Skip to main content

Home/ ThoughtVectors2014/ Group items tagged wired

Rss Feed Group items tagged

kimah6

Real-Life Decepticons: Robots Learn to Cheat | Science | WIRED - 1 views

  • nnocence didn’t last.
    • kimah6
       
      Funny how the author used the word innocence.  The writer used "innocence" to describe a robot.  Robots have feelings?
  • Soon the robots learned to follow the signals of others who’d gathered at the food. But there wasn’t enough space for all of them to feed, and the robots bumped and jostled for position. As before, only a few made it through the bottleneck of selection. And before long, they’d evolved to mute their signals, thus concealing their location.
  • “Evolutionary robotic systems implicitly encompass many behavioral components … thus allowing for an unbiased investigation of the factors driving signal evolution,” the researchers wrote Monday in the Proceedings of the National Academy of Sciences. “The great degree of realism provided by evolutionary robotic systems thus provides a powerful tool for studies that cannot readily be performed with real organisms.”
  •  
    Robots Learn to Cheat
anonymous

In the Programmable World, All Our Objects Will Act as One | Gadget Lab | WIRED - 0 views

  • what’s remarkable about this future isn’t the sensors, nor is it that all our sensors and objects and devices are linked together. It’s the fact that once we get enough of these objects onto our networks, they’re no longer one-off novelties or data sources but instead become a coherent system, a vast ensemble that can be choreographed, a body that can dance. Really, it’s the opposite of an “Internet,” a term that even today—in the era of the cloud and the app and the walled garden—connotes a peer-to-peer system in which each node is equally empowered. By contrast, these connected objects will act more like a swarm of drones, a distributed legion of bots, far-flung and sometimes even hidden from view but nevertheless coordinated as if they were a single giant machine.
  • For the Programmable World to reach its full potential, we need to pass through three stages. The first is simply the act of getting more devices onto the network—more sensors, more processors in everyday objects, more wireless hookups to extract data from the processors that already exist. The second is to make those devices rely on one another, coordinating their actions to carry out simple tasks without any human intervention. The third and final stage, once connected things become ubiquitous, is to understand them as a system to be programmed, a bona fide platform that can run software in much the same manner that a computer or smartphone can. Once we get there, that system will transform the world of everyday objects into a design­able environment, a playground for coders and engineers. It will change the whole way we think about the division between the virtual and the physical.
jamieparkerson

Don\'t trust privacy apps, use Tor (Wired UK) - 0 views

  •  
    Tor is not a silver bullet, but as we become more aware of the types of ongoing government and corporate surveillance of our online lives, it remains a vital tool. This was the message delivered by Runa Sandvik, a contributor to the open source Tor Project, at Kaspersky Lab's open day.
kimah6

Will robots eventually destroy humanity? Probably | Stuff You Should Know - 5 views

  • superhuman strength,
  • worrisome.
    • kimah6
       
      Agreed.
  • Brandon Keim over at Wired reported
  •  
    One of the great things about robots so far is that while, sure, they have superhuman strength, they're generally dumb as a bag of doorknobs. It's very satisfying to push around some robot who's just standing there like a jerk, waiting for you to order him to lift a can or run in place.
jamieparkerson

How to stay anonymous online (Wired UK) - 1 views

  •  
    One year after the first revelations of Edward Snowden, cryptography has shifted from an obscure branch of computer science to an almost mainstream notion: It's possible, user privacy groups and a growing industry of crypto-focused companies tell us, to encrypt everything from emails to IMs to a gif of a motorcycle jumping over a plane.
abdulrahmanabdo

How the NSA's Domestic Spying Program Works | Electronic Frontier Foundation - 0 views

  • When the NSA’s spying program was first exposed by the New York Times in 2005, President Bush admitted to a small aspect of the program—what the administration labeled the “Terrorist Surveillance Program”—in which the NSA monitored, without warrants, the communications of between 500-1000 people inside the US with suspected connections to Al Qaeda.
    • abdulrahmanabdo
       
      The first time the NSA's spying programs where first exposed and what was chosen to be revealed by the Bush administration.
  • But other aspects of the Program were aimed not just at targeted individuals, but perhaps millions of innocent Americans never suspected of a crime.
  • A person familiar with the matter told USA Today that the agency's goal was "to create a database of every call ever made" within the nation's borders. All of this was done without a warrant or any judicial oversight.
    • abdulrahmanabdo
       
      The main reason why some Americans are upset by the NSA's recent actions. It was a breach in the balance of power that much of American government is run by, for now hundreds of years.
  • ...4 more annotations...
  • This equipment gave the NSA unfettered access to large streams of domestic and international communications in real time—what amounted to at least 1.7 billion emails a day, according to the Washington Post.
    • abdulrahmanabdo
       
      The intelligence gathering power of the NSA.
  • First, the government convinced the major telecommunications companies in the US, including AT&T, MCI, and Sprint, to hand over the “call-detail records” of their customers. According to an investigation by USA Today, this included “customers' names, street addresses, and other personal information.” In addition, the government received “detailed records of calls they made—across town or across the country—to family members, co-workers, business contacts and others.”
    • abdulrahmanabdo
       
      How the intensive intelligence gathering began for the NSA.
  • It works like this: when you send an email or otherwise use the internet, the data travels from your computer, through telecommunication companies' wires and fiber optics networks, to your intended recipient. To intercept these communications, the government installed devices known as “fiber-optic splitters” in many of the main telecommunication junction points in the United States (like the AT&T facility in San Francisco). These splitters make exact copies of the data passing through them: then, one stream is directed to the government, while the other stream is directed to the intended recipients.
    • abdulrahmanabdo
       
      How intelligence gathering works for the NSA.
  • In April 2012, long-time national security author James Bamford reported NSA is spending $2 billion to construct a data center in a remote part of Utah to house the information it has been collecting for the past decade. “Flowing through its servers and routers and stored in near-bottomless databases,” Bamford wrote, “will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital ‘pocket litter.’
  •  
    The NSA's Domestic Spying Program and how it works.
normonique

Can the Nervous System Be Hacked? - NYTimes.com - 0 views

  • But communication between nerves and the immune system was considered impossible, according to the scientific consensus in 1998.
  • It would have been “inconceivable,” he added, to propose that nerves were directly interacting with immune cells.
  • electrical pulses to the rat’s exposed vagus nerve. He stitched the cut closed and gave the rat a bacterial toxin known to promote the production of tumor necrosis factor, or T.N.F., a protein that triggers inflammation in animals, including humans.
  • ...7 more annotations...
    • normonique
       
      This small passage answer my question of 'if the nervous system could be directly wired to technology' 
  • the nervous system was like a computer terminal through which you could deliver commands to stop a problem,
    • normonique
       
      This is a refreshing approach to cures from medicine which has a tedious list of side affects with no promise of correcting the initial problem. 
  • Inflammatory afflictions like rheumatoid arthritis and Crohn’s disease are currently treated with drugs — painkillers, steroids and what are known as biologics, or genetically engineered proteins. But such medicines, Tracey pointed out, are often expensive, hard to administer, variable in their efficacy and sometimes accompanied by lethal side effects.
  • All the information is coming and going as electrical signals
  • His work seemed to indicate that electricity delivered to the vagus nerve in just the right intensity and at precise intervals could reproduce a drug’s therapeutic — in this case, anti-inflammatory — reaction. His subsequent research would also show that it could do so more effectively and with minimal health risks.
  • bioelectronics is straightforward: Get the nervous system to tell the body to heal itself.
  •  
    This post is incredible, it's exciting to understand how technology can tell the brain to heal itself. 
1 - 7 of 7
Showing 20 items per page