1 Introduction to Complex SystemsIntroduction to Complex Systems: How to think like nature Russ Abbott Sr. Engr. Spec. Rotn to CCAE 310-336-1398

Slides:



Advertisements
Similar presentations
Public Service Reform – from theory to policy? Richard Brooks.
Advertisements

Digital Certificate Installation & User Guide For Class-2 Certificates.
Digital Certificate Installation & User Guide For Class-2 Certificates.
Procurement – What can possibly go wrong Barbara Grange, Procurement Manager Peterborough Regional College Noel Cassidy, Procurement Officer Cambridge.
Digital Certificate Installation & User Guide For Class-2 Certificates.
Grant Proposal Writing© Dr. Ayman Abdel-Hamid, CS5014, Fall CS5014 Research Methods in CS Dr. Ayman Abdel-Hamid Computer Science Department Virginia.
1 Step No Action 1To login to myTax Portal to act on behalf of your organisation/business, select “I am logging in for….”  My Organisation/Business’ Tax.
By Mary Anne Poatsy, Keith Mulbery, Eric Cameron, Jason Davidson, Rebecca Lawson, Linda Lau, Jerri Williams Chapter 9 Fine-Tuning the Database 1 Copyright.
Writing: Sentence Mechanics “An Introduction to EAP – Academic Skills in English” Lesson 7.
WHAT IS INTERACTION DESIGN?
OneDrive for Business Introduction First Time Use First Time Use Access from Computer Access from Computer Access from Internet Access from Internet Access.
1 Principles of Complex Systems How to think like nature Russ Abbott Does nature really think?
1 Besides, does nature really think? Introduction to Complex Systems: How to think like nature Russ Abbott Sr. Engr. Spec. Rotn to CCAE
1 Does nature really think? Principles of Complex Systems: How to think like nature  The Aerospace Corporation. All Rights Reserved. Part 1.
1 Introduction to Complex Systems: How to think like nature Russ Abbott Sr. Engr. Spec. Rotn to CCAE  The.
1 Does nature really think? Introduction to Complex Systems: How to think like nature  The Aerospace Corporation. All Rights Reserved. Course.
1 Besides, does nature really think? Introduction to Complex Systems: How to think like nature  The Aerospace Corporation. All Rights Reserved.
1 Complex Systems: Introduction Russ Abbott Sr. Engr. Spec. Rotn to CCAE  The Aerospace Corporation. All.
1 Introduction to Complex Systems: How to think like nature Russ Abbott Sr. Engr. Spec. Rotn to CCAE  The.
1 Introduction to Complex Systems: How to think like nature Russ Abbott Sr. Engr. Spec. Rotn to CCAE  The.
1 Introduction to Complex Systems: How to think like nature Russ Abbott Sr. Engr. Spec. Rotn to CCAE  The.
1 Does nature really think? Introduction to Complex Systems: How to think like nature  The Aerospace Corporation. All Rights Reserved. Course.
1 Introduction to Complex Systems: How to think like nature  The Aerospace Corporation. All Rights Reserved. Course overview: two hours Russ.
1 Introduction to Complex Systems: How to think like nature Russ Abbott Sr. Engr. Spec  The Aerospace Corporation.
1 Besides, does nature really think? Introduction to Complex Systems: How to think like nature  The Aerospace Corporation. All Rights Reserved.
® © 2003 Intel Corporation Security Issues with Names Carl Ellison Sr. Security Architect Network Architecture Lab Intel Corporation June 17, 2003.
1 Introduction to Complex Systems: How to think like nature Russ Abbott Sr. Engr. Spec. Rotn to CCAE  The.
1 Does nature really think? Introduction to Complex Systems: How to think like nature  The Aerospace Corporation. All Rights Reserved. Course.
1 Besides, does nature really think? Introduction to Complex Systems: How to think like nature Russ Abbott Sr. Engr. Spec. Rotn to CCAE
Networking DSC340 Mike Pangburn. Networking: Computers on the Internet  1969 – 4  1971 – 15  1984 – 1000  1987 – 10,000  1989 – 100,000  1992 –
Barriers Identification for Wind Power Generation Technology Transfer in China By Li Junfeng Director of Center for Renewable Energy Development January.
SERVER Betül ŞAHİN What is this? Betül ŞAHİN
Authentication Approaches over Internet Jia Li
© by Seclarity Inc. 2005, Slide: 1 Seclarity, Inc Lightfall Court Columbia, MD A Blumberg Capital, Valley Ventures and Intel Capital Funded.
Google PowerMeter. Overview Google PowerMeter is a new application from Google that allows users to observe the power usage in their environment shown.
October 30, 2007 TSP Pre-Planning Meeting & Information.
Best Council, BSA Council Training Syllabus 1 Financial Management For Council Events & Activities.
Identity for energy management Bruce Nordman Lawrence Berkeley National Laboratory March 28, 2011 OPSAREA Meeting.
Chapter 8 Local Area Networks: Internetworking Data Communications and Computer Networks: A Business User’s Approach.
Cells By: Aspen Pennington.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Please check, just in case…. APA Tip of the Day: Quotation marks inside quotes If the text that you are quoting includes a word or phrase with double.
Government and Public Policy
A Vision of Employment For All: From competitive to customized Ellen Condon UM Rural Institute on Disabilities
What is “Technical Writing”? Dr. Mike Downing Technical Writing.
Chapter 1 Introduction to Cybercrime and Cyberterror Copyright © 2015 Carolina Academic Press. All rights reserved.
© 2006 Prentice Hall Business Publishing The Economic Way of Thinking, 11/e Heyne/Boettke/Prychitko “The Economic Way of Thinking” 11 th Edition Chapter.
1 Besides, does nature really think? Introduction to Complex Systems: How to think like nature Russ Abbott Sr. Engr. Spec. Rotn to CCAE
Networking Components Michelle Vega Network System Administrations LTEC /026 Mr. West.
1 Complex Systems: Introduction Russ Abbott Sr. Engr. Spec. Rotn to CCAE  The Aerospace Corporation. All.
1 Introduction to Complex Systems: How to think like nature  The Aerospace Corporation. All Rights Reserved. Course overview: two hours Russ.
A Pattern Language for Firewalls Eduardo B. Fernandez, Maria M. Petrie, Naeem Seliya, Nelly Delessy, and Angela Herzberg.
It’s Our Civic Duty Romans 13:1-7
Animal Testing: Good, Bad or Ugly?
Voice of the Customer - Lecture 11 Quality Function Deployment (QFD) © 2009 ~ Mark Polczynski.
1 Initial Narrative for this Sample Case (this case is abbreviated for this limited web sample test): John Frisk is the Help Desk Director, responsible.
Entrance Ticket Why are incentives important in the study of economics? Give an example to support your answer.
IN MEDICAL SCIENCE IN MEDICAL SCIENCE COMPUTER IS USED FOR KEY HOLE SURGERIES.
Learning Objectives © 2014 Cengage Learning. All Rights Reserved. LO1Describe the different users of accounting information. LO2Prepare a net worth statement.
Accounting I Accounting for a Service Business. Learning Targets © 2014 Cengage Learning. All Rights Reserved. Lesson 1-1 Accounting in Action What: Starting.
Millions of Dollars Lost. MAN IN THE BROWSER. TABLE OF CONTENTS Introduction Brief Examples of Man in the middle Defining MitB From Infection to Pay Day.
In the Framework of: Financed by: Developed by: MODULE 6 Association Membership Governance / Organizational Structure.
Free But Effective Listing Building and Marketing Service How to easily and quickly grow a list of potential buyers and constantly send them marketing.
The Future? Or the Past and Present?
The Importance of Information Systems Management – Part II
The Importance of Information Systems Management – Part II
Introduction to Complex Systems: How to think like nature
NT Server - Networking Southeaster University Domain System
Fables and “Animal Farm”
Intended Benefit Unintended Consequence
Presentation transcript:

1 Introduction to Complex SystemsIntroduction to Complex Systems: How to think like nature Russ Abbott Sr. Engr. Spec. Rotn to CCAE  The Aerospace Corporation. All Rights Reserved. A bit presumptuous? Besides, does nature really think?

2 Complex systems: How to think like nature Unintended consequences.

3 A fable Once upon a time, a state in India had too many snakes. To solve this problem the government instituted an incentive- based program to encourage its citizens to kill snakes. It created the No Snake Left Alive program. –Anyone who brought a dead snake into a field office of the Dead Snake Control Authority (DSCA) would be paid a generous Dead Snake Bounty (DSB). A year later the DSB budget was exhausted. DSCA had paid for a significant number of dead snakes. But there was no noticeable reduction in the number of snakes plaguing the good citizens of the state. What went wrong?

4 The DSCA mechanism Catch and submit a dead snake. DSCA Receive money. Dead snake verifier Receive dead snake certificate. Submit certificate to DSCA. What would you do if such a mechanism were available in your world? Start a snake farm.

5 Moral: unintended consequences The preceding is an example of what is sometimes called an unintended consequence. It represents an entire category of (unintended and unexpected) phenomena in which –a mechanism is installed in an environment, but then –the mechanism is used/exploited in unanticipated ways. Once a mechanism is installed in the environment, it will be used for whatever purposes users can think to make of it … –which may not be that for which it was originally intended. The first lesson of complex systems thinking is that one must always be aware of the relationship between systems and their environments. That’s how nature works.

6 Energy (and its proxy money) is fundamental. Any mechanism that provides access to energy/money/resources is a potential target of unintended consequences. A niche: Energy (and its proxy money) is fundamental. Any mechanism that provides access to energy/money/resources is a potential target of unintended consequences. A niche: Follow the energy/money Example: power is supplied to computer USB ports –Presumably to provide power for USB devices. –The wifi bridge uses the Internet Port for data. –But it gets its power from the USB port. Energy (and its proxy money) is fundamental. Any mechanism that provides access to energy/money/resources is a potential target of unintended consequences. A niche: a way of extracting energy/money/ resources from an environment Energy (and its proxy money) is fundamental. Any mechanism that provides access to energy/money/resources is a potential target of unintended consequences. A niche: a way of extracting energy/money/ resources from an environment