“Networks, when attacked, become even more decentralized and resilient. A good example is Napster and its successors, each of which has more closely approached an ideal peer-to-peer model, and further freed itself from reliance on infrastructure that can be shut down by central authority, than its predecessors. Hierarchies, on the other hand, respond to attack by becoming even more ossified, brittle and closed. Hierarchies respond to leaks by becoming internally opaque and closed even to themselves, so that their information is compartmentalized and they are less able to make effective use of the knowledge dispersed among their members.”
Related posts:
The hustlers and parasites who make up Washington's establishment
John Kerry, Organization Man
The Fantasy of Debt: No Trade-Offs, No Sacrifices
The Man Who Saved Russia from the Soviet Union
Ten Ways to Get People to Change
The Evolution of Government
Race to the Bottom: Injuring the Real Economy with Paper "Wealth"
Who Funds the War Party?
Dimes on Black and Dynamite on Red
Real ID Exposed: It Is Worse Than You Think
Schedule 7 and the detention of David Miranda
Civil war is the price Afghans will pay for the criminals the West installed
The Global Status Quo Strategy: Do More of What Has Failed Spectacularly
The Latest Bubble to Pop: Mortgage Refinancings
Free Money for Everyone