-enforcing_vs_enforced,Entanglement_abstract_vs_embodied,Entanglement_obligatory_vs_voluntary,Entanglement_flocking_vs_swarming,Entanglement_defensible_vs_exposed,Entanglement_exclusive_vs_non-exclusive,Experience_sufficient_vs_insufficient,Experience_crystallized_vs_contested,Experience_trust-evading_vs_trust-inducing,Experience_predictable_vs_emergent,Experience_exclusion_vs_inclusion,Experience_Kafka_vs_Whitehead,Experience_dead_vs_alive
|
||||
4.3669950738916254,6.990147783251231,4.278325123152709,7.071428571428571,5.495073891625616,7.603448275862069,4.906403940886699,2.8448275862068964,4.002463054187192,4.33743842364532,5.1330049261083746,4.938423645320197,6.458128078817734,4.497536945812808,6.096059113300493,8.549261083743842,4.766009852216749,4.485221674876847,5.460591133004926,4.032019704433497,5.955665024630542,6.657635467980295,6.25615763546798
|
||||
|
@@ -0,0 +1,4 @@
|
||||
Category,Accuracy,N_Dimensions
|
||||
Design,0.9039408866995073,8
|
||||
Entanglement,0.8916256157635468,8
|
||||
Experience,0.7832512315270936,7
|
||||
|
@@ -0,0 +1,24 @@
|
||||
Design_explicit_vs_implicit,Design_precise_vs_interpretive,Design_elite_vs_vernacular,Design_documenting_vs_enabling,Design_static_vs_malleable,Design_technical_vs_social,Design_universal_vs_particular,Design_durable_vs_ephemeral,Entanglement_macro_vs_micro,Entanglement_sovereign_vs_subsidiary,Entanglement_self-enforcing_vs_enforced,Entanglement_abstract_vs_embodied,Entanglement_obligatory_vs_voluntary,Entanglement_flocking_vs_swarming,Entanglement_defensible_vs_exposed,Entanglement_exclusive_vs_non-exclusive,Experience_sufficient_vs_insufficient,Experience_crystallized_vs_contested,Experience_trust-evading_vs_trust-inducing,Experience_predictable_vs_emergent,Experience_exclusion_vs_inclusion,Experience_Kafka_vs_Whitehead,Experience_dead_vs_alive
|
||||
1.0,0.41317332141124036,0.30221181272670977,-0.06645867816026212,0.10113464724161264,0.12188715532238725,0.1521686552993031,0.10426562159075112,0.13547358064872422,-0.1246366822831737,-0.1835963209454281,0.1214291588395635,0.10345560015922754,0.2047251198757227,0.16735747556234626,0.030914542836122938,0.16716732087921393,0.22025179979228993,0.044347032802150924,0.23086340122178484,-0.07113541451915163,-0.005769017580435719,-0.1259595074173219
|
||||
0.41317332141124036,1.0,0.36727283379294373,0.043819231486519276,0.42789985451283463,0.2636992886924316,0.06504187245577642,0.20755784300231317,0.2390021536201203,-0.10497291890236206,-0.27738683038665485,0.06444235604667138,0.28422783761922743,0.2541695971960997,0.28916975917849547,0.0913181110489483,0.2536488037023725,0.3581815209848713,0.14027316512617358,0.4200447343153832,0.13518019838839457,0.004275450732267744,-0.1148265931890366
|
||||
0.30221181272670977,0.36727283379294373,1.0,0.22854303729170627,0.5302136523382137,0.16700809646949,0.11900316482414897,0.1931304906145443,0.40157528813620497,-0.45793563160495454,-0.5754440419988962,0.38766010673184426,0.4195184235018261,0.5374889670337175,0.13777841961234477,0.20731378556760194,-0.03465526894344103,0.14240371791549916,0.2870493515345701,0.4403643400730937,0.46911887148158404,0.3247179368694943,0.043350186105223884
|
||||
-0.06645867816026212,0.043819231486519276,0.22854303729170627,1.0,0.34078858668140394,-0.0694443125202319,-0.027209678499598558,0.11128644174451163,-0.0588134688630253,-0.04755967275545022,-0.14091092723357035,0.13478731121046733,0.11486350478707237,0.2056281440002805,0.13369286938081598,0.033262314447997744,-0.07585374418811562,0.10370816162591417,0.17535410395735815,0.2446935062403523,0.2817418005520351,0.2012397678289397,0.1324995510333785
|
||||
0.10113464724161264,0.42789985451283463,0.5302136523382137,0.34078858668140394,1.0,0.12706225880916164,-0.11724538075648214,0.11428421378244297,0.22941869490672265,-0.30365352979316057,-0.3458109762879913,0.11800770256886882,0.44252606268853556,0.5013309324085095,0.19451422899786103,0.2692859953665489,0.0038689925265881523,0.2121294169864509,0.320215222176782,0.6127379607088606,0.4953942543701929,0.22187166064539976,0.07744539385099297
|
||||
0.12188715532238725,0.2636992886924316,0.16700809646949,-0.0694443125202319,0.12706225880916164,1.0,0.2493886161131522,0.08575435327021531,0.13511013234899538,0.05809988358364524,-0.03506381410531575,0.02992703341626584,0.001578511659934578,-0.015508727006660662,-0.07314815202167468,-0.056414995509338116,0.016805962665833268,0.2078157701179109,0.2639693783450474,0.14436626876325645,-0.03314518389576896,-0.11297036716605058,0.060595301569928386
|
||||
0.1521686552993031,0.06504187245577642,0.11900316482414897,-0.027209678499598558,-0.11724538075648214,0.2493886161131522,1.0,0.06346889032144575,0.1955341553026234,0.12188576696151936,0.001774335261325607,0.16871197975483973,-0.18209677636861513,-0.1361692856495824,-0.13859200860652263,-0.1888066070265598,-0.07340673186394077,0.031228286004029576,0.09919497901158901,-0.033493203173144595,-0.11191129057539502,-0.047476902994286675,-0.13221425675828838
|
||||
0.10426562159075112,0.20755784300231317,0.1931304906145443,0.11128644174451163,0.11428421378244297,0.08575435327021531,0.06346889032144575,1.0,0.19882953406522663,-0.011466863002497238,-0.1955643883654295,0.10888820924601914,0.07597637869896234,0.0747757830232838,0.30071627211363067,-0.006103876557347183,0.19267356207832764,0.1616946225819954,-0.021975525723857563,0.14850141243341594,-0.023127556800618967,-0.09058841729658984,-0.1929907668010168
|
||||
0.13547358064872422,0.2390021536201203,0.40157528813620497,-0.0588134688630253,0.22941869490672265,0.13511013234899538,0.1955341553026234,0.19882953406522663,1.0,-0.23162204324270416,-0.3183268695746428,0.26163742855743244,0.24234345505813398,0.08144512939382051,-0.006691560790647981,0.07295428540213099,0.02244152047522908,0.07575619886584867,0.07879164520084064,0.168840556462435,0.15215284574644566,0.13473935753265281,-0.052515956204613384
|
||||
-0.1246366822831737,-0.10497291890236206,-0.45793563160495454,-0.04755967275545022,-0.30365352979316057,0.05809988358364524,0.12188576696151936,-0.011466863002497238,-0.23162204324270416,1.0,0.41497927222597564,-0.12000115141034269,-0.4650178746548702,-0.43233289769474625,-0.014956411102697737,-0.15895624232743355,0.08109044521917455,0.00016573431489308753,-0.1641197452875736,-0.2677846567098773,-0.3188526585075172,-0.2933162707572719,-0.021125130985946216
|
||||
-0.1835963209454281,-0.27738683038665485,-0.5754440419988962,-0.14091092723357035,-0.3458109762879913,-0.03506381410531575,0.001774335261325607,-0.1955643883654295,-0.3183268695746428,0.41497927222597564,1.0,-0.30195910049025493,-0.39676351272439164,-0.5577463502180012,-0.10481353156134371,-0.22950268320304673,0.09023813138151131,0.0009226673555752525,-0.13396844820539347,-0.2630292978093667,-0.3093874148974011,-0.2832648127474136,-0.05378186931038156
|
||||
0.1214291588395635,0.06444235604667138,0.38766010673184426,0.13478731121046733,0.11800770256886882,0.02992703341626584,0.16871197975483973,0.10888820924601914,0.26163742855743244,-0.12000115141034269,-0.30195910049025493,1.0,0.030690658094896482,0.17406917192660476,-0.02386019667932113,0.0944180924323901,-0.1433555964452968,-0.07526995346103912,0.21960530609358675,0.09021325593400427,0.18269318680741775,0.22929624367441248,0.0952171786513153
|
||||
0.10345560015922754,0.28422783761922743,0.4195184235018261,0.11486350478707237,0.44252606268853556,0.001578511659934578,-0.18209677636861513,0.07597637869896234,0.24234345505813398,-0.4650178746548702,-0.39676351272439164,0.030690658094896482,1.0,0.3864538878286067,0.29546239322716555,0.16655737231752984,0.09739113957397358,0.19166238552959033,0.13464422627441888,0.4135032983040481,0.34443595165997115,0.2250882194556722,-0.055773466423218995
|
||||
0.2047251198757227,0.2541695971960997,0.5374889670337175,0.2056281440002805,0.5013309324085095,-0.015508727006660662,-0.1361692856495824,0.0747757830232838,0.08144512939382051,-0.43233289769474625,-0.5577463502180012,0.17406917192660476,0.3864538878286067,1.0,0.199639784082062,0.22327138289704915,-0.029028006018769568,0.10543709396635895,0.24832931334572467,0.45316997920769914,0.42373114820022517,0.2354568891322353,0.0772581357012461
|
||||
0.16735747556234626,0.28916975917849547,0.13777841961234477,0.13369286938081598,0.19451422899786103,-0.07314815202167468,-0.13859200860652263,0.30071627211363067,-0.006691560790647981,-0.014956411102697737,-0.10481353156134371,-0.02386019667932113,0.29546239322716555,0.199639784082062,1.0,0.055128197110624944,0.3535142000589775,0.23613056524728943,-0.13612990798177757,0.33534860847503156,0.05831016406349206,-0.1285913998456659,-0.1585805795337268
|
||||
0.030914542836122938,0.0913181110489483,0.20731378556760194,0.033262314447997744,0.2692859953665489,-0.056414995509338116,-0.1888066070265598,-0.006103876557347183,0.07295428540213099,-0.15895624232743355,-0.22950268320304673,0.0944180924323901,0.16655737231752984,0.22327138289704915,0.055128197110624944,1.0,-0.14325384407675268,-0.032456816572283796,0.11284782945553158,0.07155824786449519,0.37189061077543123,0.25104407319685723,0.07143853367669227
|
||||
0.16716732087921393,0.2536488037023725,-0.03465526894344103,-0.07585374418811562,0.0038689925265881523,0.016805962665833268,-0.07340673186394077,0.19267356207832764,0.02244152047522908,0.08109044521917455,0.09023813138151131,-0.1433555964452968,0.09739113957397358,-0.029028006018769568,0.3535142000589775,-0.14325384407675268,1.0,0.40200244687015263,-0.20902107628818803,0.19481622464392803,-0.2220205202823439,-0.4229615464914092,-0.24694423556071768
|
||||
0.22025179979228993,0.3581815209848713,0.14240371791549916,0.10370816162591417,0.2121294169864509,0.2078157701179109,0.031228286004029576,0.1616946225819954,0.07575619886584867,0.00016573431489308753,0.0009226673555752525,-0.07526995346103912,0.19166238552959033,0.10543709396635895,0.23613056524728943,-0.032456816572283796,0.40200244687015263,1.0,-0.03980637404124914,0.4281407750829956,-0.11116757355723013,-0.2755002729280541,-0.14999394645701025
|
||||
0.044347032802150924,0.14027316512617358,0.2870493515345701,0.17535410395735815,0.320215222176782,0.2639693783450474,0.09919497901158901,-0.021975525723857563,0.07879164520084064,-0.1641197452875736,-0.13396844820539347,0.21960530609358675,0.13464422627441888,0.24832931334572467,-0.13612990798177757,0.11284782945553158,-0.20902107628818803,-0.03980637404124914,1.0,0.22200058537050507,0.42499555221936935,0.3340449150627035,0.1225080058518451
|
||||
0.23086340122178484,0.4200447343153832,0.4403643400730937,0.2446935062403523,0.6127379607088606,0.14436626876325645,-0.033493203173144595,0.14850141243341594,0.168840556462435,-0.2677846567098773,-0.2630292978093667,0.09021325593400427,0.4135032983040481,0.45316997920769914,0.33534860847503156,0.07155824786449519,0.19481622464392803,0.4281407750829956,0.22200058537050507,1.0,0.27473805072784,0.02040637961096724,-0.034642145492174745
|
||||
-0.07113541451915163,0.13518019838839457,0.46911887148158404,0.2817418005520351,0.4953942543701929,-0.03314518389576896,-0.11191129057539502,-0.023127556800618967,0.15215284574644566,-0.3188526585075172,-0.3093874148974011,0.18269318680741775,0.34443595165997115,0.42373114820022517,0.05831016406349206,0.37189061077543123,-0.2220205202823439,-0.11116757355723013,0.42499555221936935,0.27473805072784,1.0,0.5220125785098495,0.11685533056186767
|
||||
-0.005769017580435719,0.004275450732267744,0.3247179368694943,0.2012397678289397,0.22187166064539976,-0.11297036716605058,-0.047476902994286675,-0.09058841729658984,0.13473935753265281,-0.2933162707572719,-0.2832648127474136,0.22929624367441248,0.2250882194556722,0.2354568891322353,-0.1285913998456659,0.25104407319685723,-0.4229615464914092,-0.2755002729280541,0.3340449150627035,0.02040637961096724,0.5220125785098495,1.0,0.12964298287898468
|
||||
-0.1259595074173219,-0.1148265931890366,0.043350186105223884,0.1324995510333785,0.07744539385099297,0.060595301569928386,-0.13221425675828838,-0.1929907668010168,-0.052515956204613384,-0.021125130985946216,-0.05378186931038156,0.0952171786513153,-0.055773466423218995,0.0772581357012461,-0.1585805795337268,0.07143853367669227,-0.24694423556071768,-0.14999394645701025,0.1225080058518451,-0.034642145492174745,0.11685533056186767,0.12964298287898468,1.0
|
||||
|
@@ -0,0 +1,407 @@
|
||||
Descriptor,cluster
|
||||
Abdication Protocol,-1
|
||||
Abolitionist Practice Protocol,0
|
||||
Access Check-in,0
|
||||
Access Intimacy Protocol,-1
|
||||
Access-Centered Practices,-1
|
||||
ActivityPub Protocol,3
|
||||
African Futurist Escape,0
|
||||
Afrofuturism,0
|
||||
Airport Security Procedures,1
|
||||
Alusi Trance (African Futurism),-1
|
||||
Ancestral Spirit Possession,7
|
||||
Anishinaabeg Knowledge Sharing Protocols,0
|
||||
Anishinaabeg Visiting Protocols,0
|
||||
Annual Feasts,-1
|
||||
Arendt's Reporting Protocol,-1
|
||||
ARPANET Protocols,-1
|
||||
Arranged Marriage,-1
|
||||
Art Historical/Curatorial Validation Protocol,-1
|
||||
Artisanal Marketing Protocol,-1
|
||||
Artistic Collaboration,-1
|
||||
ASL Provision Protocol,-1
|
||||
Audience Recording Protocol,-1
|
||||
Authority Assertions via Linguistic Precision,-1
|
||||
Automobile Driver Warning Protocol,-1
|
||||
Autonomous Worlds (0xPARC framework),0
|
||||
Bamboo Sales (Village Artisan Example),0
|
||||
BankAmericard Distribution Protocol,-1
|
||||
Bartleby Protocol,0
|
||||
Basel Program,-1
|
||||
Bell Pit Spacing,-1
|
||||
Benefit Application Procedures,-1
|
||||
Bertillonage,-1
|
||||
Bilderatlas Mnemosyne (Warburg’s Method),-1
|
||||
Birth Registration (City Hall),-1
|
||||
Bitcoin Protocol,3
|
||||
Black Feminist Protocols,0
|
||||
Black Poethics,-1
|
||||
Black Time Belt,0
|
||||
Blueprint Protocol,-1
|
||||
Borgesian Aleph Construction,-1
|
||||
Bristlemouth Protocol,-1
|
||||
Buddhist Monastery Protocols,0
|
||||
Building Codes,1
|
||||
German Bureaucratic Prose,-1
|
||||
Calendar Invite and Alarm System,-1
|
||||
Canary Use for Gas Detection,-1
|
||||
Canonical Bridge Protocols,-1
|
||||
Capital Markets Opening and Closing Times Protocol,-1
|
||||
Carriage Dispute Protocol,-1
|
||||
CART (Communication Access Realtime Translation) Provision Protocol (Community Arts Org),-1
|
||||
Chancery Ceremonies,-1
|
||||
Child Discipline (Spanking/Grounding),-1
|
||||
Childbirth Protocols (Local Knowledge),0
|
||||
Choose Your Own Adventure Protocol,-1
|
||||
Chronicles of Suffering (Thirty Years' War),-1
|
||||
Chronometer Usage Protocol,-1
|
||||
Circular Movement Protocol,0
|
||||
City-States,-1
|
||||
Clan Identification,-1
|
||||
Climate Treaties,-1
|
||||
Cloud Data Capturing,-1
|
||||
Coal Dust Mitigation,-1
|
||||
Code of Criminal Procedure Protocol,4
|
||||
College Enrollment,-1
|
||||
Column Chromatography,-1
|
||||
Command and Control,-1
|
||||
Commemorative Coin Protocol,-1
|
||||
Communal Altar Creation,0
|
||||
Communication Protocols (Cold War),-1
|
||||
Community Land Acknowledgement Protocol (Gallery),-1
|
||||
Community Lore Protocols,0
|
||||
Compost-Based Ritual Protocols,0
|
||||
Conciliatory Chairman Intervention Protocol,6
|
||||
Content Moderation Standards,-1
|
||||
Cooking Practices,-1
|
||||
Coordinated Universal Time (UTC),-1
|
||||
Coordinatizing Scientific Observation,-1
|
||||
Corporate Contracts,-1
|
||||
Corridor Design (Government Buildings),-1
|
||||
Council of Ministers Meetings,-1
|
||||
Cover Letter (Early Credit Agreements),-1
|
||||
COVID-19 Mask Mandate Protocols,2
|
||||
COVID-19 Pandemic Protocols,2
|
||||
COVID-19 Regulations,2
|
||||
Cowrie Bead Currency,-1
|
||||
Crash Protocol,6
|
||||
"""Open Publishing",-1
|
||||
Criminological Discourse Protocols,-1
|
||||
Crisis Communication Protocols (Cold War),-1
|
||||
CRISPR,-1
|
||||
CubeSat Protocol,5
|
||||
Currency Ledgers,-1
|
||||
Dating Websites (Pre-App),-1
|
||||
De umbrias ideareum (Bruno’s Memory Seals),-1
|
||||
Decentralized Autonomous Organization (DAO) Governance Voting Protocol,-1
|
||||
Decision-Making Process in Case of Disagreement,-1
|
||||
Decision-Making via Vote,-1
|
||||
Decision-Making within the Cabinet,1
|
||||
Deep Fake Generation Protocols,-1
|
||||
Deep Listening,0
|
||||
Deliberative Analyses,0
|
||||
Department Council Protocols,-1
|
||||
Detroit Techno Music Performance Protocols,-1
|
||||
Diaries (Experimental Soul Studies),-1
|
||||
Diaries (Puritan & Pietist),-1
|
||||
Difficulty Bomb (Ethereum),-1
|
||||
Dinner Etiquette,-1
|
||||
Diplomatic Protocol,-1
|
||||
Discernment of Spirits,-1
|
||||
Disciplinary Procedure Protocol,-1
|
||||
Dispute Resolution Through Mediation,0
|
||||
Distributed Cooperatives (DisCOs),0
|
||||
DIY Hormone Detection,0
|
||||
DNA Testing Kits,-1
|
||||
DNS,1
|
||||
Doubloon Game Protocol,0
|
||||
Drexciya's Sonic World Building,-1
|
||||
Drift Mine Slope Excavation,-1
|
||||
Dust Suppression Efforts,-1
|
||||
Early Fatality Reporting,-1
|
||||
Ecology Protocols (Local Knowledge),0
|
||||
Eichmann Trial Protocol,-1
|
||||
EIP (Ethereum Improvement Proposal),6
|
||||
Election Reporting Conventions,-1
|
||||
Elevator Button Addressing,-1
|
||||
Email Services,-1
|
||||
Embossing Protocol (BankAmericard),-1
|
||||
Ennoblement Protocols,-1
|
||||
Environmental Racism Protocols,0
|
||||
Environmental Vigil Protocols,0
|
||||
Ethereum DAO Withdrawal Protocol,-1
|
||||
Ethereum Proof of Stake,-1
|
||||
Ethereum Proof of Work,-1
|
||||
Ethereum Protocol,3
|
||||
Ethnographic Containment,-1
|
||||
European Hoff Ceremonial Protocol,-1
|
||||
Evidence-Based Debates,-1
|
||||
Exit to Community Model,0
|
||||
Extinction Rebellion Affinity Networks Protocols,0
|
||||
Face-Restoring Protocol,-1
|
||||
Facebook Protocol,-1
|
||||
Petition Submission,-1
|
||||
Flag-Raising/Lowering Protocols,4
|
||||
Flint Arrowhead Manufacturing Protocols,0
|
||||
Flux Divergence,-1
|
||||
Food Localization Protocol,0
|
||||
Form-Based Interaction Protocol,1
|
||||
Fundamental Cause Investigations,0
|
||||
Funeral Rituals,-1
|
||||
Gas Testing with Candle,-1
|
||||
Gestural Warning Protocol,7
|
||||
Goffman's Interactional System Protocol,-1
|
||||
Gold Coinage,-1
|
||||
Gold Standard,-1
|
||||
Greenwich Mean Time,-1
|
||||
Grid-Based Urban Planning,5
|
||||
Gynepunk,0
|
||||
Halal and Gluten-Free Food Options,-1
|
||||
Handshake,0
|
||||
Hats Protocol,-1
|
||||
High-Frequency Trading Protocol,-1
|
||||
House Addressing (Tax Collection/Conscription),-1
|
||||
House Style,-1
|
||||
Human Rights,-1
|
||||
Hundred Gradations Incense Seal Protocol,-1
|
||||
HyperCard Protocol,-1
|
||||
Hypertext/Hypermedia Protocol,-1
|
||||
I Ching Protocol,-1
|
||||
Imperial Family Interactions,-1
|
||||
Imperial Grace Awarding,-1
|
||||
Imperial Mark Protocol,-1
|
||||
Incense Clock Protocol,-1
|
||||
Information Campaign (Nationalist Commentators),-1
|
||||
Injection Protocol,-1
|
||||
Insurance Claim Protocol,-1
|
||||
Intangible Cultural Heritage Department Protocols,6
|
||||
International Law (as Protocol),0
|
||||
International Meridian Conference,-1
|
||||
International Organization for Standardization (ISO),-1
|
||||
Introduction Protocol,0
|
||||
Islamic Dietary Laws,4
|
||||
Islamic Memorization,-1
|
||||
Islamic Prayer Rituals,-1
|
||||
Job Interview Protocol,-1
|
||||
Keeping in Touch (Return Visits),0
|
||||
Kleros Dispute Resolution Protocol,3
|
||||
Knotted Cord Alarm Protocol,-1
|
||||
Kraftwerk's Aesthetic Minimalism,-1
|
||||
Language Regulation,-1
|
||||
Layer 2 Scaling Solutions,-1
|
||||
League of Nations,-1
|
||||
Legal Protocol (General),-1
|
||||
Lemon Balm Protocol,0
|
||||
Lift and Transfer Protocol,-1
|
||||
Lift and Transfer Protocol,-1
|
||||
Lingua Franca,-1
|
||||
Linux Kernel Production,0
|
||||
Listening Protocols,0
|
||||
Literary Genre Conventions (General),0
|
||||
Longitude Determination Protocols,-1
|
||||
Manifest Destiny,-1
|
||||
Mapping & Charting Protocols,-1
|
||||
Marginal Note Usage,-1
|
||||
Marronage,-1
|
||||
Mass Surveillance Protocols,-1
|
||||
Means Without Ends,0
|
||||
Mecanno Kit,-1
|
||||
Meeting Protocol (Museum),-1
|
||||
Meeting Scheduling,-1
|
||||
Memetic Culture,-1
|
||||
Memorization Palaces,-1
|
||||
Memory Wheels,-1
|
||||
MEV (Maximal Extractable Value),-1
|
||||
MFA Seminar Protocols,-1
|
||||
Michi Saagiig Clan Introduction,-1
|
||||
Military Drill Techniques,-1
|
||||
Military Protocols,4
|
||||
Milking Apparatus,-1
|
||||
Ministerial Conferences,-1
|
||||
Minute Book Recording Protocol,-1
|
||||
Minute-Taking Protocol,-1
|
||||
Minutes of Council of Ministers,1
|
||||
Model 500's Detroit Techno Identity,-1
|
||||
Mundaneum Protocol,-1
|
||||
Music Genre Protocols,0
|
||||
Mutual Aid Swarm Protocol,0
|
||||
Mutual Exchange Practices,0
|
||||
Myal Protocols,0
|
||||
NAGPRA,4
|
||||
Naming Protocols (Land Acknowledgements & Introductions),-1
|
||||
Narrative Blogging Protocols,-1
|
||||
Navigational Protocols,-1
|
||||
Neighborhood Food Distribution Festival Protocol,-1
|
||||
Network Nations Protocols,0
|
||||
Network State Founder Protocols,-1
|
||||
New York Garment Worker Strike Protocols,-1
|
||||
Nishnaabeg Storytelling Traditions,0
|
||||
NLS Protocol,-1
|
||||
Noon-day Gun Protocol,-1
|
||||
NSU Trial Protocol,-1
|
||||
Nuclear Protocols,1
|
||||
Oblique Messaging/Editing (Content Circulation Protocol),0
|
||||
Observational Documentation Protocol (Secret Services),-1
|
||||
Observational Science Protocols,-1
|
||||
Occupying Vacancy Protocol,0
|
||||
Offering Alternative Respect Tokens,0
|
||||
Office Request Protocol,-1
|
||||
Office Space Survey Protocol,-1
|
||||
OODA Loop,-1
|
||||
Open Source Estrogen,0
|
||||
Open Source Protocols,-1
|
||||
Oral Communication Preferences,-1
|
||||
Pagamento (Payback),0
|
||||
Pale Fire Protocol,-1
|
||||
Paris Agreement,-1
|
||||
Participatory Guarantee Systems (PGS),0
|
||||
Patriotic Protocols,4
|
||||
Pedestrian Traffic Rules Protocol,-1
|
||||
Performance of Transparency,-1
|
||||
Petition Submission and Review,-1
|
||||
Petitioning for Privileges,-1
|
||||
Philanthropic Foundation Advocacy Protocol,-1
|
||||
Photographic Standardization,-1
|
||||
Physiognomic Interpretation,-1
|
||||
Pickup Basketball/Soccer Games,0
|
||||
Piece Wage System,-1
|
||||
Pipe Ceremony Protocol,0
|
||||
Planting Tree Protocols,-1
|
||||
Police Intervention Protocol,-1
|
||||
Police-led Information-Gathering Network,-1
|
||||
Political Discourse Protocol,-1
|
||||
Political Protocols (Arendt & Schmitt),0
|
||||
Political Thriller/Police Movie Protocol,-1
|
||||
Pop-up Village Protocols,0
|
||||
Prime Meridian Unconference,-1
|
||||
Proactive Suggestion Protocol,-1
|
||||
Profile Photo Change (Symbolic Participation Protocol),-1
|
||||
Proof of Stake Consensus,3
|
||||
Proof of Work Consensus,-1
|
||||
Protocol Analysis (Ericsson & Simon),-1
|
||||
Protocol Departure in Creative Writing,0
|
||||
Protocol for Academic Science,-1
|
||||
Protocol for COVID Masking,2
|
||||
Protocol for Dance Collaboration,0
|
||||
Protocol for Evaluating Clock Protocols,-1
|
||||
Protocol for Good Death,-1
|
||||
Handwashing,-1
|
||||
Medical System (US),-1
|
||||
Protocol of Kinship,-1
|
||||
Protocol of Operational Closure,-1
|
||||
Protocol of Reclamation,0
|
||||
Time Zones,-1
|
||||
Protocol of Targeted Killing,-1
|
||||
Protocol of Tjukurpa (Dreamtime Instructions),0
|
||||
Public Amateurism,0
|
||||
Public Enemy’s Political Activism,-1
|
||||
Public Health Behavioral Guidelines,8
|
||||
Publishing Protocols,0
|
||||
Quadratic Voting,-1
|
||||
Quilting Practices,0
|
||||
QWERTY Keyboard Protocol,-1
|
||||
Relationship-Building in Deaf Community,0
|
||||
Participatory Studies (Seed Oils),0
|
||||
ResearchHub Model,-1
|
||||
LK-99 Replication Craze,0
|
||||
Clinical Trial Design,0
|
||||
Peer Review,-1
|
||||
Dating Apps,-1
|
||||
Reporting Conventions for Election Integrity,1
|
||||
Reporting of Financial Status,-1
|
||||
Reykjavik Protocol,-1
|
||||
RFC Process,-1
|
||||
Rhetorical Canons,-1
|
||||
Rhizomatic Urban Farm Expansion Protocol,0
|
||||
Rhymes and Syllabic Rhythm,-1
|
||||
Robert Musil’s Protocol of Critical Assessment,-1
|
||||
Roman Senate Advisory Decree,-1
|
||||
Royal Access Protocol,-1
|
||||
Royal Protocols,-1
|
||||
Rust Programming Language Principles,-1
|
||||
Sacrament of Eucharist,-1
|
||||
Sacrament of Reconciliation,-1
|
||||
Plantationocence,0
|
||||
Sangoma Healing Practices,7
|
||||
Scent-Free Attendance,-1
|
||||
Script Provision Protocol,-1
|
||||
Seating Arrangements Protocol,1
|
||||
Secular Lunar Calendar,-1
|
||||
Sellers Screw Thread Protocol,-1
|
||||
Semantic Web Protocol,-1
|
||||
Senatus Consultum,-1
|
||||
Seven Ancestor Teachings,0
|
||||
Shadbush Tree Planting,0
|
||||
Shipping Container Protocol,5
|
||||
Shorthand Transcription,-1
|
||||
Sign Language Interpretation Protocol,-1
|
||||
SILENT/LISTEN Protocol,0
|
||||
Silhouette Creation,-1
|
||||
Silicon Valley Exit,-1
|
||||
Silicon Valley Model,0
|
||||
Simplan Credit Card System,-1
|
||||
Sin Protocol (Ignatian),-1
|
||||
Six-Day Work Week,-1
|
||||
Social Entrepreneurship,0
|
||||
Socratic Method,-1
|
||||
Songlines,0
|
||||
Sonic Engineering Protocols,-1
|
||||
Spam/Dilution Tactics (Content Disruption Protocol),-1
|
||||
Staking Protocols,-1
|
||||
Stenography Protocols,-1
|
||||
Stereographic Exchange,-1
|
||||
Stock Exchange Trading Halt Protocol,6
|
||||
Submission of Exclusive Privileges,-1
|
||||
Succession Protocols,-1
|
||||
Sustos Retrieval,-1
|
||||
Swiping,-1
|
||||
Systematic Experimental Self-Observation,-1
|
||||
SZ Journalists' Note-Taking Protocol,-1
|
||||
Tarot Card Interpretation,0
|
||||
TCP/IP,-1
|
||||
Teaching Protocol (Paulo Freire),0
|
||||
Technical-Political Distinction Protocol,-1
|
||||
Territory Acknowledgement,-1
|
||||
Theocracies,-1
|
||||
Think Aloud Protocol,-1
|
||||
Threshold Forgetting Protocols,-1
|
||||
Time Distribution via Gun Time,-1
|
||||
Time Zone Standardization,1
|
||||
Timekeeping for Activities (Yin/Yang Hours),-1
|
||||
Tjukurpa (Dreaming Stories),0
|
||||
Tobacco Offering Protocol,-1
|
||||
Totalitarian Hospitalization Protocol,-1
|
||||
Toyota Killswitch Protocol,-1
|
||||
Traffic Signals,1
|
||||
Translation Correction Protocol,-1
|
||||
Tribal Council Research Permit,-1
|
||||
Tribal Protocols of the Cultural Resources Program,4
|
||||
Truth and Reparations Commission Protocols,8
|
||||
TSA Airport Security,-1
|
||||
Ultimate Frisbee Gameplay,0
|
||||
Underground Resistance's Bandana Protocol,-1
|
||||
Uniform Resource Locator (URL) Protocol,-1
|
||||
Uninsurable Protocol,8
|
||||
Unionized Worker Right to Strike,-1
|
||||
Urban Rewilding Protocol,8
|
||||
Urine-Hormone-Extraction-Action,-1
|
||||
USB-C Connector Protocol,-1
|
||||
Vibe Culture,0
|
||||
Victorian Room Design (Enclosure),-1
|
||||
Video Game Tournament Disqualification Protocol,-1
|
||||
Vienna Convention (Diplomatic Law),-1
|
||||
Vigil for Murdered Environmentalists,0
|
||||
Vogue'ology,0
|
||||
VPN Usage (Circumvention Protocol),-1
|
||||
Wampum Belt Bead Code,-1
|
||||
Web Protocols,-1
|
||||
Westphalian System,-1
|
||||
White Cube Presentation Protocol,-1
|
||||
Whitworth Screw Thread Protocol,-1
|
||||
Windrush Generation Protocols,-1
|
||||
Witness Interaction Protocol,-1
|
||||
World Zionist Congress,-1
|
||||
Würzburg Psychology's Experimenter-Guided Observation,-1
|
||||
Xanadu Protocol,-1
|
||||
Xenopolitics #1: Petro-bodies and Geopolitics of Hormones,-1
|
||||
YES-HER Yeast Biosensors,-1
|
||||
|
@@ -0,0 +1,282 @@
|
||||
Descriptor
|
||||
Abdication Protocol
|
||||
Access Intimacy Protocol
|
||||
Access-Centered Practices
|
||||
Alusi Trance (African Futurism)
|
||||
Annual Feasts
|
||||
Arendt's Reporting Protocol
|
||||
ARPANET Protocols
|
||||
Arranged Marriage
|
||||
Art Historical/Curatorial Validation Protocol
|
||||
Artisanal Marketing Protocol
|
||||
Artistic Collaboration
|
||||
ASL Provision Protocol
|
||||
Audience Recording Protocol
|
||||
Authority Assertions via Linguistic Precision
|
||||
Automobile Driver Warning Protocol
|
||||
BankAmericard Distribution Protocol
|
||||
Basel Program
|
||||
Bell Pit Spacing
|
||||
Benefit Application Procedures
|
||||
Bertillonage
|
||||
Bilderatlas Mnemosyne (Warburg’s Method)
|
||||
Birth Registration (City Hall)
|
||||
Black Poethics
|
||||
Blueprint Protocol
|
||||
Borgesian Aleph Construction
|
||||
Bristlemouth Protocol
|
||||
German Bureaucratic Prose
|
||||
Calendar Invite and Alarm System
|
||||
Canary Use for Gas Detection
|
||||
Canonical Bridge Protocols
|
||||
Capital Markets Opening and Closing Times Protocol
|
||||
Carriage Dispute Protocol
|
||||
CART (Communication Access Realtime Translation) Provision Protocol (Community Arts Org)
|
||||
Chancery Ceremonies
|
||||
Child Discipline (Spanking/Grounding)
|
||||
Choose Your Own Adventure Protocol
|
||||
Chronicles of Suffering (Thirty Years' War)
|
||||
Chronometer Usage Protocol
|
||||
City-States
|
||||
Clan Identification
|
||||
Climate Treaties
|
||||
Cloud Data Capturing
|
||||
Coal Dust Mitigation
|
||||
College Enrollment
|
||||
Column Chromatography
|
||||
Command and Control
|
||||
Commemorative Coin Protocol
|
||||
Communication Protocols (Cold War)
|
||||
Community Land Acknowledgement Protocol (Gallery)
|
||||
Content Moderation Standards
|
||||
Cooking Practices
|
||||
Coordinated Universal Time (UTC)
|
||||
Coordinatizing Scientific Observation
|
||||
Corporate Contracts
|
||||
Corridor Design (Government Buildings)
|
||||
Council of Ministers Meetings
|
||||
Cover Letter (Early Credit Agreements)
|
||||
Cowrie Bead Currency
|
||||
"""Open Publishing"
|
||||
Criminological Discourse Protocols
|
||||
Crisis Communication Protocols (Cold War)
|
||||
CRISPR
|
||||
Currency Ledgers
|
||||
Dating Websites (Pre-App)
|
||||
De umbrias ideareum (Bruno’s Memory Seals)
|
||||
Decentralized Autonomous Organization (DAO) Governance Voting Protocol
|
||||
Decision-Making Process in Case of Disagreement
|
||||
Decision-Making via Vote
|
||||
Deep Fake Generation Protocols
|
||||
Department Council Protocols
|
||||
Detroit Techno Music Performance Protocols
|
||||
Diaries (Experimental Soul Studies)
|
||||
Diaries (Puritan & Pietist)
|
||||
Difficulty Bomb (Ethereum)
|
||||
Dinner Etiquette
|
||||
Diplomatic Protocol
|
||||
Discernment of Spirits
|
||||
Disciplinary Procedure Protocol
|
||||
DNA Testing Kits
|
||||
Drexciya's Sonic World Building
|
||||
Drift Mine Slope Excavation
|
||||
Dust Suppression Efforts
|
||||
Early Fatality Reporting
|
||||
Eichmann Trial Protocol
|
||||
Election Reporting Conventions
|
||||
Elevator Button Addressing
|
||||
Email Services
|
||||
Embossing Protocol (BankAmericard)
|
||||
Ennoblement Protocols
|
||||
Ethereum DAO Withdrawal Protocol
|
||||
Ethereum Proof of Stake
|
||||
Ethereum Proof of Work
|
||||
Ethnographic Containment
|
||||
European Hoff Ceremonial Protocol
|
||||
Evidence-Based Debates
|
||||
Face-Restoring Protocol
|
||||
Facebook Protocol
|
||||
Petition Submission
|
||||
Flux Divergence
|
||||
Funeral Rituals
|
||||
Gas Testing with Candle
|
||||
Goffman's Interactional System Protocol
|
||||
Gold Coinage
|
||||
Gold Standard
|
||||
Greenwich Mean Time
|
||||
Halal and Gluten-Free Food Options
|
||||
Hats Protocol
|
||||
High-Frequency Trading Protocol
|
||||
House Addressing (Tax Collection/Conscription)
|
||||
House Style
|
||||
Human Rights
|
||||
Hundred Gradations Incense Seal Protocol
|
||||
HyperCard Protocol
|
||||
Hypertext/Hypermedia Protocol
|
||||
I Ching Protocol
|
||||
Imperial Family Interactions
|
||||
Imperial Grace Awarding
|
||||
Imperial Mark Protocol
|
||||
Incense Clock Protocol
|
||||
Information Campaign (Nationalist Commentators)
|
||||
Injection Protocol
|
||||
Insurance Claim Protocol
|
||||
International Meridian Conference
|
||||
International Organization for Standardization (ISO)
|
||||
Islamic Memorization
|
||||
Islamic Prayer Rituals
|
||||
Job Interview Protocol
|
||||
Knotted Cord Alarm Protocol
|
||||
Kraftwerk's Aesthetic Minimalism
|
||||
Language Regulation
|
||||
Layer 2 Scaling Solutions
|
||||
League of Nations
|
||||
Legal Protocol (General)
|
||||
Lift and Transfer Protocol
|
||||
Lift and Transfer Protocol
|
||||
Lingua Franca
|
||||
Longitude Determination Protocols
|
||||
Manifest Destiny
|
||||
Mapping & Charting Protocols
|
||||
Marginal Note Usage
|
||||
Marronage
|
||||
Mass Surveillance Protocols
|
||||
Mecanno Kit
|
||||
Meeting Protocol (Museum)
|
||||
Meeting Scheduling
|
||||
Memetic Culture
|
||||
Memorization Palaces
|
||||
Memory Wheels
|
||||
MEV (Maximal Extractable Value)
|
||||
MFA Seminar Protocols
|
||||
Michi Saagiig Clan Introduction
|
||||
Military Drill Techniques
|
||||
Milking Apparatus
|
||||
Ministerial Conferences
|
||||
Minute Book Recording Protocol
|
||||
Minute-Taking Protocol
|
||||
Model 500's Detroit Techno Identity
|
||||
Mundaneum Protocol
|
||||
Naming Protocols (Land Acknowledgements & Introductions)
|
||||
Narrative Blogging Protocols
|
||||
Navigational Protocols
|
||||
Neighborhood Food Distribution Festival Protocol
|
||||
Network State Founder Protocols
|
||||
New York Garment Worker Strike Protocols
|
||||
NLS Protocol
|
||||
Noon-day Gun Protocol
|
||||
NSU Trial Protocol
|
||||
Observational Documentation Protocol (Secret Services)
|
||||
Observational Science Protocols
|
||||
Office Request Protocol
|
||||
Office Space Survey Protocol
|
||||
OODA Loop
|
||||
Open Source Protocols
|
||||
Oral Communication Preferences
|
||||
Pale Fire Protocol
|
||||
Paris Agreement
|
||||
Pedestrian Traffic Rules Protocol
|
||||
Performance of Transparency
|
||||
Petition Submission and Review
|
||||
Petitioning for Privileges
|
||||
Philanthropic Foundation Advocacy Protocol
|
||||
Photographic Standardization
|
||||
Physiognomic Interpretation
|
||||
Piece Wage System
|
||||
Planting Tree Protocols
|
||||
Police Intervention Protocol
|
||||
Police-led Information-Gathering Network
|
||||
Political Discourse Protocol
|
||||
Political Thriller/Police Movie Protocol
|
||||
Prime Meridian Unconference
|
||||
Proactive Suggestion Protocol
|
||||
Profile Photo Change (Symbolic Participation Protocol)
|
||||
Proof of Work Consensus
|
||||
Protocol Analysis (Ericsson & Simon)
|
||||
Protocol for Academic Science
|
||||
Protocol for Evaluating Clock Protocols
|
||||
Protocol for Good Death
|
||||
Handwashing
|
||||
Medical System (US)
|
||||
Protocol of Kinship
|
||||
Protocol of Operational Closure
|
||||
Time Zones
|
||||
Protocol of Targeted Killing
|
||||
Public Enemy’s Political Activism
|
||||
Quadratic Voting
|
||||
QWERTY Keyboard Protocol
|
||||
ResearchHub Model
|
||||
Peer Review
|
||||
Dating Apps
|
||||
Reporting of Financial Status
|
||||
Reykjavik Protocol
|
||||
RFC Process
|
||||
Rhetorical Canons
|
||||
Rhymes and Syllabic Rhythm
|
||||
Robert Musil’s Protocol of Critical Assessment
|
||||
Roman Senate Advisory Decree
|
||||
Royal Access Protocol
|
||||
Royal Protocols
|
||||
Rust Programming Language Principles
|
||||
Sacrament of Eucharist
|
||||
Sacrament of Reconciliation
|
||||
Scent-Free Attendance
|
||||
Script Provision Protocol
|
||||
Secular Lunar Calendar
|
||||
Sellers Screw Thread Protocol
|
||||
Semantic Web Protocol
|
||||
Senatus Consultum
|
||||
Shorthand Transcription
|
||||
Sign Language Interpretation Protocol
|
||||
Silhouette Creation
|
||||
Silicon Valley Exit
|
||||
Simplan Credit Card System
|
||||
Sin Protocol (Ignatian)
|
||||
Six-Day Work Week
|
||||
Socratic Method
|
||||
Sonic Engineering Protocols
|
||||
Spam/Dilution Tactics (Content Disruption Protocol)
|
||||
Staking Protocols
|
||||
Stenography Protocols
|
||||
Stereographic Exchange
|
||||
Submission of Exclusive Privileges
|
||||
Succession Protocols
|
||||
Sustos Retrieval
|
||||
Swiping
|
||||
Systematic Experimental Self-Observation
|
||||
SZ Journalists' Note-Taking Protocol
|
||||
TCP/IP
|
||||
Technical-Political Distinction Protocol
|
||||
Territory Acknowledgement
|
||||
Theocracies
|
||||
Think Aloud Protocol
|
||||
Threshold Forgetting Protocols
|
||||
Time Distribution via Gun Time
|
||||
Timekeeping for Activities (Yin/Yang Hours)
|
||||
Tobacco Offering Protocol
|
||||
Totalitarian Hospitalization Protocol
|
||||
Toyota Killswitch Protocol
|
||||
Translation Correction Protocol
|
||||
Tribal Council Research Permit
|
||||
TSA Airport Security
|
||||
Underground Resistance's Bandana Protocol
|
||||
Uniform Resource Locator (URL) Protocol
|
||||
Unionized Worker Right to Strike
|
||||
Urine-Hormone-Extraction-Action
|
||||
USB-C Connector Protocol
|
||||
Victorian Room Design (Enclosure)
|
||||
Video Game Tournament Disqualification Protocol
|
||||
Vienna Convention (Diplomatic Law)
|
||||
VPN Usage (Circumvention Protocol)
|
||||
Wampum Belt Bead Code
|
||||
Web Protocols
|
||||
Westphalian System
|
||||
White Cube Presentation Protocol
|
||||
Whitworth Screw Thread Protocol
|
||||
Windrush Generation Protocols
|
||||
Witness Interaction Protocol
|
||||
World Zionist Congress
|
||||
Würzburg Psychology's Experimenter-Guided Observation
|
||||
Xanadu Protocol
|
||||
Xenopolitics #1: Petro-bodies and Geopolitics of Hormones
|
||||
YES-HER Yeast Biosensors
|
||||
|
@@ -0,0 +1,24 @@
|
||||
Factor1,Factor2,Factor3,Factor4,Factor5
|
||||
-0.2648511247756239,0.29271622940703945,0.2999296210442012,0.09283659154820939,0.08373298805467462
|
||||
-0.47723617281155767,0.4140041934819382,0.14111580980333127,-0.09581305473362843,0.030587917139279816
|
||||
-0.8055842302889386,-0.04024537289867484,0.2689799400745281,0.07689231991329676,-0.047134685412394815
|
||||
-0.31946322403101823,-0.0663160907744834,-0.18504841082912704,-0.2104500094202737,-0.32662123548411687
|
||||
-0.7494242115897046,0.0855966121432013,-0.201362321522618,-0.25207037581773756,0.012029007290088236
|
||||
-0.1301645755250333,0.18036387358085812,0.36847669109398296,-0.3715723999329904,0.1971692921588991
|
||||
0.04089178510172272,0.03537827664921642,0.5635229178189144,-0.18033801104263789,-0.06219072595590646
|
||||
-0.18918747041677447,0.2912146120188066,0.16189077580221356,0.10911800772342634,-0.31238532315338297
|
||||
-0.36566258425296116,0.027708065075726977,0.350991691713989,0.12117109777969058,-0.013063374549213455
|
||||
0.5366125424095799,0.16165020689588497,0.03961450559339247,-0.32687926856454697,-0.26956403029588366
|
||||
0.6301241274129392,0.10977236982981321,-0.17457879372571236,-0.3238761357166984,0.025713550987298557
|
||||
-0.311478091711492,-0.2001612434895928,0.3478543785195841,0.030366613740275515,-0.26328160316293253
|
||||
-0.5966164118567748,0.10196257096426559,-0.20477548618164626,0.21031230461929962,0.17746224585087148
|
||||
-0.6844396260506244,-0.033506434852490566,-0.11852470686600966,0.12528951172782718,0.052479130502153234
|
||||
-0.2514659092325856,0.45989387436336804,-0.24770962905003713,0.17526210294274777,-0.28745976512671984
|
||||
-0.30982833857958064,-0.2046510281038959,-0.15886271306035055,0.04461099677934029,-0.04141620759617488
|
||||
0.022676593152156668,0.6589822683426376,-0.07961195872130064,0.1247505451727331,-0.03696463827740493
|
||||
-0.20878118776859222,0.613157614559712,-0.00022633514622230969,-0.13488396182930007,0.07667203809004973
|
||||
-0.3925297798446973,-0.2678170829392805,0.09110918613997854,-0.40333864263887736,0.08435861691845982
|
||||
-0.6419833452010307,0.3803698427436743,-0.14487325661872155,-0.19011427131704575,0.046131258945790676
|
||||
-0.6160434840144539,-0.38875563048504425,-0.2116980006991625,-0.1372100050873583,-0.10058848637010065
|
||||
-0.3942141182200811,-0.5804696535806011,-0.02242982717678628,-0.006831519477925561,-0.03226652483723172
|
||||
-0.05136258465597454,-0.2926758435485606,-0.07087126517196246,-0.14032454002144562,0.01640932202793413
|
||||
|
@@ -0,0 +1,407 @@
|
||||
Descriptor,Factor1,Factor2,Factor3,Factor4,Factor5
|
||||
Abdication Protocol,-0.5424262068014555,1.2233030732180126,-0.08208310774488517,-0.33111889327810007,0.9663446902757743
|
||||
Abolitionist Practice Protocol,-1.6425096980354492,0.12047493445241107,-0.1284032346595972,-0.40456572331308094,0.29136073271057666
|
||||
Access Check-in,-0.979401500263108,-0.3728476984156146,0.18183077727626643,-0.09970823352927331,-0.6002205738250133
|
||||
Access Intimacy Protocol,-1.8401678677382007,0.7395244591903393,0.044552412529880035,0.20246310759707437,-0.09545173263641556
|
||||
Access-Centered Practices,-0.6390988803803908,-0.6748915984433091,-0.1539977563938356,-1.050641366552975,0.00023978668023544214
|
||||
ActivityPub Protocol,-0.39447415932554847,-0.6260266646694829,-1.4411328294514079,0.13570207156941333,0.4172506388017959
|
||||
African Futurist Escape,-1.5330787351379984,1.0117315403705767,0.24824170942649065,0.5195304049089997,0.24128525394025968
|
||||
Afrofuturism,-1.5947867542753036,0.38325457319797024,-0.029860939503307673,-0.17051433827426724,0.27713445534796405
|
||||
Airport Security Procedures,1.0411256241527769,-1.0699316825501288,-0.3433544636997474,-0.8874886207895998,-0.8268047746282178
|
||||
Alusi Trance (African Futurism),-1.2749323229054195,0.30847423872317364,1.2029785725511941,-0.7618907473697939,-0.5558345942737403
|
||||
Ancestral Spirit Possession,-1.1552582721495277,1.4576311925695393,1.1704302189856162,-0.3474772768975067,-0.5071174796039237
|
||||
Anishinaabeg Knowledge Sharing Protocols,-1.1380100307403023,-1.120624941465459,1.5276346405168804,-0.4971031587373886,0.3231195743614451
|
||||
Anishinaabeg Visiting Protocols,-0.9863505960868066,-1.3121228839897088,1.2832052634068687,-0.11780123237473628,0.602615293027083
|
||||
Annual Feasts,-0.3736010679504976,-0.9442004866236968,0.5406482497289095,0.6314409221048667,-0.16362839308314472
|
||||
Arendt's Reporting Protocol,0.5513909179345818,-0.9361769876807958,0.8252091313561132,1.119882101566228,1.473460356618205
|
||||
ARPANET Protocols,0.8442827341050344,0.5037141754361076,-1.0343223996051372,1.9712727126720266,-1.8475034657906573
|
||||
Arranged Marriage,1.2216811413757023,1.0500949222500604,1.4320728873718132,-1.0791590147382246,0.1939278373114859
|
||||
Art Historical/Curatorial Validation Protocol,0.2778893540673666,1.1812920979382,0.6932471410433735,0.8766340704350639,1.323950220736565
|
||||
Artisanal Marketing Protocol,0.9640261475143769,1.2209646990301328,-0.6148624052233413,0.150577770651726,-0.031803003207582066
|
||||
Artistic Collaboration,-1.83171657520131,-0.22048667979210992,0.09954657442478358,0.12116904894336546,-0.6620028414234456
|
||||
ASL Provision Protocol,-0.2036907424486756,-0.14099890829101805,0.11828330152089112,-1.0820734322836696,0.284991703195841
|
||||
Audience Recording Protocol,1.4764888532876461,-0.7618908413287049,1.0437028260238597,-0.2552300783111699,0.4419178420584651
|
||||
Authority Assertions via Linguistic Precision,0.972336478707149,0.4686886889027665,-0.08918664247900512,1.2735457777897412,1.2152220151750421
|
||||
Automobile Driver Warning Protocol,0.04218300101551482,-0.4613433136162455,-0.3305192723256984,0.5218648819556134,-0.9805375518292454
|
||||
Autonomous Worlds (0xPARC framework),-1.1182708305368714,0.7079713816284359,-0.42265781040726813,-0.060798234662236834,0.08888480410942946
|
||||
Bamboo Sales (Village Artisan Example),-0.9787122478250823,-0.7466645479370846,1.6891543099899022,0.731159697117478,0.44469281723962045
|
||||
BankAmericard Distribution Protocol,0.36925603486313213,0.742703645710387,-0.5320564981850432,-0.6636962807509612,-0.22140270292800232
|
||||
Bartleby Protocol,-1.5941917194103081,0.7479536340973416,0.36249551667579705,0.8803902017478539,-0.0414846197680643
|
||||
Basel Program,0.6779266535161659,0.8885693210013875,-0.37444016336505404,-0.390793247400455,-0.23710476033407507
|
||||
Bell Pit Spacing,-0.15424016253525166,-0.8505201783325713,1.3650824308756486,1.5354054775748098,-1.2868647888432725
|
||||
Benefit Application Procedures,1.1474141397446058,-0.7522792551929991,0.1351448737847707,-1.1978704791558314,-0.4734478134798952
|
||||
Bertillonage,1.8856546183080758,0.49764264004999054,0.03306753892436213,1.188711781419425,-0.6500550126032557
|
||||
Bilderatlas Mnemosyne (Warburg’s Method),-0.30158517588528716,0.6862675884810407,-0.6736661195550667,-0.0862418278889231,0.2387261847815291
|
||||
Birth Registration (City Hall),1.177614074123014,-1.2798088002809953,0.8869465731362006,-0.9934479992823957,0.1581625709938325
|
||||
Bitcoin Protocol,-0.2697899068807144,-1.2501725592852673,-0.8782144555983592,1.9465989245902482,-0.1479096701007697
|
||||
Black Feminist Protocols,-1.4277824853605134,-0.2303755359924385,0.05534211608890236,-0.8441760622081665,-0.11096300112570089
|
||||
Black Poethics,-0.7725662944283336,1.0367899150297488,-0.8131045474004929,-0.7665428904590562,0.5675733472051006
|
||||
Black Time Belt,-1.4225185177819109,0.28885689899080164,-0.049233220126311344,-0.2487712218859658,0.6309755442995146
|
||||
Blueprint Protocol,0.6016604449631984,-0.4261655440883892,0.11363996560548638,1.8186322565608557,0.133321204716497
|
||||
Borgesian Aleph Construction,0.8726502459434639,2.0394906547233873,-0.6622165567522723,0.630121228745456,0.4109369857168236
|
||||
Bristlemouth Protocol,-0.5725072831826896,-0.07003779326832302,-0.6836140931035628,0.934500828223363,-0.601904917006401
|
||||
Buddhist Monastery Protocols,-0.9497281685102588,-0.5993376349159331,0.46679207595388883,0.10519324798275144,0.1881917104012738
|
||||
Building Codes,1.5280107477245914,-1.4123134004456768,-0.5741686608661328,-0.45178220493470733,-0.12928664555855726
|
||||
German Bureaucratic Prose,1.831750618311421,-0.7618021074521435,0.7471773367032837,0.022345169952318854,0.47518873444772664
|
||||
Calendar Invite and Alarm System,0.014542381788448822,-1.2591846425704063,-1.2072167819959687,0.019582809767071264,-0.0723718115403282
|
||||
Canary Use for Gas Detection,0.07099791186137303,-0.9813903490113978,1.1198530086579046,1.6342941568060625,-1.6617294573030825
|
||||
Canonical Bridge Protocols,-0.5732618116341921,-0.35650705006913536,-1.3788533495732205,1.2595550749910067,0.05593753704650662
|
||||
Capital Markets Opening and Closing Times Protocol,1.2646573836947057,-0.8167166877971324,-0.5944790927497038,-0.21341591381630054,-0.3212172108973102
|
||||
Carriage Dispute Protocol,1.1009590793795574,2.200952931046683,0.7456179617698134,0.026683945315131415,0.2601130448159504
|
||||
CART (Communication Access Realtime Translation) Provision Protocol (Community Arts Org),-0.36407808354277116,-0.6781106719313641,0.5548486246475707,-0.8767987960701927,-1.6875781113891113
|
||||
Chancery Ceremonies,1.860711434260842,-0.3935244260465862,0.08420141509990042,0.07964564088867122,0.5958334375705558
|
||||
Child Discipline (Spanking/Grounding),0.27598358300391684,1.3748623649963878,1.6379129539921538,1.440312774870801,-0.5324313228332928
|
||||
Childbirth Protocols (Local Knowledge),-1.2429561912134321,-0.049758681003433045,1.6005796690721974,0.14519965582009398,1.0757842408121119
|
||||
Choose Your Own Adventure Protocol,-1.2440056566356934,-0.8753691276864254,-0.19051084064065607,-0.0028383012223018667,1.1665518782867983
|
||||
Chronicles of Suffering (Thirty Years' War),-0.5118143189334824,1.0700440005243779,0.9488022038053473,0.5114676514534526,1.9250322707151422
|
||||
Chronometer Usage Protocol,1.154810972352348,-0.5410614197933944,0.0076146849188585275,-0.0685135813031579,-1.5150676609983915
|
||||
Circular Movement Protocol,-1.1681444295271441,-1.2699504873121443,1.2926417508744876,0.20577131306277466,0.413053064360192
|
||||
City-States,-0.14735838023599854,0.42970772471268226,-0.5753354991499187,0.3432498754330437,1.3042018816517036
|
||||
Clan Identification,-0.11658482293309805,-1.402405117855646,1.8006350728537779,0.34745877955858306,0.8252983819854102
|
||||
Climate Treaties,-0.24917267153064943,0.6762243469751926,-1.568099331695408,-0.9287449982329046,1.1016067481199905
|
||||
Cloud Data Capturing,0.2262806874906007,-0.37063296813216406,-1.1223945329310243,0.7625451871022618,0.9887782650535676
|
||||
Coal Dust Mitigation,0.8258412281479489,-0.39911388179060425,-1.5069602316432698,-0.05799261446078624,-1.287463311547368
|
||||
Code of Criminal Procedure Protocol,1.1354482594458115,-1.1488837586619187,-0.07515813233452476,-0.8191323554195544,0.461132139741506
|
||||
College Enrollment,0.901749003418297,-0.05465949534050775,-0.13814274318345388,-0.7246700126325389,0.27654705399016216
|
||||
Column Chromatography,-0.7383641518635005,0.6148061154419122,-0.14102613819441526,0.2109338207294357,-0.6869143859561471
|
||||
Command and Control,0.8316251954515704,-0.1887953295056472,-0.7584607552811579,-1.1131143872488154,-0.009616565892850213
|
||||
Commemorative Coin Protocol,0.8730960591822778,0.27031978319325234,0.17528387386882996,-0.67119842490005,0.15903482751926634
|
||||
Communal Altar Creation,-1.1323595588597744,-0.416164955526637,0.48522407254438743,-0.14147421512065153,-1.4804289950372405
|
||||
Communication Protocols (Cold War),1.3839798643898042,-0.7181588579468552,0.41467387549562507,-0.025168020585670046,0.8697375322205273
|
||||
Community Land Acknowledgement Protocol (Gallery),0.4536680084354532,-0.09361024272900362,0.9971012922878291,-0.41416868675574364,-1.1854089263125622
|
||||
Community Lore Protocols,-0.9071023823346586,-0.2685268492259804,1.0463528304135385,-0.32710170858552906,0.735924611949663
|
||||
Compost-Based Ritual Protocols,-1.1989168423413978,-1.1771603991528605,0.42612778343288477,0.025218228137664903,-0.6696279852022304
|
||||
Conciliatory Chairman Intervention Protocol,0.07231853391070141,-0.7347436809030111,-0.9017140271746107,-0.5933876968580726,0.7262768717913772
|
||||
Content Moderation Standards,-0.5635767633097792,0.9205099497415191,-0.9788054745280086,-0.9280827044888649,0.12820607907484272
|
||||
Cooking Practices,-1.2021472636258246,-0.22112929554950617,0.7430384856854165,-0.25917851589635993,0.725617272274858
|
||||
Coordinated Universal Time (UTC),0.9690603134315467,-2.156877355800498,-1.352493456688092,0.20148522352761128,0.23472810561825103
|
||||
Coordinatizing Scientific Observation,-0.818465007684876,0.29924868873924837,-1.6662577672198842,0.22203560829154192,-0.25120225984463856
|
||||
Corporate Contracts,1.091259519901528,-1.019910619169145,-0.8286258737364735,-0.14202056924151693,0.2092440217091565
|
||||
Corridor Design (Government Buildings),0.5194005470966088,-0.7168138291311458,-0.31821272541438317,0.3172395969575592,-0.7089590604344868
|
||||
Council of Ministers Meetings,1.0213062022449755,-0.4069046825352291,0.7419737346404164,-1.357560162250159,-0.4415170956681116
|
||||
Cover Letter (Early Credit Agreements),-1.3915309279495842,0.43503719999491614,1.0920305244763289,0.21339225806491274,-0.6360561739147182
|
||||
COVID-19 Mask Mandate Protocols,0.40884744358123837,0.7623421406804934,-0.19873733401707197,-1.4558390885547747,-1.161270721816499
|
||||
COVID-19 Pandemic Protocols,0.4062437850557165,1.1412352896604183,-0.673398775811387,-1.432357231099742,-0.649891709290073
|
||||
COVID-19 Regulations,0.4681886952748358,0.925580505243518,-0.11861534679953085,-1.7057407823234116,-0.48928279562956234
|
||||
Cowrie Bead Currency,-0.5430754933785445,-0.8729050614002227,0.5001307518355111,1.7163045762669251,0.3522524343684209
|
||||
Crash Protocol,0.6839443257881636,-0.43239730083090944,-0.9030987515729028,-0.7106267518510181,-0.20605289455672304
|
||||
"""Open Publishing",-1.1192826066189205,0.09342451035502944,-0.8733975173195642,0.4950420591134603,-0.21057031326887304
|
||||
Criminological Discourse Protocols,1.587569604059292,0.3350867694110176,0.27157146078527783,-0.025355362730251043,0.24788185077339853
|
||||
Crisis Communication Protocols (Cold War),0.9438283236334957,-0.2760837592172636,0.3149352325035803,-1.5333242476425077,0.5889470327095506
|
||||
CRISPR,-0.09175839333082561,-1.0967991722842743,-1.4470753913391268,0.32970113029581644,-0.5243105399442586
|
||||
CubeSat Protocol,0.12923775008698743,-1.2634227605251458,-1.1389367064644236,0.46957805630518135,-1.1586920337745252
|
||||
Currency Ledgers,0.2258508370878748,-1.3552669084623463,-0.2572920446029664,-0.042152459973996435,-0.2051223149444864
|
||||
Dating Websites (Pre-App),0.0204688638411952,-0.2340297273501134,-0.4436425477616149,-0.16161704002307473,-0.17491488338367703
|
||||
De umbrias ideareum (Bruno’s Memory Seals),-0.19204920900314726,0.12636982874157268,-0.13233031871879092,1.390614379385113,0.6494462444130042
|
||||
Decentralized Autonomous Organization (DAO) Governance Voting Protocol,-0.5107013722913257,0.2920230654796101,-0.7527974698503627,-0.0010977935562126728,0.28338128854870726
|
||||
Decision-Making Process in Case of Disagreement,1.489463784691923,0.5795508620032681,0.4730577556175573,-0.08782539685545906,-0.7699236474068794
|
||||
Decision-Making via Vote,0.2620380021247367,-0.4946736989086367,-0.06001871342915393,0.23803018502033205,0.18811539121106408
|
||||
Decision-Making within the Cabinet,1.6965493442888477,-0.676315912705725,0.5722054726627611,-0.015937183384916745,0.23402003871359908
|
||||
Deep Fake Generation Protocols,-0.5538339366173748,0.9443846632762404,-0.3985616634287392,-0.07505855857762606,0.21990377793965893
|
||||
Deep Listening,-1.2218814567961371,0.006219396915398335,-0.4548366282676691,-0.13357021238670655,0.09625293858522506
|
||||
Deliberative Analyses,-0.4845333700948499,0.46737264104860304,-1.0517675630373018,-0.16894788270652342,0.7731577865608251
|
||||
Department Council Protocols,1.1171648100978122,1.4995352017512598,0.6795815683393263,-0.7197268042224839,-0.05080479804896704
|
||||
Detroit Techno Music Performance Protocols,-0.06195390153451977,-0.3849133143436796,1.7570594164404854,0.37716374507100353,-0.8150982310468367
|
||||
Diaries (Experimental Soul Studies),-0.9589132842290854,-0.2169653615418412,-0.05279803692909508,1.5660325403236635,0.6720936519968175
|
||||
Diaries (Puritan & Pietist),-1.0221860068421638,0.8444588917366779,0.9756440035643482,0.7193082385335405,0.7129207060373662
|
||||
Difficulty Bomb (Ethereum),0.3364952114001348,-0.15898335581158107,-0.4911062515024025,0.11198168488731726,-1.4499741831836737
|
||||
Dinner Etiquette,0.01844092624064425,-0.3711547917587553,0.22453515796480908,0.43673009372612154,0.4349896133416333
|
||||
Diplomatic Protocol,0.4218465230829413,-0.5127961866902847,-0.2896635503783121,-0.9869549996364246,0.30050716217766155
|
||||
Discernment of Spirits,-0.1184845614823007,-0.21204394739980867,0.19331347741676122,-0.8543237158746608,-0.25513843891122917
|
||||
Disciplinary Procedure Protocol,1.0647483155228123,-1.6581203274307468,0.4792658080750905,-1.2043151669260541,0.33804965266473724
|
||||
Dispute Resolution Through Mediation,-0.43047600509997974,-0.2609692750758043,-0.9951874153236043,-0.7960300061212253,0.2597729536714269
|
||||
Distributed Cooperatives (DisCOs),-1.2438124130805996,0.41290707937157894,-0.42206684155159596,-0.4330346893190245,0.5997673087808122
|
||||
DIY Hormone Detection,-1.3382816795010688,0.6182412788245079,-0.575601326070261,0.372421339845332,-0.05864273069827985
|
||||
DNA Testing Kits,0.6305683290490266,-0.20104995543239285,-0.8203472660159096,-0.4806798392533816,-0.6561831663961883
|
||||
DNS,0.8627155311293135,-0.8840945326393088,-1.3993721325996342,-0.4578592464707529,-0.9283851743133209
|
||||
Doubloon Game Protocol,-1.6954039658975961,0.7896596798854687,0.6530103943342694,-0.17047828547872554,-0.2826468800141778
|
||||
Drexciya's Sonic World Building,-1.0638595623718827,0.35938957009379563,0.7170214869690114,-0.19442789786472722,-0.05685015282621768
|
||||
Drift Mine Slope Excavation,-0.24939132641637018,-0.04555582935813986,0.6431496070024062,0.2189893143196934,-1.5682351867317945
|
||||
Dust Suppression Efforts,0.4920670582953674,-1.1674216705258358,-0.4632387499333033,-0.9383035063337893,-1.0961856196607958
|
||||
Early Fatality Reporting,1.0245142304468777,1.1528487289746974,0.49717198746163366,1.1804656843012782,0.43951017075940246
|
||||
Ecology Protocols (Local Knowledge),-1.2860843479470287,0.07757730991009673,1.0607369225685772,-0.3797331572829522,0.7737275898461408
|
||||
Eichmann Trial Protocol,1.2871854423877294,1.4315420866746362,0.4424251213799288,-0.1661771216082558,0.4359789022583856
|
||||
EIP (Ethereum Improvement Proposal),0.2821502290995076,-0.80699463146642,-0.3349479767107785,-0.8588639800534721,0.13912957036953305
|
||||
Election Reporting Conventions,-0.1071343999693155,-0.4621997928947671,-0.013805735867825953,-0.28279254931083114,0.6278692850770575
|
||||
Elevator Button Addressing,-0.29405810481840433,-0.6400698848583198,0.5798695939613677,0.1579206215870741,0.22803022269806114
|
||||
Email Services,0.9802219068999098,0.18151507230438807,-1.082219586421151,0.7155603507977911,0.358181964769797
|
||||
Embossing Protocol (BankAmericard),0.9197434972884012,-0.875683372203761,-0.047963806884882075,0.9528290783637925,-1.9953049616229566
|
||||
Ennoblement Protocols,0.8881826396980872,-0.40633912216710166,1.1186014050878885,-0.31487470167897497,1.391287641946439
|
||||
Environmental Racism Protocols,-0.9803146820043653,-0.07414559057350179,-0.0922731061299669,-1.012110271538706,0.31029593948282513
|
||||
Environmental Vigil Protocols,-1.285727120430387,-0.06433844566673864,0.6358049462498445,-0.30512063514959276,0.1398561574616833
|
||||
Ethereum DAO Withdrawal Protocol,-0.03015683554402453,0.12357594257213117,-1.051591382489497,0.5863060310590956,-0.7185883956990874
|
||||
Ethereum Proof of Stake,0.033598609011323825,-1.0327625668745952,-0.5769859257207249,0.8228048346372709,0.05516406013951451
|
||||
Ethereum Proof of Work,-0.18235962101195086,-0.035735318201641164,-1.0386769272153682,1.877761697381282,-0.39649801746842683
|
||||
Ethereum Protocol,-0.6334607075632848,-0.9927772361352516,-1.401929905140741,1.367153012616603,-0.33178761692265557
|
||||
Ethnographic Containment,-1.2117375833728619,0.11054303307054097,-0.49338755698241904,-0.8980785971300488,1.2357756286697024
|
||||
European Hoff Ceremonial Protocol,1.7080991497426574,-0.743149335390787,0.9601156577515761,-0.5595959016745204,0.5842887062838952
|
||||
Evidence-Based Debates,-0.08892966098986178,-0.7532134788131111,-0.938457271660084,0.17499929817386267,0.8623269909091037
|
||||
Exit to Community Model,-1.2176570384983252,-0.1477545324357257,-0.5290079171333147,-0.8089530024564986,1.2995463929091544
|
||||
Extinction Rebellion Affinity Networks Protocols,-1.5618892754093634,0.1732671681733627,-0.335298507445652,-0.13450447419283626,0.21913604996514738
|
||||
Face-Restoring Protocol,-0.42940246404282995,-0.055403362558879066,0.077295958882507,0.2550943414417569,0.0644885668563878
|
||||
Facebook Protocol,0.17758444636070148,1.1405638017018191,-0.11550287612644289,0.37602536526809105,-0.4790252552901039
|
||||
Petition Submission,1.1835470907709238,0.48258665841827963,0.46258320802607866,0.0374077139934829,0.776646431277264
|
||||
Flag-Raising/Lowering Protocols,1.1587834085420596,-1.705370193808621,0.5302415500967544,-0.15097232656856108,0.043209664040683174
|
||||
Flint Arrowhead Manufacturing Protocols,-1.4426352923445835,0.16232969780442902,0.691148461261667,-0.3675713057404881,0.054538879395458435
|
||||
Flux Divergence,0.14794719590958555,0.21292452943658133,-0.7796463759327784,1.8776142879809739,0.7810653975745537
|
||||
Food Localization Protocol,-1.3873653617221304,-0.09282429182603853,0.4277708786365321,-0.3666884425275961,0.30184088710109475
|
||||
Form-Based Interaction Protocol,1.6527153630938565,-0.8705429249813427,0.43584862746144415,-0.3152495636891578,-0.019897981958792128
|
||||
Fundamental Cause Investigations,-0.4498600200578348,0.11557375105415565,-1.389816350799372,-1.0308300107143564,0.5559780204585961
|
||||
Funeral Rituals,-0.6576946840131825,0.5002984477529628,0.05303636953241129,0.17295543064186025,-0.16148181744428236
|
||||
Gas Testing with Candle,-0.3017132507910839,-0.2124702075897568,1.140467032433361,2.032132470761566,-1.7422242000543777
|
||||
Gestural Warning Protocol,-1.243494979806048,1.1409581711194297,1.0408635938610613,0.3597565117124458,-0.6547310898814299
|
||||
Goffman's Interactional System Protocol,-1.081301337643788,0.3556754920791582,-0.33765527195908146,-0.13920709618424945,-0.06667817877941946
|
||||
Gold Coinage,0.7754597633550815,-0.6535646336334204,0.1736043847414648,0.1857585840396394,1.0406024932250912
|
||||
Gold Standard,1.0954007373826486,-0.24465904940585567,-0.643396624393284,0.9166518802159569,-0.05120430060038383
|
||||
Greenwich Mean Time,0.5336238853598224,1.0295209954319207,-1.3160286693338044,-0.7550050888744236,-0.0553683432328395
|
||||
Grid-Based Urban Planning,0.7428807116717876,-1.0736565852053979,-1.584625147018721,0.8761295108487821,-0.46702814153226957
|
||||
Gynepunk,-1.6772068471052888,0.7270767908847366,0.13758635292747073,-0.43597726910834517,0.0655149933031769
|
||||
Halal and Gluten-Free Food Options,-0.35334376877898843,-0.9827749092200493,0.22971717009383036,-0.5438257899493274,-0.30325527855515844
|
||||
Handshake,-0.9989607523112948,-0.6878350510738741,1.4616189384471066,0.9858888137863996,-0.8453958263575063
|
||||
Hats Protocol,-0.08312756335794018,-0.6038556136133723,0.6557949789265619,-0.6706423351731069,-0.39172952167844277
|
||||
High-Frequency Trading Protocol,-0.013981938243720326,1.448471392586003,-1.355908457105839,-0.34609427803839105,-0.013186502202242422
|
||||
,1.2738263396767637,1.1179756319941359,-0.20407957298131021,-0.44254512296816073,-0.1706800576130924
|
||||
House Addressing (Tax Collection/Conscription),-0.5068458466704673,0.7580087889803256,0.4985009191119715,-1.2581088727317824,-0.43437749080091714
|
||||
House Style,0.1616861843623637,1.1851173851774437,-1.4318450183060631,-0.745774453473459,-0.06552796102299739
|
||||
Human Rights,0.15822029836819188,0.8520274850535124,1.0615630433862577,1.564099970911807,-0.9773068935505934
|
||||
Hundred Gradations Incense Seal Protocol,-0.5586457274659019,0.01851315924547261,0.2014988735068721,0.5729208582418468,-1.5815638668615093
|
||||
HyperCard Protocol,-0.6794909656377378,0.3126177785930931,-1.6346563314588167,0.2525134805154272,0.25383062544085355
|
||||
Hypertext/Hypermedia Protocol,-1.2384387501597933,0.11739364513546097,-0.3794505270343328,1.1424597964679761,-0.27099836561111423
|
||||
I Ching Protocol,1.1151805265814008,0.7279930567023508,1.4944473712872701,0.03431863560938264,0.6457381672625785
|
||||
Imperial Family Interactions,1.474731301476823,0.6539122269211711,0.6307922225377018,0.8583401996702531,1.2851244419622134
|
||||
Imperial Grace Awarding,1.0743122221114305,-0.6545562993866116,1.0318164123166076,-0.6869492308605882,0.14338809542720252
|
||||
Imperial Mark Protocol,-0.8589896400590202,0.2913246710708355,1.230944698765249,1.5005788336379755,-1.3481711516710113
|
||||
Incense Clock Protocol,1.1461912452398992,1.6631135753871065,0.060181172712202545,-0.4805809337170497,-1.0144895618617227
|
||||
Information Campaign (Nationalist Commentators),0.3172693759216088,-1.2115030204786463,0.39297053130321513,-1.2888032322475254,-0.7434203081990699
|
||||
Injection Protocol,1.524584528189694,0.12165165290348211,-0.24817289633885298,0.03013949843930253,-0.29452442567491405
|
||||
Insurance Claim Protocol,0.37242342612377105,-0.3065861540790764,-1.1675226764191482,-1.0460946036937244,0.4457076838509608
|
||||
Intangible Cultural Heritage Department Protocols,-0.27181464572121616,1.0040184673182722,-0.8502154682870688,-0.48484262428624103,0.6989632356176748
|
||||
International Law (as Protocol),0.9744222794802868,-0.3771978609657593,-0.9051381736274559,0.10916185492107516,0.8036094660428472
|
||||
International Meridian Conference,0.6145777595032422,-0.8913159335052778,-1.7598553877441743,0.13857573403059664,0.4795056170110397
|
||||
International Organization for Standardization (ISO),-0.5626447093458528,-1.3804713941461557,0.4001514100542568,-0.14989172150550692,0.20761890347742237
|
||||
Introduction Protocol,1.1546630146917225,-1.2649671799515914,1.0757072088045556,-0.4115643510027104,0.13313121782903878
|
||||
Islamic Dietary Laws,0.21266806447340203,-1.0680422144704225,0.4811674667907405,-1.1835810337814627,-0.206030409625755
|
||||
Islamic Memorization,0.7034079341100133,-1.5918734176718279,0.5490092407076136,-0.2985330088094455,-0.5709470875656011
|
||||
Islamic Prayer Rituals,0.6476196012797293,1.3467703441790833,0.9169937747415324,-0.9250209295365194,-0.4986794348562655
|
||||
Job Interview Protocol,-0.9658192865172511,-1.1958514486911171,1.131962761333223,-0.4121497809792793,-0.06675691961082002
|
||||
Keeping in Touch (Return Visits),-0.5274386956655102,-0.6778102569579815,-0.9906432147011233,0.8094416536757463,0.278400222458021
|
||||
Kleros Dispute Resolution Protocol,-0.3374138891368075,0.4753917127724674,1.4258562042820522,2.1748262413022976,-1.9342066536172788
|
||||
Knotted Cord Alarm Protocol,0.7168702283252415,-1.0023036338195377,-0.1257214819139354,1.7144075432361934,1.3201987432067501
|
||||
Kraftwerk's Aesthetic Minimalism,1.2632327656290891,1.4750692718306215,1.1409418171562307,-0.5805194083935779,-0.5012365005791033
|
||||
Language Regulation,-0.13219763797590062,-0.923116725590189,-0.9010443739591585,0.45610584547492683,-0.8767589925706061
|
||||
Layer 2 Scaling Solutions,0.48375295363418236,1.210264101184644,-0.9946409151996349,-0.29499081550230644,0.07992268895393555
|
||||
League of Nations,1.1315560270310077,-0.040589035315777386,-0.1921828563067872,-0.9526327577326406,-0.042777748380182265
|
||||
Legal Protocol (General),-1.0197154644935578,0.4539720981256586,0.7538418100198251,-0.1573409752942686,-0.14881832360907257
|
||||
Lemon Balm Protocol,1.2551524927168434,0.3189342727960657,-0.081614059548644,0.456428296524928,-1.202292262869729
|
||||
,1.504889736949818,0.43613975346456996,-0.2787191962347707,0.6992544550125976,-1.369160153714559
|
||||
Lift and Transfer Protocol,-0.48551404695385764,-0.4657459903615283,-0.5318192991268375,0.21265956366603958,-0.2872209049697159
|
||||
Lift and Transfer Protocol,-0.5548298785493224,-1.2855138078062953,-0.21074746956284873,-0.5851885995605676,0.2182673684538636
|
||||
Lingua Franca,-1.2794189956100268,-0.23495531907484474,0.2160152891240197,-0.23536061222501475,-0.34794936408781335
|
||||
Linux Kernel Production,-0.6406725918785405,0.368377235463812,-1.1989999114745382,0.36464254395040524,0.6101928064571864
|
||||
Listening Protocols,0.18949769092193863,0.6910822097597027,-1.0830477932194118,0.7468996135088363,1.3661879116557394
|
||||
Literary Genre Conventions (General),1.339956622407794,2.335955212055867,0.5023782411526104,0.2565488355662438,0.03153617659109336
|
||||
Longitude Determination Protocols,0.4434460248602514,-1.408930261478516,-1.2659054978444715,0.6019681512810514,-0.9286596845508462
|
||||
Manifest Destiny,-0.22828813976269324,0.2246622444651008,0.582526655131123,-0.16854233986888606,0.33017016487615697
|
||||
Mapping & Charting Protocols,-1.5684660177882879,-0.0048552800658796585,0.7195477049027489,0.33215133561594307,0.6771380921876909
|
||||
Marginal Note Usage,1.3869026327088048,1.8658185520875714,-0.24134291041974934,0.12153780289425152,0.3143499446094748
|
||||
Marronage,-1.5686756906903012,0.24692955566941194,0.09888829475381075,-0.28290935450521215,-0.14516291621724922
|
||||
Mass Surveillance Protocols,-0.5067125938134589,-0.7406777293445098,-0.4675881140269575,1.78928412257998,-1.1197401460037317
|
||||
Means Without Ends,1.3783084440052709,2.195856599953866,1.3657331673176722,0.6092490402341161,-0.4203868143234032
|
||||
Mecanno Kit,1.4933841155639596,2.2320421022757237,1.706182489527059,0.4240910316515414,-0.23829435100141558
|
||||
Meeting Protocol (Museum),-0.6290456692616286,1.537063587102989,-0.07438323641732016,0.2894105686404576,-0.4759158562718077
|
||||
Meeting Scheduling,-0.6328584084110289,-1.5882617520523332,0.2578657071335577,0.3218396591372884,0.822975964935701
|
||||
Memetic Culture,-0.7883528332039881,0.18295817169778295,-0.11442759773627735,0.669380848672575,0.31951830344264787
|
||||
Memorization Palaces,-0.5834060691498925,1.836594368037601,-0.1846599226828021,0.7698664669170601,-0.21479447586806494
|
||||
Memory Wheels,0.3697183503211327,-0.486901131907077,0.27324543321329126,-1.9626522888072824,-0.21438955640386997
|
||||
MEV (Maximal Extractable Value),-0.13301532852948805,-1.7068844663525349,1.4248671384797726,0.5280778618063269,-0.0175884671567621
|
||||
MFA Seminar Protocols,1.1749951874508537,-1.0018264325785486,1.0161724402313979,-0.13219270083578585,0.16626733746604522
|
||||
Michi Saagiig Clan Introduction,1.3835045022119035,-1.2674611242186014,0.7943738374243131,-0.9530894225803275,-0.1096201774979346
|
||||
Military Drill Techniques,0.10284761673902094,2.1813966374054434,1.4436882213361522,0.03495297545297927,-0.6074477855457704
|
||||
Military Protocols,0.6179167436511734,0.5265930553571745,0.10061220528056135,-1.2553044079129756,-0.5605413438774965
|
||||
Milking Apparatus,1.478749200340538,-0.19513667183049124,0.8497150232656684,0.0963643895091391,0.3373862884979139
|
||||
Ministerial Conferences,0.8733921985853372,-1.4188720804963173,0.05620384292849155,0.39665092810969993,-0.24558870721127227
|
||||
Minute Book Recording Protocol,1.508354911825273,-1.0299945932139936,0.2511918735457852,0.4554181546933293,0.9220299382167709
|
||||
Minute-Taking Protocol,0.0007160557325557746,0.5396383784166914,1.142219978606782,1.3649712387687365,-0.6068324145112154
|
||||
Minutes of Council of Ministers,0.0960226302771651,0.11518965942503072,-1.6281056789199146,0.9997381366977666,0.6607568726900948
|
||||
Model 500's Detroit Techno Identity,-0.990783097330674,-0.02142425424860878,0.7057624866109448,-0.13909121153011947,0.4484297544837769
|
||||
Mundaneum Protocol,-1.530857299590453,-0.08753730167077506,-0.12459651775437613,-0.06585143300258466,-0.15077479347488668
|
||||
Music Genre Protocols,-1.178170536170417,-0.6492893978098367,1.0878491581981775,0.7080875847324469,-0.08264880251729012
|
||||
Mutual Aid Swarm Protocol,-1.5015428092914573,-0.47054121467951515,0.6995005803134146,-0.6756882332206925,0.5109729272126775
|
||||
Mutual Exchange Practices,0.8403122494654838,-1.5106440875351483,0.07167553780926048,-1.2091342537340233,0.123951328376612
|
||||
Myal Protocols,-0.0689148132231733,-0.1929716313341283,-0.046033304157644235,-0.44889838469334564,0.5889831518644999
|
||||
NAGPRA,-1.125569367299395,-0.22842220985471043,0.5487417850311253,0.8204808119130877,0.44476264808075694
|
||||
Naming Protocols (Land Acknowledgements & Introductions),0.6700360669092459,-0.8244779228403274,-0.048140849512521317,1.2527995353113195,-0.37571412109101576
|
||||
Narrative Blogging Protocols,-0.5993423557567276,-0.45534300301375125,0.8241667919040084,-1.4072593495753616,-0.4116127163264901
|
||||
Navigational Protocols,-1.421444808912179,0.5093487327665785,-0.8524574960749314,-0.35960445894116533,0.35543650762126644
|
||||
Neighborhood Food Distribution Festival Protocol,0.6492570981760308,1.79254527067104,-0.7832349152164237,-0.2703010934829964,-0.6361773761519949
|
||||
Network Nations Protocols,-0.5225854843912989,0.2070612013217467,0.38256019851462714,-0.7081592118234742,0.12678152410067314
|
||||
Network State Founder Protocols,-0.7666416626846986,-1.1512824096554484,1.339436448867155,-0.4480901153394938,0.5638988426172308
|
||||
New York Garment Worker Strike Protocols,-0.6052170980317884,0.5512813043914644,-1.2066692916347572,0.579357949563889,-0.3124725663401459
|
||||
Nishnaabeg Storytelling Traditions,0.7264690612689699,-0.38793973851293245,0.34341555681108993,0.06783757667466948,-1.5626515718635883
|
||||
NLS Protocol,1.4643569499628222,0.6869925844865739,0.8681460504739369,0.34480877042863567,1.0780338605179989
|
||||
Noon-day Gun Protocol,1.4521238229226185,-0.6933356389678612,-0.18933553649512241,-0.3703369679194269,0.3861583561704471
|
||||
NSU Trial Protocol,-1.356411283002709,0.7330729744838259,0.28609856652384885,-0.055982885150276045,0.3244764008072578
|
||||
Nuclear Protocols,1.4970354399131576,0.6141721827328566,0.9756871053203612,-0.4260841372278477,0.40442282340557373
|
||||
Oblique Messaging/Editing (Content Circulation Protocol),0.7085532351995958,-1.6507038631046393,0.03235873339768389,1.11441704935508,1.194368688848697
|
||||
Observational Documentation Protocol (Secret Services),-1.3877081632127188,0.295754268084826,0.2913617209379808,-0.518978092343902,-0.24192219150893876
|
||||
Observational Science Protocols,-1.2565110580197005,-0.8980123590579522,0.06656782403325817,-0.07876492006610145,-0.1585957891996862
|
||||
Occupying Vacancy Protocol,-0.13454509170957596,1.312402613962489,-0.4060926883165134,-1.1180067227240755,0.11374365570488831
|
||||
Offering Alternative Respect Tokens,1.2142848733272107,-1.3900039823230494,-0.4250372156894401,1.3381966048632543,0.42366211338566556
|
||||
Office Request Protocol,0.10132024988397269,0.008882988431998865,-1.8898117403027264,0.38607615106076987,0.005650410315063126
|
||||
Office Space Survey Protocol,-1.3554496395628988,0.3021260128590374,-0.6551959283415684,0.05150476898206203,-0.11983529740927544
|
||||
OODA Loop,-1.2880211328286122,-0.6506781091529364,-1.2051055672798874,-0.2275654592157216,0.34943459611769545
|
||||
Open Source Estrogen,-0.5925714369350606,-0.4726092678574461,-0.4710569016714194,-1.0286918785322792,0.03803668580819555
|
||||
Open Source Protocols,-1.1020128385229044,0.7127387540690266,0.496191958187559,-0.11283101542216793,0.02604726937781604
|
||||
Oral Communication Preferences,-0.6788052675044204,1.3705625581401182,-0.5884987881294377,0.8774025323125488,0.42240280032286565
|
||||
Pagamento (Payback),-0.471907057989398,0.29126855762679643,-1.5923358196389181,-0.568240236597016,-0.14862200376132711
|
||||
Pale Fire Protocol,-1.671605225299659,-0.5933415852286931,0.5649815216217254,-0.4803850469065158,0.032778529253531495
|
||||
Paris Agreement,0.8925592609918283,-0.8207438204928624,0.6501625968467137,-0.25443171577150286,0.25544094773607035
|
||||
Participatory Guarantee Systems (PGS),0.5025220833328307,-0.4790738776963404,0.5356476388139437,0.29835083745970103,-0.3471950393197312
|
||||
Patriotic Protocols,-0.3342018464793894,0.02426236928234591,-0.8261452731458465,-1.1320577899137383,0.1371821691008445
|
||||
Pedestrian Traffic Rules Protocol,0.8155971733170456,-0.33473320843898446,-0.6371846321698389,-0.6112951911886688,0.13037189369836935
|
||||
Performance of Transparency,1.2639228517613859,0.3604678990356304,0.6853341939643034,-1.0665789013735318,0.011789663925682701
|
||||
Petition Submission and Review,0.7869006716092929,0.5953490070638178,0.4144672575150983,0.3422285967493237,-0.06054976760542925
|
||||
Petitioning for Privileges,1.1302578884834693,-1.4282006513500036,-0.5289598490958832,1.5420588094025294,0.44479918701883037
|
||||
Philanthropic Foundation Advocacy Protocol,0.732921191169285,2.0994382301334826,-0.3076135825031307,1.5375571033578384,-0.3890552672109479
|
||||
Photographic Standardization,-1.7215653938656688,-0.4527844699304015,0.7682272270530122,-0.30436668784316034,-0.33137137341798506
|
||||
Physiognomic Interpretation,0.8997845967785086,1.0336018387976986,0.21735282669760192,0.9915471405089078,-1.0351575642303
|
||||
Pickup Basketball/Soccer Games,-0.7527237321530327,-0.8750724463865582,0.6642328361327932,-0.03285104698865965,0.4002965704013851
|
||||
Piece Wage System,-0.7526536661262831,-0.15631559708640194,0.9767701723458391,0.3700514521941079,-0.7204362907624766
|
||||
Pipe Ceremony Protocol,1.0095086074988304,-0.3297070562299724,0.23480346418394704,-0.6881300017756936,-0.4404715557945064
|
||||
Planting Tree Protocols,1.345259375898284,1.4553141289925589,0.5345042005808841,-1.110030647883341,0.33746080355230734
|
||||
Police Intervention Protocol,0.4632412048493912,0.45350803723402405,-0.32636836621738624,-0.6801098641040677,0.11569571006736727
|
||||
Police-led Information-Gathering Network,-0.4853492060566341,1.1867200444732333,-0.8564905898436039,-0.1420100772362724,1.0463377068298292
|
||||
Political Discourse Protocol,-0.1980310093114364,0.36795623586115783,-0.3928025522875241,1.4967610228635093,0.8723538415492672
|
||||
Political Protocols (Arendt & Schmitt),-1.4809917990709462,0.2924286351228609,0.1918123562918446,-0.30401892086692883,-0.685294321698067
|
||||
Political Thriller/Police Movie Protocol,-1.3350571379975955,0.519961549084844,-0.24055467896652813,-0.8955690170354359,-0.6976962855316191
|
||||
Pop-up Village Protocols,-0.4482098112945587,0.810171092289519,0.024512302307797922,0.7298209737797873,-0.5579827614553985
|
||||
Prime Meridian Unconference,-0.5911265070478456,-0.2939324400741034,-0.27245450054167253,1.6096368786016735,-0.7640560118007412
|
||||
Proactive Suggestion Protocol,-0.1080146892421301,-0.7268236759043043,-1.4835753119928898,1.0895532370284744,0.2263167656946289
|
||||
Profile Photo Change (Symbolic Participation Protocol),0.3097254438718502,0.6074075430813597,-0.3389297441458467,2.73879899726422,-0.7850720550747088
|
||||
Proof of Stake Consensus,0.5445213873086929,0.4044028537822899,-0.6322762674545843,1.0122681577096189,1.1440402840034707
|
||||
Proof of Work Consensus,-1.3250988025146155,0.14363825622720397,-0.004781060983832268,-0.9583529375016419,0.5171194422131837
|
||||
Protocol Analysis (Ericsson & Simon),1.1383470100786763,0.04922416689743275,-0.09277490603709575,0.12159221471853006,0.404169924303634
|
||||
Protocol Departure in Creative Writing,0.09751926021516762,1.3311039997878447,-0.9973379231658581,-1.5294184025472455,-0.9510366483469268
|
||||
Protocol for Academic Science,-1.8044307137887972,0.2263917883972599,-0.05026993472127334,0.1861945221713677,-0.5896098012024781
|
||||
Protocol for COVID Masking,-0.7831548404247503,0.9877625875392315,-1.1719841445059758,0.09430302087462439,0.5505449144633918
|
||||
Protocol for Dance Collaboration,1.1602898389303329,1.2956389922303693,0.4303384102928116,0.8486537715921465,1.693890199600336
|
||||
Protocol for Evaluating Clock Protocols,0.43918240796231933,-1.6336952869125478,-0.35041514980745264,0.453224060142061,-1.113379867956474
|
||||
Protocol for Good Death,0.6802363067118838,1.7201474919863244,0.1223505574987383,-0.24898405971435356,1.0973190656312222
|
||||
Handwashing,-0.7235153826620134,-0.25152636305178094,0.7880720358522939,-0.2993186903096069,0.0759678802479727
|
||||
Medical System (US),0.6447826931491643,1.4508116976402161,-0.07924515402594726,1.8040829631023665,1.163468744242613
|
||||
Protocol of Kinship,-1.294781476503372,-0.06505571566597852,0.5129666820273981,-0.2120714674996394,0.9476221620615395
|
||||
Protocol of Operational Closure,1.2729935358135473,-0.2914114342074191,-1.1208852369060236,0.5515398900231523,-0.3424820730863549
|
||||
Protocol of Reclamation,0.926604936222341,2.006000344511127,-0.10811258831730766,-0.6249970862554116,-0.8754684624314376
|
||||
Time Zones,-0.23976789084826391,-0.7654406231603035,2.09769965486845,-0.06877862363585567,0.5079949888738023
|
||||
Protocol of Targeted Killing,-1.6299863462747548,0.5513858458559641,-0.3903380223167182,-0.2630428229293035,-0.4047183459924203
|
||||
,-0.5990064657012131,-0.5626670103040065,-0.29031797908715884,-0.3830599254013354,-0.507484314614639
|
||||
Protocol of Tjukurpa (Dreamtime Instructions),0.6111224363126806,0.2816793790589088,-0.42081326557963344,-1.0823462483115367,-0.4267514283206311
|
||||
Public Amateurism,-0.8133686437398029,0.04775599290811493,-0.8825145911900106,-0.2961288084572369,0.4998691918921757
|
||||
Public Enemy’s Political Activism,-0.4246143207440786,-0.03469749353233849,-0.23460506737317302,0.5187262934737196,0.5556142870388623
|
||||
Public Health Behavioral Guidelines,-1.2271374234812282,-0.9056191562071685,1.2642102800935138,0.49367602128720517,0.22358732906560363
|
||||
Publishing Protocols,1.0311638174562474,0.168614475611265,-0.1776885257886248,0.9166702947792589,0.01975341685866402
|
||||
Quadratic Voting,-1.2445611108863637,-0.21489113151455336,0.46423096335829783,-0.720526302797808,-0.4035238376623256
|
||||
Quilting Practices,-1.3709652244619523,0.5858556172738839,-0.2585535212189599,-0.5040403342765136,-0.49423989220349585
|
||||
QWERTY Keyboard Protocol,-0.2788391020806587,2.0304217930528767,-0.40365982533599487,-0.40941104966377034,-0.18724497308412996
|
||||
,-1.3729642371046538,0.08418131605979894,-0.34478586733187,0.4074952328313275,-0.45499016272231557
|
||||
Relationship-Building in Deaf Community,-0.49355530367759143,0.49293560641261885,-1.2955423023312385,-0.41751001439952584,0.8535928679877283
|
||||
Participatory Studies (Seed Oils),0.3254865661552471,0.29125062859133355,-0.8685964771036594,-0.9525989078557974,1.2553836386433646
|
||||
ResearchHub Model,0.17879684299860818,0.7888451459901394,0.17060257223184547,1.3887777809013033,-0.9693155589789388
|
||||
LK-99 Replication Craze,1.627534705007524,-0.8187110785937562,0.1683885339817937,-0.7199131402093829,0.04198391666539225
|
||||
Clinical Trial Design,-0.7095207467174157,-0.48791783378557735,1.0181279420799976,0.9506956286555192,1.0196097160164455
|
||||
Peer Review,0.39655315607082914,-0.21505662383115876,-0.9222591747157866,0.04584966954828931,0.7234065850036127
|
||||
Dating Apps,-1.0542597550953223,-0.617933398852565,-1.0840527425043032,-0.21823558761926848,0.14428484717509035
|
||||
Reporting Conventions for Election Integrity,0.3542676499137561,-0.8625773805885948,-0.5636596789498219,-0.37645190338697454,0.5586987653148827
|
||||
Reporting of Financial Status,-1.3251691644275716,0.06201397379289104,-0.6054880640263236,-0.37605167470539974,0.16017797076943047
|
||||
Reykjavik Protocol,-0.7919252402966118,-0.5373336099931673,0.029125534005158802,0.7579100518175775,-0.29049846793664547
|
||||
RFC Process,-0.41915422254288764,1.0729029303115085,-0.8560266236193206,0.35505608116537485,0.7312106993550871
|
||||
Rhetorical Canons,0.9835443081258753,0.850435296068163,-0.4867673960681375,0.3851416541664474,-0.1389569964013558
|
||||
Rhizomatic Urban Farm Expansion Protocol,2.1940643816967182,0.5229949891920153,1.3508235130827453,0.2501080864310065,0.2909969311138722
|
||||
Rhymes and Syllabic Rhythm,1.6436720502148132,1.419314673132836,0.5601741948453344,-0.4484551219427225,-0.4139801936914549
|
||||
Robert Musil’s Protocol of Critical Assessment,0.34386729284374296,-1.5610838237488982,-0.825511345834233,0.01491329047264375,0.10958464653901186
|
||||
Roman Senate Advisory Decree,1.642803011834868,-1.330448763142602,1.0565361310564463,-1.197234922107833,-0.31595064672906703
|
||||
Royal Access Protocol,0.8675020878427946,-1.0910986424623337,0.7733572845475545,-0.7961490194862921,0.20870588796416406
|
||||
Royal Protocols,-1.2893715017657388,0.4155710795029407,0.1473764564265603,-0.8457159598688199,0.335750913456835
|
||||
Rust Programming Language Principles,-1.3305473872315343,1.3154980330020547,0.9880164467015268,0.06824390746900764,-0.22478253006584328
|
||||
Sacrament of Eucharist,0.3588199941611944,-1.4986127234243554,0.7185452354761094,-1.5200070683409148,-0.8414586018111779
|
||||
Sacrament of Reconciliation,-0.21493697449416474,-1.1760720187430502,-0.30164685923868606,0.11734651403779985,0.3842444050349236
|
||||
Plantationocence,1.592235301999062,-0.5846281529534358,0.08138369372746128,-0.1770769647269877,-0.7531486789476257
|
||||
Sangoma Healing Practices,-0.2987102092272852,0.12170259806677948,-1.0409978445293877,0.20192064701430873,0.2072562994025903
|
||||
Scent-Free Attendance,-0.16736220069098132,-1.1801007446361491,-1.4305912405357728,0.5840796886294054,-0.4910665514447838
|
||||
Script Provision Protocol,-0.1887035865572739,0.17255230796507398,-1.3855385153791044,0.5310244627311691,-1.0159122127208147
|
||||
Seating Arrangements Protocol,0.9966824323599424,1.0394289019167267,0.8707993712873837,0.3071549272685454,0.186633452050099
|
||||
Secular Lunar Calendar,-1.4913893033885206,-0.509176267061695,0.5146386416100973,-0.5754270552718758,-0.11628137006530519
|
||||
Sellers Screw Thread Protocol,-0.5997109680233469,-0.9596403868517369,1.2599647309037705,0.4528600128687538,-0.4007418161217454
|
||||
Semantic Web Protocol,0.7411894154715473,-1.569045963688538,-1.6980118526453432,1.03833805479742,-0.46774370636462836
|
||||
Senatus Consultum,0.6663328203261115,-0.8699941001473528,0.026050025001920954,0.5331299245910569,0.32171751589629605
|
||||
Seven Ancestor Teachings,-0.37918654431432236,-0.7823179117933122,0.4226217842773801,-1.8709536578605235,0.2941558612723148
|
||||
Shadbush Tree Planting,-1.3992409264120858,0.3038089187396028,0.01931888091763172,-0.6974821279172059,-0.30328691672310215
|
||||
Shipping Container Protocol,0.9940645736885776,-0.69232210906851,0.09064938961302385,1.6617470501827234,0.8691273675248816
|
||||
Shorthand Transcription,0.16532379747759224,1.561133321011173,0.07963544677983729,-0.6268619765407727,0.4128019659840532
|
||||
Sign Language Interpretation Protocol,-0.8777343275045774,0.10532593322157613,-1.0706329401342778,-0.35400168834927287,0.40187156953700315
|
||||
SILENT/LISTEN Protocol,0.6800629046216353,1.1697434510610238,0.755715521665158,-0.3980807813650121,-0.23352385342266235
|
||||
Silhouette Creation,0.0376191379471281,0.10535061952653102,1.0166396133204194,-0.03514087265386647,-1.0382244360124122
|
||||
Silicon Valley Exit,0.7339548626123957,0.37330510066844275,0.21954017121412517,-1.0043283498031836,-0.5249720921328894
|
||||
Silicon Valley Model,-0.7892760360966611,-0.11295964119429354,-1.0975155633592322,-0.8784961707544537,0.5101749939280237
|
||||
Simplan Credit Card System,-0.7797672548301553,0.05968310112567996,-0.7768359484753822,0.0030275608121696166,0.051112623555619074
|
||||
Sin Protocol (Ignatian),-0.8790012534083678,-0.26923758405399983,1.4267534721719257,-0.39917609274927573,0.43120676815988523
|
||||
Six-Day Work Week,1.0646683583296845,0.43797111020073587,0.06604777728275828,-0.24120050429241374,-0.7709507755659321
|
||||
Social Entrepreneurship,1.0067253677722565,1.7152659154622063,0.060466925509776254,-0.6480495083024175,-1.4572052853695918
|
||||
Socratic Method,0.0319032656942319,-0.5967488106384868,-0.6071566406976046,0.4525454264204037,0.7100330843723347
|
||||
Songlines,0.9796134898092649,0.5238987903573092,-0.17725765428098125,1.6766491285367016,0.21831138364995276
|
||||
Sonic Engineering Protocols,0.1393950988701812,0.4897499501086592,-0.9221543237128772,0.19793946353073588,0.25815296471064947
|
||||
Spam/Dilution Tactics (Content Disruption Protocol),0.321728310197318,-0.9193534306773639,-1.0455663873427925,-1.46811460286904,0.09816055800616001
|
||||
Staking Protocols,1.7930053668181507,-0.08990441127021445,1.0548678316017996,-0.07207980266360693,0.3315462893240142
|
||||
,1.9613426200030002,0.54962742911495,0.8836778005148762,-0.44647402788552526,0.15869781672482247
|
||||
Stenography Protocols,-0.7370137044753696,1.2476987876716814,-0.322574734624412,0.05738416488507312,0.5739650511696885
|
||||
Stereographic Exchange,-0.04159487082597863,0.41466234411583197,-0.2690207604647561,0.877678830901879,-1.4104243516470316
|
||||
Stock Exchange Trading Halt Protocol,0.36569466115149624,0.2431560527115872,0.20768659225156902,-0.34330034163099826,0.49532892092761704
|
||||
Submission of Exclusive Privileges,-0.18694376843239274,-1.3885251050804128,1.0364736100132375,0.5571416251105629,1.0021971627842354
|
||||
Succession Protocols,-1.7086569680327253,0.5455154235164974,0.00782594709858692,-0.3358163566970329,-0.019876274871482587
|
||||
Sustos Retrieval,0.01686856999979955,-1.0625894786652286,-1.602892622731821,0.8207885049967463,-0.9360320545771258
|
||||
Swiping,-1.441722259066499,-0.03133142018147307,-0.24286770169834482,-0.6207827940746975,0.10199622031688199
|
||||
Systematic Experimental Self-Observation,0.2657487122131522,1.4529899078021027,-0.2911439281721952,0.22039913099998304,-0.06969745439126937
|
||||
SZ Journalists' Note-Taking Protocol,0.09262769632478596,-0.048254500463981755,-0.438066732353577,-0.8833256072072184,-0.27594486994098033
|
||||
Tarot Card Interpretation,1.344932631637815,0.3914016868863252,-0.36286083977189343,0.5214271787692507,1.7733406501357032
|
||||
TCP/IP,0.4079234928590213,-0.06213610454025776,-0.28692218305812384,0.27026118591142556,1.1303384261138085
|
||||
Teaching Protocol (Paulo Freire),0.8762099067888058,1.4842593010308487,-0.13437295772279406,0.717055725345274,-0.6743620064575694
|
||||
Technical-Political Distinction Protocol,0.6978162518660658,0.1428948111246461,0.5804507054402086,-0.07163234813243126,-1.3916675789282558
|
||||
Territory Acknowledgement,1.049074873152331,-0.9883488685794359,-0.8504842791584066,-0.7637778697435421,-0.5344684746644244
|
||||
Theocracies,-0.5266570464588545,0.00837418860506767,0.40713524037299686,0.9645101359311657,-0.004328709394358281
|
||||
Think Aloud Protocol,-0.13880210229161033,-0.7069795061449375,2.077822985481451,-0.012131508150864355,0.807658851632101
|
||||
Threshold Forgetting Protocols,-1.0080141522132522,-0.5390457936562482,1.3131226270031657,0.48948785590176436,-0.4830457857053071
|
||||
Time Distribution via Gun Time,1.664896996818871,1.9859395154227948,0.1476507718981697,0.45977535984509654,0.21330253516581282
|
||||
Time Zone Standardization,-0.3955940333589979,-1.0941542157973543,0.39052937672564964,-1.1804130775045873,-0.23090803408753283
|
||||
Timekeeping for Activities (Yin/Yang Hours),1.296712834706874,-1.8244553626949267,-0.41548752186637733,-0.29016747403172977,-0.5771651949323221
|
||||
Tjukurpa (Dreaming Stories),-0.1306908130809865,-0.16084483232259533,0.02678617094008649,0.08802382298342837,1.073995115049462
|
||||
Tobacco Offering Protocol,0.24859261494612925,-1.1070106710452294,0.8642655110861552,-2.055698986236155,-0.4678578147609805
|
||||
Totalitarian Hospitalization Protocol,0.657876258577519,-1.1620466405465875,0.5578005897263232,-0.8516124704003857,0.48899590260535164
|
||||
Toyota Killswitch Protocol,0.1050490678075787,0.2453307095470184,-1.0300940845885238,-1.8521041150084887,-0.03566130027601083
|
||||
Traffic Signals,1.6532802779901803,0.900159263955942,0.9933653252721737,-0.689690031389765,-0.2451349968091407
|
||||
Translation Correction Protocol,-1.5956076566978057,-0.3652050695009585,0.059615261522371996,-0.060083279756069495,-0.3193730054069538
|
||||
Tribal Council Research Permit,0.31573522415012834,-0.5867035194995649,2.0785252367360147,0.3043534379223472,-0.9924011799485671
|
||||
Tribal Protocols of the Cultural Resources Program,0.3075070586068253,-1.5704404326841754,-2.112691147390454,0.8567265553186547,-0.7508866784918493
|
||||
Truth and Reparations Commission Protocols,-0.24012725741347438,0.9184989110848756,-1.516822359722228,-1.10927251474868,-0.02452098045239515
|
||||
TSA Airport Security,0.25570904275809114,0.07425528408463729,-0.4844475458721427,-0.8526035094898381,-0.44102341070681944
|
||||
Ultimate Frisbee Gameplay,-0.22082274661362916,0.2243164141184291,-0.8363645006669725,-1.2171020599852522,-0.8760829036352586
|
||||
Underground Resistance's Bandana Protocol,-1.0059489026368233,0.27687119901509205,0.030372138315390748,0.5444185688924479,-0.7492912474077048
|
||||
Uniform Resource Locator (URL) Protocol,0.4303020067038203,-0.27966409815597815,-1.4669403827416976,-0.0402028188176214,-0.4756122654814353
|
||||
Uninsurable Protocol,-1.6046838660788998,0.2871662729434492,0.564267737473516,0.05756829352043406,0.5416766779962604
|
||||
Unionized Worker Right to Strike,0.7589308777318633,-0.3723392191396009,0.9904186964825945,1.2251161410362525,2.0457049507487444
|
||||
Urban Rewilding Protocol,0.4363904960364672,1.246843272510166,-0.6446013686021068,-0.8991363480574304,-0.08891482445308717
|
||||
Urine-Hormone-Extraction-Action,0.7690088254486039,-1.3884036322103679,-0.9721042870817284,-0.06351156097187091,0.9858825338828294
|
||||
USB-C Connector Protocol,-1.1045796659936118,-0.3926308537452399,0.612399094708073,0.5326864106813601,-0.5124845456116263
|
||||
Vibe Culture,-1.50362176369948,-0.6251946153358334,0.5262207415184234,-0.5914940306312233,0.4136028642063358
|
||||
Victorian Room Design (Enclosure),-0.9209437853689563,-0.4639106635412139,-0.2930935847466902,0.4271873053278723,-0.22206586346308313
|
||||
Video Game Tournament Disqualification Protocol,-0.39007358101370526,-0.7328996394053147,2.444902555270502,0.8568517297175818,1.2717179440958224
|
||||
Vienna Convention (Diplomatic Law),-0.23993654070582005,0.7803031397590154,-1.140558596552998,-1.2285122614949522,-0.2415262696437218
|
||||
Vigil for Murdered Environmentalists,1.2121130787994956,1.379232449268747,-0.555798738084375,0.9505622332772781,1.530247795124984
|
||||
Vogue'ology,1.1285569288692414,0.26461108447906256,0.27137615308701285,0.26938392051152266,1.187902703089233
|
||||
VPN Usage (Circumvention Protocol),0.4153313748618792,-1.7188697272284625,-0.7891097035838349,0.6138592878322142,0.1634497996025882
|
||||
Wampum Belt Bead Code,0.6515951730697355,1.2344458410727868,-0.13888148156125768,-1.3545742570879558,-0.49444210572765845
|
||||
Web Protocols,-1.0795347437720986,1.7321516606919714,0.2872361967251162,0.4281796536605927,0.18933040748397914
|
||||
Westphalian System,0.869121882578504,1.4123761576680238,-0.33746033814560455,0.1506832288279442,0.4318021058247991
|
||||
White Cube Presentation Protocol,0.8775691604281214,0.2690676818682297,0.41713023703117186,-0.21551998894856883,0.6050846412646764
|
||||
Whitworth Screw Thread Protocol,-0.5791699985896652,0.7652173147182211,-0.4591411599882023,0.36915817417113456,-0.17340625219693992
|
||||
Windrush Generation Protocols,-0.13164285052203517,2.0631029922523036,1.7548510385248268,0.06321685538203735,-0.3773837869242666
|
||||
Witness Interaction Protocol,-0.7474897159521424,0.6155087601341251,-0.37173359975388753,-0.5590327677891469,-1.2934095171920224
|
||||
|
@@ -0,0 +1,24 @@
|
||||
Dimension,Importance
|
||||
Design_elite_vs_vernacular,0.22670005014772088
|
||||
Entanglement_flocking_vs_swarming,0.13844934403578782
|
||||
Design_static_vs_malleable,0.10207625314364473
|
||||
Entanglement_self-enforcing_vs_enforced,0.09223001854305843
|
||||
Entanglement_obligatory_vs_voluntary,0.08020819243271289
|
||||
Experience_exclusion_vs_inclusion,0.05852059807155883
|
||||
Design_precise_vs_interpretive,0.04038682206222712
|
||||
Experience_predictable_vs_emergent,0.03880553797351134
|
||||
Entanglement_sovereign_vs_subsidiary,0.03805080000848619
|
||||
Design_explicit_vs_implicit,0.02100503890505323
|
||||
Entanglement_macro_vs_micro,0.019805353916302337
|
||||
Entanglement_abstract_vs_embodied,0.019741886384821872
|
||||
Experience_trust-evading_vs_trust-inducing,0.015536003652738524
|
||||
Experience_Kafka_vs_Whitehead,0.014888427799899078
|
||||
Experience_crystallized_vs_contested,0.013723182082686072
|
||||
Design_durable_vs_ephemeral,0.011758274762928634
|
||||
Experience_dead_vs_alive,0.011559668744230095
|
||||
Entanglement_defensible_vs_exposed,0.011429776745208163
|
||||
Design_universal_vs_particular,0.010399750467375051
|
||||
Experience_sufficient_vs_insufficient,0.009861923524384293
|
||||
Design_technical_vs_social,0.00985265430289064
|
||||
Design_documenting_vs_enabling,0.009050072054613984
|
||||
Entanglement_exclusive_vs_non-exclusive,0.0059603702381595455
|
||||
|
@@ -0,0 +1,407 @@
|
||||
Descriptor,cluster
|
||||
Abdication Protocol,5
|
||||
Abolitionist Practice Protocol,1
|
||||
Access Check-in,1
|
||||
Access Intimacy Protocol,1
|
||||
Access-Centered Practices,1
|
||||
ActivityPub Protocol,5
|
||||
African Futurist Escape,1
|
||||
Afrofuturism,1
|
||||
Airport Security Procedures,2
|
||||
Alusi Trance (African Futurism),1
|
||||
Ancestral Spirit Possession,1
|
||||
Anishinaabeg Knowledge Sharing Protocols,1
|
||||
Anishinaabeg Visiting Protocols,1
|
||||
Annual Feasts,1
|
||||
Arendt's Reporting Protocol,4
|
||||
ARPANET Protocols,5
|
||||
Arranged Marriage,3
|
||||
Art Historical/Curatorial Validation Protocol,4
|
||||
Artisanal Marketing Protocol,3
|
||||
Artistic Collaboration,1
|
||||
ASL Provision Protocol,1
|
||||
Audience Recording Protocol,2
|
||||
Authority Assertions via Linguistic Precision,4
|
||||
Automobile Driver Warning Protocol,2
|
||||
Autonomous Worlds (0xPARC framework),1
|
||||
Bamboo Sales (Village Artisan Example),1
|
||||
BankAmericard Distribution Protocol,3
|
||||
Bartleby Protocol,1
|
||||
Basel Program,3
|
||||
Bell Pit Spacing,5
|
||||
Benefit Application Procedures,2
|
||||
Bertillonage,4
|
||||
Bilderatlas Mnemosyne (Warburg’s Method),5
|
||||
Birth Registration (City Hall),2
|
||||
Bitcoin Protocol,2
|
||||
Black Feminist Protocols,1
|
||||
Black Poethics,5
|
||||
Black Time Belt,1
|
||||
Blueprint Protocol,4
|
||||
Borgesian Aleph Construction,3
|
||||
Bristlemouth Protocol,1
|
||||
Buddhist Monastery Protocols,1
|
||||
Building Codes,2
|
||||
German Bureaucratic Prose,2
|
||||
Calendar Invite and Alarm System,2
|
||||
Canary Use for Gas Detection,5
|
||||
Canonical Bridge Protocols,5
|
||||
Capital Markets Opening and Closing Times Protocol,2
|
||||
Carriage Dispute Protocol,3
|
||||
CART (Communication Access Realtime Translation) Provision Protocol (Community Arts Org),1
|
||||
Chancery Ceremonies,2
|
||||
Child Discipline (Spanking/Grounding),3
|
||||
Childbirth Protocols (Local Knowledge),1
|
||||
Choose Your Own Adventure Protocol,1
|
||||
Chronicles of Suffering (Thirty Years' War),4
|
||||
Chronometer Usage Protocol,2
|
||||
Circular Movement Protocol,1
|
||||
City-States,4
|
||||
Clan Identification,1
|
||||
Climate Treaties,5
|
||||
Cloud Data Capturing,4
|
||||
Coal Dust Mitigation,2
|
||||
Code of Criminal Procedure Protocol,2
|
||||
College Enrollment,2
|
||||
Column Chromatography,5
|
||||
Command and Control,2
|
||||
Commemorative Coin Protocol,3
|
||||
Communal Altar Creation,1
|
||||
Communication Protocols (Cold War),2
|
||||
Community Land Acknowledgement Protocol (Gallery),1
|
||||
Community Lore Protocols,1
|
||||
Compost-Based Ritual Protocols,1
|
||||
Conciliatory Chairman Intervention Protocol,2
|
||||
Content Moderation Standards,5
|
||||
Cooking Practices,1
|
||||
Coordinated Universal Time (UTC),2
|
||||
Coordinatizing Scientific Observation,5
|
||||
Corporate Contracts,2
|
||||
Corridor Design (Government Buildings),2
|
||||
Council of Ministers Meetings,2
|
||||
Cover Letter (Early Credit Agreements),1
|
||||
COVID-19 Mask Mandate Protocols,5
|
||||
COVID-19 Pandemic Protocols,5
|
||||
COVID-19 Regulations,5
|
||||
Cowrie Bead Currency,1
|
||||
Crash Protocol,2
|
||||
"""Open Publishing",1
|
||||
Criminological Discourse Protocols,2
|
||||
Crisis Communication Protocols (Cold War),2
|
||||
CRISPR,2
|
||||
CubeSat Protocol,2
|
||||
Currency Ledgers,2
|
||||
Dating Websites (Pre-App),5
|
||||
De umbrias ideareum (Bruno’s Memory Seals),4
|
||||
Decentralized Autonomous Organization (DAO) Governance Voting Protocol,5
|
||||
Decision-Making Process in Case of Disagreement,3
|
||||
Decision-Making via Vote,5
|
||||
Decision-Making within the Cabinet,2
|
||||
Deep Fake Generation Protocols,5
|
||||
Deep Listening,1
|
||||
Deliberative Analyses,5
|
||||
Department Council Protocols,3
|
||||
Detroit Techno Music Performance Protocols,1
|
||||
Diaries (Experimental Soul Studies),4
|
||||
Diaries (Puritan & Pietist),4
|
||||
Difficulty Bomb (Ethereum),5
|
||||
Dinner Etiquette,1
|
||||
Diplomatic Protocol,2
|
||||
Discernment of Spirits,1
|
||||
Disciplinary Procedure Protocol,2
|
||||
Dispute Resolution Through Mediation,5
|
||||
Distributed Cooperatives (DisCOs),1
|
||||
DIY Hormone Detection,1
|
||||
DNA Testing Kits,2
|
||||
DNS,2
|
||||
Doubloon Game Protocol,1
|
||||
Drexciya's Sonic World Building,4
|
||||
Drift Mine Slope Excavation,5
|
||||
Dust Suppression Efforts,2
|
||||
Early Fatality Reporting,4
|
||||
Ecology Protocols (Local Knowledge),1
|
||||
Eichmann Trial Protocol,3
|
||||
EIP (Ethereum Improvement Proposal),1
|
||||
Election Reporting Conventions,1
|
||||
Elevator Button Addressing,1
|
||||
Email Services,4
|
||||
Embossing Protocol (BankAmericard),5
|
||||
Ennoblement Protocols,2
|
||||
Environmental Racism Protocols,1
|
||||
Environmental Vigil Protocols,1
|
||||
Ethereum DAO Withdrawal Protocol,2
|
||||
Ethereum Proof of Stake,2
|
||||
Ethereum Proof of Work,5
|
||||
Ethereum Protocol,2
|
||||
Ethnographic Containment,1
|
||||
European Hoff Ceremonial Protocol,2
|
||||
Evidence-Based Debates,5
|
||||
Exit to Community Model,1
|
||||
Extinction Rebellion Affinity Networks Protocols,1
|
||||
Face-Restoring Protocol,1
|
||||
Facebook Protocol,3
|
||||
Petition Submission,4
|
||||
Flag-Raising/Lowering Protocols,2
|
||||
Flint Arrowhead Manufacturing Protocols,1
|
||||
Flux Divergence,4
|
||||
Food Localization Protocol,1
|
||||
Form-Based Interaction Protocol,2
|
||||
Fundamental Cause Investigations,5
|
||||
Funeral Rituals,5
|
||||
Gas Testing with Candle,5
|
||||
Gestural Warning Protocol,1
|
||||
Goffman's Interactional System Protocol,5
|
||||
Gold Coinage,2
|
||||
Gold Standard,2
|
||||
Greenwich Mean Time,5
|
||||
Grid-Based Urban Planning,2
|
||||
Gynepunk,1
|
||||
Halal and Gluten-Free Food Options,1
|
||||
Handshake,1
|
||||
Hats Protocol,1
|
||||
High-Frequency Trading Protocol,5
|
||||
House Addressing (Tax Collection/Conscription),3
|
||||
House Style,5
|
||||
Human Rights,5
|
||||
Hundred Gradations Incense Seal Protocol,1
|
||||
HyperCard Protocol,5
|
||||
Hypertext/Hypermedia Protocol,5
|
||||
I Ching Protocol,1
|
||||
Imperial Family Interactions,3
|
||||
Imperial Grace Awarding,4
|
||||
Imperial Mark Protocol,2
|
||||
Incense Clock Protocol,1
|
||||
Information Campaign (Nationalist Commentators),3
|
||||
Injection Protocol,1
|
||||
Insurance Claim Protocol,2
|
||||
Intangible Cultural Heritage Department Protocols,2
|
||||
International Law (as Protocol),5
|
||||
International Meridian Conference,2
|
||||
International Organization for Standardization (ISO),2
|
||||
Introduction Protocol,1
|
||||
Islamic Dietary Laws,2
|
||||
Islamic Memorization,1
|
||||
Islamic Prayer Rituals,2
|
||||
Job Interview Protocol,3
|
||||
Keeping in Touch (Return Visits),1
|
||||
Kleros Dispute Resolution Protocol,5
|
||||
Knotted Cord Alarm Protocol,5
|
||||
Kraftwerk's Aesthetic Minimalism,4
|
||||
Language Regulation,3
|
||||
Layer 2 Scaling Solutions,2
|
||||
League of Nations,3
|
||||
Legal Protocol (General),2
|
||||
Lemon Balm Protocol,1
|
||||
Lift and Transfer Protocol,2
|
||||
Lift and Transfer Protocol,2
|
||||
Lingua Franca,5
|
||||
Linux Kernel Production,1
|
||||
Listening Protocols,1
|
||||
Literary Genre Conventions (General),5
|
||||
Longitude Determination Protocols,4
|
||||
Manifest Destiny,3
|
||||
Mapping & Charting Protocols,2
|
||||
Marginal Note Usage,4
|
||||
Marronage,1
|
||||
Mass Surveillance Protocols,3
|
||||
Means Without Ends,1
|
||||
Mecanno Kit,5
|
||||
Meeting Protocol (Museum),3
|
||||
Meeting Scheduling,3
|
||||
Memetic Culture,5
|
||||
Memorization Palaces,1
|
||||
Memory Wheels,1
|
||||
MEV (Maximal Extractable Value),5
|
||||
MFA Seminar Protocols,2
|
||||
Michi Saagiig Clan Introduction,1
|
||||
Military Drill Techniques,2
|
||||
Military Protocols,2
|
||||
Milking Apparatus,3
|
||||
Ministerial Conferences,2
|
||||
Minute Book Recording Protocol,2
|
||||
Minute-Taking Protocol,2
|
||||
Minutes of Council of Ministers,2
|
||||
Model 500's Detroit Techno Identity,1
|
||||
Mundaneum Protocol,4
|
||||
Music Genre Protocols,1
|
||||
Mutual Aid Swarm Protocol,1
|
||||
Mutual Exchange Practices,1
|
||||
Myal Protocols,1
|
||||
NAGPRA,2
|
||||
Naming Protocols (Land Acknowledgements & Introductions),1
|
||||
Narrative Blogging Protocols,4
|
||||
Navigational Protocols,2
|
||||
Neighborhood Food Distribution Festival Protocol,1
|
||||
Network Nations Protocols,1
|
||||
Network State Founder Protocols,3
|
||||
New York Garment Worker Strike Protocols,1
|
||||
Nishnaabeg Storytelling Traditions,1
|
||||
NLS Protocol,5
|
||||
Noon-day Gun Protocol,2
|
||||
NSU Trial Protocol,4
|
||||
Nuclear Protocols,2
|
||||
Oblique Messaging/Editing (Content Circulation Protocol),1
|
||||
Observational Documentation Protocol (Secret Services),2
|
||||
Observational Science Protocols,4
|
||||
Occupying Vacancy Protocol,1
|
||||
Offering Alternative Respect Tokens,1
|
||||
Office Request Protocol,5
|
||||
Office Space Survey Protocol,4
|
||||
OODA Loop,5
|
||||
Open Source Estrogen,1
|
||||
Open Source Protocols,5
|
||||
Oral Communication Preferences,1
|
||||
Pagamento (Payback),1
|
||||
Pale Fire Protocol,5
|
||||
Paris Agreement,5
|
||||
Participatory Guarantee Systems (PGS),1
|
||||
Patriotic Protocols,2
|
||||
Pedestrian Traffic Rules Protocol,2
|
||||
Performance of Transparency,5
|
||||
Petition Submission and Review,2
|
||||
Petitioning for Privileges,3
|
||||
Philanthropic Foundation Advocacy Protocol,3
|
||||
Photographic Standardization,4
|
||||
Physiognomic Interpretation,3
|
||||
Pickup Basketball/Soccer Games,1
|
||||
Piece Wage System,5
|
||||
Pipe Ceremony Protocol,1
|
||||
Planting Tree Protocols,1
|
||||
Police Intervention Protocol,2
|
||||
Police-led Information-Gathering Network,3
|
||||
Political Discourse Protocol,3
|
||||
Political Protocols (Arendt & Schmitt),5
|
||||
Political Thriller/Police Movie Protocol,4
|
||||
Pop-up Village Protocols,1
|
||||
Prime Meridian Unconference,1
|
||||
Proactive Suggestion Protocol,5
|
||||
Profile Photo Change (Symbolic Participation Protocol),5
|
||||
Proof of Stake Consensus,5
|
||||
Proof of Work Consensus,5
|
||||
Protocol Analysis (Ericsson & Simon),4
|
||||
Protocol Departure in Creative Writing,1
|
||||
Protocol for Academic Science,4
|
||||
Protocol for COVID Masking,5
|
||||
Protocol for Dance Collaboration,1
|
||||
Protocol for Evaluating Clock Protocols,1
|
||||
Protocol for Good Death,4
|
||||
Handwashing,2
|
||||
Medical System (US),4
|
||||
Protocol of Kinship,1
|
||||
Protocol of Operational Closure,4
|
||||
Protocol of Reclamation,1
|
||||
Time Zones,2
|
||||
Protocol of Targeted Killing,3
|
||||
Protocol of Tjukurpa (Dreamtime Instructions),1
|
||||
Public Amateurism,1
|
||||
Public Enemy’s Political Activism,1
|
||||
Public Health Behavioral Guidelines,2
|
||||
Publishing Protocols,5
|
||||
Quadratic Voting,5
|
||||
Quilting Practices,1
|
||||
QWERTY Keyboard Protocol,4
|
||||
Relationship-Building in Deaf Community,1
|
||||
Participatory Studies (Seed Oils),1
|
||||
ResearchHub Model,3
|
||||
LK-99 Replication Craze,1
|
||||
Clinical Trial Design,5
|
||||
Peer Review,2
|
||||
Dating Apps,5
|
||||
Reporting Conventions for Election Integrity,2
|
||||
Reporting of Financial Status,1
|
||||
Reykjavik Protocol,4
|
||||
RFC Process,5
|
||||
Rhetorical Canons,2
|
||||
Rhizomatic Urban Farm Expansion Protocol,1
|
||||
Rhymes and Syllabic Rhythm,1
|
||||
Robert Musil’s Protocol of Critical Assessment,5
|
||||
Roman Senate Advisory Decree,3
|
||||
Royal Access Protocol,3
|
||||
Royal Protocols,3
|
||||
Rust Programming Language Principles,2
|
||||
Sacrament of Eucharist,2
|
||||
Sacrament of Reconciliation,1
|
||||
Plantationocence,1
|
||||
Sangoma Healing Practices,1
|
||||
Scent-Free Attendance,1
|
||||
Script Provision Protocol,1
|
||||
Seating Arrangements Protocol,2
|
||||
Secular Lunar Calendar,5
|
||||
Sellers Screw Thread Protocol,2
|
||||
Semantic Web Protocol,2
|
||||
Senatus Consultum,3
|
||||
Seven Ancestor Teachings,1
|
||||
Shadbush Tree Planting,1
|
||||
Shipping Container Protocol,2
|
||||
Shorthand Transcription,2
|
||||
Sign Language Interpretation Protocol,1
|
||||
SILENT/LISTEN Protocol,1
|
||||
Silhouette Creation,4
|
||||
Silicon Valley Exit,4
|
||||
Silicon Valley Model,5
|
||||
Simplan Credit Card System,3
|
||||
Sin Protocol (Ignatian),1
|
||||
Six-Day Work Week,3
|
||||
Social Entrepreneurship,5
|
||||
Socratic Method,1
|
||||
Songlines,1
|
||||
Sonic Engineering Protocols,3
|
||||
Spam/Dilution Tactics (Content Disruption Protocol),3
|
||||
Staking Protocols,2
|
||||
Stenography Protocols,4
|
||||
Stereographic Exchange,5
|
||||
Stock Exchange Trading Halt Protocol,2
|
||||
Submission of Exclusive Privileges,3
|
||||
Succession Protocols,3
|
||||
Sustos Retrieval,1
|
||||
Swiping,5
|
||||
Systematic Experimental Self-Observation,4
|
||||
SZ Journalists' Note-Taking Protocol,1
|
||||
Tarot Card Interpretation,1
|
||||
TCP/IP,2
|
||||
Teaching Protocol (Paulo Freire),1
|
||||
Technical-Political Distinction Protocol,3
|
||||
Territory Acknowledgement,1
|
||||
Theocracies,4
|
||||
Think Aloud Protocol,4
|
||||
Threshold Forgetting Protocols,3
|
||||
Time Distribution via Gun Time,3
|
||||
Time Zone Standardization,2
|
||||
Timekeeping for Activities (Yin/Yang Hours),1
|
||||
Tjukurpa (Dreaming Stories),1
|
||||
Tobacco Offering Protocol,1
|
||||
Totalitarian Hospitalization Protocol,3
|
||||
Toyota Killswitch Protocol,1
|
||||
Traffic Signals,2
|
||||
Translation Correction Protocol,1
|
||||
Tribal Council Research Permit,1
|
||||
Tribal Protocols of the Cultural Resources Program,2
|
||||
Truth and Reparations Commission Protocols,5
|
||||
TSA Airport Security,3
|
||||
Ultimate Frisbee Gameplay,1
|
||||
Underground Resistance's Bandana Protocol,1
|
||||
Uniform Resource Locator (URL) Protocol,2
|
||||
Uninsurable Protocol,5
|
||||
Unionized Worker Right to Strike,3
|
||||
Urban Rewilding Protocol,5
|
||||
Urine-Hormone-Extraction-Action,1
|
||||
USB-C Connector Protocol,2
|
||||
Vibe Culture,1
|
||||
Victorian Room Design (Enclosure),4
|
||||
Video Game Tournament Disqualification Protocol,5
|
||||
Vienna Convention (Diplomatic Law),2
|
||||
Vigil for Murdered Environmentalists,1
|
||||
Vogue'ology,1
|
||||
VPN Usage (Circumvention Protocol),5
|
||||
Wampum Belt Bead Code,1
|
||||
Web Protocols,5
|
||||
Westphalian System,3
|
||||
White Cube Presentation Protocol,4
|
||||
Whitworth Screw Thread Protocol,2
|
||||
Windrush Generation Protocols,3
|
||||
Witness Interaction Protocol,5
|
||||
World Zionist Congress,3
|
||||
Würzburg Psychology's Experimenter-Guided Observation,4
|
||||
Xanadu Protocol,5
|
||||
Xenopolitics #1: Petro-bodies and Geopolitics of Hormones,3
|
||||
YES-HER Yeast Biosensors,5
|
||||
|
@@ -0,0 +1,407 @@
|
||||
Descriptor,cluster
|
||||
Abdication Protocol,1
|
||||
Abolitionist Practice Protocol,1
|
||||
Access Check-in,1
|
||||
Access Intimacy Protocol,1
|
||||
Access-Centered Practices,1
|
||||
ActivityPub Protocol,1
|
||||
African Futurist Escape,1
|
||||
Afrofuturism,1
|
||||
Airport Security Procedures,2
|
||||
Alusi Trance (African Futurism),1
|
||||
Ancestral Spirit Possession,1
|
||||
Anishinaabeg Knowledge Sharing Protocols,1
|
||||
Anishinaabeg Visiting Protocols,1
|
||||
Annual Feasts,1
|
||||
Arendt's Reporting Protocol,2
|
||||
ARPANET Protocols,2
|
||||
Arranged Marriage,2
|
||||
Art Historical/Curatorial Validation Protocol,2
|
||||
Artisanal Marketing Protocol,2
|
||||
Artistic Collaboration,1
|
||||
ASL Provision Protocol,1
|
||||
Audience Recording Protocol,2
|
||||
Authority Assertions via Linguistic Precision,2
|
||||
Automobile Driver Warning Protocol,1
|
||||
Autonomous Worlds (0xPARC framework),1
|
||||
Bamboo Sales (Village Artisan Example),1
|
||||
BankAmericard Distribution Protocol,2
|
||||
Bartleby Protocol,1
|
||||
Basel Program,2
|
||||
Bell Pit Spacing,1
|
||||
Benefit Application Procedures,2
|
||||
Bertillonage,2
|
||||
Bilderatlas Mnemosyne (Warburg’s Method),1
|
||||
Birth Registration (City Hall),2
|
||||
Bitcoin Protocol,1
|
||||
Black Feminist Protocols,1
|
||||
Black Poethics,1
|
||||
Black Time Belt,1
|
||||
Blueprint Protocol,2
|
||||
Borgesian Aleph Construction,2
|
||||
Bristlemouth Protocol,1
|
||||
Buddhist Monastery Protocols,1
|
||||
Building Codes,2
|
||||
German Bureaucratic Prose,2
|
||||
Calendar Invite and Alarm System,1
|
||||
Canary Use for Gas Detection,1
|
||||
Canonical Bridge Protocols,1
|
||||
Capital Markets Opening and Closing Times Protocol,2
|
||||
Carriage Dispute Protocol,2
|
||||
CART (Communication Access Realtime Translation) Provision Protocol (Community Arts Org),1
|
||||
Chancery Ceremonies,2
|
||||
Child Discipline (Spanking/Grounding),2
|
||||
Childbirth Protocols (Local Knowledge),1
|
||||
Choose Your Own Adventure Protocol,1
|
||||
Chronicles of Suffering (Thirty Years' War),1
|
||||
Chronometer Usage Protocol,2
|
||||
Circular Movement Protocol,1
|
||||
City-States,1
|
||||
Clan Identification,1
|
||||
Climate Treaties,1
|
||||
Cloud Data Capturing,2
|
||||
Coal Dust Mitigation,2
|
||||
Code of Criminal Procedure Protocol,2
|
||||
College Enrollment,2
|
||||
Column Chromatography,1
|
||||
Command and Control,2
|
||||
Commemorative Coin Protocol,2
|
||||
Communal Altar Creation,1
|
||||
Communication Protocols (Cold War),2
|
||||
Community Land Acknowledgement Protocol (Gallery),2
|
||||
Community Lore Protocols,1
|
||||
Compost-Based Ritual Protocols,1
|
||||
Conciliatory Chairman Intervention Protocol,2
|
||||
Content Moderation Standards,1
|
||||
Cooking Practices,1
|
||||
Coordinated Universal Time (UTC),2
|
||||
Coordinatizing Scientific Observation,1
|
||||
Corporate Contracts,2
|
||||
Corridor Design (Government Buildings),2
|
||||
Council of Ministers Meetings,2
|
||||
Cover Letter (Early Credit Agreements),1
|
||||
COVID-19 Mask Mandate Protocols,2
|
||||
COVID-19 Pandemic Protocols,2
|
||||
COVID-19 Regulations,2
|
||||
Cowrie Bead Currency,1
|
||||
Crash Protocol,2
|
||||
"""Open Publishing",1
|
||||
Criminological Discourse Protocols,2
|
||||
Crisis Communication Protocols (Cold War),2
|
||||
CRISPR,1
|
||||
CubeSat Protocol,2
|
||||
Currency Ledgers,2
|
||||
Dating Websites (Pre-App),1
|
||||
De umbrias ideareum (Bruno’s Memory Seals),1
|
||||
Decentralized Autonomous Organization (DAO) Governance Voting Protocol,1
|
||||
Decision-Making Process in Case of Disagreement,2
|
||||
Decision-Making via Vote,2
|
||||
Decision-Making within the Cabinet,2
|
||||
Deep Fake Generation Protocols,1
|
||||
Deep Listening,1
|
||||
Deliberative Analyses,1
|
||||
Department Council Protocols,2
|
||||
Detroit Techno Music Performance Protocols,1
|
||||
Diaries (Experimental Soul Studies),1
|
||||
Diaries (Puritan & Pietist),1
|
||||
Difficulty Bomb (Ethereum),2
|
||||
Dinner Etiquette,1
|
||||
Diplomatic Protocol,2
|
||||
Discernment of Spirits,1
|
||||
Disciplinary Procedure Protocol,2
|
||||
Dispute Resolution Through Mediation,1
|
||||
Distributed Cooperatives (DisCOs),1
|
||||
DIY Hormone Detection,1
|
||||
DNA Testing Kits,2
|
||||
DNS,2
|
||||
Doubloon Game Protocol,1
|
||||
Drexciya's Sonic World Building,1
|
||||
Drift Mine Slope Excavation,1
|
||||
Dust Suppression Efforts,2
|
||||
Early Fatality Reporting,2
|
||||
Ecology Protocols (Local Knowledge),1
|
||||
Eichmann Trial Protocol,2
|
||||
EIP (Ethereum Improvement Proposal),2
|
||||
Election Reporting Conventions,1
|
||||
Elevator Button Addressing,1
|
||||
Email Services,2
|
||||
Embossing Protocol (BankAmericard),2
|
||||
Ennoblement Protocols,2
|
||||
Environmental Racism Protocols,1
|
||||
Environmental Vigil Protocols,1
|
||||
Ethereum DAO Withdrawal Protocol,1
|
||||
Ethereum Proof of Stake,1
|
||||
Ethereum Proof of Work,1
|
||||
Ethereum Protocol,1
|
||||
Ethnographic Containment,1
|
||||
European Hoff Ceremonial Protocol,2
|
||||
Evidence-Based Debates,1
|
||||
Exit to Community Model,1
|
||||
Extinction Rebellion Affinity Networks Protocols,1
|
||||
Face-Restoring Protocol,1
|
||||
Facebook Protocol,1
|
||||
Petition Submission,2
|
||||
Flag-Raising/Lowering Protocols,2
|
||||
Flint Arrowhead Manufacturing Protocols,1
|
||||
Flux Divergence,1
|
||||
Food Localization Protocol,1
|
||||
Form-Based Interaction Protocol,2
|
||||
Fundamental Cause Investigations,1
|
||||
Funeral Rituals,1
|
||||
Gas Testing with Candle,1
|
||||
Gestural Warning Protocol,1
|
||||
Goffman's Interactional System Protocol,1
|
||||
Gold Coinage,2
|
||||
Gold Standard,2
|
||||
Greenwich Mean Time,2
|
||||
Grid-Based Urban Planning,2
|
||||
Gynepunk,1
|
||||
Halal and Gluten-Free Food Options,1
|
||||
Handshake,1
|
||||
Hats Protocol,2
|
||||
High-Frequency Trading Protocol,1
|
||||
House Addressing (Tax Collection/Conscription),2
|
||||
House Style,1
|
||||
Human Rights,2
|
||||
Hundred Gradations Incense Seal Protocol,1
|
||||
HyperCard Protocol,1
|
||||
Hypertext/Hypermedia Protocol,1
|
||||
I Ching Protocol,1
|
||||
Imperial Family Interactions,2
|
||||
Imperial Grace Awarding,2
|
||||
Imperial Mark Protocol,2
|
||||
Incense Clock Protocol,1
|
||||
Information Campaign (Nationalist Commentators),2
|
||||
Injection Protocol,2
|
||||
Insurance Claim Protocol,2
|
||||
Intangible Cultural Heritage Department Protocols,2
|
||||
International Law (as Protocol),1
|
||||
International Meridian Conference,2
|
||||
International Organization for Standardization (ISO),2
|
||||
Introduction Protocol,1
|
||||
Islamic Dietary Laws,2
|
||||
Islamic Memorization,2
|
||||
Islamic Prayer Rituals,2
|
||||
Job Interview Protocol,2
|
||||
Keeping in Touch (Return Visits),1
|
||||
Kleros Dispute Resolution Protocol,1
|
||||
Knotted Cord Alarm Protocol,1
|
||||
Kraftwerk's Aesthetic Minimalism,2
|
||||
Language Regulation,2
|
||||
Layer 2 Scaling Solutions,1
|
||||
League of Nations,2
|
||||
Legal Protocol (General),2
|
||||
Lemon Balm Protocol,1
|
||||
Lift and Transfer Protocol,2
|
||||
Lift and Transfer Protocol,2
|
||||
Lingua Franca,1
|
||||
Linux Kernel Production,1
|
||||
Listening Protocols,1
|
||||
Literary Genre Conventions (General),1
|
||||
Longitude Determination Protocols,2
|
||||
Manifest Destiny,2
|
||||
Mapping & Charting Protocols,2
|
||||
Marginal Note Usage,1
|
||||
Marronage,1
|
||||
Mass Surveillance Protocols,2
|
||||
Means Without Ends,1
|
||||
Mecanno Kit,1
|
||||
Meeting Protocol (Museum),2
|
||||
Meeting Scheduling,2
|
||||
Memetic Culture,1
|
||||
Memorization Palaces,1
|
||||
Memory Wheels,1
|
||||
MEV (Maximal Extractable Value),1
|
||||
MFA Seminar Protocols,2
|
||||
Michi Saagiig Clan Introduction,1
|
||||
Military Drill Techniques,2
|
||||
Military Protocols,2
|
||||
Milking Apparatus,2
|
||||
Ministerial Conferences,2
|
||||
Minute Book Recording Protocol,2
|
||||
Minute-Taking Protocol,2
|
||||
Minutes of Council of Ministers,2
|
||||
Model 500's Detroit Techno Identity,1
|
||||
Mundaneum Protocol,1
|
||||
Music Genre Protocols,1
|
||||
Mutual Aid Swarm Protocol,1
|
||||
Mutual Exchange Practices,1
|
||||
Myal Protocols,1
|
||||
NAGPRA,2
|
||||
Naming Protocols (Land Acknowledgements & Introductions),1
|
||||
Narrative Blogging Protocols,1
|
||||
Navigational Protocols,2
|
||||
Neighborhood Food Distribution Festival Protocol,1
|
||||
Network Nations Protocols,1
|
||||
Network State Founder Protocols,2
|
||||
New York Garment Worker Strike Protocols,1
|
||||
Nishnaabeg Storytelling Traditions,1
|
||||
NLS Protocol,1
|
||||
Noon-day Gun Protocol,2
|
||||
NSU Trial Protocol,2
|
||||
Nuclear Protocols,2
|
||||
Oblique Messaging/Editing (Content Circulation Protocol),1
|
||||
Observational Documentation Protocol (Secret Services),2
|
||||
Observational Science Protocols,2
|
||||
Occupying Vacancy Protocol,1
|
||||
Offering Alternative Respect Tokens,1
|
||||
Office Request Protocol,1
|
||||
Office Space Survey Protocol,2
|
||||
OODA Loop,2
|
||||
Open Source Estrogen,1
|
||||
Open Source Protocols,1
|
||||
Oral Communication Preferences,1
|
||||
Pagamento (Payback),1
|
||||
Pale Fire Protocol,1
|
||||
Paris Agreement,1
|
||||
Participatory Guarantee Systems (PGS),1
|
||||
Patriotic Protocols,2
|
||||
Pedestrian Traffic Rules Protocol,2
|
||||
Performance of Transparency,1
|
||||
Petition Submission and Review,2
|
||||
Petitioning for Privileges,2
|
||||
Philanthropic Foundation Advocacy Protocol,2
|
||||
Photographic Standardization,2
|
||||
Physiognomic Interpretation,2
|
||||
Pickup Basketball/Soccer Games,1
|
||||
Piece Wage System,2
|
||||
Pipe Ceremony Protocol,1
|
||||
Planting Tree Protocols,1
|
||||
Police Intervention Protocol,2
|
||||
Police-led Information-Gathering Network,2
|
||||
Political Discourse Protocol,2
|
||||
Political Protocols (Arendt & Schmitt),1
|
||||
Political Thriller/Police Movie Protocol,1
|
||||
Pop-up Village Protocols,1
|
||||
Prime Meridian Unconference,1
|
||||
Proactive Suggestion Protocol,1
|
||||
Profile Photo Change (Symbolic Participation Protocol),1
|
||||
Proof of Stake Consensus,1
|
||||
Proof of Work Consensus,2
|
||||
Protocol Analysis (Ericsson & Simon),2
|
||||
Protocol Departure in Creative Writing,1
|
||||
Protocol for Academic Science,2
|
||||
Protocol for COVID Masking,2
|
||||
Protocol for Dance Collaboration,1
|
||||
Protocol for Evaluating Clock Protocols,1
|
||||
Protocol for Good Death,2
|
||||
Handwashing,2
|
||||
Medical System (US),2
|
||||
Protocol of Kinship,1
|
||||
Protocol of Operational Closure,2
|
||||
Protocol of Reclamation,1
|
||||
Time Zones,2
|
||||
Protocol of Targeted Killing,2
|
||||
Protocol of Tjukurpa (Dreamtime Instructions),1
|
||||
Public Amateurism,1
|
||||
Public Enemy’s Political Activism,1
|
||||
Public Health Behavioral Guidelines,2
|
||||
Publishing Protocols,1
|
||||
Quadratic Voting,1
|
||||
Quilting Practices,1
|
||||
QWERTY Keyboard Protocol,2
|
||||
Relationship-Building in Deaf Community,1
|
||||
Participatory Studies (Seed Oils),1
|
||||
ResearchHub Model,1
|
||||
LK-99 Replication Craze,1
|
||||
Clinical Trial Design,1
|
||||
Peer Review,2
|
||||
Dating Apps,1
|
||||
Reporting Conventions for Election Integrity,2
|
||||
Reporting of Financial Status,1
|
||||
Reykjavik Protocol,2
|
||||
RFC Process,1
|
||||
Rhetorical Canons,2
|
||||
Rhizomatic Urban Farm Expansion Protocol,1
|
||||
Rhymes and Syllabic Rhythm,1
|
||||
Robert Musil’s Protocol of Critical Assessment,1
|
||||
Roman Senate Advisory Decree,2
|
||||
Royal Access Protocol,2
|
||||
Royal Protocols,2
|
||||
Rust Programming Language Principles,2
|
||||
Sacrament of Eucharist,2
|
||||
Sacrament of Reconciliation,2
|
||||
Plantationocence,1
|
||||
Sangoma Healing Practices,1
|
||||
Scent-Free Attendance,2
|
||||
Script Provision Protocol,1
|
||||
Seating Arrangements Protocol,2
|
||||
Secular Lunar Calendar,1
|
||||
Sellers Screw Thread Protocol,1
|
||||
Semantic Web Protocol,1
|
||||
Senatus Consultum,2
|
||||
Seven Ancestor Teachings,1
|
||||
Shadbush Tree Planting,1
|
||||
Shipping Container Protocol,2
|
||||
Shorthand Transcription,2
|
||||
Sign Language Interpretation Protocol,1
|
||||
SILENT/LISTEN Protocol,1
|
||||
Silhouette Creation,2
|
||||
Silicon Valley Exit,2
|
||||
Silicon Valley Model,1
|
||||
Simplan Credit Card System,2
|
||||
Sin Protocol (Ignatian),1
|
||||
Six-Day Work Week,2
|
||||
Social Entrepreneurship,1
|
||||
Socratic Method,1
|
||||
Songlines,1
|
||||
Sonic Engineering Protocols,2
|
||||
Spam/Dilution Tactics (Content Disruption Protocol),2
|
||||
Staking Protocols,2
|
||||
Stenography Protocols,2
|
||||
Stereographic Exchange,1
|
||||
Stock Exchange Trading Halt Protocol,2
|
||||
Submission of Exclusive Privileges,2
|
||||
Succession Protocols,2
|
||||
Sustos Retrieval,1
|
||||
Swiping,1
|
||||
Systematic Experimental Self-Observation,2
|
||||
SZ Journalists' Note-Taking Protocol,1
|
||||
Tarot Card Interpretation,1
|
||||
TCP/IP,2
|
||||
Teaching Protocol (Paulo Freire),1
|
||||
Technical-Political Distinction Protocol,2
|
||||
Territory Acknowledgement,2
|
||||
Theocracies,2
|
||||
Think Aloud Protocol,2
|
||||
Threshold Forgetting Protocols,2
|
||||
Time Distribution via Gun Time,2
|
||||
Time Zone Standardization,2
|
||||
Timekeeping for Activities (Yin/Yang Hours),1
|
||||
Tjukurpa (Dreaming Stories),1
|
||||
Tobacco Offering Protocol,1
|
||||
Totalitarian Hospitalization Protocol,2
|
||||
Toyota Killswitch Protocol,1
|
||||
Traffic Signals,2
|
||||
Translation Correction Protocol,1
|
||||
Tribal Council Research Permit,2
|
||||
Tribal Protocols of the Cultural Resources Program,2
|
||||
Truth and Reparations Commission Protocols,2
|
||||
TSA Airport Security,2
|
||||
Ultimate Frisbee Gameplay,1
|
||||
Underground Resistance's Bandana Protocol,2
|
||||
Uniform Resource Locator (URL) Protocol,2
|
||||
Uninsurable Protocol,1
|
||||
Unionized Worker Right to Strike,2
|
||||
Urban Rewilding Protocol,1
|
||||
Urine-Hormone-Extraction-Action,1
|
||||
USB-C Connector Protocol,2
|
||||
Vibe Culture,1
|
||||
Victorian Room Design (Enclosure),2
|
||||
Video Game Tournament Disqualification Protocol,2
|
||||
Vienna Convention (Diplomatic Law),2
|
||||
Vigil for Murdered Environmentalists,1
|
||||
Vogue'ology,1
|
||||
VPN Usage (Circumvention Protocol),1
|
||||
Wampum Belt Bead Code,1
|
||||
Web Protocols,1
|
||||
Westphalian System,2
|
||||
White Cube Presentation Protocol,2
|
||||
Whitworth Screw Thread Protocol,2
|
||||
Windrush Generation Protocols,2
|
||||
Witness Interaction Protocol,1
|
||||
World Zionist Congress,2
|
||||
Würzburg Psychology's Experimenter-Guided Observation,2
|
||||
Xanadu Protocol,1
|
||||
Xenopolitics #1: Petro-bodies and Geopolitics of Hormones,1
|
||||
YES-HER Yeast Biosensors,1
|
||||
|
@@ -0,0 +1,407 @@
|
||||
Descriptor,Degree_Centrality,Betweenness_Centrality
|
||||
VPN Usage (Circumvention Protocol),0.3234567901234568,0.025680771833717496
|
||||
Offering Alternative Respect Tokens,0.30123456790123454,0.008655458802071227
|
||||
Access Check-in,0.2962962962962963,0.022013859623751176
|
||||
Deliberative Analyses,0.2962962962962963,0.02443320729788798
|
||||
Quadratic Voting,0.28888888888888886,0.027553707593361346
|
||||
Deep Listening,0.28888888888888886,0.006522555382231701
|
||||
Teaching Protocol (Paulo Freire),0.2814814814814815,0.0039404276363194475
|
||||
Publishing Protocols,0.27901234567901234,0.012183540395265195
|
||||
Listening Protocols,0.27901234567901234,0.004358999435858897
|
||||
Music Genre Protocols,0.2765432098765432,0.007284207416438463
|
||||
Pagamento (Payback),0.2765432098765432,0.007852040435957157
|
||||
Pipe Ceremony Protocol,0.2691358024691358,0.01273762522818996
|
||||
Access-Centered Practices,0.26666666666666666,0.011497798140748066
|
||||
Distributed Cooperatives (DisCOs),0.25679012345679014,0.0030280009939332676
|
||||
Silicon Valley Model,0.254320987654321,0.005984315070408309
|
||||
Means Without Ends,0.2518518518518518,0.0023526229898555265
|
||||
Environmental Vigil Protocols,0.2518518518518518,0.0025606197950167127
|
||||
Food Localization Protocol,0.24938271604938272,0.002184031754155122
|
||||
Vogue'ology,0.24444444444444444,0.0029504576810618576
|
||||
Open Source Estrogen,0.2419753086419753,0.002539942874901975
|
||||
Extinction Rebellion Affinity Networks Protocols,0.23950617283950618,0.0020683561179995467
|
||||
Rhizomatic Urban Farm Expansion Protocol,0.23950617283950618,0.002169795384782237
|
||||
Environmental Racism Protocols,0.23950617283950618,0.004387262443797964
|
||||
Afrofuturism,0.23703703703703705,0.0017253197177219703
|
||||
Ultimate Frisbee Gameplay,0.2345679012345679,0.001441304826975567
|
||||
Mutual Aid Swarm Protocol,0.2345679012345679,0.0021950536294372846
|
||||
Occupying Vacancy Protocol,0.22962962962962963,0.0017248452639748145
|
||||
Protocol of Reclamation,0.22962962962962963,0.0019119863731012357
|
||||
Network Nations Protocols,0.22962962962962963,0.002196133290092323
|
||||
Literary Genre Conventions (General),0.2271604938271605,0.006138891678959517
|
||||
Dispute Resolution Through Mediation,0.22469135802469134,0.012882711643851871
|
||||
DIY Hormone Detection,0.22469135802469134,0.00230112595949846
|
||||
Fundamental Cause Investigations,0.2222222222222222,0.01088379484903979
|
||||
Oblique Messaging/Editing (Content Circulation Protocol),0.2222222222222222,0.0047908694474759
|
||||
Buddhist Monastery Protocols,0.21975308641975308,0.002989012880047043
|
||||
SILENT/LISTEN Protocol,0.21975308641975308,0.0013967380064161849
|
||||
Black Feminist Protocols,0.21481481481481482,0.0012060557782197611
|
||||
Vigil for Murdered Environmentalists,0.21481481481481482,0.002539565415409949
|
||||
Performance of Transparency,0.21234567901234566,0.009127976616214303
|
||||
Urban Rewilding Protocol,0.21234567901234566,0.01664714849797112
|
||||
Participatory Guarantee Systems (PGS),0.21234567901234566,0.0009883363788898663
|
||||
Community Lore Protocols,0.21234567901234566,0.0044043534897694105
|
||||
Flint Arrowhead Manufacturing Protocols,0.20987654320987653,0.0022838454691198177
|
||||
Oral Communication Preferences,0.20987654320987653,0.007273375946794818
|
||||
Gynepunk,0.20493827160493827,0.004832016652328255
|
||||
Decentralized Autonomous Organization (DAO) Governance Voting Protocol,0.20493827160493827,0.005529800052049959
|
||||
Public Amateurism,0.20493827160493827,0.0019209424085242812
|
||||
Exit to Community Model,0.20493827160493827,0.0015192499035715974
|
||||
Dating Websites (Pre-App),0.20246913580246914,0.01749288718653501
|
||||
Autonomous Worlds (0xPARC framework),0.20246913580246914,0.00234824253584963
|
||||
Social Entrepreneurship,0.19999999999999998,0.002142658334174947
|
||||
Linux Kernel Production,0.19999999999999998,0.008853180670373904
|
||||
Goffman's Interactional System Protocol,0.19753086419753085,0.0025093091167886455
|
||||
EIP (Ethereum Improvement Proposal),0.19753086419753085,0.0337380483205318
|
||||
Compost-Based Ritual Protocols,0.19753086419753085,0.003690479359468569
|
||||
Naming Protocols (Land Acknowledgements & Introductions),0.19753086419753085,0.01646586138698306
|
||||
Intangible Cultural Heritage Department Protocols,0.19753086419753085,0.014643125234641993
|
||||
"""Open Publishing",0.19506172839506172,0.002439654627929191
|
||||
Lingua Franca,0.19506172839506172,0.009275316323980473
|
||||
Plantationocence,0.19506172839506172,0.0014185080983833906
|
||||
Tarot Card Interpretation,0.19506172839506172,0.0007545770710501434
|
||||
RFC Process,0.19506172839506172,0.004082840353210222
|
||||
Black Time Belt,0.19012345679012346,0.0008538873351239776
|
||||
Ecology Protocols (Local Knowledge),0.19012345679012346,0.0007993284015649228
|
||||
Seven Ancestor Teachings,0.19012345679012346,0.0005366739733027203
|
||||
ASL Provision Protocol,0.1876543209876543,0.01577470739842562
|
||||
Relationship-Building in Deaf Community,0.1876543209876543,0.0007532137462583754
|
||||
Pickup Basketball/Soccer Games,0.1876543209876543,0.0008025903942132824
|
||||
Abolitionist Practice Protocol,0.1876543209876543,0.0005497593107338436
|
||||
Myal Protocols,0.1876543209876543,0.0007886015002733944
|
||||
Political Protocols (Arendt & Schmitt),0.18518518518518517,0.01872329312754587
|
||||
Crash Protocol,0.18024691358024691,0.02537058803497888
|
||||
Public Health Behavioral Guidelines,0.18024691358024691,0.032535566624450084
|
||||
Rhetorical Canons,0.17777777777777778,0.02401385340966485
|
||||
Uninsurable Protocol,0.17530864197530863,0.011859497816155088
|
||||
Content Moderation Standards,0.17530864197530863,0.004977512184736752
|
||||
Lemon Balm Protocol,0.1728395061728395,0.0014813258017206603
|
||||
Participatory Studies (Seed Oils),0.1728395061728395,0.0018357846544176026
|
||||
Circular Movement Protocol,0.1728395061728395,0.002327800605446986
|
||||
Protocol for Dance Collaboration,0.17037037037037037,0.000491226259924515
|
||||
ActivityPub Protocol,0.17037037037037037,0.013068555800919899
|
||||
Cooking Practices,0.16790123456790124,0.0012152518568526534
|
||||
Protocol for Evaluating Clock Protocols,0.16790123456790124,0.006147254973510184
|
||||
Keeping in Touch (Return Visits),0.16790123456790124,0.002498717091082671
|
||||
Quilting Practices,0.16790123456790124,0.001684631185224035
|
||||
Protocol of Kinship,0.1654320987654321,0.0029080933516693196
|
||||
Truth and Reparations Commission Protocols,0.1654320987654321,0.00979061428216815
|
||||
Clinical Trial Design,0.16296296296296295,0.0042741579882912255
|
||||
Introduction Protocol,0.16296296296296295,0.003665407937640823
|
||||
Time Zone Standardization,0.16049382716049382,0.011306190792321714
|
||||
Anishinaabeg Visiting Protocols,0.16049382716049382,0.002147395745783998
|
||||
Open Source Protocols,0.16049382716049382,0.0018283915197854208
|
||||
Petition Submission and Review,0.1580246913580247,0.017362317227601003
|
||||
Neighborhood Food Distribution Festival Protocol,0.1580246913580247,0.0032105435573034713
|
||||
Hypertext/Hypermedia Protocol,0.15555555555555556,0.0033087711725805027
|
||||
Protocol Departure in Creative Writing,0.15555555555555556,0.0007902181706277178
|
||||
International Law (as Protocol),0.15555555555555556,0.005690456277023179
|
||||
Childbirth Protocols (Local Knowledge),0.15308641975308643,0.0018833537756223777
|
||||
Coordinatizing Scientific Observation,0.15061728395061727,0.005466392182087559
|
||||
Funeral Rituals,0.15061728395061727,0.005088223824098532
|
||||
Vibe Culture,0.15061728395061727,0.00036882451010528615
|
||||
Anishinaabeg Knowledge Sharing Protocols,0.15061728395061727,0.0015728857097170568
|
||||
Pop-up Village Protocols,0.14814814814814814,0.00066937121999438
|
||||
Calendar Invite and Alarm System,0.14814814814814814,0.01125233101601669
|
||||
LK-99 Replication Craze,0.14814814814814814,0.0008051624535617589
|
||||
Bartleby Protocol,0.14814814814814814,0.0014045839410217976
|
||||
Sustos Retrieval,0.145679012345679,0.0030951071084973653
|
||||
New York Garment Worker Strike Protocols,0.145679012345679,0.0031035318695887396
|
||||
Communal Altar Creation,0.145679012345679,0.0035338676664364733
|
||||
African Futurist Escape,0.14320987654320988,0.0005779385224071365
|
||||
Access Intimacy Protocol,0.14320987654320988,0.0007207214601158786
|
||||
Marronage,0.14074074074074075,0.0011937672091285752
|
||||
Islamic Memorization,0.1382716049382716,0.012845665322911502
|
||||
Planting Tree Protocols,0.1382716049382716,0.00651479465071023
|
||||
Tobacco Offering Protocol,0.1382716049382716,0.0024501628285435676
|
||||
Shadbush Tree Planting,0.13580246913580246,0.0025437985990046327
|
||||
Mutual Exchange Practices,0.13580246913580246,0.0024585876881721373
|
||||
Nuclear Protocols,0.13580246913580246,0.015314335424890526
|
||||
Halal and Gluten-Free Food Options,0.13333333333333333,0.004072483561789532
|
||||
Conciliatory Chairman Intervention Protocol,0.13333333333333333,0.003726410746986289
|
||||
Nishnaabeg Storytelling Traditions,0.13333333333333333,0.00271004722589206
|
||||
Evidence-Based Debates,0.13333333333333333,0.004325115335174074
|
||||
Annual Feasts,0.13333333333333333,0.0037322853447491005
|
||||
Stock Exchange Trading Halt Protocol,0.1308641975308642,0.009731473720670623
|
||||
Doubloon Game Protocol,0.12839506172839507,0.00035234382916209773
|
||||
Kleros Dispute Resolution Protocol,0.12839506172839507,0.023608302431067922
|
||||
Black Poethics,0.1259259259259259,0.0021409587658815315
|
||||
MFA Seminar Protocols,0.1259259259259259,0.010714615456543052
|
||||
College Enrollment,0.12345679012345678,0.011224572076981073
|
||||
Dinner Etiquette,0.12345679012345678,0.013995525317942773
|
||||
Injection Protocol,0.12345679012345678,0.008531019764773039
|
||||
Reporting of Financial Status,0.12345679012345678,0.0026282224836204717
|
||||
Public Enemy’s Political Activism,0.12098765432098765,0.0010406626189596326
|
||||
Benefit Application Procedures,0.12098765432098765,0.009196405231262719
|
||||
Unionized Worker Right to Strike,0.12098765432098765,0.006719636946810356
|
||||
Timekeeping for Activities (Yin/Yang Hours),0.12098765432098765,0.006834097169807707
|
||||
Airport Security Procedures,0.11851851851851852,0.0045333401440815395
|
||||
Rhymes and Syllabic Rhythm,0.11851851851851852,0.0024093842495840428
|
||||
Paris Agreement,0.11851851851851852,0.0011051932687261362
|
||||
Territory Acknowledgement,0.11604938271604938,0.009083429848598317
|
||||
Proof of Stake Consensus,0.11604938271604938,0.005933485385150238
|
||||
Bilderatlas Mnemosyne (Warburg’s Method),0.11604938271604938,0.0032992420630354956
|
||||
Toyota Killswitch Protocol,0.11358024691358025,0.007130273751786599
|
||||
Artistic Collaboration,0.11358024691358025,0.00024956044967577504
|
||||
Bamboo Sales (Village Artisan Example),0.1111111111111111,0.001018585562511161
|
||||
Election Reporting Conventions,0.1111111111111111,0.0031655396316706257
|
||||
Climate Treaties,0.1111111111111111,0.0010524052372536128
|
||||
Ethnographic Containment,0.10864197530864197,0.00011292653044860351
|
||||
Form-Based Interaction Protocol,0.10864197530864197,0.009544170018518518
|
||||
Patriotic Protocols,0.10864197530864197,0.011630464281254386
|
||||
Time Zones,0.10617283950617283,0.007892566024048552
|
||||
Six-Day Work Week,0.1037037037037037,0.022128686075001704
|
||||
Currency Ledgers,0.10123456790123457,0.010119487661737049
|
||||
DNA Testing Kits,0.10123456790123457,0.004116369944386133
|
||||
Gestural Warning Protocol,0.10123456790123457,0.0010609898370798735
|
||||
Corporate Contracts,0.10123456790123457,0.0033050090557981385
|
||||
Script Provision Protocol,0.09876543209876543,0.004923615105734906
|
||||
Vienna Convention (Diplomatic Law),0.0962962962962963,0.003184372448099274
|
||||
I Ching Protocol,0.0962962962962963,0.0005055962890302394
|
||||
Reporting Conventions for Election Integrity,0.0962962962962963,0.0031244655619273726
|
||||
Human Rights,0.0962962962962963,0.0036992402056436526
|
||||
Bristlemouth Protocol,0.0962962962962963,0.0036862961760548542
|
||||
Stereographic Exchange,0.09382716049382715,0.00578562272449413
|
||||
Minute-Taking Protocol,0.09382716049382715,0.012649376710243361
|
||||
DNS,0.09135802469135802,0.004511436862703001
|
||||
Sign Language Interpretation Protocol,0.09135802469135802,0.007069569048985852
|
||||
Political Discourse Protocol,0.08888888888888889,0.01529340105919046
|
||||
Songlines,0.08888888888888889,0.0003168771724013598
|
||||
Flag-Raising/Lowering Protocols,0.08641975308641975,0.002703467007478153
|
||||
Urine-Hormone-Extraction-Action,0.08641975308641975,0.000950172329237439
|
||||
Web Protocols,0.08641975308641975,0.0009416552939264143
|
||||
NAGPRA,0.08641975308641975,0.001618767442354101
|
||||
House Style,0.08641975308641975,0.006599449442466685
|
||||
Hats Protocol,0.08641975308641975,0.0042211073167912
|
||||
International Organization for Standardization (ISO),0.08395061728395062,0.002663283340165548
|
||||
Peer Review,0.08395061728395062,0.0026342790608888484
|
||||
Command and Control,0.08395061728395062,0.003282744596455703
|
||||
Traffic Signals,0.08395061728395062,0.0012209348679086732
|
||||
Diplomatic Protocol,0.08148148148148147,0.00267311816977373
|
||||
Memory Wheels,0.08148148148148147,0.0018096150733468797
|
||||
USB-C Connector Protocol,0.08148148148148147,0.00353095284115428
|
||||
Disciplinary Procedure Protocol,0.08148148148148147,0.0027842883583056623
|
||||
Semantic Web Protocol,0.08148148148148147,0.0013742372015483411
|
||||
Insurance Claim Protocol,0.07901234567901234,0.01687439908510194
|
||||
Building Codes,0.07901234567901234,0.0010072854822698175
|
||||
Video Game Tournament Disqualification Protocol,0.07901234567901234,0.006708771399187641
|
||||
OODA Loop,0.07901234567901234,0.0039004339601034776
|
||||
Tribal Protocols of the Cultural Resources Program,0.07901234567901234,0.0037338903736544187
|
||||
Narrative Blogging Protocols,0.07901234567901234,0.0007357701946135219
|
||||
Sangoma Healing Practices,0.07654320987654321,0.00012851819640972932
|
||||
Windrush Generation Protocols,0.07654320987654321,0.008881130063204536
|
||||
Capital Markets Opening and Closing Times Protocol,0.07654320987654321,0.000603945426386374
|
||||
Dust Suppression Efforts,0.07654320987654321,0.0025040474786532994
|
||||
Think Aloud Protocol,0.07654320987654321,0.013560149591400507
|
||||
Grid-Based Urban Planning,0.07407407407407407,0.0029613552072576864
|
||||
Military Protocols,0.07407407407407407,0.005420285941819413
|
||||
Detroit Techno Music Performance Protocols,0.07160493827160494,0.009606332374879982
|
||||
Islamic Dietary Laws,0.07160493827160494,0.0011703225408306061
|
||||
Artisanal Marketing Protocol,0.07160493827160494,0.009027793321254725
|
||||
Alusi Trance (African Futurism),0.07160493827160494,0.00018427788995315706
|
||||
City-States,0.07160493827160494,0.005792787653696562
|
||||
Decision-Making within the Cabinet,0.07160493827160494,0.0027746401455080445
|
||||
Code of Criminal Procedure Protocol,0.07160493827160494,0.0006510225879056289
|
||||
Michi Saagiig Clan Introduction,0.0691358024691358,0.002968446663084102
|
||||
Decision-Making via Vote,0.0691358024691358,0.0013348427085387393
|
||||
Sonic Engineering Protocols,0.0691358024691358,0.007157261827606667
|
||||
League of Nations,0.06666666666666667,0.00795875518907145
|
||||
Sacrament of Reconciliation,0.06419753086419754,0.0007252786425180034
|
||||
Scent-Free Attendance,0.06419753086419754,0.000500559181237852
|
||||
Choose Your Own Adventure Protocol,0.06419753086419754,0.00017651022901097325
|
||||
Ethereum Protocol,0.06419753086419754,0.003915047635114331
|
||||
Technical-Political Distinction Protocol,0.06172839506172839,0.008170864198935889
|
||||
SZ Journalists' Note-Taking Protocol,0.06172839506172839,0.0033257294887922197
|
||||
Police Intervention Protocol,0.06172839506172839,0.0020707486782360882
|
||||
Face-Restoring Protocol,0.06172839506172839,0.002821549016380731
|
||||
Seating Arrangements Protocol,0.06172839506172839,0.0008788779543506591
|
||||
Secular Lunar Calendar,0.05925925925925926,0.0004438810876990615
|
||||
Cover Letter (Early Credit Agreements),0.05925925925925926,0.0004232063846971175
|
||||
Prime Meridian Unconference,0.05925925925925926,0.00012521941347659425
|
||||
Tribal Council Research Permit,0.05925925925925926,0.0011432018904793458
|
||||
Criminological Discourse Protocols,0.05925925925925926,0.004790755407541962
|
||||
Mapping & Charting Protocols,0.056790123456790124,0.0019233085838298819
|
||||
Islamic Prayer Rituals,0.056790123456790124,0.0013760884823739
|
||||
Minutes of Council of Ministers,0.056790123456790124,0.0014414035913814227
|
||||
Shipping Container Protocol,0.05432098765432099,0.0013830452476142037
|
||||
Sellers Screw Thread Protocol,0.05432098765432099,0.0025472206904942384
|
||||
CART (Communication Access Realtime Translation) Provision Protocol (Community Arts Org),0.05432098765432099,0.006850148438774572
|
||||
Office Request Protocol,0.05432098765432099,0.003455239989084464
|
||||
Greenwich Mean Time,0.05185185185185185,0.0011386827004567627
|
||||
TCP/IP,0.05185185185185185,0.0008781144255661626
|
||||
Canonical Bridge Protocols,0.04938271604938271,0.0007767040282326666
|
||||
Facebook Protocol,0.04938271604938271,0.005156428729177142
|
||||
Ethereum DAO Withdrawal Protocol,0.046913580246913576,0.0009489691860894247
|
||||
Witness Interaction Protocol,0.046913580246913576,0.00031860021392497506
|
||||
Birth Registration (City Hall),0.046913580246913576,0.0009665288803944723
|
||||
Communication Protocols (Cold War),0.046913580246913576,0.0013432265301375778
|
||||
NLS Protocol,0.046913580246913576,0.002597114300047659
|
||||
Coal Dust Mitigation,0.046913580246913576,0.0004752653439164204
|
||||
Proactive Suggestion Protocol,0.046913580246913576,0.0029432052529618498
|
||||
Audience Recording Protocol,0.044444444444444446,0.001539036271289295
|
||||
CubeSat Protocol,0.044444444444444446,0.0003969960813923101
|
||||
Ethereum Proof of Stake,0.044444444444444446,0.005609989546895183
|
||||
Coordinated Universal Time (UTC),0.044444444444444446,0.0006824414294740978
|
||||
Protocol for Academic Science,0.044444444444444446,0.004002660304070225
|
||||
Pedestrian Traffic Rules Protocol,0.044444444444444446,0.008959196814994446
|
||||
Layer 2 Scaling Solutions,0.044444444444444446,0.0008351658070734707
|
||||
Network State Founder Protocols,0.04197530864197531,0.0034945354772531324
|
||||
Uniform Resource Locator (URL) Protocol,0.04197530864197531,0.00026363944873815625
|
||||
Elevator Button Addressing,0.04197530864197531,0.0002499122438071256
|
||||
Legal Protocol (General),0.04197530864197531,0.0002942844914458895
|
||||
COVID-19 Pandemic Protocols,0.04197530864197531,0.0016703336254811508
|
||||
Memorization Palaces,0.04197530864197531,0.0001336570804046042
|
||||
Philanthropic Foundation Advocacy Protocol,0.03950617283950617,0.0011380172963993277
|
||||
Handwashing,0.03950617283950617,0.00046568680529527636
|
||||
Handshake,0.03950617283950617,7.733943076760369e-06
|
||||
Petition Submission,0.03950617283950617,0.005563540654017156
|
||||
Reykjavik Protocol,0.03950617283950617,0.0013818008258439784
|
||||
Rust Programming Language Principles,0.03950617283950617,0.0015174272495851804
|
||||
Chancery Ceremonies,0.03950617283950617,0.0007375631550204818
|
||||
Xanadu Protocol,0.037037037037037035,0.0021999185026552277
|
||||
Basel Program,0.037037037037037035,0.004961756135065854
|
||||
Diaries (Experimental Soul Studies),0.037037037037037035,0.0012628733473694553
|
||||
Protocol of Tjukurpa (Dreamtime Instructions),0.037037037037037035,4.378996620320422e-05
|
||||
Protocol for COVID Masking,0.037037037037037035,0.0008445291315996742
|
||||
Medical System (US),0.037037037037037035,0.008942629362404713
|
||||
Corridor Design (Government Buildings),0.037037037037037035,0.00035580949961495125
|
||||
Wampum Belt Bead Code,0.0345679012345679,0.00013617023434176186
|
||||
ResearchHub Model,0.0345679012345679,0.001092312132267769
|
||||
Military Drill Techniques,0.0345679012345679,0.0031578252166412127
|
||||
Observational Documentation Protocol (Secret Services),0.0345679012345679,0.013382673090647546
|
||||
European Hoff Ceremonial Protocol,0.0345679012345679,0.000438703736087489
|
||||
Ancestral Spirit Possession,0.0345679012345679,0.0026284389846569695
|
||||
Theocracies,0.0345679012345679,0.003683260157995062
|
||||
Email Services,0.0345679012345679,0.0007531575537133841
|
||||
Marginal Note Usage,0.0345679012345679,0.0017351854150103308
|
||||
Eichmann Trial Protocol,0.03209876543209877,0.004078118313834523
|
||||
Memetic Culture,0.03209876543209877,0.0009251003740770353
|
||||
Council of Ministers Meetings,0.03209876543209877,0.0002500025674231045
|
||||
Time Distribution via Gun Time,0.02962962962962963,0.00693943036269099
|
||||
Würzburg Psychology's Experimenter-Guided Observation,0.02962962962962963,0.003237901525916104
|
||||
Roman Senate Advisory Decree,0.02962962962962963,0.0004285030839641204
|
||||
Systematic Experimental Self-Observation,0.02962962962962963,0.0007156593445155641
|
||||
Mass Surveillance Protocols,0.02962962962962963,0.0022809435676998204
|
||||
Job Interview Protocol,0.02962962962962963,0.006296174215344887
|
||||
Cloud Data Capturing,0.02962962962962963,0.001122448069285774
|
||||
Clan Identification,0.02962962962962963,0.0002954004990702538
|
||||
Crisis Communication Protocols (Cold War),0.02962962962962963,0.023856243155252508
|
||||
German Bureaucratic Prose,0.027160493827160494,9.986700263787226e-05
|
||||
Tjukurpa (Dreaming Stories),0.027160493827160494,0.0011220832013192725
|
||||
Shorthand Transcription,0.027160493827160494,0.004433659027022623
|
||||
House Addressing (Tax Collection/Conscription),0.027160493827160494,0.002079990899037613
|
||||
Department Council Protocols,0.027160493827160494,0.00283596796007378
|
||||
Authority Assertions via Linguistic Precision,0.027160493827160494,0.0032411472747952736
|
||||
Diaries (Puritan & Pietist),0.024691358024691357,0.003150733071705771
|
||||
Bitcoin Protocol,0.024691358024691357,4.1919294254046317e-05
|
||||
Political Thriller/Police Movie Protocol,0.024691358024691357,0.0010468259315826788
|
||||
CRISPR,0.024691358024691357,4.319980629836546e-05
|
||||
Flux Divergence,0.024691358024691357,0.002223773405577105
|
||||
COVID-19 Mask Mandate Protocols,0.024691358024691357,0.0006875513148338125
|
||||
Protocol of Operational Closure,0.022222222222222223,0.003255030959702698
|
||||
Commemorative Coin Protocol,0.022222222222222223,0.0005480588633559009
|
||||
Gold Coinage,0.022222222222222223,0.0015129048571653452
|
||||
Protocol Analysis (Ericsson & Simon),0.022222222222222223,0.0006973470095715832
|
||||
Whitworth Screw Thread Protocol,0.022222222222222223,0.00041751736803097934
|
||||
Kraftwerk's Aesthetic Minimalism,0.022222222222222223,0.0018309246501629327
|
||||
Photographic Standardization,0.022222222222222223,0.002551828661661632
|
||||
Imperial Mark Protocol,0.022222222222222223,0.0008153091172836233
|
||||
YES-HER Yeast Biosensors,0.022222222222222223,0.0013479465429994085
|
||||
Underground Resistance's Bandana Protocol,0.022222222222222223,0.00014866053426127436
|
||||
Chronometer Usage Protocol,0.019753086419753086,0.00355475623888164
|
||||
Deep Fake Generation Protocols,0.019753086419753086,5.480267298306029e-05
|
||||
Child Discipline (Spanking/Grounding),0.019753086419753086,0.005575290868363093
|
||||
Abdication Protocol,0.019753086419753086,0.0002755792364012255
|
||||
Incense Clock Protocol,0.019753086419753086,0.008184132787462954
|
||||
Police-led Information-Gathering Network,0.019753086419753086,0.00211546824830991
|
||||
Decision-Making Process in Case of Disagreement,0.019753086419753086,0.00024815416404782924
|
||||
Early Fatality Reporting,0.01728395061728395,0.0007257276423114013
|
||||
Totalitarian Hospitalization Protocol,0.01728395061728395,0.00029289501443919885
|
||||
Arendt's Reporting Protocol,0.01728395061728395,0.002870961807871271
|
||||
MEV (Maximal Extractable Value),0.01728395061728395,3.930989860018135e-05
|
||||
Cowrie Bead Currency,0.01728395061728395,0.00020268305309894478
|
||||
Gold Standard,0.01728395061728395,0.001677218553775442
|
||||
Sin Protocol (Ignatian),0.01728395061728395,0.0007299465976243785
|
||||
Spam/Dilution Tactics (Content Disruption Protocol),0.01728395061728395,0.0005241708789165627
|
||||
Art Historical/Curatorial Validation Protocol,0.01728395061728395,0.0033786358252442476
|
||||
Threshold Forgetting Protocols,0.01728395061728395,0.0004923458423661032
|
||||
Minute Book Recording Protocol,0.01728395061728395,0.00044728324916085095
|
||||
Dating Apps,0.01728395061728395,0.0004517431944336714
|
||||
HyperCard Protocol,0.014814814814814815,0.003436383078899106
|
||||
BankAmericard Distribution Protocol,0.014814814814814815,0.00010544952772061428
|
||||
TSA Airport Security,0.014814814814814815,0.008065881126999972
|
||||
Mundaneum Protocol,0.014814814814814815,0.00023668250272507746
|
||||
White Cube Presentation Protocol,0.014814814814814815,0.008576152305621311
|
||||
Information Campaign (Nationalist Commentators),0.014814814814814815,0.00016193124014020897
|
||||
Silhouette Creation,0.014814814814814815,0.0004914128074322951
|
||||
Mecanno Kit,0.014814814814814815,0.007498477455671752
|
||||
Robert Musil’s Protocol of Critical Assessment,0.014814814814814815,8.188690776178064e-05
|
||||
NSU Trial Protocol,0.014814814814814815,0.005208357764701308
|
||||
Petitioning for Privileges,0.014814814814814815,0.01888083465067029
|
||||
Bell Pit Spacing,0.012345679012345678,0.0010174155720420078
|
||||
Imperial Family Interactions,0.012345679012345678,0.0006603038843171575
|
||||
Succession Protocols,0.012345679012345678,0.0004331287481852131
|
||||
Lift and Transfer Protocol,0.012345679012345678,0.0004760056336734168
|
||||
Protocol for Good Death,0.012345679012345678,0.0003380662119730069
|
||||
Ministerial Conferences,0.012345679012345678,4.9178380122013965e-06
|
||||
Socratic Method,0.012345679012345678,0.0
|
||||
Ennoblement Protocols,0.012345679012345678,0.00010180754219241114
|
||||
Royal Protocols,0.012345679012345678,0.009606047589194712
|
||||
Navigational Protocols,0.009876543209876543,0.0003100778923241313
|
||||
De umbrias ideareum (Bruno’s Memory Seals),0.009876543209876543,0.003050657900808134
|
||||
Longitude Determination Protocols,0.009876543209876543,7.447103149590187e-05
|
||||
Protocol of Targeted Killing,0.009876543209876543,4.2384758321561625e-05
|
||||
COVID-19 Regulations,0.009876543209876543,0.0
|
||||
Gas Testing with Candle,0.009876543209876543,0.0015492377759255074
|
||||
Drift Mine Slope Excavation,0.009876543209876543,0.002230922201196423
|
||||
Swiping,0.009876543209876543,0.0002611555236984056
|
||||
Canary Use for Gas Detection,0.009876543209876543,0.0028585852988200823
|
||||
Arranged Marriage,0.009876543209876543,0.0032307495791170982
|
||||
Column Chromatography,0.009876543209876543,2.1489568657065508e-05
|
||||
Pale Fire Protocol,0.009876543209876543,1.3827308037465218e-05
|
||||
Model 500's Detroit Techno Identity,0.009876543209876543,0.0005626863200422481
|
||||
Physiognomic Interpretation,0.007407407407407408,0.00012853825605731674
|
||||
Victorian Room Design (Enclosure),0.007407407407407408,0.00016191427577028007
|
||||
Knotted Cord Alarm Protocol,0.007407407407407408,0.0
|
||||
Lift and Transfer Protocol,0.007407407407407408,0.004803813714704804
|
||||
Office Space Survey Protocol,0.007407407407407408,0.0
|
||||
Hundred Gradations Incense Seal Protocol,0.007407407407407408,0.00037265638506445625
|
||||
Royal Access Protocol,0.007407407407407408,8.032565439050584e-05
|
||||
Ethereum Proof of Work,0.007407407407407408,0.014338100476714338
|
||||
Submission of Exclusive Privileges,0.007407407407407408,0.0003161327600946706
|
||||
World Zionist Congress,0.0049382716049382715,0.0
|
||||
High-Frequency Trading Protocol,0.0049382716049382715,0.0
|
||||
Translation Correction Protocol,0.0049382716049382715,0.0
|
||||
ARPANET Protocols,0.0049382716049382715,0.004803813714704804
|
||||
Proof of Work Consensus,0.0049382716049382715,0.00958318054027625
|
||||
Chronicles of Suffering (Thirty Years' War),0.0049382716049382715,0.0
|
||||
Noon-day Gun Protocol,0.0049382716049382715,0.0
|
||||
Community Land Acknowledgement Protocol (Gallery),0.0049382716049382715,0.0003109720603826201
|
||||
Milking Apparatus,0.0049382716049382715,3.942425264956054e-05
|
||||
Manifest Destiny,0.0049382716049382715,0.004803813714704804
|
||||
Blueprint Protocol,0.0049382716049382715,9.330080059589183e-05
|
||||
QWERTY Keyboard Protocol,0.0049382716049382715,0.0
|
||||
Automobile Driver Warning Protocol,0.0024691358024691358,0.0
|
||||
Bertillonage,0.0024691358024691358,0.0
|
||||
Discernment of Spirits,0.0024691358024691358,0.0
|
||||
Staking Protocols,0.0024691358024691358,0.0
|
||||
Profile Photo Change (Symbolic Participation Protocol),0.0024691358024691358,0.0
|
||||
Observational Science Protocols,0.0024691358024691358,0.0
|
||||
Piece Wage System,0.0024691358024691358,0.0
|
||||
Language Regulation,0.0024691358024691358,0.0
|
||||
Imperial Grace Awarding,0.0024691358024691358,0.0
|
||||
Embossing Protocol (BankAmericard),0.0024691358024691358,0.0
|
||||
International Meridian Conference,0.0024691358024691358,0.0
|
||||
Silicon Valley Exit,0.0024691358024691358,0.0
|
||||
Sacrament of Eucharist,0.0024691358024691358,0.0
|
||||
Westphalian System,0.0,0.0
|
||||
Meeting Protocol (Museum),0.0,0.0
|
||||
Carriage Dispute Protocol,0.0,0.0
|
||||
Borgesian Aleph Construction,0.0,0.0
|
||||
Meeting Scheduling,0.0,0.0
|
||||
Senatus Consultum,0.0,0.0
|
||||
Simplan Credit Card System,0.0,0.0
|
||||
Drexciya's Sonic World Building,0.0,0.0
|
||||
Stenography Protocols,0.0,0.0
|
||||
Difficulty Bomb (Ethereum),0.0,0.0
|
||||
Xenopolitics #1: Petro-bodies and Geopolitics of Hormones,0.0,0.0
|
||||
|
@@ -0,0 +1,407 @@
|
||||
Descriptor,PC1,PC2,PC3,PC4,PC5
|
||||
Abdication Protocol,0.9675700783703842,2.4000203060432845,0.21686446969017706,-0.22255455351222125,-1.9589431778182516
|
||||
Abolitionist Practice Protocol,3.7459800572430284,-0.11230177186896899,-0.2426046994651431,1.2427576757590437,-0.23547853693356685
|
||||
Access Check-in,2.4263224179800105,-0.6180959435535255,0.43768384896916535,-0.21382226963675255,1.2454117747748252
|
||||
Access Intimacy Protocol,4.502587759186634,1.444583034558555,-0.13108525449829095,-0.07422619488828539,0.27005498512672627
|
||||
Access-Centered Practices,1.3471684047397872,-1.3132811601168297,0.19118163682008452,1.3665425194954155,0.05425335743038691
|
||||
ActivityPub Protocol,0.6757288247420505,-1.4551214937415191,-2.3364574833601393,0.548089748913563,-0.23563595831349382
|
||||
African Futurist Escape,3.505808324768462,2.074071004849128,-0.004720688102767112,-0.6892165338274122,-0.42284200010589645
|
||||
Afrofuturism,3.7302339447190516,0.6331331130106402,-0.039386720588874755,0.7812650516281028,-0.4956634333895638
|
||||
Airport Security Procedures,-2.5628447758457438,-2.3401124417742025,-0.13737881602436278,1.310223959077495,1.4877404295734848
|
||||
Alusi Trance (African Futurism),3.151900453777089,0.861534861697218,2.25302921863536,0.18404654199832554,1.3569896397351828
|
||||
Ancestral Spirit Possession,2.9381035037557504,2.667315002566487,1.8446895639815428,0.14225649445903668,1.1850145474314264
|
||||
Anishinaabeg Knowledge Sharing Protocols,2.6652929558062692,-1.956630498247114,2.7945708753868175,-0.05333501275236893,-0.4520776011095744
|
||||
Anishinaabeg Visiting Protocols,2.3302825014199344,-2.2974677944299966,2.19529305359775,-0.25029734085524447,-0.7369688751796524
|
||||
Annual Feasts,1.0587933419668243,-1.5658697951645177,0.39590408389540727,-0.47683987489666657,-0.14668917159693406
|
||||
Arendt's Reporting Protocol,-1.3990799192026555,-1.51858126755375,1.2305160084201447,-2.076674235640539,-2.060034165765236
|
||||
ARPANET Protocols,-1.795949300904689,1.3330018378493984,-2.780935120688003,-2.454777859622127,2.9932866082398157
|
||||
Arranged Marriage,-2.8785228619186864,2.041168361529465,2.62281697754202,1.8481470160563116,0.3345049704997859
|
||||
Art Historical/Curatorial Validation Protocol,-0.37638850367258303,2.222152473121793,0.8613271015301455,-1.1178938997243375,-2.412806137567969
|
||||
Artisanal Marketing Protocol,-1.9532523192636861,2.1487409058827143,-1.320096334631216,0.5361753939146907,-0.17214342279663755
|
||||
Artistic Collaboration,4.482911520685381,-0.37645269311965407,0.2623054528117536,-0.47603047335365045,1.1777075006918087
|
||||
ASL Provision Protocol,0.6474470295038295,-0.4196967774985425,1.1084207522357226,1.100365534498987,-0.11700882699679792
|
||||
Audience Recording Protocol,-3.531146759563075,-1.1950040169276048,2.007297544487622,-0.6972260076298694,-1.3607997581586417
|
||||
Authority Assertions via Linguistic Precision,-2.293381369533117,0.5957864506272101,-0.6417275748138195,-1.3074871356426745,-1.560490670756595
|
||||
Automobile Driver Warning Protocol,0.49447185192480625,-0.5231355508896653,-0.5109082031096748,-0.5880981876223796,1.4657903206055
|
||||
Autonomous Worlds (0xPARC framework),2.3353340800781766,1.0905621421022318,-0.8179549339963705,0.38333855661198707,0.0885147522970331
|
||||
Bamboo Sales (Village Artisan Example),2.4754548736798525,-0.9675586267831119,2.561800171038649,-1.7967419747833162,-1.229084326758667
|
||||
BankAmericard Distribution Protocol,-0.6702797656236545,1.5650395763706013,-0.41758438388303676,0.8290154073564614,0.10228541154551694
|
||||
Bartleby Protocol,3.833116282417135,1.6503777297571758,0.1083022309132751,-1.5279567500679379,-0.020172443600169895
|
||||
Basel Program,-1.7579709934361136,1.4145114632114972,-0.6526637751946452,1.179779529412996,0.14437057779413293
|
||||
Bell Pit Spacing,0.285113461557794,-0.810483886848429,1.1937266213040663,-3.239742031161407,1.7213108777068893
|
||||
Benefit Application Procedures,-2.7461284689603223,-1.546081109817039,0.7826420679953584,1.700994338581677,0.6512234851569874
|
||||
Bertillonage,-4.574767977118515,1.0461646774926483,-0.5661847952449249,-2.4484138059322604,0.1888348399672378
|
||||
Bilderatlas Mnemosyne (Warburg’s Method),0.7993063637983984,0.9997452645669559,-0.7238516545702608,0.002277252585103157,-0.07030071542230756
|
||||
Birth Registration (City Hall),-2.5772856865541445,-2.38391004562905,2.248985598146294,0.36278284278031425,-0.6827166934483354
|
||||
Bitcoin Protocol,0.19703232967269552,-2.5390552550914323,-2.676195873263299,-1.7726030280955607,0.3992158579123304
|
||||
Black Feminist Protocols,3.358793852692251,-0.6606833272375687,0.5472303944999805,1.2527879730659082,0.4072885536467311
|
||||
Black Poethics,1.9599153896995634,2.013102487331374,-0.67247307540589,1.2652527746210225,-0.9896011597031054
|
||||
Black Time Belt,3.202221469760726,0.5203530801091664,0.003469769566572412,0.5558280594940934,-0.9681353582366558
|
||||
Blueprint Protocol,-1.2256077448900786,-0.8265273991783422,-0.5833365968623603,-2.722160143862144,0.2956103084039697
|
||||
Borgesian Aleph Construction,-2.369360172684165,3.6955871126983344,-1.4399802016390069,0.1656294430513692,0.5254531208285886
|
||||
Bristlemouth Protocol,1.253098602093741,-0.020330485239159278,-1.7979381818322415,-1.0563264130198322,0.708972974045953
|
||||
Buddhist Monastery Protocols,2.380719630642215,-1.146109727614001,0.7224701022957375,0.2175476725674431,-0.26641191026369293
|
||||
Building Codes,-3.9276722571218055,-2.7463534379197845,-0.7657094726462497,0.6697937292862957,-0.07727621818196838
|
||||
German Bureaucratic Prose,-4.612428053807073,-0.9519696911904311,1.2475702544993144,-1.1622932382613889,-0.8865047561587952
|
||||
Calendar Invite and Alarm System,0.038724474529870705,-2.6169097496927445,-1.7317158980992156,0.3302892484269017,0.1710001091399351
|
||||
Canary Use for Gas Detection,0.08359783422056202,-1.1513572525115896,1.014540906100632,-3.3088686315228952,3.0935353291720094
|
||||
Canonical Bridge Protocols,1.5983495373706358,-0.786736178459561,-2.6858532850807766,-1.178832006556703,-0.12439179930812623
|
||||
Capital Markets Opening and Closing Times Protocol,-3.241029438058034,-1.728378698118864,-1.0661749017403503,0.7369627551542868,0.41663087433457946
|
||||
Carriage Dispute Protocol,-2.924523449668818,4.308501559711244,1.2663754712661923,0.06547347380221766,0.6593773582599274
|
||||
CART (Communication Access Realtime Translation) Provision Protocol (Community Arts Org),0.8716881422264126,-1.0136314305353717,1.340320211438665,0.4020854740006955,2.4280587815572683
|
||||
Chancery Ceremonies,-4.791477281787973,-0.7247519830836998,-0.07392430985185537,-0.6803578862711948,-1.0788182285663566
|
||||
Child Discipline (Spanking/Grounding),-0.31706647720811487,2.833707713731188,1.4389414626384027,-1.900255290409877,0.46796696964056733
|
||||
Childbirth Protocols (Local Knowledge),3.0729224487082214,-0.008536144387259286,2.544662029110585,-0.5941677261682216,-1.6641403957906133
|
||||
Choose Your Own Adventure Protocol,2.708938127973101,-1.8766507704730069,-0.36014878970305625,0.28544709669512625,-1.4943299272880606
|
||||
Chronicles of Suffering (Thirty Years' War),0.8651008576669389,2.159731328066507,1.1469929388658855,-1.0217929729915176,-3.3287313471865
|
||||
Chronometer Usage Protocol,-2.381623502792843,-0.8019998593082881,0.014473910280135881,-0.29585642345395413,2.849108558411842
|
||||
Circular Movement Protocol,2.831019866199365,-2.057439076618821,2.0734499522382355,-0.6142400149927155,-0.49774394543567857
|
||||
City-States,0.3899327148357742,0.6425783855712065,-0.7260678341095315,-0.7668778414294426,-2.1110235896326524
|
||||
Clan Identification,0.06013071040425115,-2.1126644529989176,2.4695336677727746,-0.6307976855233506,-1.5427811678617476
|
||||
Climate Treaties,0.5444457810171349,0.8140755959128242,-1.9901546570364015,2.2157163936587994,-1.4976501930141584
|
||||
Cloud Data Capturing,-0.6311547237971332,-0.8707441344951539,-1.9853928963212457,-1.1768377066544853,-1.5954668610715537
|
||||
Coal Dust Mitigation,-2.0455704099728687,-0.9012683432948476,-2.3682894908374643,0.14297846568900066,1.1610160471910715
|
||||
Code of Criminal Procedure Protocol,-2.875989601895717,-2.3115484917984728,0.5143441111204214,1.1495045648677953,-0.45488639276442316
|
||||
College Enrollment,-2.176629269344685,-0.4142279657427815,0.1199417881412182,1.323028620280681,-0.15005375909611443
|
||||
Column Chromatography,1.7245938890388328,1.1460806602429283,-0.23822794048311693,-0.9506497269674753,0.7858372741193139
|
||||
Command and Control,-2.1634015496808043,-0.8502120715900884,-0.8634436181067496,1.608507237934949,-0.09881353172244997
|
||||
Commemorative Coin Protocol,-1.6870787185815863,1.0007191161527422,0.6822533415920063,0.8137723142998036,-0.5175998650992439
|
||||
Communal Altar Creation,2.549267839625239,-0.7041373006142645,0.6568239208491395,0.29237688635468656,2.222007457334387
|
||||
Communication Protocols (Cold War),-3.3381911259957695,-1.1468097258694623,0.6673859341471988,-0.4271421375749724,-0.6718994459474695
|
||||
Community Land Acknowledgement Protocol (Gallery),-0.8030475687108767,0.31465909873408837,2.1296896680608683,-0.6681831686783408,1.1812172324985648
|
||||
Community Lore Protocols,1.98235628966403,-0.3642316580058194,1.5649372163496307,0.541758027250583,-0.8951899617564569
|
||||
Compost-Based Ritual Protocols,2.66899808769186,-2.112286198184246,0.7065153856538716,-0.27433647054942967,1.1185677072227977
|
||||
Conciliatory Chairman Intervention Protocol,-0.03428720136747119,-1.212128951759137,-0.933298474016982,0.994222815257087,-0.9504013602943557
|
||||
Content Moderation Standards,1.4409290452102215,1.1411835872010787,-1.237375698402088,2.1411926026929606,-0.23094964946395077
|
||||
Cooking Practices,2.85040112892316,-0.6347862145585241,1.2296870127713029,0.1320557055383592,-1.020527923711742
|
||||
Coordinated Universal Time (UTC),-2.3603617070879115,-4.1643130032620945,-1.979280310399853,-0.07223121261804233,0.03985060298785796
|
||||
Coordinatizing Scientific Observation,1.7411022239181533,0.47448617539453314,-2.7612821746563814,-0.12380745987819702,-0.003504029090319481
|
||||
Corporate Contracts,-2.579611233000127,-2.1235707241517887,-1.2334757157355323,0.6667046714723347,-0.2276347221264627
|
||||
Corridor Design (Government Buildings),-1.0521750365810234,-1.1787660375872608,-0.5266652521359595,-0.24136562773936826,0.7222726546537841
|
||||
Council of Ministers Meetings,-2.4041169004274563,-0.7437257515960237,1.7698821646297966,1.387927567569324,1.1563184932218842
|
||||
Cover Letter (Early Credit Agreements),3.346885059379283,1.2597464367967706,1.753496049068038,-1.303481720850444,1.1118714965573482
|
||||
COVID-19 Mask Mandate Protocols,-0.9569228043158505,1.396479022660089,0.2503008877290459,1.4614959694254428,2.31415984343195
|
||||
COVID-19 Pandemic Protocols,-1.0223843565481918,1.9542812907770175,-0.627969833552062,1.7932481238484086,1.37754865038818
|
||||
COVID-19 Regulations,-1.139863729501604,1.4039706922869526,0.31719753777183185,2.149349172528087,1.6582713432917933
|
||||
Cowrie Bead Currency,1.2771551390641263,-0.9583409374144735,-0.15627712389073706,-2.558460325486205,-1.3252706548516544
|
||||
Crash Protocol,-1.542761758368335,-0.9424285465362938,-1.1486845438740534,1.3316614544795076,0.08465861147494601
|
||||
"""Open Publishing",2.4505760233102487,-0.18850857853449637,-1.7858492884025727,0.0899568754949159,0.11413729750186072
|
||||
Criminological Discourse Protocols,-3.8468190899281303,0.5620807968463677,0.19203171375336095,0.11665479082544832,-1.075258186639921
|
||||
Crisis Communication Protocols (Cold War),-2.4854383183331294,-0.3195088688431875,1.2957618177463122,1.6290163863409832,-0.3385370009433748
|
||||
CRISPR,0.08745352521514221,-2.3712374856160303,-2.0930152222552643,-0.6131911776988742,0.9692102416262874
|
||||
CubeSat Protocol,-0.5492653416889762,-2.5119237035145194,-1.6913536744226723,-0.8233102779616994,1.7987303047472616
|
||||
Currency Ledgers,-0.32250478291342943,-2.601181242692368,-0.4917792557987815,0.4314875424781467,0.059996172911797055
|
||||
Dating Websites (Pre-App),0.24137279429879718,-0.4610947347601136,-0.5076664096023668,0.4639062755753219,0.09026632480643132
|
||||
De umbrias ideareum (Bruno’s Memory Seals),0.9352289732693093,0.3224809678817011,-0.5921672774723999,-2.240113630015955,-0.38461596523566033
|
||||
Decentralized Autonomous Organization (DAO) Governance Voting Protocol,1.2434897625435017,0.12646204595626823,-1.3181666458107963,0.8544629969031883,-0.05599360054703213
|
||||
Decision-Making Process in Case of Disagreement,-3.3109983673337795,1.4893012479533143,0.5529501181520017,-0.1423407135373431,0.7946533144107074
|
||||
Decision-Making via Vote,-0.19879822302440978,-1.1032241824760265,-0.2588998164243166,0.3660852426792344,-0.3961567047958977
|
||||
Decision-Making within the Cabinet,-4.288723121631188,-1.3083334647424536,0.9211007717604215,-0.3007083741664643,-0.5505658516223393
|
||||
Deep Fake Generation Protocols,1.2118061064043366,1.2836793535241582,-0.8752487084272805,0.24961763811433874,-0.2936550645525591
|
||||
Deep Listening,2.9169898495663715,-0.18669181075647312,-0.5109631525872717,0.1392484515410716,-0.10755927242321964
|
||||
Deliberative Analyses,1.2811344755791987,0.6341466671119477,-1.5310306181753797,0.9122363757047705,-0.935298000828403
|
||||
Department Council Protocols,-2.4601261703452963,2.884165786249677,1.253400540426062,0.8014475656370864,-0.32570583007162845
|
||||
Detroit Techno Music Performance Protocols,0.17895425937740578,-0.44582315241564746,2.240858875987703,-0.7687156958299548,0.5494664417612612
|
||||
Diaries (Experimental Soul Studies),1.839055665173149,-0.37338292090071856,-0.9107497104707009,-2.5338659697082364,-1.447962123943377
|
||||
Diaries (Puritan & Pietist),2.1265541822770095,1.5833121513123465,1.4053714171604008,-1.8356205185825725,-1.5340402884637534
|
||||
Difficulty Bomb (Ethereum),-1.2690940224648566,-0.05855404494732834,-0.8258822900309889,-0.7883435655760198,2.7415234219694753
|
||||
Dinner Etiquette,0.29900549009087174,-0.568383843145284,0.5075647890691442,-0.8649154620599019,-0.947294405825297
|
||||
Diplomatic Protocol,-1.235414571455523,-1.1536707142417277,0.03320315446293522,1.2622318282397724,-1.021558848699561
|
||||
Discernment of Spirits,0.16781302649327653,-0.6695967816815008,0.9997929596073796,0.6117820803764884,0.33246217383442517
|
||||
Disciplinary Procedure Protocol,-2.7911394806920895,-2.9289818287439373,1.6015593151504732,0.8869877438362882,-0.8573784354849426
|
||||
Dispute Resolution Through Mediation,1.176832694961621,-0.6665490240713124,-0.9299393284653167,1.1288870552581394,-0.07047867572691532
|
||||
Distributed Cooperatives (DisCOs),2.743947344760854,0.7057821281482716,-0.6757633303042947,0.9915472500652279,-1.053515918825071
|
||||
DIY Hormone Detection,3.0288498919140103,1.2351848075623735,-1.364530534438342,-0.20508377424106244,-0.17953499357812325
|
||||
DNA Testing Kits,-1.2660938349993824,-0.6421324771465112,-1.136804970679158,1.3527893110073714,0.9581519086962921
|
||||
DNS,-2.20686295513603,-2.01534557717132,-2.1003556638413845,1.1494101738272715,1.0462845826936562
|
||||
Doubloon Game Protocol,4.0845235090344865,1.5619450407969449,0.9746472849411785,0.15172154552184974,0.9594959619008411
|
||||
Drexciya's Sonic World Building,2.190198356593509,0.574885277624439,1.363668552608167,-0.5142279070816903,0.04419451610686234
|
||||
Drift Mine Slope Excavation,0.42734809922702555,0.22859721785554654,0.7292950286680864,-1.6381602199856375,2.3212649734186144
|
||||
Dust Suppression Efforts,-1.314344431530293,-2.368767075998208,-0.11467364583064375,0.8245767445216466,1.427173621819777
|
||||
Early Fatality Reporting,-2.3013379776837857,2.7456723740275266,0.3100323589252976,-1.981028582976849,-1.572564213067817
|
||||
Ecology Protocols (Local Knowledge),3.0223930001999877,0.14999540628348737,1.8575424073955082,0.33526593021930495,-1.345986582968882
|
||||
Eichmann Trial Protocol,-3.2368879147213883,2.9691100747595156,0.46930369529767363,-0.024844538162507063,-1.3531326463472098
|
||||
EIP (Ethereum Improvement Proposal),-0.8048068513442914,-1.7025806704258553,-0.033516490207496676,1.3142968080290558,-0.04669963313561574
|
||||
Election Reporting Conventions,0.7015626442067268,-0.4868737639722568,0.448902547617555,0.516117580321425,-0.6094388644237937
|
||||
Elevator Button Addressing,0.22770543917168623,-1.0805110943339178,0.4583367257636206,-0.26724891911620496,-0.7524761865353602
|
||||
Email Services,-2.2599333760302813,-0.06695321065836281,-2.1667753581808364,0.24288320360462864,-0.2457357280257343
|
||||
Embossing Protocol (BankAmericard),-2.0805371473210794,-1.3040593238056857,-0.44875461332553396,-2.1135904710689983,2.7688086090013675
|
||||
Ennoblement Protocols,-1.6980157885057012,-0.46789814128772494,2.1900186627945852,-0.3771461045960784,-1.6476262493211495
|
||||
Environmental Racism Protocols,2.1346589137236105,-0.27175507993485826,0.22155160363544718,1.6370104741433562,-0.6137966208126902
|
||||
Environmental Vigil Protocols,3.2022831567320083,-0.27088836237705627,1.2965597417882155,0.5085906707160598,-0.0342008451010891
|
||||
Ethereum DAO Withdrawal Protocol,0.10669002654466507,-0.19611134186496293,-1.950512786105899,0.12131248352949212,1.0448944553632684
|
||||
Ethereum Proof of Stake,-0.10677619811322764,-2.3705832834632936,-0.884398850084742,-0.8596235709978011,0.7912332095248921
|
||||
Ethereum Proof of Work,0.04474336511853874,-0.30469061421971666,-2.6729663788708242,-2.376066273737473,1.204382834440171
|
||||
Ethereum Protocol,1.077273848847082,-2.27404398270141,-2.9835857513717783,-1.164479783841925,0.7235799220771891
|
||||
Ethnographic Containment,2.7004556532759127,0.23527828688907285,-0.3849390265898314,1.1083106234163538,-1.6926802445793134
|
||||
European Hoff Ceremonial Protocol,-4.2776186456854175,-1.1446353141469316,1.8551739005644556,0.08066243266408987,-0.6262123982722562
|
||||
Evidence-Based Debates,0.2889940281422845,-1.4992418036971675,-1.2669788727013889,-0.12207010693156739,-1.004761933554079
|
||||
Exit to Community Model,2.5817584933729116,-0.49400197206349933,-0.7001444082432275,1.6209652494446067,-1.6264558111673744
|
||||
Extinction Rebellion Affinity Networks Protocols,3.559626068890468,0.20285635720794956,-0.7157261821339944,0.7756456028570499,-0.5620369507148206
|
||||
Face-Restoring Protocol,1.3846212753310272,-0.05309905341781807,0.07509787795238536,-0.20878472717442503,0.3359410643319831
|
||||
Facebook Protocol,0.03721806252516729,1.8544266624791572,-0.47890041777114284,0.05519323774069168,0.4768981534041932
|
||||
Petition Submission,-2.8101853610184127,1.1219329964484224,0.8892100580968452,-0.7681093530912614,-1.5320910514382002
|
||||
Flag-Raising/Lowering Protocols,-2.676825616048769,-3.259260728296562,1.2599412288925258,-0.09932469336017383,0.6648812119778457
|
||||
Flint Arrowhead Manufacturing Protocols,3.504446686878234,0.5378755318537849,1.3807254871894554,0.13816948438249457,-0.1088515365665621
|
||||
Flux Divergence,-0.053422411916729216,0.5590439289560266,-2.0628146601293147,-2.3689875775899494,-1.7702919524216196
|
||||
Food Localization Protocol,3.1449004957107234,-0.341876489623772,0.7996364575345712,0.5456155925278416,-0.3167483451421198
|
||||
Form-Based Interaction Protocol,-4.100028943988455,-1.6067068991470677,0.77624815376418,0.35248845542235746,0.19832006689033344
|
||||
Fundamental Cause Investigations,0.9670581560235132,-0.22112440645913084,-1.5063567814298322,1.861782588225891,-0.8027222891756601
|
||||
Funeral Rituals,1.6817430501604052,1.4520085353340322,-0.31517711073443866,-0.03268508332942019,0.07378520845703951
|
||||
Gas Testing with Candle,0.8188040885572871,0.4313339262396698,0.7230904332715624,-3.7050195894898166,2.282526109277005
|
||||
Gestural Warning Protocol,3.4089563226574735,2.435571974366275,1.522861509606623,-0.8906825666651159,1.4769660708797188
|
||||
Goffman's Interactional System Protocol,2.9072365634226336,0.8754205971754866,0.16440169237331748,-0.4354785799492341,0.08097791837558138
|
||||
Gold Coinage,-1.3719083585294067,-1.100340846743394,0.3771751438432215,-0.6818980515730249,-1.1381896596277572
|
||||
Gold Standard,-2.3238094557651707,-0.14284367919263702,-1.402102775204316,-1.1553737009399656,0.7196958192345242
|
||||
Greenwich Mean Time,-1.0896623359711464,1.4297865677875286,-1.9106834115593703,2.2687193992481895,-0.22837457546694895
|
||||
Grid-Based Urban Planning,-1.8312323186332258,-2.1925326563265246,-2.7937743278982525,-0.6858046677094269,0.7152466534768188
|
||||
Gynepunk,3.9626714460393515,1.2472169170573741,0.4204139046060034,0.6456797104676724,-0.1693282143224057
|
||||
Halal and Gluten-Free Food Options,0.6041269485016393,-1.7115570477695543,0.4899343647301498,0.5790752124350002,0.30571384784678257
|
||||
Handshake,2.911362033705225,-0.766667578899608,1.844208729319982,-1.70077385382868,1.3494395383380722
|
||||
Hats Protocol,-0.28528850785478693,-0.8540813105510419,0.9230140204297779,0.5811723742189414,0.06759051015514733
|
||||
High-Frequency Trading Protocol,0.13425128449164034,2.111715468785457,-2.0417302580703214,0.9755213658089679,-0.08190736497597802
|
||||
,-2.9308411510363594,1.777437295082446,-0.46427071376949863,0.9510758463618045,-0.341479154874256
|
||||
House Addressing (Tax Collection/Conscription),0.847649005139618,1.3366978332378099,1.0389584217230932,1.4895355391331302,0.3992657947384642
|
||||
House Style,-0.465471181156335,1.8620443688311263,-2.054084117544326,1.7837673129534712,-0.05185682197717675
|
||||
Human Rights,0.36083305287373674,2.2340796087136314,1.2558579487149648,-2.7305739830604905,1.8277938356183652
|
||||
Hundred Gradations Incense Seal Protocol,1.214025381447751,0.2380367788445292,0.11006876822323268,-1.9337016728596663,1.819083693001341
|
||||
HyperCard Protocol,1.577136647557498,0.18304618162537986,-2.5641435538936674,0.09273977283562915,-0.5694865046257562
|
||||
Hypertext/Hypermedia Protocol,2.8429811836647088,0.050539436875055424,-1.1275559139859688,-1.2480984594212048,0.030873848476182908
|
||||
I Ching Protocol,-2.3030137600156446,1.4600357734365135,2.318517937365298,-0.09288571887756267,-0.8318854936771898
|
||||
Imperial Family Interactions,-3.381033945328804,1.38707169175892,0.7603695930714686,-1.530685203590638,-1.1859772139671805
|
||||
Imperial Grace Awarding,-2.452822171497959,-0.9037454552133691,2.133649122635289,-0.4655665805709309,-0.5487870428315264
|
||||
Imperial Mark Protocol,2.0933068225426084,1.384834696590758,1.2828837013602392,-3.087707215740893,1.9129450020065637
|
||||
Incense Clock Protocol,-2.7924249531308534,3.0004967530666966,0.05741610680124789,0.7811407789608122,1.3551254486289048
|
||||
Information Campaign (Nationalist Commentators),-0.7244614268168181,-2.3223711520443127,1.4789775714661515,0.9001452762125299,0.8145471890832213
|
||||
Injection Protocol,-3.61251207879094,-0.04515284346755845,-0.4933650556357663,0.09474672249755339,0.3720605887209011
|
||||
Insurance Claim Protocol,-0.9070212100167957,-0.8086646132509803,-1.3597723767969823,1.9483672728033634,-0.8374646261339898
|
||||
Intangible Cultural Heritage Department Protocols,0.8709871663581596,1.6413430599505374,-1.2680598398866239,1.6485812943269054,-1.1029037482029582
|
||||
International Law (as Protocol),-2.5411166387620505,-0.9447035373476621,-1.231857688120539,0.9513322642818474,-0.21509374869331763
|
||||
International Meridian Conference,-1.4207908913393326,-1.9226068841693305,-2.644043843999477,0.4884726668858046,-0.5764232117873304
|
||||
International Organization for Standardization (ISO),1.6333225656770525,-2.563735174679828,1.1556630659953144,-0.0965288372125549,-0.20843335330511803
|
||||
Introduction Protocol,-2.7943848524126684,-2.6115355784009218,1.7798907237913073,0.6612932595645574,0.4361612224174038
|
||||
Islamic Dietary Laws,-0.333916586801999,-2.279578012556607,1.5277947893615589,1.5933697493069923,0.5243009799843171
|
||||
Islamic Memorization,-1.4313123713606246,-3.12630711604354,1.2782142393493705,0.43058652870056924,1.007359145877785
|
||||
Islamic Prayer Rituals,-1.3531797767795557,2.490697136941514,1.9248900185949607,0.5176269387923564,0.4069830755743414
|
||||
Job Interview Protocol,2.143419472787535,-2.108246305251092,2.0588949538930117,0.03618923805946865,0.2491022583518381
|
||||
Keeping in Touch (Return Visits),0.8823248844067177,-1.559445515218785,-1.9653912791778787,-0.6014074373123441,-0.2125605350307004
|
||||
Kleros Dispute Resolution Protocol,0.9772010529310288,1.6858830708759844,0.8819289507115068,-3.891363993000969,2.9534638796319386
|
||||
Knotted Cord Alarm Protocol,-1.6061983462355434,-1.7395943354179457,-0.8746675317118893,-2.4603013961571634,-2.0689767533971968
|
||||
Kraftwerk's Aesthetic Minimalism,-3.321232443273302,3.4474819289215577,1.975205983801377,0.42652887009636065,2.0003732377200616
|
||||
Language Regulation,0.050089033205837546,-1.9665857952048942,-1.831469329493592,-0.5240211146698566,1.0751586259458144
|
||||
Layer 2 Scaling Solutions,-0.9800770668314952,2.3477204639466205,-1.6608294462093804,1.1320334008344257,0.048184037214108764
|
||||
League of Nations,-2.6866238871950503,-0.4567984274336513,-0.010552705337136765,1.6753177373345627,-0.01643078356821474
|
||||
Legal Protocol (General),2.4764869697404936,0.9133013126327483,1.3107843824300958,-0.10927286028553909,0.3729383159588886
|
||||
Lemon Balm Protocol,-2.874305794161409,0.3009767464091667,-0.3734591949574694,-0.4975550478278587,1.665170523086065
|
||||
,-3.484741264795617,0.6204542139812421,-0.7977326842454953,-1.110907238825712,1.83811106742462
|
||||
Lift and Transfer Protocol,1.2949522224411087,-0.6814329151902476,-0.9254622035368453,0.10610271992731199,-0.044353360500298665
|
||||
Lift and Transfer Protocol,1.4489706534967703,-2.6402694473568102,0.37548070328939576,0.8828678834577384,0.03268477898247679
|
||||
Lingua Franca,2.9954132537069116,-0.39301604813090013,0.38035753498070296,0.3430802670319504,-0.005237438721843869
|
||||
Linux Kernel Production,1.5648001433473122,0.5254115494543908,-1.941833786959555,0.3820681515045148,-1.156764081050102
|
||||
Listening Protocols,-0.25143775995491213,1.3339323264417018,-1.758977480116727,-1.1969816363528423,-2.4650709221207783
|
||||
Literary Genre Conventions (General),-3.2307757461564854,4.904238416050525,0.5659639494515487,0.3665284870181987,0.6201566418217264
|
||||
Longitude Determination Protocols,-1.1198570015158391,-2.8543289426705054,-1.9785161973664878,-0.9206861747827046,1.453822750073219
|
||||
Manifest Destiny,0.9858427723729773,0.41060327844871625,1.6716605831939044,-0.6363865558305405,-1.0627878523303214
|
||||
Mapping & Charting Protocols,3.5776608296712373,0.2306574590739602,1.2428255846347414,-1.128115426066215,-1.5474537406718818
|
||||
Marginal Note Usage,-3.2018771508236794,3.2536354738108524,-1.0064547840124198,0.6343625476195424,-1.4983524868980762
|
||||
Marronage,3.7045261172852637,0.5132929962936315,0.24634658462329023,0.21871267568986152,0.05482147633622149
|
||||
Mass Surveillance Protocols,1.523818642277509,-1.095782999975922,-1.1385552427941577,-3.216345240660387,1.8222307894802632
|
||||
Means Without Ends,-2.8829533031277927,4.748696641335035,1.7618439127797179,-1.7430945442071937,0.036590651134272414
|
||||
Mecanno Kit,-3.754761557252097,4.958297344381779,2.4704951968675695,-1.0228923503880014,0.39620529028831153
|
||||
Meeting Protocol (Museum),1.2356292574435959,2.7636698353305302,-1.0280946036536147,0.5246505771111653,0.5463997678354359
|
||||
Meeting Scheduling,1.2732826632898104,-2.8684721126296804,0.1872346081693101,-0.3750771100643366,-1.2812367303985202
|
||||
Memetic Culture,1.643945991127901,0.5356074831000087,-0.5487928756659561,-1.167253590807083,-0.5892746301565809
|
||||
Memorization Palaces,1.249246714085821,3.0268939586006125,-1.3873609027018177,-0.043827789244844984,0.26314979068165156
|
||||
Memory Wheels,-0.9888766967908282,-1.098047445255275,1.26176474928978,2.5051924487844173,0.16165887634216078
|
||||
MEV (Maximal Extractable Value),0.17374965757258284,-2.836425644616579,1.8093284565558696,-0.6254288332757484,-0.11611835294046606
|
||||
MFA Seminar Protocols,-2.5011841286829744,-1.8551624971148961,1.7779740599511877,-0.12608063978315304,0.20253553735260252
|
||||
Michi Saagiig Clan Introduction,-3.2776077143516793,-2.643085959696998,1.8510395703043794,1.1508735568589443,0.7954976921680674
|
||||
Military Drill Techniques,-0.1507156074170454,3.890392029422146,1.69044803492405,-0.002687659996335246,0.9171482939286176
|
||||
Military Protocols,-1.6354295321538586,0.7752680142333395,0.6961993106999946,1.2594736189045954,1.124717431203822
|
||||
Milking Apparatus,-3.578600115650285,0.009728253469325588,1.3683192168774527,-0.7740910705981849,-1.5436285152043139
|
||||
Ministerial Conferences,-2.2193437126862956,-2.4766627483991694,0.046089253715957665,-1.0596317958256407,-0.33036264552937233
|
||||
Minute Book Recording Protocol,-3.8110930821613067,-1.9465371132663676,0.3575684879786447,-0.8732291589005436,-1.270834210711905
|
||||
Minute-Taking Protocol,-0.10828232571627679,1.2719734680341226,1.1078009492475427,-2.641013524453559,0.26397479414639446
|
||||
Minutes of Council of Ministers,-0.048111436075105776,0.6507041980316096,-2.5920537608061722,-1.7847810801342527,-1.8362234873910743
|
||||
Model 500's Detroit Techno Identity,2.384587374075816,-0.23164611728587126,1.180623404509056,0.18610089934349724,-0.34885088733187647
|
||||
Mundaneum Protocol,3.530519057674668,-0.32651736233542694,-0.267418552370302,0.41968749470676875,0.40270056870950505
|
||||
Music Genre Protocols,2.8250268406076597,-0.6094596110722127,1.6225712933952412,-1.8867130771293268,0.059447935810668644
|
||||
Mutual Aid Swarm Protocol,3.4329015880158615,-0.9794748586129589,1.420263133309451,0.9348393042683107,-0.7725326333147677
|
||||
Mutual Exchange Practices,-2.105905436054666,-2.9089879640473377,0.8857168136481995,1.6949761625151143,0.14829610626417875
|
||||
Myal Protocols,0.42436393117880905,-0.30644064825474265,0.6721868559988802,0.25206656366693375,-1.0074764765370918
|
||||
NAGPRA,2.4616111347049303,-0.43851623998372224,0.746028297768265,-1.9584121402529435,-1.3157310133449285
|
||||
Naming Protocols (Land Acknowledgements & Introductions),-1.2765079059538318,-1.6540615460161718,-0.8147183179946178,-1.467502675350881,0.6515372571725769
|
||||
Narrative Blogging Protocols,1.2184127902397706,-0.9096426562816702,1.904933562549055,1.6535564182939078,0.4768434803404555
|
||||
Navigational Protocols,3.1992351357790407,0.8662469251605881,-1.4595052313270445,1.1064817218177814,-0.6763674764552925
|
||||
Neighborhood Food Distribution Festival Protocol,-1.4961078991834686,3.333403578198694,-1.4316091077791018,0.6533644101190887,1.195323399179605
|
||||
Network Nations Protocols,1.1729864444559917,0.7224885234280762,0.6815450339277765,0.9963744081133447,-0.17221302929946664
|
||||
Network State Founder Protocols,1.6208339833836451,-2.246083165071579,2.235796896064094,0.26213239747736844,-0.42635952153704526
|
||||
New York Garment Worker Strike Protocols,1.7920257922230038,1.0903917564281707,-1.6710012289973257,-1.4915422346480598,0.33317787741434735
|
||||
Nishnaabeg Storytelling Traditions,-1.343637931785629,-0.15066151018819482,0.7698865387072329,-0.6823554926712155,2.735638812845091
|
||||
NLS Protocol,-3.495620650188152,1.3835053658265144,1.3567264758558795,-0.9194302827035922,-1.2933123564543578
|
||||
Noon-day Gun Protocol,-3.5371584900369304,-1.48799207891114,-0.23363835649295425,0.9523107964384535,-0.2979712942418991
|
||||
NSU Trial Protocol,3.096214116013796,1.360057245962669,0.18982151596402222,0.463741677928403,-0.30460889271970404
|
||||
Nuclear Protocols,-3.600685824112578,0.8740939697597581,1.53669751562235,0.34109493789706186,-0.8464628019101418
|
||||
Oblique Messaging/Editing (Content Circulation Protocol),-1.4514715645599858,-2.989565316042837,-0.2013925653956778,-1.7238094545625895,-2.0331871231661496
|
||||
Observational Documentation Protocol (Secret Services),3.283316979438895,0.5719850234375478,0.742198842213119,0.6981516576566138,0.33338260831387495
|
||||
Observational Science Protocols,2.8741153918137723,-1.6282550301777756,0.12206355578831962,0.03641013331960088,0.0770751968948635
|
||||
Occupying Vacancy Protocol,0.6404059140318457,2.4706327023623573,0.08888301933119037,1.184177017657583,-0.27279972907327604
|
||||
Offering Alternative Respect Tokens,-2.819118866912471,-2.7400852046374418,-0.7180190595620127,-2.748027273762646,-0.6343606558876961
|
||||
Office Request Protocol,-0.325267873104397,-0.4408778459639077,-2.974643509105426,-0.25619932576378873,-0.10735921616028768
|
||||
Office Space Survey Protocol,3.016059994648503,0.27254331442213764,-1.389340844404578,0.7550452787988857,0.10698595056257634
|
||||
OODA Loop,2.5712395117033875,-1.648133809502203,-2.100083922521219,1.292729400758529,-0.547694711762598
|
||||
Open Source Estrogen,1.0158098628366998,-0.9995606757332968,-0.5949759073303663,1.697623242130268,-0.2728229592647647
|
||||
Open Source Protocols,2.5235119182813537,1.1978910197009176,0.6138680596561188,0.45644759561523496,-0.09750544010467899
|
||||
Oral Communication Preferences,1.827832791141636,2.382172619057423,-1.160375019868912,-1.3848521958691646,-0.314528679990263
|
||||
Pagamento (Payback),1.1438815215614264,0.05132790044441378,-2.184987897154056,1.633847679990666,-0.1325377297225511
|
||||
Pale Fire Protocol,3.8971376383543594,-1.2821986019726,1.3159012688023024,0.4365153819670353,0.19483906749798047
|
||||
Paris Agreement,-1.7787037474677996,-1.7324878838699291,1.3399374302037492,0.48365450070986205,0.09592878273733829
|
||||
Participatory Guarantee Systems (PGS),-1.056621433910608,-0.6554357729450936,0.7391713082173521,-0.8403485419068957,-0.47171773283463525
|
||||
Patriotic Protocols,1.0068586094599499,0.09229638866616614,-0.5012580437077153,1.6656552073066238,-0.5754789243312803
|
||||
Pedestrian Traffic Rules Protocol,-2.0070556586019626,-0.7055904347278592,-0.6615811381110395,1.0587653872489506,-0.18171998885105486
|
||||
Performance of Transparency,-3.4169159646855616,0.9542810106152905,1.53701717781149,1.7585589415174236,0.7072295146190478
|
||||
Petition Submission and Review,-1.519009959128294,1.169156293394279,0.2595731458951564,0.1228159876824511,0.1342647388732912
|
||||
Petitioning for Privileges,-2.6318794145846853,-2.674155343628151,-1.097072198158513,-2.7860687330017333,-0.5234047549758665
|
||||
Philanthropic Foundation Advocacy Protocol,-1.2949124486042642,4.077538776888384,-1.6340069772333632,-1.2898323287424363,1.2368123497741894
|
||||
Photographic Standardization,4.184571119962702,-0.9578675166412266,1.5266991348050378,0.15800024612773206,0.4487803757120555
|
||||
Physiognomic Interpretation,-1.868116197528675,2.1677864806354012,-0.3972075309896036,-0.9500784642264274,1.785650155845135
|
||||
Pickup Basketball/Soccer Games,1.7185411278139258,-1.4903346987705193,1.1878017634128322,-0.03833746229461549,-0.6630890481907074
|
||||
Piece Wage System,1.859536892976307,-0.030511605150917036,1.4590882978050743,-0.7483255850076704,0.5969013273806265
|
||||
Pipe Ceremony Protocol,-2.28004945190901,-0.8305965959966372,0.8563323125464641,0.20892067270057252,0.31138880731500795
|
||||
Planting Tree Protocols,-3.267384753193416,2.4619566758524707,0.910071652437812,1.8794045550415597,-0.6569432586621228
|
||||
Police Intervention Protocol,-0.9251131405011767,0.5940655925795052,-0.17893905877440736,1.1326537851996907,-0.18502117641584714
|
||||
Police-led Information-Gathering Network,1.2217716207714362,1.9472013150553416,-1.325354779197484,0.832670108086208,-1.7118085413774742
|
||||
Political Discourse Protocol,0.2269965443936097,0.8201578343381675,-1.5774684196822193,-1.5189161954003139,-2.2244045288536745
|
||||
Political Protocols (Arendt & Schmitt),3.7876192073610144,0.6296967139132845,0.7503688751655724,-0.10847564678678889,1.7401083895020504
|
||||
Political Thriller/Police Movie Protocol,2.874006638067552,0.8640439996404896,-0.5084064015981984,1.762645304708383,1.2144433722369838
|
||||
Pop-up Village Protocols,0.9665551995687497,1.7789546793469306,-0.6373349018172482,-0.856413720833511,0.6375203411356041
|
||||
Prime Meridian Unconference,1.2763356958739946,-0.097303697017187,-1.8028509863994173,-1.3680899693421396,1.5083129473773667
|
||||
Proactive Suggestion Protocol,0.2026323020255294,-1.67998943322871,-2.8367853893760464,-0.7421028725191525,-0.25451882966308736
|
||||
Profile Photo Change (Symbolic Participation Protocol),-0.8717681371773912,1.330201694365388,-2.0733277820124645,-3.472688068688027,2.105248120917022
|
||||
Proof of Stake Consensus,-1.1696457211763276,0.5518074558320561,-1.169531492301906,-1.4586487979414677,-2.191422046546906
|
||||
Proof of Work Consensus,2.8520831758716922,0.014859082983505172,0.3022954483306986,1.5734500372309688,-0.5396693392006631
|
||||
Protocol Analysis (Ericsson & Simon),-2.609891417960509,-0.15317488357534212,-0.1820866810750682,-0.028461535119054634,-0.9088035433021822
|
||||
Protocol Departure in Creative Writing,-0.32150235451361764,2.3715932034189917,-1.0220058763565543,1.9331115034841453,1.6925738235714445
|
||||
Protocol for Academic Science,4.350662437229353,0.4547214861729764,-0.19603075681469045,-0.22951924483584976,1.198888391540387
|
||||
Protocol for COVID Masking,1.8931745372921642,1.8279066032569982,-1.7883620183375049,-0.002066046548692884,-0.7810098556067471
|
||||
Protocol for Dance Collaboration,-2.772927582998693,2.6056074821623154,-0.06656616745791151,-1.2199261095543061,-2.654246619770484
|
||||
Protocol for Evaluating Clock Protocols,-0.7159407923957818,-3.0669054301869605,-0.3323719972958836,-0.705168889387325,1.3209372543265607
|
||||
Protocol for Good Death,-1.5539557642214732,2.928700641655558,0.17202104147865807,0.7329888543788076,-2.1688381268250883
|
||||
Handwashing,1.7513490656110096,-0.6575588641034804,1.0317765892837947,0.673218388938506,-0.3393759601263265
|
||||
Medical System (US),-1.5214293631393176,2.7055813767004664,-1.2138287520449957,-2.044837625499485,-2.002257513327075
|
||||
Protocol of Kinship,3.0382152955328365,0.05992769812815861,0.9152369256468442,0.22296266481951799,-1.439409060263206
|
||||
Protocol of Operational Closure,-3.0554272411651624,-0.8204872644536615,-2.168526485902778,-0.108706335645537,0.3002002128140572
|
||||
Protocol of Reclamation,-2.1573975531005827,3.1929187565991977,-0.15677057584783646,1.0039164003848475,1.0905899153517546
|
||||
Time Zones,0.8125111670789866,-1.3529241281853848,2.8688525501447177,0.47738370226586335,-0.49242089409487755
|
||||
Protocol of Targeted Killing,3.8424734767307336,0.9008584806139099,-0.6878780820675139,0.692358196334827,0.795127854224611
|
||||
,1.4915798440673986,-1.237978037494243,0.09159288241750825,0.5487718925618056,1.0122820931236038
|
||||
Protocol of Tjukurpa (Dreamtime Instructions),-1.4482774576989317,0.18524511000719138,-0.2989230486523255,1.8274331124754957,0.4572694176911383
|
||||
Public Amateurism,1.939937001503203,0.05211114625344366,-1.1773077655216713,0.6843378284291816,-0.822876512303194
|
||||
Public Enemy’s Political Activism,1.1681535692781642,-0.022530108539500167,-0.8323257846547099,-0.057515252948885355,-0.8691602406995862
|
||||
Public Health Behavioral Guidelines,2.9630938640685414,-1.4507396979184752,2.000459113259696,-1.1694501566289923,-0.46996221034655733
|
||||
Publishing Protocols,-2.2293797876176775,0.48476546324103686,-0.503229367551734,-1.2519984319676845,-1.2950214161586207
|
||||
Quadratic Voting,2.8399722983512805,-0.4572130863827692,1.1621215605512132,0.8067504007373977,0.23184854054697526
|
||||
Quilting Practices,3.1861431362393864,1.0543605075462186,-0.40738295666671326,0.8312979329929825,1.2157252163296772
|
||||
QWERTY Keyboard Protocol,0.084261888278377,3.4463038872450684,-1.1860650590269992,0.9558446872164507,0.13615679627222338
|
||||
,3.0347761183799435,0.1239757434156875,-0.9221627743515058,-0.35162191554459676,0.6788904368707818
|
||||
Relationship-Building in Deaf Community,1.2411499171176712,0.9146668111351978,-1.6530514399173764,0.6892935522691869,-1.2079730677107674
|
||||
Participatory Studies (Seed Oils),-0.9693577924653906,0.16330281707757152,-0.8486967866959617,1.2435455619563147,-2.3348688691519968
|
||||
ResearchHub Model,0.22106709751869438,1.6491883180643057,-0.6001520713322666,-1.2264689447320818,1.3947674681144857
|
||||
LK-99 Replication Craze,-4.040698630151555,-1.706129983557416,0.43014759649391343,1.1658745318249004,0.062095800973441084
|
||||
Clinical Trial Design,1.7868069445679555,-0.7140413844280723,1.3673904977295384,-1.8879506860229092,-1.7904671345216332
|
||||
Peer Review,-0.8973528699142579,-0.13343601727260476,-1.346457876476183,-0.29731145570042544,-1.426713355514848
|
||||
Dating Apps,2.056597948724266,-1.4291002253413014,-1.8771002834489927,1.0422488110678867,-0.47800754103670245
|
||||
Reporting Conventions for Election Integrity,-0.6234918929547401,-1.7383248992450984,-0.34312054791901686,0.29615964698215996,-0.500726786609206
|
||||
Reporting of Financial Status,2.9351011284943267,-0.044090002277328476,-0.845592561438182,0.8634240249879716,0.12188564057644
|
||||
Reykjavik Protocol,1.8145900661215324,-0.8979312548734416,-0.4476465709804528,-0.835238952951731,0.2974790020802402
|
||||
RFC Process,1.1166507439075806,2.0417742884840515,-1.2012061430203678,-0.652352792443504,-1.1231765548189296
|
||||
Rhetorical Canons,-2.0604181918428837,1.4625903446466901,-1.382736920930067,0.41666138430166266,0.17024238377819823
|
||||
Rhizomatic Urban Farm Expansion Protocol,-5.821081821128973,1.466433432472155,2.222418984989035,-1.0517858470026606,0.1600680469697889
|
||||
Rhymes and Syllabic Rhythm,-4.2545519697283405,2.77664440420726,0.965845406225637,1.4180408086329592,0.9942781575910103
|
||||
Robert Musil’s Protocol of Critical Assessment,-0.8989914637918378,-3.0137950272438476,-1.1771739074805319,0.04186006692871311,0.12522213792350473
|
||||
Roman Senate Advisory Decree,-4.122373343309315,-2.4733205439582604,2.5715233868542966,1.6123503058742839,1.494006851417247
|
||||
Royal Access Protocol,-1.8358547255031448,-2.107625846289924,2.025308808563727,0.883037038954481,0.2788381673764962
|
||||
Royal Protocols,2.888008695253704,0.4983860371688138,0.5393384813368108,1.359815600405958,-0.45521635947713235
|
||||
Rust Programming Language Principles,3.5947957332217673,2.265024889235318,1.5217714044530533,-0.0016511053914708973,1.0026983262771474
|
||||
Sacrament of Eucharist,-1.4420144551923428,-2.72967777382465,1.6922667320994218,1.3552105562510852,1.174154814550205
|
||||
Sacrament of Reconciliation,0.7809161294189302,-2.03364250635594,-0.12258647188018877,-0.4246653955292058,-0.6033368922459657
|
||||
Plantationocence,-3.898371471786152,-1.2111658030869064,0.09521239002767648,0.5623542643100369,1.4336877663271281
|
||||
Sangoma Healing Practices,0.3633914129417534,0.48095880661883506,-1.9939338849867951,-0.00812494340349893,-0.8163963823281615
|
||||
Scent-Free Attendance,0.4714654799938307,-2.163974451959445,-2.261046464762999,-0.888537736380466,0.7183630752197542
|
||||
Script Provision Protocol,0.4756536183323011,0.23853993803313234,-2.488102222903179,-0.37170130703799753,1.2304176358103485
|
||||
Seating Arrangements Protocol,-2.0721722413546817,2.4775542767644825,1.3239562579006368,-0.5729970874029261,-0.05319991388008796
|
||||
Secular Lunar Calendar,3.5841575254358236,-1.0584575619040206,1.219730772960398,0.7935556937636401,0.04552914728643107
|
||||
Sellers Screw Thread Protocol,1.5262403897846852,-1.7125543864084425,1.669878714736051,-0.4366618177206189,0.474320193720791
|
||||
Semantic Web Protocol,-1.8435047639692919,-3.0821404851369976,-2.948031242738426,-1.077676816870842,0.8150979008775139
|
||||
Senatus Consultum,-1.5429996162428428,-1.2828979974739627,0.048446758667558286,-1.5125182550090261,-1.1046999217168678
|
||||
Seven Ancestor Teachings,0.36774655328492806,-1.4542910641753048,1.2678154388534029,2.219607331329605,-0.29507950039965425
|
||||
Shadbush Tree Planting,3.280762592121561,0.378296858213572,0.20080896936701537,0.9610930053337542,0.16258772474661812
|
||||
Shipping Container Protocol,-2.3220893628531543,-1.0935386213642038,-0.3783233759727046,-2.8720591403000766,-1.157105087765756
|
||||
Shorthand Transcription,-0.18807229004088916,2.879077922872478,0.4961675007347052,0.6951260040027165,-0.7304601541753232
|
||||
Sign Language Interpretation Protocol,2.255976418861047,-0.22367391737942507,-1.3260110749051817,1.035675279379265,-0.28218671285443075
|
||||
SILENT/LISTEN Protocol,-1.5683458556741354,2.660394820040897,1.7979289613473244,0.06614364162378342,1.0389486036653097
|
||||
Silhouette Creation,0.2332568343874453,0.3412035395903202,1.8794097122222224,-0.7732881620954979,1.855729780431791
|
||||
Silicon Valley Exit,-1.6515714730078461,1.0293131658943462,0.6802884256082123,1.144567783535311,0.5536080994896118
|
||||
Silicon Valley Model,1.7426328764803931,-0.8045664403786564,-1.1880388763371215,1.666395607461484,-0.5040516653811518
|
||||
Simplan Credit Card System,2.0255339342060625,0.11043902022443855,-0.6704580146311732,0.2875684269884755,0.8727725273672103
|
||||
Sin Protocol (Ignatian),1.9710574032692134,-0.5980609997503376,1.9807833841057243,0.8950981681162754,-0.3918418129044602
|
||||
Six-Day Work Week,-2.2282662588948905,0.8328033191621078,-0.1555210794385127,0.6589830583825177,0.7829721604683172
|
||||
Social Entrepreneurship,-2.4001991255279034,3.1618732229484685,0.14520710236977352,0.6823622319574029,2.4277700645255207
|
||||
Socratic Method,-0.5239818692184953,-1.5092507862437785,-0.8257342068090769,0.051412930027475295,0.4071235458413334
|
||||
Songlines,-2.0137463611888466,1.5882478887570564,-1.05195338424551,-3.00978013912245,-0.40206028771748425
|
||||
Sonic Engineering Protocols,-0.02519918289137633,1.1511609692691924,-1.4153093327005641,-0.17968712320860344,-0.4706847749287584
|
||||
Spam/Dilution Tactics (Content Disruption Protocol),-0.9629416925073042,-2.0342216862703753,-0.9757482918191257,2.07693211987659,-0.06049457990853489
|
||||
Staking Protocols,-4.8695821291628665,0.4561658079526341,1.9312824339988857,-0.507459829125406,0.13686879108606617
|
||||
,-5.2465800590932865,1.0387229497098285,1.6001747719833324,1.0353186360454016,0.5982435879702003
|
||||
Stenography Protocols,2.1687451323458453,2.1225422546453254,-0.4580388491114986,0.2633313416710694,-0.6119470574706352
|
||||
Stereographic Exchange,0.5833456832004323,0.8799564545475691,-1.023834994345594,-0.5121598343641083,2.17286592481724
|
||||
Stock Exchange Trading Halt Protocol,-0.9561685820456687,0.3706636178245583,0.6836868584187864,-0.11841961447032028,-1.1393718846390835
|
||||
Submission of Exclusive Privileges,0.7678139632133593,-2.2785439435947388,2.1350229610090166,-1.4648622855255025,-1.5964139321353787
|
||||
Succession Protocols,3.8998321335259916,0.786708022444484,-0.039101861393026474,1.080555699035142,-0.12326806254487817
|
||||
Sustos Retrieval,-0.4207021236336606,-2.2560680022748247,-3.0200520865671914,-0.5536715475051769,1.0568916776954875
|
||||
Swiping,3.2371551272672514,-0.3493178098476123,-0.2857262118396358,1.1887663712248422,0.027464468408929285
|
||||
Systematic Experimental Self-Observation,-0.5167932493857107,2.609668930732604,-0.9670706762085371,0.4562134529798401,-0.2669844190348246
|
||||
SZ Journalists' Note-Taking Protocol,-0.0750991798215445,0.09786618658588073,-0.13951011782734327,1.241519935215531,0.6306676527870665
|
||||
Tarot Card Interpretation,-3.3272740744488147,0.4670765251612531,-0.9227280039510668,-0.3319181482406175,-2.747718720077395
|
||||
TCP/IP,-0.8779182782206066,-0.33173308128897006,-0.27521924725924307,-0.5572986764048576,-1.8965517853653253
|
||||
Teaching Protocol (Paulo Freire),-1.9164557294724007,2.8389625510533496,-1.119181599457883,0.022244997094037492,0.01000636511558697
|
||||
Technical-Political Distinction Protocol,-1.3746272395742607,0.7021796296911453,1.0364494237063977,-0.6056282306590299,1.3697619684218096
|
||||
Territory Acknowledgement,-2.5441735261249567,-2.109433101313261,-1.0749891105089973,1.4512747370943453,0.5038078316027579
|
||||
Theocracies,1.1770547790919457,0.1618254165509083,-0.030811672993249835,-1.2155658469555097,-0.31087132984603155
|
||||
Think Aloud Protocol,0.48165428788885456,-1.2548333993582923,2.803439642860081,0.3803147976231226,-0.9010705066689157
|
||||
Threshold Forgetting Protocols,2.5851528383207483,-0.4100501139075254,2.065274611203119,-1.3576812509712404,0.7249767289705328
|
||||
Time Distribution via Gun Time,-3.8544153828232646,4.008797848694937,-0.45140048975310465,-0.5603923429285744,-1.5168122963505781
|
||||
Time Zone Standardization,1.2073462995174815,-2.2214651130580756,1.5969891685335127,1.182999327124214,0.5053883755977768
|
||||
Timekeeping for Activities (Yin/Yang Hours),-3.3585004068214483,-3.4888859715990614,-0.4987687388022869,0.24728469829862917,0.7068147171868573
|
||||
Tjukurpa (Dreaming Stories),0.47444272345862526,-0.04745398294025456,0.4385354929096202,-0.6806949192083986,-1.6281883670763193
|
||||
Tobacco Offering Protocol,-0.6184793401545451,-2.0376976689104636,2.687947483451619,1.548268133498002,0.7979948701053883
|
||||
Totalitarian Hospitalization Protocol,-1.6842239470105547,-1.9914833327914498,1.5616651157541521,0.9906872422722879,-0.21215898561594243
|
||||
Toyota Killswitch Protocol,-0.41138921767794395,0.17346083094601514,-0.7941797877450497,2.7397482366736248,-0.27179438305465015
|
||||
Traffic Signals,-4.16076601592886,1.5802606276304931,1.7819124596987947,1.2167571104693693,0.9829427420606333
|
||||
Translation Correction Protocol,3.766304865981293,-0.9689741366690234,0.12472032028612812,0.2716017568849181,0.26039886112622285
|
||||
Tribal Council Research Permit,-0.6624144949625588,-0.8586420214092975,2.7388174255421562,-0.4588421352743076,1.2433517628714559
|
||||
Tribal Protocols of the Cultural Resources Program,-0.8307000371161992,-3.114188509428054,-3.4282575537610467,-0.7456621069982226,1.3186696809632852
|
||||
Truth and Reparations Commission Protocols,0.43385328097916076,1.044744812742683,-2.0162194213354896,1.9968367077547513,-0.010941611317732986
|
||||
TSA Airport Security,-0.6033090607249881,-0.19731681900777726,-0.2475891138447439,1.3144432063455844,0.5975290034801529
|
||||
Ultimate Frisbee Gameplay,0.3672413070079491,0.161802902362964,-0.9060359816781217,1.7323686372959568,0.8464096209580106
|
||||
Underground Resistance's Bandana Protocol,2.2725955613085898,0.6293838762654281,-0.3451935153971931,-0.6318921771679725,0.7164326149150998
|
||||
Uniform Resource Locator (URL) Protocol,-0.8526205247605829,-1.0184014670668282,-2.2676687290849453,0.6866873155557454,0.8790935360637282
|
||||
Uninsurable Protocol,3.850298997313507,0.5952797307346559,0.7569309103982578,-0.28391635582603625,-0.29724785189734537
|
||||
Unionized Worker Right to Strike,-1.7262418416927001,-0.2791302668822531,1.1509741022207496,-2.166362060508721,-3.0916307076060257
|
||||
Urban Rewilding Protocol,-1.2275969837265077,1.8890774737933167,-0.8408755138949346,1.315407019121149,-0.3785967598285968
|
||||
Urine-Hormone-Extraction-Action,-1.6773310612800307,-2.7360578256309167,-1.28583864436799,0.7679991079445322,-1.134182021981168
|
||||
USB-C Connector Protocol,2.8071633509797826,-0.5473961568184349,0.7329990166207966,-0.8071132309732709,0.7099326571263525
|
||||
Vibe Culture,3.3844763738729964,-1.3988668279072383,1.1657036501907858,0.7881203445883427,-0.28363022578584335
|
||||
Victorian Room Design (Enclosure),2.096413336962362,-0.8269282932975107,-0.8054080995434574,-0.26012599491585303,0.22638820667406806
|
||||
Video Game Tournament Disqualification Protocol,1.1373750835451848,-0.8999267707441343,3.3716068818472014,-1.744328799620424,-2.217629842862351
|
||||
Vienna Convention (Diplomatic Law),0.641764194577979,1.1694557892976762,-1.4477604770899426,2.3354915331878954,-0.17346243810948214
|
||||
Vigil for Murdered Environmentalists,-3.218397651328157,2.69142221386534,-1.1455790957896967,-0.3072190855869942,-1.885776692398119
|
||||
Vogue'ology,-2.4812905759450437,0.44463680460244526,0.44084159245369353,0.06661009422631575,-1.0916142213529867
|
||||
VPN Usage (Circumvention Protocol),-0.8903392345637828,-3.0231122526160035,-1.2190153531863475,-0.7488113738181127,0.24549657848787004
|
||||
Wampum Belt Bead Code,-1.6879898048185753,2.2936652722096293,0.2907621983163808,1.9046834546553004,0.6355666137330687
|
||||
Web Protocols,2.6559727288687576,3.2736853965442734,-0.27622876466763224,-0.02971678733614406,-0.21201373657732026
|
||||
Westphalian System,-2.2228123316541697,2.5163456192007154,-0.7364733776227431,0.9235193066605567,0.1200756534950404
|
||||
White Cube Presentation Protocol,-1.953669959266188,0.8126724300196014,0.9326312603317046,-0.45256443552122194,-1.413505430055875
|
||||
Whitworth Screw Thread Protocol,0.9612869471902936,1.4234529404746374,-1.4536503451057083,-0.5588507299716623,0.17422711150090237
|
||||
Windrush Generation Protocols,0.3647315603077989,4.167938189141586,2.63210667341837,0.19320834864466568,1.6539699069599099
|
||||
Witness Interaction Protocol,1.7469746239649084,1.2420424559913212,-0.3256759314146752,-0.10074016268196001,1.4850349056381054
|
||||
|
@@ -0,0 +1,24 @@
|
||||
PC1,PC2,PC3,PC4,PC5
|
||||
0.13368931900628342,0.22012660233474993,0.20870305829341537,-0.14218484367881312,-0.1853881848013562
|
||||
0.22864513482774051,0.2769215417295855,0.11462654832455177,0.08530591113185151,-0.13687273017978174
|
||||
0.3573742971015304,-0.01325077520614061,0.1634176037416074,-0.09215574045468133,0.03994194133669591
|
||||
0.14755564411066238,-0.06787964364527355,-0.13185397320889064,0.330087556498148,0.5436354043827633
|
||||
0.3328042742327297,0.023303468828346864,-0.10645882750076861,0.2523166089919988,-0.00890762044044212
|
||||
0.061298847141498435,0.12285818035446822,0.3905953166102003,0.3551053469139342,-0.24012431347198107
|
||||
-0.020153828139380454,0.056221722713996995,0.5360172326914133,0.02020447423211645,0.1365522869817325
|
||||
0.09760701627843006,0.2221632216839117,0.0835370114056343,-0.1689022598159574,0.4874987760684709
|
||||
0.17669021741129198,0.042606329381307144,0.3077200015284484,-0.2875840914843455,-0.022440837052236012
|
||||
-0.24795554974199466,0.10070278711145214,0.08527631399081431,0.2711491733863993,0.2697378248335243
|
||||
-0.29425335758846444,0.05768427420439045,-0.06119546354326357,0.2936033799117574,-0.032986275192055894
|
||||
0.15131050124400297,-0.12338587586195095,0.3034278362122704,-0.14291316275174212,0.3436583635151663
|
||||
0.2788263548078675,0.05908493964699283,-0.20728282414542756,-0.12888901821986595,-0.18767410123236208
|
||||
0.31400545438340655,-0.0341654801945521,-0.13785346061276105,-0.028611190105021292,-0.05287169908176774
|
||||
0.12317649059226084,0.2946527497671497,-0.2758893139053943,-0.07284207607959532,0.2765228288048569
|
||||
0.1533743509467612,-0.1491580179013341,-0.15593503618462443,-0.0739776115439133,-0.10729381814868742
|
||||
-0.00771838245815169,0.4274854737355753,-0.1364698710616826,-0.039750216089280324,-0.005614174549604761
|
||||
0.09973815527776049,0.3830448320480707,-0.020312644135244147,0.22980707686488694,-0.0767955759729394
|
||||
0.18471636595300386,-0.18152744684195282,0.2026557322763808,0.37036531591047317,-0.05705753659854782
|
||||
0.28876132354958994,0.20776123357485932,-0.08797150529237295,0.2406131013868664,-0.024647367719192487
|
||||
0.27717356326552683,-0.25101721707613045,-0.11056858445979541,0.11649109009877827,0.049471695711740704
|
||||
0.1841622344539028,-0.3619715848198735,0.016176333490552586,-0.07076423310516665,0.041659767505896034
|
||||
0.020917781857504272,-0.24097549500279125,-0.02263820276201528,0.2779545534895802,-0.05745830292829611
|
||||
|
@@ -0,0 +1,21 @@
|
||||
Dimension1,Dimension2,Correlation
|
||||
Design_static_vs_malleable,Experience_predictable_vs_emergent,0.6127379607088606
|
||||
Design_elite_vs_vernacular,Entanglement_self-enforcing_vs_enforced,-0.5754440419988962
|
||||
Entanglement_self-enforcing_vs_enforced,Entanglement_flocking_vs_swarming,-0.5577463502180012
|
||||
Design_elite_vs_vernacular,Entanglement_flocking_vs_swarming,0.5374889670337175
|
||||
Design_elite_vs_vernacular,Design_static_vs_malleable,0.5302136523382137
|
||||
Experience_exclusion_vs_inclusion,Experience_Kafka_vs_Whitehead,0.5220125785098495
|
||||
Design_static_vs_malleable,Entanglement_flocking_vs_swarming,0.5013309324085095
|
||||
Design_static_vs_malleable,Experience_exclusion_vs_inclusion,0.4953942543701929
|
||||
Design_elite_vs_vernacular,Experience_exclusion_vs_inclusion,0.46911887148158404
|
||||
Entanglement_sovereign_vs_subsidiary,Entanglement_obligatory_vs_voluntary,-0.4650178746548702
|
||||
Design_elite_vs_vernacular,Entanglement_sovereign_vs_subsidiary,-0.45793563160495454
|
||||
Entanglement_flocking_vs_swarming,Experience_predictable_vs_emergent,0.45316997920769914
|
||||
Design_static_vs_malleable,Entanglement_obligatory_vs_voluntary,0.44252606268853556
|
||||
Design_elite_vs_vernacular,Experience_predictable_vs_emergent,0.4403643400730937
|
||||
Entanglement_sovereign_vs_subsidiary,Entanglement_flocking_vs_swarming,-0.43233289769474625
|
||||
Experience_crystallized_vs_contested,Experience_predictable_vs_emergent,0.4281407750829956
|
||||
Design_precise_vs_interpretive,Design_static_vs_malleable,0.42789985451283463
|
||||
Experience_trust-evading_vs_trust-inducing,Experience_exclusion_vs_inclusion,0.42499555221936935
|
||||
Entanglement_flocking_vs_swarming,Experience_exclusion_vs_inclusion,0.42373114820022517
|
||||
Experience_sufficient_vs_insufficient,Experience_Kafka_vs_Whitehead,-0.4229615464914092
|
||||
|
@@ -0,0 +1,407 @@
|
||||
Descriptor,TSNE1,TSNE2
|
||||
Abdication Protocol,9.278665,1.8499552
|
||||
Abolitionist Practice Protocol,11.494394,-3.5343745
|
||||
Access Check-in,17.737728,-10.926216
|
||||
Access Intimacy Protocol,19.072042,-4.650054
|
||||
Access-Centered Practices,-0.10789633,-7.344217
|
||||
ActivityPub Protocol,-1.616826,-2.2359445
|
||||
African Futurist Escape,16.210228,-2.6222534
|
||||
Afrofuturism,14.660034,-4.3509912
|
||||
Airport Security Procedures,-18.237019,-3.475007
|
||||
Alusi Trance (African Futurism),22.694359,-4.668751
|
||||
Ancestral Spirit Possession,22.440205,-3.65713
|
||||
Anishinaabeg Knowledge Sharing Protocols,11.839015,-13.281312
|
||||
Anishinaabeg Visiting Protocols,11.457129,-14.790821
|
||||
Annual Feasts,5.201726,-11.13942
|
||||
Arendt's Reporting Protocol,-12.767144,5.397734
|
||||
ARPANET Protocols,1.1637192,13.602396
|
||||
Arranged Marriage,-17.541584,17.1332
|
||||
Art Historical/Curatorial Validation Protocol,-6.166397,17.617664
|
||||
Artisanal Marketing Protocol,-6.0227737,14.060894
|
||||
Artistic Collaboration,19.036049,-9.622168
|
||||
ASL Provision Protocol,2.014481,-7.7284937
|
||||
Audience Recording Protocol,-19.052128,2.7076242
|
||||
Authority Assertions via Linguistic Precision,-13.777159,8.076913
|
||||
Automobile Driver Warning Protocol,-1.11858,-11.343192
|
||||
Autonomous Worlds (0xPARC framework),12.30941,-0.6772043
|
||||
Bamboo Sales (Village Artisan Example),14.085377,-14.396386
|
||||
BankAmericard Distribution Protocol,-7.8006926,8.501099
|
||||
Bartleby Protocol,17.429117,-4.265334
|
||||
Basel Program,-4.3294835,11.410932
|
||||
Bell Pit Spacing,16.34984,11.352136
|
||||
Benefit Application Procedures,-19.606455,-2.5822365
|
||||
Bertillonage,-19.207527,9.261493
|
||||
Bilderatlas Mnemosyne (Warburg’s Method),7.4282103,4.035399
|
||||
Birth Registration (City Hall),-18.276888,1.9950613
|
||||
Bitcoin Protocol,-2.7513509,-0.46010548
|
||||
Black Feminist Protocols,14.110924,-9.221785
|
||||
Black Poethics,8.573828,1.3222878
|
||||
Black Time Belt,15.338637,-1.6469533
|
||||
Blueprint Protocol,-8.452251,21.300467
|
||||
Borgesian Aleph Construction,-15.368233,19.608002
|
||||
Bristlemouth Protocol,12.770818,2.5205424
|
||||
Buddhist Monastery Protocols,10.503135,-9.376781
|
||||
Building Codes,-17.238367,-2.3771615
|
||||
German Bureaucratic Prose,-21.690294,1.8538798
|
||||
Calendar Invite and Alarm System,-7.655963,-5.491889
|
||||
Canary Use for Gas Detection,15.524117,11.212735
|
||||
Canonical Bridge Protocols,3.7052932,4.747695
|
||||
Capital Markets Opening and Closing Times Protocol,-17.18467,-1.0525843
|
||||
Carriage Dispute Protocol,-16.612461,19.50988
|
||||
CART (Communication Access Realtime Translation) Provision Protocol (Community Arts Org),20.031345,-13.125212
|
||||
Chancery Ceremonies,-20.794748,2.4443674
|
||||
Child Discipline (Spanking/Grounding),-3.0297213,19.604769
|
||||
Childbirth Protocols (Local Knowledge),14.877241,-7.759473
|
||||
Choose Your Own Adventure Protocol,2.0444973,-13.617789
|
||||
Chronicles of Suffering (Thirty Years' War),21.102928,3.5317652
|
||||
Chronometer Usage Protocol,-11.5796385,1.9473102
|
||||
Circular Movement Protocol,11.616002,-14.224532
|
||||
City-States,-9.868756,5.1248403
|
||||
Clan Identification,7.3254075,-17.68381
|
||||
Climate Treaties,2.7250426,2.0692744
|
||||
Cloud Data Capturing,-7.818642,1.6446586
|
||||
Coal Dust Mitigation,-9.69797,-7.0549903
|
||||
Code of Criminal Procedure Protocol,-20.779337,-2.440679
|
||||
College Enrollment,-13.475821,-0.84320295
|
||||
Column Chromatography,17.63165,7.100463
|
||||
Command and Control,-9.503332,-2.9676921
|
||||
Commemorative Coin Protocol,-8.396352,8.884245
|
||||
Communal Altar Creation,18.300798,-12.172517
|
||||
Communication Protocols (Cold War),-22.49078,3.2755094
|
||||
Community Land Acknowledgement Protocol (Gallery),11.256548,15.356047
|
||||
Community Lore Protocols,10.079337,-11.324593
|
||||
Compost-Based Ritual Protocols,17.007204,-12.029777
|
||||
Conciliatory Chairman Intervention Protocol,-4.3376365,-4.7333746
|
||||
Content Moderation Standards,1.7410184,2.522689
|
||||
Cooking Practices,12.296536,-12.266546
|
||||
Coordinated Universal Time (UTC),-12.767863,-6.3519278
|
||||
Coordinatizing Scientific Observation,5.053673,4.9070024
|
||||
Corporate Contracts,-15.775065,-2.0319118
|
||||
Corridor Design (Government Buildings),-10.192521,-8.816561
|
||||
Council of Ministers Meetings,-17.924433,-9.008712
|
||||
Cover Letter (Early Credit Agreements),19.378132,-1.6293156
|
||||
COVID-19 Mask Mandate Protocols,-5.0604525,6.8067017
|
||||
COVID-19 Pandemic Protocols,-4.55278,7.0681148
|
||||
COVID-19 Regulations,-5.0625677,6.334448
|
||||
Cowrie Bead Currency,4.887493,-12.24587
|
||||
Crash Protocol,-9.113528,-3.8791223
|
||||
"""Open Publishing",12.572109,0.57027644
|
||||
Criminological Discourse Protocols,-13.398184,12.295382
|
||||
Crisis Communication Protocols (Cold War),-24.340818,3.6290908
|
||||
CRISPR,-14.648643,-9.455824
|
||||
CubeSat Protocol,-14.08873,-9.067947
|
||||
Currency Ledgers,-8.948158,-11.17013
|
||||
Dating Websites (Pre-App),1.3971677,-1.2457758
|
||||
De umbrias ideareum (Bruno’s Memory Seals),14.500075,5.4841
|
||||
Decentralized Autonomous Organization (DAO) Governance Voting Protocol,3.0390134,0.24012226
|
||||
Decision-Making Process in Case of Disagreement,-8.07242,10.849869
|
||||
Decision-Making via Vote,1.6756424,-2.5446117
|
||||
Decision-Making within the Cabinet,-20.311937,1.0092677
|
||||
Deep Fake Generation Protocols,7.398507,5.2960095
|
||||
Deep Listening,13.784657,-2.627998
|
||||
Deliberative Analyses,5.2607074,1.1690711
|
||||
Department Council Protocols,-10.22306,11.700015
|
||||
Detroit Techno Music Performance Protocols,6.6110063,-15.098124
|
||||
Diaries (Experimental Soul Studies),18.219501,2.8076868
|
||||
Diaries (Puritan & Pietist),20.322752,2.4318511
|
||||
Difficulty Bomb (Ethereum),2.6594298,14.615864
|
||||
Dinner Etiquette,4.93675,-10.69266
|
||||
Diplomatic Protocol,-9.686369,-0.26491424
|
||||
Discernment of Spirits,-4.71926,-12.726799
|
||||
Disciplinary Procedure Protocol,-21.30372,-1.2633955
|
||||
Dispute Resolution Through Mediation,-0.16504198,-5.6586895
|
||||
Distributed Cooperatives (DisCOs),9.923995,-1.7085017
|
||||
DIY Hormone Detection,10.407831,-0.56969994
|
||||
DNA Testing Kits,-12.760763,-1.9715596
|
||||
DNS,-14.683712,-3.5732312
|
||||
Doubloon Game Protocol,21.324812,-5.630553
|
||||
Drexciya's Sonic World Building,21.582733,0.69265187
|
||||
Drift Mine Slope Excavation,17.526915,8.771623
|
||||
Dust Suppression Efforts,-8.4769125,-8.188996
|
||||
Early Fatality Reporting,-11.343553,10.502615
|
||||
Ecology Protocols (Local Knowledge),14.511744,-7.0626774
|
||||
Eichmann Trial Protocol,-10.662323,12.100562
|
||||
EIP (Ethereum Improvement Proposal),-6.5574956,-3.9702604
|
||||
Election Reporting Conventions,5.116929,-3.7032218
|
||||
Elevator Button Addressing,2.1576972,-10.848018
|
||||
Email Services,-13.927059,0.4074678
|
||||
Embossing Protocol (BankAmericard),5.761746,16.057867
|
||||
Ennoblement Protocols,-22.6773,4.106361
|
||||
Environmental Racism Protocols,9.629321,-6.9985914
|
||||
Environmental Vigil Protocols,13.569433,-8.6007805
|
||||
Ethereum DAO Withdrawal Protocol,-0.5733493,0.27610782
|
||||
Ethereum Proof of Stake,-4.0310345,-0.45420808
|
||||
Ethereum Proof of Work,3.1635478,13.239017
|
||||
Ethereum Protocol,-3.0166416,-0.9522151
|
||||
Ethnographic Containment,8.475118,-2.266331
|
||||
European Hoff Ceremonial Protocol,-22.350552,0.9203792
|
||||
Evidence-Based Debates,-3.343339,-3.2844949
|
||||
Exit to Community Model,9.358116,-2.7706833
|
||||
Extinction Rebellion Affinity Networks Protocols,10.607476,-5.4542637
|
||||
Face-Restoring Protocol,0.92737025,-16.398924
|
||||
Facebook Protocol,-2.5872855,15.990653
|
||||
Petition Submission,-11.345376,9.796893
|
||||
Flag-Raising/Lowering Protocols,-21.457434,-4.3031106
|
||||
Flint Arrowhead Manufacturing Protocols,15.905185,-5.9310303
|
||||
Flux Divergence,3.3731275,8.128128
|
||||
Food Localization Protocol,13.290721,-7.0768
|
||||
Form-Based Interaction Protocol,-19.807774,-0.1799737
|
||||
Fundamental Cause Investigations,0.3640157,-4.8100047
|
||||
Funeral Rituals,7.7210026,-0.22293009
|
||||
Gas Testing with Candle,16.207796,12.057158
|
||||
Gestural Warning Protocol,21.025188,-3.729884
|
||||
Goffman's Interactional System Protocol,18.312094,-1.8293792
|
||||
Gold Coinage,-21.52764,5.3749137
|
||||
Gold Standard,-12.292303,0.6574228
|
||||
Greenwich Mean Time,-1.7215214,7.352541
|
||||
Grid-Based Urban Planning,-13.028869,-8.089625
|
||||
Gynepunk,13.933959,-5.3259664
|
||||
Halal and Gluten-Free Food Options,-0.5265567,-8.503069
|
||||
Handshake,17.346344,-14.105823
|
||||
Hats Protocol,-3.6852648,-8.7267065
|
||||
High-Frequency Trading Protocol,1.3713766,5.0526953
|
||||
,-7.7449465,13.284648
|
||||
House Addressing (Tax Collection/Conscription),7.7967305,7.3132734
|
||||
House Style,-1.8176928,7.7756977
|
||||
Human Rights,13.419874,14.059673
|
||||
Hundred Gradations Incense Seal Protocol,17.383022,8.819515
|
||||
HyperCard Protocol,5.384549,4.009041
|
||||
Hypertext/Hypermedia Protocol,16.453226,1.9709207
|
||||
I Ching Protocol,-12.24406,16.161549
|
||||
Imperial Family Interactions,-16.200863,11.487492
|
||||
Imperial Grace Awarding,-19.905378,5.308998
|
||||
Imperial Mark Protocol,14.166595,13.601515
|
||||
Incense Clock Protocol,-8.7018175,16.087242
|
||||
Information Campaign (Nationalist Commentators),-7.012381,-9.302263
|
||||
Injection Protocol,-15.85481,0.13203888
|
||||
Insurance Claim Protocol,-6.164848,-3.4228072
|
||||
Intangible Cultural Heritage Department Protocols,3.7496102,2.0194488
|
||||
International Law (as Protocol),-24.763502,-1.1132249
|
||||
International Meridian Conference,-12.429412,-5.145296
|
||||
International Organization for Standardization (ISO),10.692246,-16.2147
|
||||
Introduction Protocol,-21.27535,-4.896416
|
||||
Islamic Dietary Laws,-6.002865,-10.912758
|
||||
Islamic Memorization,-19.166355,-5.8693967
|
||||
Islamic Prayer Rituals,-10.755624,16.947725
|
||||
Job Interview Protocol,10.097662,-14.439935
|
||||
Keeping in Touch (Return Visits),-1.9500269,-1.7688576
|
||||
Kleros Dispute Resolution Protocol,16.288097,12.315619
|
||||
Knotted Cord Alarm Protocol,-8.439373,1.6485382
|
||||
Kraftwerk's Aesthetic Minimalism,-17.801937,20.017904
|
||||
Language Regulation,-7.432177,-6.786462
|
||||
Layer 2 Scaling Solutions,-2.7107432,8.757747
|
||||
League of Nations,-15.683544,1.5213094
|
||||
Legal Protocol (General),16.62044,-0.52171135
|
||||
Lemon Balm Protocol,-20.715645,9.555641
|
||||
,-20.57321,9.54977
|
||||
Lift and Transfer Protocol,5.6817794,-6.230321
|
||||
Lift and Transfer Protocol,10.247391,-17.186596
|
||||
Lingua Franca,15.745036,-10.304886
|
||||
Linux Kernel Production,4.252156,0.8613629
|
||||
Listening Protocols,4.0425105,8.76413
|
||||
Literary Genre Conventions (General),-16.08805,20.415638
|
||||
Longitude Determination Protocols,-13.220776,-10.055916
|
||||
Manifest Destiny,5.053518,-9.090858
|
||||
Mapping & Charting Protocols,16.042742,-8.469232
|
||||
Marginal Note Usage,-8.970765,13.884452
|
||||
Marronage,16.387972,-5.0970354
|
||||
Mass Surveillance Protocols,14.406785,9.430786
|
||||
Means Without Ends,-11.1714,13.572866
|
||||
Mecanno Kit,-17.94798,21.033728
|
||||
Meeting Protocol (Museum),7.817229,11.262171
|
||||
Meeting Scheduling,1.6656973,-13.995716
|
||||
Memetic Culture,14.54421,3.9806788
|
||||
Memorization Palaces,7.504709,11.431678
|
||||
Memory Wheels,-5.83538,-8.232754
|
||||
MEV (Maximal Extractable Value),7.140202,-17.48023
|
||||
MFA Seminar Protocols,-22.785576,-5.652994
|
||||
Michi Saagiig Clan Introduction,-20.701508,-4.800697
|
||||
Military Drill Techniques,-3.2048402,20.12847
|
||||
Military Protocols,-5.4835386,9.140559
|
||||
Milking Apparatus,-18.805386,3.6822474
|
||||
Ministerial Conferences,-17.030914,-4.2803698
|
||||
Minute Book Recording Protocol,-20.84133,0.71057814
|
||||
Minute-Taking Protocol,11.841744,14.89843
|
||||
Minutes of Council of Ministers,3.9888082,8.366868
|
||||
Model 500's Detroit Techno Identity,11.30336,-10.568039
|
||||
Mundaneum Protocol,18.035187,-8.252377
|
||||
Music Genre Protocols,15.053572,-13.568442
|
||||
Mutual Aid Swarm Protocol,11.9441805,-9.031919
|
||||
Mutual Exchange Practices,-21.39122,-2.9445221
|
||||
Myal Protocols,2.8130293,-7.7432127
|
||||
NAGPRA,19.621937,2.2102568
|
||||
Naming Protocols (Land Acknowledgements & Introductions),-9.359436,-5.3076253
|
||||
Narrative Blogging Protocols,9.354624,-8.392257
|
||||
Navigational Protocols,9.740922,-1.3750849
|
||||
Neighborhood Food Distribution Festival Protocol,-2.402576,10.683154
|
||||
Network Nations Protocols,6.7327323,-3.6212912
|
||||
Network State Founder Protocols,10.631135,-14.951757
|
||||
New York Garment Worker Strike Protocols,11.278531,6.5288982
|
||||
Nishnaabeg Storytelling Traditions,-11.487172,2.026563
|
||||
NLS Protocol,-15.992397,11.63486
|
||||
Noon-day Gun Protocol,-18.158722,-1.6681356
|
||||
NSU Trial Protocol,15.285125,-4.013232
|
||||
Nuclear Protocols,-13.490518,12.506843
|
||||
Oblique Messaging/Editing (Content Circulation Protocol),-9.498902,-12.235132
|
||||
Observational Documentation Protocol (Secret Services),12.203176,-6.6362953
|
||||
Observational Science Protocols,15.87063,-11.116068
|
||||
Occupying Vacancy Protocol,8.689796,6.653563
|
||||
Offering Alternative Respect Tokens,-15.105326,3.5687857
|
||||
Office Request Protocol,-11.43793,-7.9973817
|
||||
Office Space Survey Protocol,11.492894,-2.2907963
|
||||
OODA Loop,3.421606,-5.026629
|
||||
Open Source Estrogen,-2.0494936,-7.063482
|
||||
Open Source Protocols,12.898709,-5.9271894
|
||||
Oral Communication Preferences,11.041448,5.186042
|
||||
Pagamento (Payback),1.6478624,0.34868738
|
||||
Pale Fire Protocol,13.609455,-9.952634
|
||||
Paris Agreement,-22.064365,-5.1741943
|
||||
Participatory Guarantee Systems (PGS),-17.800058,6.125286
|
||||
Patriotic Protocols,3.8523643,-2.4641635
|
||||
Pedestrian Traffic Rules Protocol,-13.13704,-0.8595951
|
||||
Performance of Transparency,-18.588163,19.023653
|
||||
Petition Submission and Review,-3.7322214,14.013859
|
||||
Petitioning for Privileges,-15.2250395,3.7373774
|
||||
Philanthropic Foundation Advocacy Protocol,-1.7512407,11.666181
|
||||
Photographic Standardization,13.628699,-10.903408
|
||||
Physiognomic Interpretation,0.40568846,13.496775
|
||||
Pickup Basketball/Soccer Games,10.437595,-13.129833
|
||||
Piece Wage System,8.019294,-14.594195
|
||||
Pipe Ceremony Protocol,-10.418069,-2.1953568
|
||||
Planting Tree Protocols,-10.369436,15.899645
|
||||
Police Intervention Protocol,-5.5627155,13.064142
|
||||
Police-led Information-Gathering Network,5.311307,1.9921073
|
||||
Political Discourse Protocol,2.6201394,7.3564315
|
||||
Political Protocols (Arendt & Schmitt),20.312462,-5.5493436
|
||||
Political Thriller/Police Movie Protocol,21.454386,-7.653726
|
||||
Pop-up Village Protocols,10.206412,9.864668
|
||||
Prime Meridian Unconference,5.9182277,-1.8748801
|
||||
Proactive Suggestion Protocol,-3.6733856,-1.9657215
|
||||
Profile Photo Change (Symbolic Participation Protocol),2.4632344,13.69681
|
||||
Proof of Stake Consensus,-10.837539,5.390233
|
||||
Proof of Work Consensus,15.499133,-0.685822
|
||||
Protocol Analysis (Ericsson & Simon),-16.352844,7.98879
|
||||
Protocol Departure in Creative Writing,-4.227796,7.313172
|
||||
Protocol for Academic Science,19.408224,-5.8564076
|
||||
Protocol for COVID Masking,10.368292,3.3224838
|
||||
Protocol for Dance Collaboration,-14.126115,9.933843
|
||||
Protocol for Evaluating Clock Protocols,-17.20989,-5.5219674
|
||||
Protocol for Good Death,-5.769508,16.964148
|
||||
Handwashing,8.425932,-10.300363
|
||||
Medical System (US),-13.494936,9.311482
|
||||
Protocol of Kinship,14.740073,-6.220016
|
||||
Protocol of Operational Closure,-15.374732,-1.5878239
|
||||
Protocol of Reclamation,-10.161861,17.031876
|
||||
Time Zones,7.905788,-12.108398
|
||||
Protocol of Targeted Killing,18.924757,-6.892391
|
||||
,10.757861,-18.650562
|
||||
Protocol of Tjukurpa (Dreamtime Instructions),-3.7134817,4.3463707
|
||||
Public Amateurism,6.4042993,0.43844345
|
||||
Public Enemy’s Political Activism,4.8289776,-1.0454351
|
||||
Public Health Behavioral Guidelines,14.0016575,-13.9114685
|
||||
Publishing Protocols,-17.17046,7.669017
|
||||
Quadratic Voting,11.405479,-7.7450695
|
||||
Quilting Practices,20.72176,-6.8514223
|
||||
QWERTY Keyboard Protocol,-1.1385947,9.420748
|
||||
,18.611258,-8.351216
|
||||
Relationship-Building in Deaf Community,7.1856017,1.5856147
|
||||
Participatory Studies (Seed Oils),-8.863123,3.8820708
|
||||
ResearchHub Model,-1.4725603,16.43579
|
||||
LK-99 Replication Craze,-19.323465,-0.5968977
|
||||
Clinical Trial Design,13.973863,-15.166206
|
||||
Peer Review,-6.7009444,2.0643635
|
||||
Dating Apps,3.4804008,-5.066721
|
||||
Reporting Conventions for Election Integrity,-5.1225543,-3.9985082
|
||||
Reporting of Financial Status,12.240307,-1.1454123
|
||||
Reykjavik Protocol,1.2980378,-15.746136
|
||||
RFC Process,9.810002,4.576213
|
||||
Rhetorical Canons,-3.738781,13.964023
|
||||
Rhizomatic Urban Farm Expansion Protocol,-19.764072,17.846869
|
||||
Rhymes and Syllabic Rhythm,-17.518742,18.70157
|
||||
Robert Musil’s Protocol of Critical Assessment,-11.326967,-6.2410803
|
||||
Roman Senate Advisory Decree,-24.368738,-3.6405218
|
||||
Royal Access Protocol,-20.387934,-7.417438
|
||||
Royal Protocols,15.022171,-1.2260528
|
||||
Rust Programming Language Principles,21.5487,-3.5437932
|
||||
Sacrament of Eucharist,-19.405247,-4.2310834
|
||||
Sacrament of Reconciliation,0.5144219,-14.723674
|
||||
Plantationocence,-18.897655,0.029422393
|
||||
Sangoma Healing Practices,-1.4398974,-4.6064453
|
||||
Scent-Free Attendance,-6.751738,-6.0048532
|
||||
Script Provision Protocol,0.3934111,0.30784214
|
||||
Seating Arrangements Protocol,-14.1069565,21.138796
|
||||
Secular Lunar Calendar,11.210146,-8.986273
|
||||
Sellers Screw Thread Protocol,8.6717005,-15.026042
|
||||
Semantic Web Protocol,-13.437744,-8.281783
|
||||
Senatus Consultum,-18.27044,5.611577
|
||||
Seven Ancestor Teachings,-3.0933478,-8.396257
|
||||
Shadbush Tree Planting,13.213818,-3.720395
|
||||
Shipping Container Protocol,-15.68903,4.7828727
|
||||
Shorthand Transcription,-4.675555,17.114065
|
||||
Sign Language Interpretation Protocol,3.683762,-0.52271307
|
||||
SILENT/LISTEN Protocol,-16.027325,21.637434
|
||||
Silhouette Creation,20.628267,-13.605564
|
||||
Silicon Valley Exit,-7.444469,9.530269
|
||||
Silicon Valley Model,0.9088519,-4.817422
|
||||
Simplan Credit Card System,1.6221379,-17.821436
|
||||
Sin Protocol (Ignatian),8.491858,-11.279958
|
||||
Six-Day Work Week,-6.7467713,13.199348
|
||||
Social Entrepreneurship,-8.642198,16.497046
|
||||
Socratic Method,-4.6659327,0.18478678
|
||||
Songlines,2.600776,9.690546
|
||||
Sonic Engineering Protocols,7.114484,2.354577
|
||||
Spam/Dilution Tactics (Content Disruption Protocol),-7.7355576,-4.116024
|
||||
Staking Protocols,-19.631372,18.677664
|
||||
,-18.665579,18.099676
|
||||
Stenography Protocols,10.901623,3.2910178
|
||||
Stereographic Exchange,-1.0220108,16.52738
|
||||
Stock Exchange Trading Halt Protocol,-10.788507,6.953525
|
||||
Submission of Exclusive Privileges,12.4631,-16.187172
|
||||
Succession Protocols,12.180768,-5.182068
|
||||
Sustos Retrieval,-12.241868,-10.615713
|
||||
Swiping,12.465401,-2.8542588
|
||||
Systematic Experimental Self-Observation,-5.699339,14.586738
|
||||
SZ Journalists' Note-Taking Protocol,-3.4291556,-5.341255
|
||||
Tarot Card Interpretation,-15.03857,9.05743
|
||||
TCP/IP,-10.724696,5.5340424
|
||||
Teaching Protocol (Paulo Freire),-7.252811,14.82815
|
||||
Technical-Political Distinction Protocol,-7.8213606,10.486052
|
||||
Territory Acknowledgement,-15.457638,-3.3271644
|
||||
Theocracies,14.57153,3.7414021
|
||||
Think Aloud Protocol,7.8543262,-12.188131
|
||||
Threshold Forgetting Protocols,16.313234,-14.329513
|
||||
Time Distribution via Gun Time,-9.844904,13.301649
|
||||
Time Zone Standardization,-4.8160634,-11.772276
|
||||
Timekeeping for Activities (Yin/Yang Hours),-17.273497,-3.0247924
|
||||
Tjukurpa (Dreaming Stories),-0.525808,-16.132078
|
||||
Tobacco Offering Protocol,-6.7224545,-9.638916
|
||||
Totalitarian Hospitalization Protocol,-21.881947,-2.580249
|
||||
Toyota Killswitch Protocol,-2.3816903,3.8005106
|
||||
Traffic Signals,-17.851345,17.522833
|
||||
Translation Correction Protocol,15.0536995,-10.465349
|
||||
Tribal Council Research Permit,6.2624874,-15.28356
|
||||
Tribal Protocols of the Cultural Resources Program,-12.925072,-9.702128
|
||||
Truth and Reparations Commission Protocols,0.6272398,3.9452026
|
||||
TSA Airport Security,-6.8129067,-1.7685806
|
||||
Ultimate Frisbee Gameplay,-0.7651392,3.4733083
|
||||
Underground Resistance's Bandana Protocol,14.641298,2.1010878
|
||||
Uniform Resource Locator (URL) Protocol,-13.339499,-3.2768087
|
||||
Uninsurable Protocol,17.369345,-4.8965526
|
||||
Unionized Worker Right to Strike,-13.880219,5.8339634
|
||||
Urban Rewilding Protocol,-2.5001721,5.6246147
|
||||
Urine-Hormone-Extraction-Action,-12.906149,-5.0152164
|
||||
USB-C Connector Protocol,17.241314,-13.109064
|
||||
Vibe Culture,12.916207,-10.121175
|
||||
Victorian Room Design (Enclosure),6.2855496,-6.2010446
|
||||
Video Game Tournament Disqualification Protocol,13.797398,-17.0234
|
||||
Vienna Convention (Diplomatic Law),0.15557346,3.3343177
|
||||
Vigil for Murdered Environmentalists,-15.686899,18.378115
|
||||
Vogue'ology,-17.024624,14.120886
|
||||
VPN Usage (Circumvention Protocol),-14.014403,-5.8860397
|
||||
Wampum Belt Bead Code,-6.3413024,9.495556
|
||||
Web Protocols,8.726838,10.71168
|
||||
Westphalian System,-14.383366,18.601307
|
||||
White Cube Presentation Protocol,-10.844609,7.9024715
|
||||
Whitworth Screw Thread Protocol,5.353135,5.770281
|
||||
Windrush Generation Protocols,-4.370515,21.888132
|
||||
Witness Interaction Protocol,17.570961,7.6361537
|
||||
|
@@ -0,0 +1,407 @@
|
||||
Descriptor,UMAP1,UMAP2
|
||||
Abdication Protocol,7.305212,11.67601
|
||||
Abolitionist Practice Protocol,6.716104,10.635482
|
||||
Access Check-in,7.1219807,9.687109
|
||||
Access Intimacy Protocol,5.7034745,10.172839
|
||||
Access-Centered Practices,8.084135,10.640205
|
||||
ActivityPub Protocol,7.938449,14.249155
|
||||
African Futurist Escape,6.29704,10.723631
|
||||
Afrofuturism,5.9679055,10.0022745
|
||||
Airport Security Procedures,10.657981,14.910131
|
||||
Alusi Trance (African Futurism),5.324941,10.222712
|
||||
Ancestral Spirit Possession,5.2035403,10.271891
|
||||
Anishinaabeg Knowledge Sharing Protocols,6.4598346,8.30714
|
||||
Anishinaabeg Visiting Protocols,6.5733004,8.212883
|
||||
Annual Feasts,7.0489984,8.141691
|
||||
Arendt's Reporting Protocol,10.152231,13.648764
|
||||
ARPANET Protocols,8.119668,13.756519
|
||||
Arranged Marriage,11.707463,13.168721
|
||||
Art Historical/Curatorial Validation Protocol,10.193035,11.924623
|
||||
Artisanal Marketing Protocol,9.855848,12.034878
|
||||
Artistic Collaboration,6.518224,9.646697
|
||||
ASL Provision Protocol,8.190668,11.022069
|
||||
Audience Recording Protocol,11.289156,13.924415
|
||||
Authority Assertions via Linguistic Precision,10.422194,13.130445
|
||||
Automobile Driver Warning Protocol,7.224131,10.287907
|
||||
Autonomous Worlds (0xPARC framework),6.6322885,10.850285
|
||||
Bamboo Sales (Village Artisan Example),6.5498457,8.506237
|
||||
BankAmericard Distribution Protocol,9.619492,12.720863
|
||||
Bartleby Protocol,5.765323,10.446269
|
||||
Basel Program,9.825544,12.469387
|
||||
Bell Pit Spacing,5.431721,11.500823
|
||||
Benefit Application Procedures,11.197692,15.019506
|
||||
Bertillonage,10.486558,13.865968
|
||||
Bilderatlas Mnemosyne (Warburg’s Method),7.270795,12.047556
|
||||
Birth Registration (City Hall),11.101971,14.175754
|
||||
Bitcoin Protocol,8.274383,14.7294855
|
||||
Black Feminist Protocols,6.345938,9.666063
|
||||
Black Poethics,7.2528915,11.710901
|
||||
Black Time Belt,6.326218,10.6765585
|
||||
Blueprint Protocol,9.432662,15.280718
|
||||
Borgesian Aleph Construction,11.972483,12.834698
|
||||
Bristlemouth Protocol,6.232627,11.362361
|
||||
Buddhist Monastery Protocols,6.1282644,8.596529
|
||||
Building Codes,10.707025,15.061705
|
||||
German Bureaucratic Prose,11.631614,14.148528
|
||||
Calendar Invite and Alarm System,9.078903,14.472714
|
||||
Canary Use for Gas Detection,5.4871545,11.646298
|
||||
Canonical Bridge Protocols,8.091972,14.201817
|
||||
Capital Markets Opening and Closing Times Protocol,10.744439,15.045607
|
||||
Carriage Dispute Protocol,12.136005,13.087802
|
||||
CART (Communication Access Realtime Translation) Provision Protocol (Community Arts Org),7.262552,9.502173
|
||||
Chancery Ceremonies,11.571337,13.951714
|
||||
Child Discipline (Spanking/Grounding),9.358386,11.46989
|
||||
Childbirth Protocols (Local Knowledge),6.3748426,8.550783
|
||||
Choose Your Own Adventure Protocol,7.3136263,10.006152
|
||||
Chronicles of Suffering (Thirty Years' War),6.347488,9.389652
|
||||
Chronometer Usage Protocol,9.159123,13.446476
|
||||
Circular Movement Protocol,6.554599,8.17385
|
||||
City-States,9.66732,13.423256
|
||||
Clan Identification,6.396612,7.856179
|
||||
Climate Treaties,8.064468,11.993126
|
||||
Cloud Data Capturing,9.020169,14.665248
|
||||
Coal Dust Mitigation,9.488584,14.624609
|
||||
Code of Criminal Procedure Protocol,11.347399,15.020267
|
||||
College Enrollment,9.971367,14.197424
|
||||
Column Chromatography,5.896105,11.499593
|
||||
Command and Control,10.180295,14.223627
|
||||
Commemorative Coin Protocol,9.697048,12.881729
|
||||
Communal Altar Creation,7.102194,9.532401
|
||||
Communication Protocols (Cold War),11.399757,14.196963
|
||||
Community Land Acknowledgement Protocol (Gallery),8.923799,12.519219
|
||||
Community Lore Protocols,6.1063447,8.108929
|
||||
Compost-Based Ritual Protocols,7.074779,9.331782
|
||||
Conciliatory Chairman Intervention Protocol,8.832187,13.5731535
|
||||
Content Moderation Standards,8.321912,11.83793
|
||||
Cooking Practices,6.2370434,8.552561
|
||||
Coordinated Universal Time (UTC),9.444452,15.195159
|
||||
Coordinatizing Scientific Observation,6.9162908,12.389966
|
||||
Corporate Contracts,10.417994,15.069496
|
||||
Corridor Design (Government Buildings),9.153684,14.703771
|
||||
Council of Ministers Meetings,10.654381,14.075659
|
||||
Cover Letter (Early Credit Agreements),5.6882043,10.647758
|
||||
COVID-19 Mask Mandate Protocols,9.095398,12.994378
|
||||
COVID-19 Pandemic Protocols,9.101613,12.8814535
|
||||
COVID-19 Regulations,9.238148,12.932099
|
||||
Cowrie Bead Currency,7.0519986,8.317036
|
||||
Crash Protocol,9.582983,14.168781
|
||||
"""Open Publishing",7.1502004,10.633196
|
||||
Criminological Discourse Protocols,10.65152,12.7675085
|
||||
Crisis Communication Protocols (Cold War),10.857992,13.835656
|
||||
CRISPR,9.025253,15.245713
|
||||
CubeSat Protocol,9.044439,15.299069
|
||||
Currency Ledgers,9.586648,14.531532
|
||||
Dating Websites (Pre-App),8.169885,11.568464
|
||||
De umbrias ideareum (Bruno’s Memory Seals),6.465305,11.099905
|
||||
Decentralized Autonomous Organization (DAO) Governance Voting Protocol,8.196914,11.781045
|
||||
Decision-Making Process in Case of Disagreement,10.10398,12.538293
|
||||
Decision-Making via Vote,7.9630136,11.091623
|
||||
Decision-Making within the Cabinet,11.49128,14.34732
|
||||
Deep Fake Generation Protocols,7.2445536,12.152883
|
||||
Deep Listening,6.9780335,10.259652
|
||||
Deliberative Analyses,7.5901647,11.786989
|
||||
Department Council Protocols,10.448321,12.542963
|
||||
Detroit Techno Music Performance Protocols,6.9964466,7.9578404
|
||||
Diaries (Experimental Soul Studies),6.634209,10.090904
|
||||
Diaries (Puritan & Pietist),6.5886583,9.150264
|
||||
Difficulty Bomb (Ethereum),8.385459,13.794636
|
||||
Dinner Etiquette,7.226628,8.527923
|
||||
Diplomatic Protocol,9.898985,13.83604
|
||||
Discernment of Spirits,7.782942,9.211143
|
||||
Disciplinary Procedure Protocol,11.409719,14.747491
|
||||
Dispute Resolution Through Mediation,7.8338995,10.89813
|
||||
Distributed Cooperatives (DisCOs),6.869759,11.115982
|
||||
DIY Hormone Detection,6.6108074,11.017175
|
||||
DNA Testing Kits,9.7255,14.328796
|
||||
DNS,9.832111,14.807348
|
||||
Doubloon Game Protocol,5.568598,10.234114
|
||||
Drexciya's Sonic World Building,6.6696553,9.139299
|
||||
Drift Mine Slope Excavation,5.717572,11.627163
|
||||
Dust Suppression Efforts,9.497787,14.508786
|
||||
Early Fatality Reporting,10.602788,12.531975
|
||||
Ecology Protocols (Local Knowledge),5.998537,9.08128
|
||||
Eichmann Trial Protocol,10.595315,12.642174
|
||||
EIP (Ethereum Improvement Proposal),9.538837,13.322939
|
||||
Election Reporting Conventions,7.746367,11.345179
|
||||
Elevator Button Addressing,7.819856,10.504971
|
||||
Email Services,9.984742,14.58943
|
||||
Embossing Protocol (BankAmericard),8.817394,14.221662
|
||||
Ennoblement Protocols,11.169958,13.860048
|
||||
Environmental Racism Protocols,6.0942154,9.003853
|
||||
Environmental Vigil Protocols,6.1756873,9.455654
|
||||
Ethereum DAO Withdrawal Protocol,7.9426,14.328017
|
||||
Ethereum Proof of Stake,8.1559725,14.610431
|
||||
Ethereum Proof of Work,8.052893,14.467271
|
||||
Ethereum Protocol,8.096462,14.561194
|
||||
Ethnographic Containment,6.9435844,11.200903
|
||||
European Hoff Ceremonial Protocol,11.702464,14.162865
|
||||
Evidence-Based Debates,8.205666,14.13074
|
||||
Exit to Community Model,7.0316906,10.988033
|
||||
Extinction Rebellion Affinity Networks Protocols,6.485108,10.115426
|
||||
Face-Restoring Protocol,7.7447424,10.082914
|
||||
Facebook Protocol,9.347268,11.799927
|
||||
Petition Submission,10.72036,12.958236
|
||||
Flag-Raising/Lowering Protocols,11.271052,15.08924
|
||||
Flint Arrowhead Manufacturing Protocols,5.7848783,9.839488
|
||||
Flux Divergence,7.8774004,13.178119
|
||||
Food Localization Protocol,6.0107136,9.141718
|
||||
Form-Based Interaction Protocol,11.357424,14.551597
|
||||
Fundamental Cause Investigations,7.8432527,11.786895
|
||||
Funeral Rituals,7.1146097,11.490528
|
||||
Gas Testing with Candle,5.6259375,11.371179
|
||||
Gestural Warning Protocol,5.3337297,10.45627
|
||||
Goffman's Interactional System Protocol,5.9935412,10.403916
|
||||
Gold Coinage,10.994508,13.852519
|
||||
Gold Standard,8.94478,14.002542
|
||||
Greenwich Mean Time,9.075421,12.54102
|
||||
Grid-Based Urban Planning,9.227018,15.15713
|
||||
Gynepunk,5.738544,9.655444
|
||||
Halal and Gluten-Free Food Options,8.20815,10.179415
|
||||
Handshake,6.885072,9.029295
|
||||
Hats Protocol,8.300063,10.562241
|
||||
High-Frequency Trading Protocol,8.167963,12.271987
|
||||
,10.1542635,12.249481
|
||||
House Addressing (Tax Collection/Conscription),8.521636,12.279574
|
||||
House Style,8.849688,12.4557295
|
||||
Human Rights,5.6494994,11.107683
|
||||
Hundred Gradations Incense Seal Protocol,5.6968703,11.565634
|
||||
HyperCard Protocol,7.158521,12.439568
|
||||
Hypertext/Hypermedia Protocol,6.990033,10.217866
|
||||
I Ching Protocol,11.3079605,13.039124
|
||||
Imperial Family Interactions,10.874863,13.226328
|
||||
Imperial Grace Awarding,10.998054,13.842665
|
||||
Imperial Mark Protocol,5.599009,11.111447
|
||||
Incense Clock Protocol,9.798604,12.3503275
|
||||
Information Campaign (Nationalist Commentators),10.788905,14.407528
|
||||
Injection Protocol,10.291153,14.603272
|
||||
Insurance Claim Protocol,9.2709255,13.495552
|
||||
Intangible Cultural Heritage Department Protocols,8.1875725,11.880169
|
||||
International Law (as Protocol),10.297664,14.841561
|
||||
International Meridian Conference,9.467695,14.933318
|
||||
International Organization for Standardization (ISO),6.940989,8.422753
|
||||
Introduction Protocol,11.309286,14.994234
|
||||
Islamic Dietary Laws,10.889368,14.504472
|
||||
Islamic Memorization,11.106742,15.217271
|
||||
Islamic Prayer Rituals,10.736885,12.403801
|
||||
Job Interview Protocol,6.8897004,8.094595
|
||||
Keeping in Touch (Return Visits),8.083453,14.466927
|
||||
Kleros Dispute Resolution Protocol,5.570649,11.278582
|
||||
Knotted Cord Alarm Protocol,9.35476,14.888743
|
||||
Kraftwerk's Aesthetic Minimalism,11.991866,13.158036
|
||||
Language Regulation,8.447006,14.547745
|
||||
Layer 2 Scaling Solutions,9.015568,12.656933
|
||||
League of Nations,10.187801,14.255186
|
||||
Legal Protocol (General),6.3499765,10.702436
|
||||
Lemon Balm Protocol,10.218618,14.49246
|
||||
,10.259977,14.685449
|
||||
Lift and Transfer Protocol,7.7127066,10.56003
|
||||
Lift and Transfer Protocol,7.353484,8.748618
|
||||
Lingua Franca,6.8732634,9.587745
|
||||
Linux Kernel Production,7.9257507,11.751579
|
||||
Listening Protocols,7.772736,13.076426
|
||||
Literary Genre Conventions (General),12.067906,12.941787
|
||||
Longitude Determination Protocols,8.986634,15.280756
|
||||
Manifest Destiny,6.9930224,8.644051
|
||||
Mapping & Charting Protocols,6.282452,8.793001
|
||||
Marginal Note Usage,10.360214,12.152862
|
||||
Marronage,5.977433,10.29584
|
||||
Mass Surveillance Protocols,5.662856,11.482263
|
||||
Means Without Ends,10.689596,12.412063
|
||||
Mecanno Kit,12.041433,13.0039215
|
||||
Meeting Protocol (Museum),8.694497,11.588753
|
||||
Meeting Scheduling,7.644151,9.936781
|
||||
Memetic Culture,6.525727,10.899198
|
||||
Memorization Palaces,8.529343,11.836745
|
||||
Memory Wheels,10.520617,13.951353
|
||||
MEV (Maximal Extractable Value),6.507415,7.7825294
|
||||
MFA Seminar Protocols,11.495166,14.957788
|
||||
Michi Saagiig Clan Introduction,11.421871,15.050128
|
||||
Military Drill Techniques,9.540258,11.354535
|
||||
Military Protocols,9.241607,12.950393
|
||||
Milking Apparatus,11.123715,13.599312
|
||||
Ministerial Conferences,10.3096695,15.1245575
|
||||
Minute Book Recording Protocol,11.527599,14.528036
|
||||
Minute-Taking Protocol,5.826564,11.109235
|
||||
Minutes of Council of Ministers,7.6391807,13.028419
|
||||
Model 500's Detroit Techno Identity,6.032347,8.367099
|
||||
Mundaneum Protocol,6.457436,9.760816
|
||||
Music Genre Protocols,6.7334275,8.709909
|
||||
Mutual Aid Swarm Protocol,5.8898797,9.004104
|
||||
Mutual Exchange Practices,11.255233,14.9770565
|
||||
Myal Protocols,8.158572,11.075187
|
||||
NAGPRA,6.6451674,8.956041
|
||||
Naming Protocols (Land Acknowledgements & Introductions),9.315495,14.487208
|
||||
Narrative Blogging Protocols,5.949751,8.65885
|
||||
Navigational Protocols,6.8006535,10.938204
|
||||
Neighborhood Food Distribution Festival Protocol,9.100813,12.667248
|
||||
Network Nations Protocols,7.587411,11.140799
|
||||
Network State Founder Protocols,6.6267395,8.1065855
|
||||
New York Garment Worker Strike Protocols,6.4906206,11.890031
|
||||
Nishnaabeg Storytelling Traditions,9.184472,13.568104
|
||||
NLS Protocol,10.953755,13.191592
|
||||
Noon-day Gun Protocol,10.702988,14.80411
|
||||
NSU Trial Protocol,5.9424334,10.001678
|
||||
Nuclear Protocols,11.228312,13.140072
|
||||
Oblique Messaging/Editing (Content Circulation Protocol),9.55519,15.005994
|
||||
Observational Documentation Protocol (Secret Services),5.752164,9.358884
|
||||
Observational Science Protocols,7.1435156,9.947214
|
||||
Occupying Vacancy Protocol,6.9034033,11.768729
|
||||
Offering Alternative Respect Tokens,9.406952,15.263733
|
||||
Office Request Protocol,8.933083,15.019726
|
||||
Office Space Survey Protocol,6.824784,10.746759
|
||||
OODA Loop,7.3096557,10.78739
|
||||
Open Source Estrogen,7.8893747,10.733405
|
||||
Open Source Protocols,5.849254,9.520878
|
||||
Oral Communication Preferences,6.5912557,11.64738
|
||||
Pagamento (Payback),8.042904,11.6993685
|
||||
Pale Fire Protocol,6.3728924,9.218477
|
||||
Paris Agreement,11.508334,14.994635
|
||||
Participatory Guarantee Systems (PGS),10.414125,13.401557
|
||||
Patriotic Protocols,7.7675147,11.584038
|
||||
Pedestrian Traffic Rules Protocol,9.838101,14.399977
|
||||
Performance of Transparency,11.921412,13.2750025
|
||||
Petition Submission and Review,9.678544,12.097967
|
||||
Petitioning for Privileges,9.5403,15.338702
|
||||
Philanthropic Foundation Advocacy Protocol,8.968895,12.698421
|
||||
Photographic Standardization,6.2894344,8.961799
|
||||
Physiognomic Interpretation,8.476736,13.388537
|
||||
Pickup Basketball/Soccer Games,6.5138144,8.004612
|
||||
Piece Wage System,6.925856,7.773244
|
||||
Pipe Ceremony Protocol,10.391999,14.42603
|
||||
Planting Tree Protocols,11.260343,12.765915
|
||||
Police Intervention Protocol,9.66431,12.134307
|
||||
Police-led Information-Gathering Network,7.845599,12.080929
|
||||
Political Discourse Protocol,7.8582883,12.860141
|
||||
Political Protocols (Arendt & Schmitt),5.5798774,10.283589
|
||||
Political Thriller/Police Movie Protocol,5.825484,10.205916
|
||||
Pop-up Village Protocols,8.281301,11.071048
|
||||
Prime Meridian Unconference,8.287225,11.150661
|
||||
Proactive Suggestion Protocol,8.340182,14.5272
|
||||
Profile Photo Change (Symbolic Participation Protocol),7.970562,14.09434
|
||||
Proof of Stake Consensus,9.828855,13.507231
|
||||
Proof of Work Consensus,6.3121734,10.677725
|
||||
Protocol Analysis (Ericsson & Simon),10.342435,13.912305
|
||||
Protocol Departure in Creative Writing,8.957599,12.761364
|
||||
Protocol for Academic Science,5.6964536,10.121278
|
||||
Protocol for COVID Masking,6.7596784,11.531053
|
||||
Protocol for Dance Collaboration,10.693354,12.881951
|
||||
Protocol for Evaluating Clock Protocols,10.341623,15.153188
|
||||
Protocol for Good Death,10.208904,12.060282
|
||||
Handwashing,6.3203087,7.96588
|
||||
Medical System (US),10.405321,12.77046
|
||||
Protocol of Kinship,6.3560762,10.307921
|
||||
Protocol of Operational Closure,10.120437,14.981167
|
||||
Protocol of Reclamation,10.491644,12.146345
|
||||
Time Zones,6.2887836,7.9427614
|
||||
Protocol of Targeted Killing,5.816946,10.070325
|
||||
,7.196097,9.220482
|
||||
Protocol of Tjukurpa (Dreamtime Instructions),9.38274,13.138078
|
||||
Public Amateurism,7.1375155,11.378934
|
||||
Public Enemy’s Political Activism,7.94179,11.067634
|
||||
Public Health Behavioral Guidelines,6.5652537,8.589609
|
||||
Publishing Protocols,10.420145,13.467179
|
||||
Quadratic Voting,5.889559,8.833111
|
||||
Quilting Practices,5.8760467,10.280271
|
||||
QWERTY Keyboard Protocol,8.723073,12.353451
|
||||
,6.593228,9.99655
|
||||
Relationship-Building in Deaf Community,7.041963,11.672015
|
||||
Participatory Studies (Seed Oils),9.563984,13.483972
|
||||
ResearchHub Model,9.269926,11.552786
|
||||
LK-99 Replication Craze,11.030141,14.999477
|
||||
Clinical Trial Design,6.7246084,8.551211
|
||||
Peer Review,8.749485,13.540467
|
||||
Dating Apps,7.543704,10.77051
|
||||
Reporting Conventions for Election Integrity,9.441091,13.786263
|
||||
Reporting of Financial Status,6.924538,10.792663
|
||||
Reykjavik Protocol,7.636953,10.001599
|
||||
RFC Process,6.749323,11.575734
|
||||
Rhetorical Canons,9.512182,12.295322
|
||||
Rhizomatic Urban Farm Expansion Protocol,11.972825,13.53213
|
||||
Rhymes and Syllabic Rhythm,12.021228,13.066911
|
||||
Robert Musil’s Protocol of Critical Assessment,9.298579,14.884283
|
||||
Roman Senate Advisory Decree,11.945323,13.630465
|
||||
Royal Access Protocol,11.171456,14.735783
|
||||
Royal Protocols,6.4055963,10.647574
|
||||
Rust Programming Language Principles,5.352502,10.20481
|
||||
Sacrament of Eucharist,11.342421,14.841584
|
||||
Sacrament of Reconciliation,7.839224,10.060666
|
||||
Plantationocence,11.148413,14.763673
|
||||
Sangoma Healing Practices,7.488209,12.076611
|
||||
Scent-Free Attendance,8.515955,14.401539
|
||||
Script Provision Protocol,7.610982,13.574643
|
||||
Seating Arrangements Protocol,11.734243,12.715468
|
||||
Secular Lunar Calendar,5.9302697,8.743088
|
||||
Sellers Screw Thread Protocol,7.002387,7.929665
|
||||
Semantic Web Protocol,9.159471,15.271513
|
||||
Senatus Consultum,10.39468,13.515335
|
||||
Seven Ancestor Teachings,8.223339,10.702206
|
||||
Shadbush Tree Planting,6.7562847,10.165945
|
||||
Shipping Container Protocol,9.611511,15.131489
|
||||
Shorthand Transcription,9.685388,11.882923
|
||||
Sign Language Interpretation Protocol,7.477554,10.934939
|
||||
SILENT/LISTEN Protocol,12.010077,12.934543
|
||||
Silhouette Creation,7.3163276,9.525692
|
||||
Silicon Valley Exit,9.582541,12.778748
|
||||
Silicon Valley Model,7.564962,11.139612
|
||||
Simplan Credit Card System,7.5516696,10.092146
|
||||
Sin Protocol (Ignatian),6.0761414,7.920196
|
||||
Six-Day Work Week,9.774609,12.160275
|
||||
Social Entrepreneurship,9.312076,12.688238
|
||||
Socratic Method,8.254313,14.677629
|
||||
Songlines,7.9681916,13.282109
|
||||
Sonic Engineering Protocols,7.285667,11.9090395
|
||||
Spam/Dilution Tactics (Content Disruption Protocol),9.4359045,13.896852
|
||||
Staking Protocols,12.0471735,13.326568
|
||||
,11.9816,13.332485
|
||||
Stenography Protocols,6.8013587,11.392283
|
||||
Stereographic Exchange,8.588603,11.26962
|
||||
Stock Exchange Trading Halt Protocol,9.944644,13.5409355
|
||||
Submission of Exclusive Privileges,6.681922,8.3003645
|
||||
Succession Protocols,5.794894,9.659626
|
||||
Sustos Retrieval,8.708939,15.14855
|
||||
Swiping,6.768971,10.547259
|
||||
Systematic Experimental Self-Observation,9.479957,11.850424
|
||||
SZ Journalists' Note-Taking Protocol,8.754657,12.9970875
|
||||
Tarot Card Interpretation,10.733491,13.215235
|
||||
TCP/IP,9.822829,13.584584
|
||||
Teaching Protocol (Paulo Freire),9.919958,11.982897
|
||||
Technical-Political Distinction Protocol,9.825483,12.906208
|
||||
Territory Acknowledgement,10.23062,14.932891
|
||||
Theocracies,7.090352,10.371038
|
||||
Think Aloud Protocol,6.248088,7.879861
|
||||
Threshold Forgetting Protocols,6.7493505,8.846985
|
||||
Time Distribution via Gun Time,10.474446,12.384613
|
||||
Time Zone Standardization,7.5616837,8.821483
|
||||
Timekeeping for Activities (Yin/Yang Hours),10.554731,15.246817
|
||||
Tjukurpa (Dreaming Stories),7.848752,10.040983
|
||||
Tobacco Offering Protocol,11.104921,14.595723
|
||||
Totalitarian Hospitalization Protocol,11.343904,14.967734
|
||||
Toyota Killswitch Protocol,9.037555,12.997586
|
||||
Traffic Signals,11.793531,13.272215
|
||||
Translation Correction Protocol,6.772482,9.660414
|
||||
Tribal Council Research Permit,6.703457,7.7948513
|
||||
Tribal Protocols of the Cultural Resources Program,8.889942,15.1752205
|
||||
Truth and Reparations Commission Protocols,8.384237,12.453181
|
||||
TSA Airport Security,9.392783,12.176497
|
||||
Ultimate Frisbee Gameplay,8.641188,12.638007
|
||||
Underground Resistance's Bandana Protocol,6.620824,10.524759
|
||||
Uniform Resource Locator (URL) Protocol,8.743833,14.659964
|
||||
Uninsurable Protocol,5.7513714,10.116749
|
||||
Unionized Worker Right to Strike,10.706025,13.621966
|
||||
Urban Rewilding Protocol,9.252271,12.947261
|
||||
Urine-Hormone-Extraction-Action,9.589721,14.977526
|
||||
USB-C Connector Protocol,7.0797095,9.428108
|
||||
Vibe Culture,6.2016306,8.975493
|
||||
Victorian Room Design (Enclosure),7.50436,10.6319
|
||||
Video Game Tournament Disqualification Protocol,6.378919,8.094717
|
||||
Vienna Convention (Diplomatic Law),8.273426,12.207802
|
||||
Vigil for Murdered Environmentalists,11.8409815,12.784727
|
||||
Vogue'ology,11.36619,13.260128
|
||||
VPN Usage (Circumvention Protocol),9.059258,14.386161
|
||||
Wampum Belt Bead Code,9.320472,12.768557
|
||||
Web Protocols,8.513212,11.454208
|
||||
Westphalian System,11.772842,12.644909
|
||||
White Cube Presentation Protocol,10.205497,13.056148
|
||||
Whitworth Screw Thread Protocol,6.7056875,12.230406
|
||||
Windrush Generation Protocols,9.796807,11.211065
|
||||
Witness Interaction Protocol,5.919491,11.715108
|
||||
|
|
After Width: | Height: | Size: 1.0 MiB |
|
After Width: | Height: | Size: 417 KiB |
|
After Width: | Height: | Size: 496 KiB |
|
After Width: | Height: | Size: 411 KiB |
|
After Width: | Height: | Size: 851 KiB |
|
After Width: | Height: | Size: 408 KiB |
|
After Width: | Height: | Size: 352 KiB |
|
After Width: | Height: | Size: 2.4 MiB |
|
After Width: | Height: | Size: 189 KiB |
|
After Width: | Height: | Size: 669 KiB |
|
After Width: | Height: | Size: 9.6 MiB |
|
After Width: | Height: | Size: 1.3 MiB |
|
After Width: | Height: | Size: 890 KiB |
|
After Width: | Height: | Size: 396 KiB |
|
After Width: | Height: | Size: 194 KiB |
|
After Width: | Height: | Size: 1.2 MiB |
|
After Width: | Height: | Size: 890 KiB |
|
After Width: | Height: | Size: 1.2 MiB |
|
After Width: | Height: | Size: 906 KiB |
@@ -0,0 +1,42 @@
|
||||
================================================================================
|
||||
MULTIVARIATE ANALYSIS SUMMARY REPORT
|
||||
Protocol Bicorder Dataset
|
||||
================================================================================
|
||||
|
||||
Dataset: diagnostic_output.csv
|
||||
Number of protocols: 406
|
||||
Number of dimensions: 23
|
||||
- Design: 8
|
||||
- Entanglement: 8
|
||||
- Experience: 7
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
ANALYSES PERFORMED
|
||||
--------------------------------------------------------------------------------
|
||||
K-Means: 2 clusters identified
|
||||
Hierarchical: 5 clusters
|
||||
DBSCAN: 281 outlier protocols identified
|
||||
|
||||
Dimensionality Reduction:
|
||||
- Principal Component Analysis (PCA)
|
||||
- t-SNE Projection
|
||||
- UMAP Projection
|
||||
- Factor Analysis
|
||||
|
||||
Statistical Analyses:
|
||||
- Correlation Analysis
|
||||
- Network Analysis
|
||||
- Feature Importance Analysis
|
||||
- Analyst Comparison
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
OUTPUT FILES
|
||||
--------------------------------------------------------------------------------
|
||||
All results saved to: analysis_results/
|
||||
- plots/ : All visualizations (PNG)
|
||||
- data/ : All numerical results (CSV)
|
||||
- reports/ : This summary report
|
||||
|
||||
================================================================================
|
||||
END OF REPORT
|
||||
================================================================================
|
||||
@@ -0,0 +1,285 @@
|
||||
{
|
||||
"name": "Protocol Bicorder",
|
||||
"schema": "bicorder.schema.json",
|
||||
"version": "1.2.4",
|
||||
"description": "A diagnostic tool for the study of protocols",
|
||||
"author": "Nathan Schneider",
|
||||
"date_modified": "2025-12-02",
|
||||
"metadata": {
|
||||
"protocol": "Abdication Protocol",
|
||||
"description": "Though not formally codified, the King\u2019s abdication represents a deviation from the accepted protocol for royal succession. It marks a departure from the traditional expectation that monarchs serve until death and a disruption of the established system of power transfer. This departure challenged the established norm for royal behavior and demonstrated the possibility of opting out of a predetermined role, albeit with significant consequences. The event served as a striking example of challenging predefined patterns of action.",
|
||||
"analyst": "GPT-OSS",
|
||||
"standpoint": "A careful ethnographer and outsider aspiring to achieve a neutral stance and a high degree of precision",
|
||||
"timestamp": null,
|
||||
"shortform": false
|
||||
},
|
||||
"diagnostic": [
|
||||
{
|
||||
"set_name": "Design",
|
||||
"set_description": "How the protocol is created and remembered",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "explicit",
|
||||
"term_left_description": "The design is stated explicitly somewhere that is accessible to participants",
|
||||
"term_right": "implicit",
|
||||
"term_right_description": "The design is not stated explicitly and is learned by use",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "precise",
|
||||
"term_left_description": "The design is specified with a high level of precision that eliminates ambiguity in implementation",
|
||||
"term_right": "interpretive",
|
||||
"term_right_description": "The design is ambiguous, allowing participants a wide range of interpretation",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "institutional",
|
||||
"term_left_description": "Design occurs through processes controlled by powerful institutions",
|
||||
"term_right": "vernacular",
|
||||
"term_right_description": "Design occurs through evolving community interactions",
|
||||
"value": 6,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "documenting",
|
||||
"term_left_description": "The primary purpose is to document or validate activity that is occurring",
|
||||
"term_right": "enabling",
|
||||
"term_right_description": "The primary purpose is to enable activity that might not happen otherwise",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "static",
|
||||
"term_left_description": "Designed to be as fixed and unchanging as possible",
|
||||
"term_right": "malleable",
|
||||
"term_right_description": "Designed to be changed by participants according to evolving needs",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "technical",
|
||||
"term_left_description": "Primarily concerned with interactions among technologies",
|
||||
"term_right": "social",
|
||||
"term_right_description": "Primarily concerned with interactions among people or groups",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "universal",
|
||||
"term_left_description": "Meant for global adoption across different communities",
|
||||
"term_right": "particular",
|
||||
"term_right_description": "Tailored for a specific community",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "durable",
|
||||
"term_left_description": "Designed to be persistently available",
|
||||
"term_right": "ephemeral",
|
||||
"term_right_description": "Designed to vanish when no longer needed",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Entanglement",
|
||||
"set_description": "How the protocol relates with participant agents",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "macro",
|
||||
"term_left_description": "Operates at large scales involving many participants or broad scope",
|
||||
"term_right": "micro",
|
||||
"term_right_description": "Operates at small scales with few participants or narrow scope",
|
||||
"value": 6,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "sovereign",
|
||||
"term_left_description": "A distinctive operating logic, not subject to any other entity",
|
||||
"term_right": "subsidiary",
|
||||
"term_right_description": "An operating logic under the control of a particular entity",
|
||||
"value": 1,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "self-enforcing",
|
||||
"term_left_description": "Rules are automatically enforced through its own mechanisms",
|
||||
"term_right": "enforced",
|
||||
"term_right_description": "Rules require external enforcement by authorities or institutions",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "abstract",
|
||||
"term_left_description": "Participants learn the protocol by studying it intellectually",
|
||||
"term_right": "embodied",
|
||||
"term_right_description": "Participants learn the protocol by physically practicing it",
|
||||
"value": 1,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "obligatory",
|
||||
"term_left_description": "Participation is compulsory for a certain class of agents",
|
||||
"term_right": "voluntary",
|
||||
"term_right_description": "Participation in the protocol is optional and not coerced",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "flocking",
|
||||
"term_left_description": "Coordination occurs through centralized direction or direct mimicry",
|
||||
"term_right": "swarming",
|
||||
"term_right_description": "Coordination occurs through distributed interactions without central direction",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "defensible",
|
||||
"term_left_description": "Strong boundaries and protections against external influence",
|
||||
"term_right": "exposed",
|
||||
"term_right_description": "Weak boundaries and vulnerable to external influence",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "monopolistic",
|
||||
"term_left_description": "Excludes the use of other protocols with similar purposes",
|
||||
"term_right": "pluralistic",
|
||||
"term_right_description": "Interoperates with other protocols and does not exclude their use",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Experience",
|
||||
"set_description": "How the protocol is perceived in the context of its implementation",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "sufficient",
|
||||
"term_left_description": "Adequately meets the needs and goals of participants",
|
||||
"term_right": "limited",
|
||||
"term_right_description": "Does not, on its own, adequately meet the needs and goals of participants",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "crystallized",
|
||||
"term_left_description": "Content or meaning are settled and widely agreed upon",
|
||||
"term_right": "contested",
|
||||
"term_right_description": "Content or meaning are disputed or under debate",
|
||||
"value": 4,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "trust-evading",
|
||||
"term_left_description": "Minimizes the need for trust among participants",
|
||||
"term_right": "trust-inducing",
|
||||
"term_right_description": "Relies on or cultivates trust among participants",
|
||||
"value": 4,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "predictable",
|
||||
"term_left_description": "Produces expected and consistent outcomes",
|
||||
"term_right": "emergent",
|
||||
"term_right_description": "Produces unexpected or novel outcomes",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "exclusion",
|
||||
"term_left_description": "Creates barriers or excludes certain participants",
|
||||
"term_right": "inclusion",
|
||||
"term_right_description": "Reduces barriers and includes diverse participants",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "restraining",
|
||||
"term_left_description": "Fosters experiences of absurd complexity, alienation, and powerlessness",
|
||||
"term_right": "liberating",
|
||||
"term_right_description": "Enables participants to carry out desired activities with less work or thought",
|
||||
"value": 5,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "dead",
|
||||
"term_left_description": "Not actively utilized by relevant participants",
|
||||
"term_right": "alive",
|
||||
"term_right_description": "Actively utilized by relevant participants",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"analysis": [
|
||||
{
|
||||
"term_left": "hardness",
|
||||
"term_left_description": "The protocol tends toward properties characterized by hardness",
|
||||
"term_right": "softness",
|
||||
"term_right_description": "The protocol tends toward properties characterized by softness",
|
||||
"instructions": "Take all the 'value' fields in the gradients above and determine a mean. Round it to the nearest integer. That is the 'value' here.",
|
||||
"automated": true,
|
||||
"value": 6,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "polarized",
|
||||
"term_left_description": "The analyst tended toward more extreme high or low readings",
|
||||
"term_right": "centrist",
|
||||
"term_right_description": "The analyst tended toward readings at the middle of the gradients",
|
||||
"instructions": "Take all the 'value' fields in the gradients above. Assess their degree of polarization. For instance, if all the values are either 1 or 9, the output would be 1, and if all of them are 5, the output would be 9.",
|
||||
"automated": true,
|
||||
"value": 3,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "bureaucratic",
|
||||
"term_left_description": "The protocol exhibits institutional, formal, top-down characteristics with centralized control and external enforcement",
|
||||
"term_right": "relational",
|
||||
"term_right_description": "The protocol exhibits community-based, emergent, bottom-up characteristics with distributed coordination and voluntary participation",
|
||||
"instructions": "Based on the diagnostic readings, calculate the protocol's position using Linear Discriminant Analysis. The LDA score is scaled to the 1-9 range, where 1 represents strongly bureaucratic/institutional protocols and 9 represents strongly relational/cultural protocols. A score of 5 indicates a protocol near the boundary exhibiting characteristics of both families.",
|
||||
"automated": true,
|
||||
"value": null,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "not useful",
|
||||
"term_left_description": "The bicorder was not useful or relevant for analyzing this protocol",
|
||||
"term_right": "very useful",
|
||||
"term_right_description": "The bicorder was very useful and relevant for analyzing this protocol",
|
||||
"instructions": "Evaluate the usefulness of this bicorder as a tool for analyzing this protocol, considering whether the gradient terms seemed revealing or irrelevant.",
|
||||
"automated": false,
|
||||
"value": null,
|
||||
"notes": null
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -0,0 +1,285 @@
|
||||
{
|
||||
"name": "Protocol Bicorder",
|
||||
"schema": "bicorder.schema.json",
|
||||
"version": "1.2.4",
|
||||
"description": "A diagnostic tool for the study of protocols",
|
||||
"author": "Nathan Schneider",
|
||||
"date_modified": "2025-12-02",
|
||||
"metadata": {
|
||||
"protocol": "Abolitionist Practice Protocol",
|
||||
"description": "This is referenced as a method of enacting change that focuses on dismantling systems of oppression and building alternative forms of social organization. It emphasizes creating practices rooted in self-determination and shared struggle. It's a protocol about creating alternatives and taking action in the present, working towards a future free from oppressive structures, and building resilience through reciprocal support.",
|
||||
"analyst": "GPT-OSS",
|
||||
"standpoint": "A careful ethnographer and outsider aspiring to achieve a neutral stance and a high degree of precision",
|
||||
"timestamp": null,
|
||||
"shortform": false
|
||||
},
|
||||
"diagnostic": [
|
||||
{
|
||||
"set_name": "Design",
|
||||
"set_description": "How the protocol is created and remembered",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "explicit",
|
||||
"term_left_description": "The design is stated explicitly somewhere that is accessible to participants",
|
||||
"term_right": "implicit",
|
||||
"term_right_description": "The design is not stated explicitly and is learned by use",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "precise",
|
||||
"term_left_description": "The design is specified with a high level of precision that eliminates ambiguity in implementation",
|
||||
"term_right": "interpretive",
|
||||
"term_right_description": "The design is ambiguous, allowing participants a wide range of interpretation",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "institutional",
|
||||
"term_left_description": "Design occurs through processes controlled by powerful institutions",
|
||||
"term_right": "vernacular",
|
||||
"term_right_description": "Design occurs through evolving community interactions",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "documenting",
|
||||
"term_left_description": "The primary purpose is to document or validate activity that is occurring",
|
||||
"term_right": "enabling",
|
||||
"term_right_description": "The primary purpose is to enable activity that might not happen otherwise",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "static",
|
||||
"term_left_description": "Designed to be as fixed and unchanging as possible",
|
||||
"term_right": "malleable",
|
||||
"term_right_description": "Designed to be changed by participants according to evolving needs",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "technical",
|
||||
"term_left_description": "Primarily concerned with interactions among technologies",
|
||||
"term_right": "social",
|
||||
"term_right_description": "Primarily concerned with interactions among people or groups",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "universal",
|
||||
"term_left_description": "Meant for global adoption across different communities",
|
||||
"term_right": "particular",
|
||||
"term_right_description": "Tailored for a specific community",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "durable",
|
||||
"term_left_description": "Designed to be persistently available",
|
||||
"term_right": "ephemeral",
|
||||
"term_right_description": "Designed to vanish when no longer needed",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Entanglement",
|
||||
"set_description": "How the protocol relates with participant agents",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "macro",
|
||||
"term_left_description": "Operates at large scales involving many participants or broad scope",
|
||||
"term_right": "micro",
|
||||
"term_right_description": "Operates at small scales with few participants or narrow scope",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "sovereign",
|
||||
"term_left_description": "A distinctive operating logic, not subject to any other entity",
|
||||
"term_right": "subsidiary",
|
||||
"term_right_description": "An operating logic under the control of a particular entity",
|
||||
"value": 1,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "self-enforcing",
|
||||
"term_left_description": "Rules are automatically enforced through its own mechanisms",
|
||||
"term_right": "enforced",
|
||||
"term_right_description": "Rules require external enforcement by authorities or institutions",
|
||||
"value": 1,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "abstract",
|
||||
"term_left_description": "Participants learn the protocol by studying it intellectually",
|
||||
"term_right": "embodied",
|
||||
"term_right_description": "Participants learn the protocol by physically practicing it",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "obligatory",
|
||||
"term_left_description": "Participation is compulsory for a certain class of agents",
|
||||
"term_right": "voluntary",
|
||||
"term_right_description": "Participation in the protocol is optional and not coerced",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "flocking",
|
||||
"term_left_description": "Coordination occurs through centralized direction or direct mimicry",
|
||||
"term_right": "swarming",
|
||||
"term_right_description": "Coordination occurs through distributed interactions without central direction",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "defensible",
|
||||
"term_left_description": "Strong boundaries and protections against external influence",
|
||||
"term_right": "exposed",
|
||||
"term_right_description": "Weak boundaries and vulnerable to external influence",
|
||||
"value": 5,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "monopolistic",
|
||||
"term_left_description": "Excludes the use of other protocols with similar purposes",
|
||||
"term_right": "pluralistic",
|
||||
"term_right_description": "Interoperates with other protocols and does not exclude their use",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Experience",
|
||||
"set_description": "How the protocol is perceived in the context of its implementation",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "sufficient",
|
||||
"term_left_description": "Adequately meets the needs and goals of participants",
|
||||
"term_right": "limited",
|
||||
"term_right_description": "Does not, on its own, adequately meet the needs and goals of participants",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "crystallized",
|
||||
"term_left_description": "Content or meaning are settled and widely agreed upon",
|
||||
"term_right": "contested",
|
||||
"term_right_description": "Content or meaning are disputed or under debate",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "trust-evading",
|
||||
"term_left_description": "Minimizes the need for trust among participants",
|
||||
"term_right": "trust-inducing",
|
||||
"term_right_description": "Relies on or cultivates trust among participants",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "predictable",
|
||||
"term_left_description": "Produces expected and consistent outcomes",
|
||||
"term_right": "emergent",
|
||||
"term_right_description": "Produces unexpected or novel outcomes",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "exclusion",
|
||||
"term_left_description": "Creates barriers or excludes certain participants",
|
||||
"term_right": "inclusion",
|
||||
"term_right_description": "Reduces barriers and includes diverse participants",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "restraining",
|
||||
"term_left_description": "Fosters experiences of absurd complexity, alienation, and powerlessness",
|
||||
"term_right": "liberating",
|
||||
"term_right_description": "Enables participants to carry out desired activities with less work or thought",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "dead",
|
||||
"term_left_description": "Not actively utilized by relevant participants",
|
||||
"term_right": "alive",
|
||||
"term_right_description": "Actively utilized by relevant participants",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"analysis": [
|
||||
{
|
||||
"term_left": "hardness",
|
||||
"term_left_description": "The protocol tends toward properties characterized by hardness",
|
||||
"term_right": "softness",
|
||||
"term_right_description": "The protocol tends toward properties characterized by softness",
|
||||
"instructions": "Take all the 'value' fields in the gradients above and determine a mean. Round it to the nearest integer. That is the 'value' here.",
|
||||
"automated": true,
|
||||
"value": 7,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "polarized",
|
||||
"term_left_description": "The analyst tended toward more extreme high or low readings",
|
||||
"term_right": "centrist",
|
||||
"term_right_description": "The analyst tended toward readings at the middle of the gradients",
|
||||
"instructions": "Take all the 'value' fields in the gradients above. Assess their degree of polarization. For instance, if all the values are either 1 or 9, the output would be 1, and if all of them are 5, the output would be 9.",
|
||||
"automated": true,
|
||||
"value": 3,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "bureaucratic",
|
||||
"term_left_description": "The protocol exhibits institutional, formal, top-down characteristics with centralized control and external enforcement",
|
||||
"term_right": "relational",
|
||||
"term_right_description": "The protocol exhibits community-based, emergent, bottom-up characteristics with distributed coordination and voluntary participation",
|
||||
"instructions": "Based on the diagnostic readings, calculate the protocol's position using Linear Discriminant Analysis. The LDA score is scaled to the 1-9 range, where 1 represents strongly bureaucratic/institutional protocols and 9 represents strongly relational/cultural protocols. A score of 5 indicates a protocol near the boundary exhibiting characteristics of both families.",
|
||||
"automated": true,
|
||||
"value": null,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "not useful",
|
||||
"term_left_description": "The bicorder was not useful or relevant for analyzing this protocol",
|
||||
"term_right": "very useful",
|
||||
"term_right_description": "The bicorder was very useful and relevant for analyzing this protocol",
|
||||
"instructions": "Evaluate the usefulness of this bicorder as a tool for analyzing this protocol, considering whether the gradient terms seemed revealing or irrelevant.",
|
||||
"automated": false,
|
||||
"value": null,
|
||||
"notes": null
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -0,0 +1,285 @@
|
||||
{
|
||||
"name": "Protocol Bicorder",
|
||||
"schema": "bicorder.schema.json",
|
||||
"version": "1.2.4",
|
||||
"description": "A diagnostic tool for the study of protocols",
|
||||
"author": "Nathan Schneider",
|
||||
"date_modified": "2025-12-02",
|
||||
"metadata": {
|
||||
"protocol": "Access Check-in",
|
||||
"description": "This is a protocol increasingly adopted in collaborative spaces to proactively identify and address participant needs beyond standard accommodations like ASL and captioning. It involves a dedicated portion of a meeting where participants are invited to share their needs and preferences, including fatigue levels or preferences for staying off-camera. This signals a commitment to inclusivity and prioritizes a participant-centered approach to engagement, and aims to foster a more comfortable and accessible environment.",
|
||||
"analyst": "GPT-OSS",
|
||||
"standpoint": "A careful ethnographer and outsider aspiring to achieve a neutral stance and a high degree of precision",
|
||||
"timestamp": null,
|
||||
"shortform": false
|
||||
},
|
||||
"diagnostic": [
|
||||
{
|
||||
"set_name": "Design",
|
||||
"set_description": "How the protocol is created and remembered",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "explicit",
|
||||
"term_left_description": "The design is stated explicitly somewhere that is accessible to participants",
|
||||
"term_right": "implicit",
|
||||
"term_right_description": "The design is not stated explicitly and is learned by use",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "precise",
|
||||
"term_left_description": "The design is specified with a high level of precision that eliminates ambiguity in implementation",
|
||||
"term_right": "interpretive",
|
||||
"term_right_description": "The design is ambiguous, allowing participants a wide range of interpretation",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "institutional",
|
||||
"term_left_description": "Design occurs through processes controlled by powerful institutions",
|
||||
"term_right": "vernacular",
|
||||
"term_right_description": "Design occurs through evolving community interactions",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "documenting",
|
||||
"term_left_description": "The primary purpose is to document or validate activity that is occurring",
|
||||
"term_right": "enabling",
|
||||
"term_right_description": "The primary purpose is to enable activity that might not happen otherwise",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "static",
|
||||
"term_left_description": "Designed to be as fixed and unchanging as possible",
|
||||
"term_right": "malleable",
|
||||
"term_right_description": "Designed to be changed by participants according to evolving needs",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "technical",
|
||||
"term_left_description": "Primarily concerned with interactions among technologies",
|
||||
"term_right": "social",
|
||||
"term_right_description": "Primarily concerned with interactions among people or groups",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "universal",
|
||||
"term_left_description": "Meant for global adoption across different communities",
|
||||
"term_right": "particular",
|
||||
"term_right_description": "Tailored for a specific community",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "durable",
|
||||
"term_left_description": "Designed to be persistently available",
|
||||
"term_right": "ephemeral",
|
||||
"term_right_description": "Designed to vanish when no longer needed",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Entanglement",
|
||||
"set_description": "How the protocol relates with participant agents",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "macro",
|
||||
"term_left_description": "Operates at large scales involving many participants or broad scope",
|
||||
"term_right": "micro",
|
||||
"term_right_description": "Operates at small scales with few participants or narrow scope",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "sovereign",
|
||||
"term_left_description": "A distinctive operating logic, not subject to any other entity",
|
||||
"term_right": "subsidiary",
|
||||
"term_right_description": "An operating logic under the control of a particular entity",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "self-enforcing",
|
||||
"term_left_description": "Rules are automatically enforced through its own mechanisms",
|
||||
"term_right": "enforced",
|
||||
"term_right_description": "Rules require external enforcement by authorities or institutions",
|
||||
"value": 4,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "abstract",
|
||||
"term_left_description": "Participants learn the protocol by studying it intellectually",
|
||||
"term_right": "embodied",
|
||||
"term_right_description": "Participants learn the protocol by physically practicing it",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "obligatory",
|
||||
"term_left_description": "Participation is compulsory for a certain class of agents",
|
||||
"term_right": "voluntary",
|
||||
"term_right_description": "Participation in the protocol is optional and not coerced",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "flocking",
|
||||
"term_left_description": "Coordination occurs through centralized direction or direct mimicry",
|
||||
"term_right": "swarming",
|
||||
"term_right_description": "Coordination occurs through distributed interactions without central direction",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "defensible",
|
||||
"term_left_description": "Strong boundaries and protections against external influence",
|
||||
"term_right": "exposed",
|
||||
"term_right_description": "Weak boundaries and vulnerable to external influence",
|
||||
"value": 6,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "monopolistic",
|
||||
"term_left_description": "Excludes the use of other protocols with similar purposes",
|
||||
"term_right": "pluralistic",
|
||||
"term_right_description": "Interoperates with other protocols and does not exclude their use",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Experience",
|
||||
"set_description": "How the protocol is perceived in the context of its implementation",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "sufficient",
|
||||
"term_left_description": "Adequately meets the needs and goals of participants",
|
||||
"term_right": "limited",
|
||||
"term_right_description": "Does not, on its own, adequately meet the needs and goals of participants",
|
||||
"value": 4,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "crystallized",
|
||||
"term_left_description": "Content or meaning are settled and widely agreed upon",
|
||||
"term_right": "contested",
|
||||
"term_right_description": "Content or meaning are disputed or under debate",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "trust-evading",
|
||||
"term_left_description": "Minimizes the need for trust among participants",
|
||||
"term_right": "trust-inducing",
|
||||
"term_right_description": "Relies on or cultivates trust among participants",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "predictable",
|
||||
"term_left_description": "Produces expected and consistent outcomes",
|
||||
"term_right": "emergent",
|
||||
"term_right_description": "Produces unexpected or novel outcomes",
|
||||
"value": 5,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "exclusion",
|
||||
"term_left_description": "Creates barriers or excludes certain participants",
|
||||
"term_right": "inclusion",
|
||||
"term_right_description": "Reduces barriers and includes diverse participants",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "restraining",
|
||||
"term_left_description": "Fosters experiences of absurd complexity, alienation, and powerlessness",
|
||||
"term_right": "liberating",
|
||||
"term_right_description": "Enables participants to carry out desired activities with less work or thought",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "dead",
|
||||
"term_left_description": "Not actively utilized by relevant participants",
|
||||
"term_right": "alive",
|
||||
"term_right_description": "Actively utilized by relevant participants",
|
||||
"value": 6,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"analysis": [
|
||||
{
|
||||
"term_left": "hardness",
|
||||
"term_left_description": "The protocol tends toward properties characterized by hardness",
|
||||
"term_right": "softness",
|
||||
"term_right_description": "The protocol tends toward properties characterized by softness",
|
||||
"instructions": "Take all the 'value' fields in the gradients above and determine a mean. Round it to the nearest integer. That is the 'value' here.",
|
||||
"automated": true,
|
||||
"value": 6,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "polarized",
|
||||
"term_left_description": "The analyst tended toward more extreme high or low readings",
|
||||
"term_right": "centrist",
|
||||
"term_right_description": "The analyst tended toward readings at the middle of the gradients",
|
||||
"instructions": "Take all the 'value' fields in the gradients above. Assess their degree of polarization. For instance, if all the values are either 1 or 9, the output would be 1, and if all of them are 5, the output would be 9.",
|
||||
"automated": true,
|
||||
"value": 4,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "bureaucratic",
|
||||
"term_left_description": "The protocol exhibits institutional, formal, top-down characteristics with centralized control and external enforcement",
|
||||
"term_right": "relational",
|
||||
"term_right_description": "The protocol exhibits community-based, emergent, bottom-up characteristics with distributed coordination and voluntary participation",
|
||||
"instructions": "Based on the diagnostic readings, calculate the protocol's position using Linear Discriminant Analysis. The LDA score is scaled to the 1-9 range, where 1 represents strongly bureaucratic/institutional protocols and 9 represents strongly relational/cultural protocols. A score of 5 indicates a protocol near the boundary exhibiting characteristics of both families.",
|
||||
"automated": true,
|
||||
"value": null,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "not useful",
|
||||
"term_left_description": "The bicorder was not useful or relevant for analyzing this protocol",
|
||||
"term_right": "very useful",
|
||||
"term_right_description": "The bicorder was very useful and relevant for analyzing this protocol",
|
||||
"instructions": "Evaluate the usefulness of this bicorder as a tool for analyzing this protocol, considering whether the gradient terms seemed revealing or irrelevant.",
|
||||
"automated": false,
|
||||
"value": null,
|
||||
"notes": null
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -0,0 +1,285 @@
|
||||
{
|
||||
"name": "Protocol Bicorder",
|
||||
"schema": "bicorder.schema.json",
|
||||
"version": "1.2.4",
|
||||
"description": "A diagnostic tool for the study of protocols",
|
||||
"author": "Nathan Schneider",
|
||||
"date_modified": "2025-12-02",
|
||||
"metadata": {
|
||||
"protocol": "Access Intimacy Protocol",
|
||||
"description": "This describes a spontaneous and often unarticulated feeling of connection and understanding between individuals related to access needs. It is characterized by an elusive comfort that arises when someone \"gets\" your specific access requirements, often transcending political or shared identity. The protocol is less about a structured process and more about recognizing and appreciating moments of intuitive, reciprocal understanding in the shared experience of disability. Experiencing this protocol can cultivate feelings of safety and validation.",
|
||||
"analyst": "GPT-OSS",
|
||||
"standpoint": "A careful ethnographer and outsider aspiring to achieve a neutral stance and a high degree of precision",
|
||||
"timestamp": null,
|
||||
"shortform": false
|
||||
},
|
||||
"diagnostic": [
|
||||
{
|
||||
"set_name": "Design",
|
||||
"set_description": "How the protocol is created and remembered",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "explicit",
|
||||
"term_left_description": "The design is stated explicitly somewhere that is accessible to participants",
|
||||
"term_right": "implicit",
|
||||
"term_right_description": "The design is not stated explicitly and is learned by use",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "precise",
|
||||
"term_left_description": "The design is specified with a high level of precision that eliminates ambiguity in implementation",
|
||||
"term_right": "interpretive",
|
||||
"term_right_description": "The design is ambiguous, allowing participants a wide range of interpretation",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "institutional",
|
||||
"term_left_description": "Design occurs through processes controlled by powerful institutions",
|
||||
"term_right": "vernacular",
|
||||
"term_right_description": "Design occurs through evolving community interactions",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "documenting",
|
||||
"term_left_description": "The primary purpose is to document or validate activity that is occurring",
|
||||
"term_right": "enabling",
|
||||
"term_right_description": "The primary purpose is to enable activity that might not happen otherwise",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "static",
|
||||
"term_left_description": "Designed to be as fixed and unchanging as possible",
|
||||
"term_right": "malleable",
|
||||
"term_right_description": "Designed to be changed by participants according to evolving needs",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "technical",
|
||||
"term_left_description": "Primarily concerned with interactions among technologies",
|
||||
"term_right": "social",
|
||||
"term_right_description": "Primarily concerned with interactions among people or groups",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "universal",
|
||||
"term_left_description": "Meant for global adoption across different communities",
|
||||
"term_right": "particular",
|
||||
"term_right_description": "Tailored for a specific community",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "durable",
|
||||
"term_left_description": "Designed to be persistently available",
|
||||
"term_right": "ephemeral",
|
||||
"term_right_description": "Designed to vanish when no longer needed",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Entanglement",
|
||||
"set_description": "How the protocol relates with participant agents",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "macro",
|
||||
"term_left_description": "Operates at large scales involving many participants or broad scope",
|
||||
"term_right": "micro",
|
||||
"term_right_description": "Operates at small scales with few participants or narrow scope",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "sovereign",
|
||||
"term_left_description": "A distinctive operating logic, not subject to any other entity",
|
||||
"term_right": "subsidiary",
|
||||
"term_right_description": "An operating logic under the control of a particular entity",
|
||||
"value": 1,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "self-enforcing",
|
||||
"term_left_description": "Rules are automatically enforced through its own mechanisms",
|
||||
"term_right": "enforced",
|
||||
"term_right_description": "Rules require external enforcement by authorities or institutions",
|
||||
"value": 1,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "abstract",
|
||||
"term_left_description": "Participants learn the protocol by studying it intellectually",
|
||||
"term_right": "embodied",
|
||||
"term_right_description": "Participants learn the protocol by physically practicing it",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "obligatory",
|
||||
"term_left_description": "Participation is compulsory for a certain class of agents",
|
||||
"term_right": "voluntary",
|
||||
"term_right_description": "Participation in the protocol is optional and not coerced",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "flocking",
|
||||
"term_left_description": "Coordination occurs through centralized direction or direct mimicry",
|
||||
"term_right": "swarming",
|
||||
"term_right_description": "Coordination occurs through distributed interactions without central direction",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "defensible",
|
||||
"term_left_description": "Strong boundaries and protections against external influence",
|
||||
"term_right": "exposed",
|
||||
"term_right_description": "Weak boundaries and vulnerable to external influence",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "monopolistic",
|
||||
"term_left_description": "Excludes the use of other protocols with similar purposes",
|
||||
"term_right": "pluralistic",
|
||||
"term_right_description": "Interoperates with other protocols and does not exclude their use",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Experience",
|
||||
"set_description": "How the protocol is perceived in the context of its implementation",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "sufficient",
|
||||
"term_left_description": "Adequately meets the needs and goals of participants",
|
||||
"term_right": "limited",
|
||||
"term_right_description": "Does not, on its own, adequately meet the needs and goals of participants",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "crystallized",
|
||||
"term_left_description": "Content or meaning are settled and widely agreed upon",
|
||||
"term_right": "contested",
|
||||
"term_right_description": "Content or meaning are disputed or under debate",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "trust-evading",
|
||||
"term_left_description": "Minimizes the need for trust among participants",
|
||||
"term_right": "trust-inducing",
|
||||
"term_right_description": "Relies on or cultivates trust among participants",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "predictable",
|
||||
"term_left_description": "Produces expected and consistent outcomes",
|
||||
"term_right": "emergent",
|
||||
"term_right_description": "Produces unexpected or novel outcomes",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "exclusion",
|
||||
"term_left_description": "Creates barriers or excludes certain participants",
|
||||
"term_right": "inclusion",
|
||||
"term_right_description": "Reduces barriers and includes diverse participants",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "restraining",
|
||||
"term_left_description": "Fosters experiences of absurd complexity, alienation, and powerlessness",
|
||||
"term_right": "liberating",
|
||||
"term_right_description": "Enables participants to carry out desired activities with less work or thought",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "dead",
|
||||
"term_left_description": "Not actively utilized by relevant participants",
|
||||
"term_right": "alive",
|
||||
"term_right_description": "Actively utilized by relevant participants",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"analysis": [
|
||||
{
|
||||
"term_left": "hardness",
|
||||
"term_left_description": "The protocol tends toward properties characterized by hardness",
|
||||
"term_right": "softness",
|
||||
"term_right_description": "The protocol tends toward properties characterized by softness",
|
||||
"instructions": "Take all the 'value' fields in the gradients above and determine a mean. Round it to the nearest integer. That is the 'value' here.",
|
||||
"automated": true,
|
||||
"value": 7,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "polarized",
|
||||
"term_left_description": "The analyst tended toward more extreme high or low readings",
|
||||
"term_right": "centrist",
|
||||
"term_right_description": "The analyst tended toward readings at the middle of the gradients",
|
||||
"instructions": "Take all the 'value' fields in the gradients above. Assess their degree of polarization. For instance, if all the values are either 1 or 9, the output would be 1, and if all of them are 5, the output would be 9.",
|
||||
"automated": true,
|
||||
"value": 2,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "bureaucratic",
|
||||
"term_left_description": "The protocol exhibits institutional, formal, top-down characteristics with centralized control and external enforcement",
|
||||
"term_right": "relational",
|
||||
"term_right_description": "The protocol exhibits community-based, emergent, bottom-up characteristics with distributed coordination and voluntary participation",
|
||||
"instructions": "Based on the diagnostic readings, calculate the protocol's position using Linear Discriminant Analysis. The LDA score is scaled to the 1-9 range, where 1 represents strongly bureaucratic/institutional protocols and 9 represents strongly relational/cultural protocols. A score of 5 indicates a protocol near the boundary exhibiting characteristics of both families.",
|
||||
"automated": true,
|
||||
"value": null,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "not useful",
|
||||
"term_left_description": "The bicorder was not useful or relevant for analyzing this protocol",
|
||||
"term_right": "very useful",
|
||||
"term_right_description": "The bicorder was very useful and relevant for analyzing this protocol",
|
||||
"instructions": "Evaluate the usefulness of this bicorder as a tool for analyzing this protocol, considering whether the gradient terms seemed revealing or irrelevant.",
|
||||
"automated": false,
|
||||
"value": null,
|
||||
"notes": null
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -0,0 +1,285 @@
|
||||
{
|
||||
"name": "Protocol Bicorder",
|
||||
"schema": "bicorder.schema.json",
|
||||
"version": "1.2.4",
|
||||
"description": "A diagnostic tool for the study of protocols",
|
||||
"author": "Nathan Schneider",
|
||||
"date_modified": "2025-12-02",
|
||||
"metadata": {
|
||||
"protocol": "Access-Centered Practices",
|
||||
"description": "In response to ableism within institutional settings during the COVID-19 pandemic, this protocol emphasizes inclusivity and accessibility for individuals with disabilities. It involves modifying communication methods, physical spaces, and programmatic elements to ensure participation for all. Beyond legal requirements, this process represents a move towards dismantling discriminatory practices and centering the experiences of disabled individuals. Ultimately, it highlights the importance of collective responsibility for creating equitable spaces.",
|
||||
"analyst": "GPT-OSS",
|
||||
"standpoint": "A careful ethnographer and outsider aspiring to achieve a neutral stance and a high degree of precision",
|
||||
"timestamp": null,
|
||||
"shortform": false
|
||||
},
|
||||
"diagnostic": [
|
||||
{
|
||||
"set_name": "Design",
|
||||
"set_description": "How the protocol is created and remembered",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "explicit",
|
||||
"term_left_description": "The design is stated explicitly somewhere that is accessible to participants",
|
||||
"term_right": "implicit",
|
||||
"term_right_description": "The design is not stated explicitly and is learned by use",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "precise",
|
||||
"term_left_description": "The design is specified with a high level of precision that eliminates ambiguity in implementation",
|
||||
"term_right": "interpretive",
|
||||
"term_right_description": "The design is ambiguous, allowing participants a wide range of interpretation",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "institutional",
|
||||
"term_left_description": "Design occurs through processes controlled by powerful institutions",
|
||||
"term_right": "vernacular",
|
||||
"term_right_description": "Design occurs through evolving community interactions",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "documenting",
|
||||
"term_left_description": "The primary purpose is to document or validate activity that is occurring",
|
||||
"term_right": "enabling",
|
||||
"term_right_description": "The primary purpose is to enable activity that might not happen otherwise",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "static",
|
||||
"term_left_description": "Designed to be as fixed and unchanging as possible",
|
||||
"term_right": "malleable",
|
||||
"term_right_description": "Designed to be changed by participants according to evolving needs",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "technical",
|
||||
"term_left_description": "Primarily concerned with interactions among technologies",
|
||||
"term_right": "social",
|
||||
"term_right_description": "Primarily concerned with interactions among people or groups",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "universal",
|
||||
"term_left_description": "Meant for global adoption across different communities",
|
||||
"term_right": "particular",
|
||||
"term_right_description": "Tailored for a specific community",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "durable",
|
||||
"term_left_description": "Designed to be persistently available",
|
||||
"term_right": "ephemeral",
|
||||
"term_right_description": "Designed to vanish when no longer needed",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Entanglement",
|
||||
"set_description": "How the protocol relates with participant agents",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "macro",
|
||||
"term_left_description": "Operates at large scales involving many participants or broad scope",
|
||||
"term_right": "micro",
|
||||
"term_right_description": "Operates at small scales with few participants or narrow scope",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "sovereign",
|
||||
"term_left_description": "A distinctive operating logic, not subject to any other entity",
|
||||
"term_right": "subsidiary",
|
||||
"term_right_description": "An operating logic under the control of a particular entity",
|
||||
"value": 2,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "self-enforcing",
|
||||
"term_left_description": "Rules are automatically enforced through its own mechanisms",
|
||||
"term_right": "enforced",
|
||||
"term_right_description": "Rules require external enforcement by authorities or institutions",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "abstract",
|
||||
"term_left_description": "Participants learn the protocol by studying it intellectually",
|
||||
"term_right": "embodied",
|
||||
"term_right_description": "Participants learn the protocol by physically practicing it",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "obligatory",
|
||||
"term_left_description": "Participation is compulsory for a certain class of agents",
|
||||
"term_right": "voluntary",
|
||||
"term_right_description": "Participation in the protocol is optional and not coerced",
|
||||
"value": 7,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "flocking",
|
||||
"term_left_description": "Coordination occurs through centralized direction or direct mimicry",
|
||||
"term_right": "swarming",
|
||||
"term_right_description": "Coordination occurs through distributed interactions without central direction",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "defensible",
|
||||
"term_left_description": "Strong boundaries and protections against external influence",
|
||||
"term_right": "exposed",
|
||||
"term_right_description": "Weak boundaries and vulnerable to external influence",
|
||||
"value": 5,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "monopolistic",
|
||||
"term_left_description": "Excludes the use of other protocols with similar purposes",
|
||||
"term_right": "pluralistic",
|
||||
"term_right_description": "Interoperates with other protocols and does not exclude their use",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"set_name": "Experience",
|
||||
"set_description": "How the protocol is perceived in the context of its implementation",
|
||||
"gradients": [
|
||||
{
|
||||
"term_left": "sufficient",
|
||||
"term_left_description": "Adequately meets the needs and goals of participants",
|
||||
"term_right": "limited",
|
||||
"term_right_description": "Does not, on its own, adequately meet the needs and goals of participants",
|
||||
"value": 4,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "crystallized",
|
||||
"term_left_description": "Content or meaning are settled and widely agreed upon",
|
||||
"term_right": "contested",
|
||||
"term_right_description": "Content or meaning are disputed or under debate",
|
||||
"value": 4,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "trust-evading",
|
||||
"term_left_description": "Minimizes the need for trust among participants",
|
||||
"term_right": "trust-inducing",
|
||||
"term_right_description": "Relies on or cultivates trust among participants",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "predictable",
|
||||
"term_left_description": "Produces expected and consistent outcomes",
|
||||
"term_right": "emergent",
|
||||
"term_right_description": "Produces unexpected or novel outcomes",
|
||||
"value": 3,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "exclusion",
|
||||
"term_left_description": "Creates barriers or excludes certain participants",
|
||||
"term_right": "inclusion",
|
||||
"term_right_description": "Reduces barriers and includes diverse participants",
|
||||
"value": 9,
|
||||
"notes": null,
|
||||
"shortform": true
|
||||
},
|
||||
{
|
||||
"term_left": "restraining",
|
||||
"term_left_description": "Fosters experiences of absurd complexity, alienation, and powerlessness",
|
||||
"term_right": "liberating",
|
||||
"term_right_description": "Enables participants to carry out desired activities with less work or thought",
|
||||
"value": 8,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
},
|
||||
{
|
||||
"term_left": "dead",
|
||||
"term_left_description": "Not actively utilized by relevant participants",
|
||||
"term_right": "alive",
|
||||
"term_right_description": "Actively utilized by relevant participants",
|
||||
"value": 6,
|
||||
"notes": null,
|
||||
"shortform": false
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"analysis": [
|
||||
{
|
||||
"term_left": "hardness",
|
||||
"term_left_description": "The protocol tends toward properties characterized by hardness",
|
||||
"term_right": "softness",
|
||||
"term_right_description": "The protocol tends toward properties characterized by softness",
|
||||
"instructions": "Take all the 'value' fields in the gradients above and determine a mean. Round it to the nearest integer. That is the 'value' here.",
|
||||
"automated": true,
|
||||
"value": 6,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "polarized",
|
||||
"term_left_description": "The analyst tended toward more extreme high or low readings",
|
||||
"term_right": "centrist",
|
||||
"term_right_description": "The analyst tended toward readings at the middle of the gradients",
|
||||
"instructions": "Take all the 'value' fields in the gradients above. Assess their degree of polarization. For instance, if all the values are either 1 or 9, the output would be 1, and if all of them are 5, the output would be 9.",
|
||||
"automated": true,
|
||||
"value": 4,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "bureaucratic",
|
||||
"term_left_description": "The protocol exhibits institutional, formal, top-down characteristics with centralized control and external enforcement",
|
||||
"term_right": "relational",
|
||||
"term_right_description": "The protocol exhibits community-based, emergent, bottom-up characteristics with distributed coordination and voluntary participation",
|
||||
"instructions": "Based on the diagnostic readings, calculate the protocol's position using Linear Discriminant Analysis. The LDA score is scaled to the 1-9 range, where 1 represents strongly bureaucratic/institutional protocols and 9 represents strongly relational/cultural protocols. A score of 5 indicates a protocol near the boundary exhibiting characteristics of both families.",
|
||||
"automated": true,
|
||||
"value": null,
|
||||
"notes": null
|
||||
},
|
||||
{
|
||||
"term_left": "not useful",
|
||||
"term_left_description": "The bicorder was not useful or relevant for analyzing this protocol",
|
||||
"term_right": "very useful",
|
||||
"term_right_description": "The bicorder was very useful and relevant for analyzing this protocol",
|
||||
"instructions": "Evaluate the usefulness of this bicorder as a tool for analyzing this protocol, considering whether the gradient terms seemed revealing or irrelevant.",
|
||||
"automated": false,
|
||||
"value": null,
|
||||
"notes": null
|
||||
}
|
||||
]
|
||||
}
|
||||