Skip to main content

Home/ TOK Friends/ Group items tagged simulation

Rss Feed Group items tagged

caelengrubb

Study exposes global ripple effects of regional water scarcity -- ScienceDaily - 1 views

  • Water scarcity is often understood as a problem for regions experiencing drought, but a new study from Cornell and Tufts universities finds that not only can localized water shortages impact the global economy, but changes in global demand send positive and negative ripple effects to water basins across the globe.
  • "Evaluating the economic impact of water scarcity in a changing world," was published March 26 in Nature Communications, and uniquely captures the interdependent effects of global trade consistently with differences in regional climate policies as well as river basin-specific capacity to address water scarcity risks.
  • The researchers coupled physical and economic models to simulate thousands of potential climate futures for 235 major river basins -- a technique known as scenario discovery -- to better understand how water scarcity is a globally-connected phenomenon, with local conditions having reverberations across the globe in industries such as agriculture, energy, transportation and manufacturing.
  • ...4 more annotations...
  • The study also found that small differences in projections for future climate conditions can yield very large differences in the economic outcomes for water scarcity.
  • A river basin can be considered economically robust if it is able to adapt to drought with alternative sources of water or adjust economic activity to limit usage.
  • The conditions that lead to these tipping points are highly variable from basin to basin, depending on a combination of local factors and global conditions
  • As climate change makes the physical and economic effects of water scarcity more challenging for policy makers to understand, the researchers hope their work will provide the basis for similar analyses and draw attention to the importance of expanded data collection to improve modeling and decision making.
tonycheng6

Accurate machine learning in materials science facilitated by using diverse data sources - 0 views

  • Computational modelling is also used to estimate the properties of materials. However, there is usually a trade-off between the cost of the experiments (or simulations) and the accuracy of the measurements (or estimates), which has limited the number of materials that can be tested rigorously.
  • Materials scientists commonly supplement their own ‘chemical intuition’ with predictions from machine-learning models, to decide which experiments to conduct next
  • More importantly, almost all of these studies use models built on data obtained from a single, consistent source. Such models are referred to as single-fidelity models.
  • ...4 more annotations...
  • However, for most real-world applications, measurements of materials’ properties have varying levels of fidelity, depending on the resources available.
  • A comparison of prediction errors clearly demonstrates the benefit of the multi-fidelity approach
  • The authors’ system is not restricted to materials science, but is generalizable to any problem that can be described using graph structures, such as social networks and knowledge graphs (digital frameworks that represent knowledge as concepts connected by relationships)
  • More research is needed to understand the scenarios for which multi-fidelity learning is most beneficial, balancing prediction accuracy with the cost of acquiring data
kaylynfreeman

NASA's SLS Rocket to the Moon Faces Setback After Test - The New York Times - 0 views

  • After billions of dollars and a decade of work, NASA’s plans to send astronauts back to the moon had a new setback on Saturday. A planned eight-minute test firing of the four engines of a new mega rocket needed for the moon missions came to an abrupt end after only about a minute.
  • NASA officials, however, said that it was too early to predict delays, if any. “I don’t think at this point that we have enough information to know,” Jim Bridenstine, the NASA administrator, said during a news conference after the test. “It depends what the anomaly was and how challenging it’s going to be to fix it.”
  • The rocket, known as the Space Launch System, has yet to travel to space, and Saturday’s test was intended to be a key milestone. For the first time, the four engines on the booster stage were set to be fired for about eight minutes, simulating what they would do during an actual launch.
pier-paolo

SCIENCE WATCH; Clouded Perceptions - The New York Times - 0 views

  • experiments showed that fog could make a driver think he had dropped to a safe speed when he was actually hurtling along at, say, 70 miles per hour, thinking he was doing 50.
  • Evidence suggests that when people look at a pattern like moving stripes, they think that the stripes move more slowly when it becomes hard to see where one stops and another begins.
  • To find out if a similar distortion affects drivers in fog, the Cardiff researchers studied nine people who had been taught to drive in a computer-controlled simulated environment.
  • ...3 more annotations...
  • with feedback,'' Dr. Snowden said, ''we could teach them to be accurate and drive at a consistent speed.''
  • drivers were often reluctant to drag their eyes from a foggy road and tended to judge their speed by feel.
  • ''We can't change our visual systems,'' Dr. Snowden said, ''so even when visibility is poor, it's worth having a look down to check your speed.'
Javier E

Everyone is biased, including you: the play designed by neuroscientists | Science | The... - 1 views

  • In a 2014 study, Mercier and colleagues found only 22% of participants could solve a reasoning task on their own, but when small groups discussed their thinking, this rose to 63%. “If people are reasoning on their own or only with people they agree with, nine times out of 10 they will stick to biased positions and you are going to get polarisation,” he says. “But if you take a group of people with some kind of common incentive but who disagree about something, then reason can help them get a better answer.”
knudsenlu

Imagining the Future Is Just Another Form of Memory - The Atlantic - 0 views

  • humans predict what the future will be like by using their memories
  • “When somebody’s preparing for a date with someone they’ve never been on a date with before, or a job interview—these situations where we don’t have past experience, that’s where we think this ability to imagine the future really matters,” says Karl Szpunar, a professor of psychology at the University of Illinois at Chicago. People “can take bits and pieces, like who’s going to be there, where it’s going to be, and try to put all that together into a novel simulation of events.”
  • The first clue that memory and imagining the future might go hand in hand came from amnesia patients. When they lost their pasts, it seemed, they lost their futures as well.
  • ...4 more annotations...
  • Since then, functional MRI scans have allowed researchers to determine that many of the same brain structures are indeed involved in both remembering and forecasting
  • And just as memories are more detailed the more recent they are, imagined future scenes are more detailed the nearer in the future they are
  • It’s not hard to see how this ability to imagine the future gives humans an evolutionary advantage. If you can plan for the future, you’re more likely to survive it. But there’s are limitations as well. Your accumulated experiences—and your cultural life script—are the only building blocks you have to construct a vision of the future. This can make it hard to expect the unexpected, and it means people often expect the future to be more like the past, or the present, than it will be.
  • There’s also an “optimistic, extreme positivity bias toward the future,” Bohn says. To the point that people “always say future events are more important to their identity and life story than the past events.” Talk about being nostalgic for the future.
runlai_jiang

8 Infinity Facts That Will Blow Your Mind - 0 views

  • Infinity has its own special symbol: ∞. The symbol, sometimes called the lemniscate, was introduced by clergyman and mathematician John Wallis in 1655. The word "lemniscate" comes from the Latin word lemniscus, which means "ribbon," while the word "infinity" comes from the Latin word infinitas, which means "boundless."
  • Of all Zeno's paradoxes, the most famous is his paradox of the Tortoise and Achilles. In the paradox, a tortoise challenges the Greek hero Achilles to a race, providing the tortoise is given a small head start. The tortoise argues he will win the race because as Achilles catches up to him, the tortoise will have gone a bit further, adding to the distance.
  • Pi as an Example of Infinity Pi is a number consisting of an infinite number of digits. Jeffrey Coolidge / Getty Images Another good example of infinity is the number π or pi. Mathematicians use a symbol for pi because it's impossible to write the number down. Pi consists of an infinite number of digits. It's often rounded to 3.14 or even 3.14159, yet no matter how many digits you write, it's impossible to get to the end.
  • ...2 more annotations...
  • Fractals and Infinity A fractal may be magnified over and over, to infinity, always revealing more detail. PhotoviewPlus / Getty Images A fractal is an abstract mathematical object, used in art and to simulate natural phenomena. Written as a mathematical equation, most fractals are nowhere differentiable. When viewing an image of a fractal, this means you could zoom in and see new detail. In other words, a fractal is infinitely magnifiable.The Koch snowflake is an interesting example of a fractal. The snowflake starts as an equilateral triangle. For each iteration of the fractal:Each line segment is divided into three equal segments.
  • Cosmology and Infinity Even if the universe is finite, it might be one of an infinite number of "bubbles.". Detlev van Ravenswaay / Getty Images Cosmologists study the universe and ponder infinity. Does space go on and on without end? This remains an open question. Even if the physical universe as we know it has a boundary, there is still the multiverse theory to consider. Our universe may be but one in an infinite number of them.
runlai_jiang

BBC - Capital - The dirty secret about success - 0 views

  • e’re often reluctant to credit our good fortune purely to luck. We’d much rather put a material gain or positive outcome down to our brilliant intelligence, smarts, skills or hard work.But if success is directly correlated to our ability, why do there seem to be so many rich people with mediocre talent? And why aren’t the smartest people in the world also the wealthiest?A new paper authored by a team of Italian researchers, physicists Alessandro Pluchino and Andrea Raspisarda and economist Alessio Biondo, used a computer simulation of success defined by financial wealth to show that the most successful people in the world aren’t necessarily the most talented. They are the luckiest.
  • “It’s hard to get people to think about external forces and events,” says Frank. “But we find that if you prompt them to think about it – by asking about a time when they were lucky, rather than telling them they were lucky – the more generous people become and more willing to contribute to the common good.”
johnsonel7

Computers Are Learning to Read-But They're Still Not So Smart | WIRED - 0 views

  • computers still weren’t very good at understanding the written word. Sure, they had become decent at simulating that understanding in certain narrow domains, like automatic translation or sentiment analysis (for example, determining if a sentence sounds “mean or nice,” he said). But Bowman wanted measurable evidence of the genuine article: bona fide, human-style reading comprehension in English. So he came up with a test
  • The machines bombed. Even state-of-the-art neural networks scored no higher than 69 out of 100 across all nine tasks: a D-plus, in letter grade terms. Bowman and his coauthors weren’t surprised. Neural networks — layers of computational connections built in a crude approximation of how neurons communicate within mammalian brains
  • It produced a GLUE score of 80.5. On this brand-new benchmark designed to measure machines’ real understanding of natural language — or to expose their lack thereof — the machines had jumped from a D-plus to a B-minus in just six months.
  • ...4 more annotations...
  • Researchers simply fed their neural networks massive amounts of written text copied from freely available sources like Wikipedia — billions of words, preformatted into grammatically correct sentences — and let the networks derive next-word predictions on their own. In essence, it was like asking the person inside a Chinese room to write all his own rules, using only the incoming Chinese messages for reference.“The great thing about this approach is it turns out that the model learns a ton of stuff about syntax,”
  • The only problem is that perfect rulebooks don’t exist, because natural language is far too complex and haphazard to be reduced to a rigid set of specifications.
  • The nonsequential nature of the transformer represented sentences in a more expressive form, which Uszkoreit calls treelike. Each layer of the neural network makes multiple, parallel connections between certain words while ignoring others — akin to a student diagramming a sentence in elementary school. These connections are often drawn between words that may not actually sit next to each other in the sentence. “Those structures effectively look like a number of trees that are overlaid,” Uszkoreit explained.
  • But instead of concluding that BERT could apparently imbue neural networks with near-Aristotelian reasoning skills, they suspected a simpler explanation: that BERT was picking up on superficial patterns in the way the warrants were phrased.
tongoscar

A Pattern Recognition Theory of Mind | Praxis - 0 views

  • the pace of improvement in technology would become a runaway phenomenon that would transform all aspects of human civilization.
  • the structure and functioning of the human brain is actually quite simple, a basic unit of cognition repeated millions of times. Therefore, creating an artificial brain will not require simulating the human brain at every level of detail. It will only require reverse engineering this basic repeating unit.
  • our memories are organized in discrete segments. If you try to start mid-segment, you’ll struggle for a bit until your sequential memory kicks in.
  • ...13 more annotations...
  • your memories are sequential, like symbols on a ticker tape. They are designed to be read in a certain direction and in order.
  • your memories are nested. Every action and thought is made up of smaller actions and thoughts.
  • the cortical column, a basic structure that is repeated throughout the neocortex. Each of the approximately 500,000 cortical columns is about two millimeters high and a half millimeter wide, and contains about 60,000 neurons (for a total of about 30 billion neurons in the neocortex).
  • The human brain has evolved to recognize patterns, perhaps more than any other single function. Our brain is weak at processing logic, remembering facts, and making calculations, but pattern recognition is its deep core capability.
  • The neocortex is an elaborately folded sheath of tissue covering the whole top and front of the brain, making up nearly 80% of its weight.
  • The basic structure and functioning of the human brain is hierarchical. This may not seem intuitive at first. It sounds like how a computer works.
  • For our purposes, the most important thing to understand about the neocortex is that it has an extremely uniform structure.
  • Mountcastle also believed there must be smaller sub-units, but that couldn’t be confirmed until years later. These “mini-columns” are so tightly interwoven it is impossible to distinguish them, but they constitute the fundamental component of the neocortex. Thus, they constitute the fundamental component of human thought.
  • The basic structure of a PR has three parts: the input, the name, and the output.
  • The first part is the input – dendrites coming from other PRs that signal the presence of lower-level patterns
  • The third part is the output – axons emerging from the PR that signal the presence of its designated pattern.
  • When the inputs to a PR cross a certain threshold, it fires. That is, it emits a nerve impulse to the higher-level PRs it connects to. This is essentially the “A” PR shouting “Hey guys! I just saw the letter “A”!” When the PR for “Apple” hears such signals for a, p, p again, l, and e, it fires itself, shouting “Hey guys! I just saw “Apple!” And so on up the hierarchy.
  • “neurons that fire together, wire together,” which emphasizes the plasticity of individual neurons and is known as the Hebbian Theory, may be incorrect.
blythewallick

Physical activity in lessons improves students' attainment -- ScienceDaily - 0 views

  • "These improvements in physical activity levels and educational outcomes are the result of quite basic physical exercises. Teachers can easily incorporate these physical active lessons in the existing curriculum to improve the learning experience of students."
  • In one of the 42 studies analysed, eight- and nine-year-olds simulated travelling the world by running on the spot in between answering questions relating to different countries. The research team, also led by Dr Norris at UCL, concluded that the children were more active and more focused on the task than peers in a control group, following teachers' instructions more closely.
  • In another study in the Netherlands, primary school children who took part in physically active lessons three times a week over two years made significantly better progress in spelling and mathematics than their peers -- equating to four months of extra learning gains.
Javier E

Seeking Dark Matter, They Detected Another Mystery - The New York Times - 0 views

  • A team of scientists hunting dark matter has recorded suspicious pings coming from a vat of liquid xenon underneath a mountain in Italy
  • If the signal is real and persists, the scientists say, it may be evidence of a species of subatomic particles called axions — long theorized to play a crucial role in keeping nature symmetrical but never seen — streaming from the sun.
  • Instead of axions, the scientists may have detected a new, unexpected property of the slippery ghostly particles called neutrinos. Yet another equally likely explanation is that their detector has been contaminated by vanishingly tiny amounts of tritium, a rare radioactive form of hydrogen.
  • ...19 more annotations...
  • “We want to be very clear that all we are reporting is observation of an excess (a fairly significant one) and not a discovery of any kind,”
  • “I’m trying to be calm here, but it’s hard not to be hyperbolic,” said Neal Weiner, a particle theorist at New York University. “If this is real, calling it a game changer would be an understatement.”
  • Dr. Aprile’s Xenon experiment is currently the largest and most sensitive in an alphabet soup of efforts aimed at detecting and identifying dark matter
  • The best guess is that this dark matter consists of clouds of exotic subatomic particles left over from the Big Bang and known generically as WIMPs, for weakly interacting massive particles, hundreds or thousands of times more massive than a hydrogen atom.
  • Dr. Aprile and her colleagues have wired a succession of vats containing liquid xenon with photomultipliers and other sensors. The hope is that her team’s device — far underground to shield it from cosmic rays and other worldly forms of interference — would spot the rare collision between a WIMP and a xenon atom. The collision should result in a flash of light and a cloud of electrical charge.
  • in its most recent analysis of that experiment, the team had looked for electrons, rather than the heavier xenon nuclei, recoiling from collisions. Among other things, that could be the signature of particles much lighter than the putative WIMPs striking the xenon.
  • Simulations and calculations suggested that random events should have produced about 232 such recoils over the course of a year.
  • But from February 2017 to February 2018, the detector recorded 285, an excess of 53 recoils.
  • The story of axions begins in 1977, when Roberto Peccei, a professor at the University of California, Los Angeles, who died on June 1, and Helen Quinn, emerita professor at Stanford, suggested a slight modification to the theory that governs strong nuclear forces, making sure that it is invariant to the direction of time, a feature that physicists consider a necessity for the universe.
  • this modification implied the existence of a new subatomic particle. Dr. Wilczek called it the axion, and the name stuck.
  • Axions have never been detected either directly or indirectly. And the theory does not predict their mass, which makes it hard to look for them. It only predicts that they would be weird and would barely interact with regular matter
  • although they are not WIMPS, they share some of those particles’ imagined weird abilities, such as being able to float through Earth and our bodies like smoke through a screen door.
  • In order to fulfill the requirements of cosmologists, however, such dark-matter axions would need to have a mass of less than a thousandth of an electron volt in the units of mass and energy preferred by physicists
  • (By comparison, the electrons that dance around in your smartphone weigh in at half a million electron volts each.) What they lack in heft they would more than make up for in numbers.
  • That would make individual cosmic dark-matter axions too slow and ethereal to be detected by the Xenon experiment.But axions could also be produced by nuclear reactions in the sun, and those “solar axions” would have enough energy to ping the Xenon detector right where it is most sensitive
  • The other exciting, though slightly less likely, possibility is that the Xenon collaboration’s excess signals come from the wispy particles known as neutrinos, which are real, and weird, and zipping through our bodies by the trillions every second.
  • Ordinarily, these neutrinos would not contribute much to the excess of events the detector read. But they would do so if they had an intrinsic magnetism that physicists call a magnetic moment. That would give them a higher probability of interacting with the xenon and tripping the detector
  • According to the standard lore, neutrinos, which are electrically neutral, do not carry magnetism. The discovery that they did would require rewriting the rules as they apply to neutrinos.
  • That, said Dr. Weiner, would be “a very very big deal,” because it would imply that there are new fundamental particles out there to look for — new physics.
Javier E

Quantum Computing Advance Begins New Era, IBM Says - The New York Times - 0 views

  • While researchers at Google in 2019 claimed that they had achieved “quantum supremacy” — a task performed much more quickly on a quantum computer than a conventional one — IBM’s researchers say they have achieved something new and more useful, albeit more modestly named.
  • “We’re entering this phase of quantum computing that I call utility,” said Jay Gambetta, a vice president of IBM Quantum. “The era of utility.”
  • Present-day computers are called digital, or classical, because they deal with bits of information that are either 1 or 0, on or off. A quantum computer performs calculations on quantum bits, or qubits, that capture a more complex state of information. Just as a thought experiment by the physicist Erwin Schrödinger postulated that a cat could be in a quantum state that is both dead and alive, a qubit can be both 1 and 0 simultaneously.
  • ...15 more annotations...
  • That allows quantum computers to make many calculations in one pass, while digital ones have to perform each calculation separately. By speeding up computation, quantum computers could potentially solve big, complex problems in fields like chemistry and materials science that are out of reach today.
  • When Google researchers made their supremacy claim in 2019, they said their quantum computer performed a calculation in 3 minutes 20 seconds that would take about 10,000 years on a state-of-the-art conventional supercomputer.
  • The IBM researchers in the new study performed a different task, one that interests physicists. They used a quantum processor with 127 qubits to simulate the behavior of 127 atom-scale bar magnets — tiny enough to be governed by the spooky rules of quantum mechanics — in a magnetic field. That is a simple system known as the Ising model, which is often used to study magnetism.
  • This problem is too complex for a precise answer to be calculated even on the largest, fastest supercomputers.
  • On the quantum computer, the calculation took less than a thousandth of a second to complete. Each quantum calculation was unreliable — fluctuations of quantum noise inevitably intrude and induce errors — but each calculation was quick, so it could be performed repeatedly.
  • Indeed, for many of the calculations, additional noise was deliberately added, making the answers even more unreliable. But by varying the amount of noise, the researchers could tease out the specific characteristics of the noise and its effects at each step of the calculation.“We can amplify the noise very precisely, and then we can rerun that same circuit,” said Abhinav Kandala, the manager of quantum capabilities and demonstrations at IBM Quantum and an author of the Nature paper. “And once we have results of these different noise levels, we can extrapolate back to what the result would have been in the absence of noise.”In essence, the researchers were able to subtract the effects of noise from the unreliable quantum calculations, a process they call error mitigation.
  • Altogether, the computer performed the calculation 600,000 times, converging on an answer for the overall magnetization produced by the 127 bar magnets.
  • Although an Ising model with 127 bar magnets is too big, with far too many possible configurations, to fit in a conventional computer, classical algorithms can produce approximate answers, a technique similar to how compression in JPEG images throws away less crucial data to reduce the size of the file while preserving most of the image’s details
  • Certain configurations of the Ising model can be solved exactly, and both the classical and quantum algorithms agreed on the simpler examples. For more complex but solvable instances, the quantum and classical algorithms produced different answers, and it was the quantum one that was correct.
  • Thus, for other cases where the quantum and classical calculations diverged and no exact solutions are known, “there is reason to believe that the quantum result is more accurate,”
  • Mr. Anand is currently trying to add a version of error mitigation for the classical algorithm, and it is possible that could match or surpass the performance of the quantum calculations.
  • In the long run, quantum scientists expect that a different approach, error correction, will be able to detect and correct calculation mistakes, and that will open the door for quantum computers to speed ahead for many uses.
  • Error correction is already used in conventional computers and data transmission to fix garbles. But for quantum computers, error correction is likely years away, requiring better processors able to process many more qubits
  • “This is one of the simplest natural science problems that exists,” Dr. Gambetta said. “So it’s a good one to start with. But now the question is, how do you generalize it and go to more interesting natural science problems?”
  • Those might include figuring out the properties of exotic materials, accelerating drug discovery and modeling fusion reactions.
Javier E

CarynAI, created with GPT-4 technology, will be your girlfriend - The Washington Post - 0 views

  • CarynAI also shows how AI applications can increase the ability of a single person to reach an audience of thousands in a way that, for users, may feel distinctly personal.
  • The impact could be enormous for someone forming something resembling a personal relationship with thousands or millions of online followers. It could also show how thin and tenuous these simulations of human connection could become.
  • CarynAI also is a reminder that sex and romance are often the first realm in which technological progress becomes profitable. Marjorie acknowledges that some of the exchanges with CarynAI become sexually explicit
  • ...11 more annotations...
  • CarynAI is the first major release from a company called Forever Voices. The company previously has created realistic AI chatbots that allow users to talk with replicated versions of Steve Jobs, Kanye West, Donald Trump and Taylor Swift
  • CarynAI is a far more sophisticated product, the company says, and part of Forever Voices’ new AI companion initiative, meant to provide users with a girlfriend-like experience that fans can emotionally bond with.
  • John Meyer, CEO and founder of Forever Voices, said that he created the company last year, after trying to use AI to develop ways to reconnect with his late father, who passed away in 2017. He built an AI voice chatbot that replicated his late father’s voice and personality to talk to and found the experience incredibly healing. “It was a remarkable experience to talk to him again in a super realistic way,” Meyer said. “I’ve been in tech my whole life, I’m a programmer, so it was easy for me to start building something like that especially as things got more advanced with the AI space.”
  • Meyer’s company has about 10 employees. One job Meyer is hoping to fill soon is chief ethics officer. “There are a lot of ways to do this wrong,”
  • One safeguard is trying to limit the amount of time a user is allowed to chat with CarynAI. To keep users from becoming addicted, CarynAI is programmed to wind down conversations after about an hour, encouraging users to pick back up later. But there is no hard time limit on use, and some users are spending hours speaking to CarynAI per day, according to Marjorie’s manager, Ishan Goel.
  • “I consider myself a futurist at heart and when I look into the future I believe this is the beginning of a very diverse future consisting of AI to human companionship,”
  • Elizabeth Snower, founder of ICONIQ, which creates conversational 3D avatars, predicts that soon there will be “AI influencers on every social platform that are influencing consumer decisions.”
  • “A lot of people have just been kind of really mad at the existence of this. They think that it’s the end of humanity,” she said.
  • Marjorie hopes the backlash will fade when other online personalities begin rolling out their own AI companions
  • “I think in the next five years, most Americans will have an AI companion in their pocket in some way, shape or form, whether it’s an ultra flirty AI that you’re dating, an AI that’s your personal trainer, or simply a tutor companion. Those are all things that we are building internally,
  • That strikes AI adviser and investor Allie K. Miller as a likely outcome. “I can imagine a future in which everyone — celebrities, TV characters, influencers, your brother — has an online avatar that they invite their audience or friends to engage with. … With the accessibility of these models, I’m not surprised it’s expanding to scaled interpersonal relationships.”
Javier E

Whistleblower: Twitter misled investors, FTC and underplayed spam issues - Washington Post - 0 views

  • Twitter executives deceived federal regulators and the company’s own board of directors about “extreme, egregious deficiencies” in its defenses against hackers, as well as its meager efforts to fight spam, according to an explosive whistleblower complaint from its former security chief.
  • The complaint from former head of security Peiter Zatko, a widely admired hacker known as “Mudge,” depicts Twitter as a chaotic and rudderless company beset by infighting, unable to properly protect its 238 million daily users including government agencies, heads of state and other influential public figures.
  • Among the most serious accusations in the complaint, a copy of which was obtained by The Washington Post, is that Twitter violated the terms of an 11-year-old settlement with the Federal Trade Commission by falsely claiming that it had a solid security plan. Zatko’s complaint alleges he had warned colleagues that half the company’s servers were running out-of-date and vulnerable software and that executives withheld dire facts about the number of breaches and lack of protection for user data, instead presenting directors with rosy charts measuring unimportant changes.
  • ...56 more annotations...
  • The complaint — filed last month with the Securities and Exchange Commission and the Department of Justice, as well as the FTC — says thousands of employees still had wide-ranging and poorly tracked internal access to core company software, a situation that for years had led to embarrassing hacks, including the commandeering of accounts held by such high-profile users as Elon Musk and former presidents Barack Obama and Donald Trump.
  • the whistleblower document alleges the company prioritized user growth over reducing spam, though unwanted content made the user experience worse. Executives stood to win individual bonuses of as much as $10 million tied to increases in daily users, the complaint asserts, and nothing explicitly for cutting spam.
  • Chief executive Parag Agrawal was “lying” when he tweeted in May that the company was “strongly incentivized to detect and remove as much spam as we possibly can,” the complaint alleges.
  • Zatko described his decision to go public as an extension of his previous work exposing flaws in specific pieces of software and broader systemic failings in cybersecurity. He was hired at Twitter by former CEO Jack Dorsey in late 2020 after a major hack of the company’s systems.
  • “I felt ethically bound. This is not a light step to take,” said Zatko, who was fired by Agrawal in January. He declined to discuss what happened at Twitter, except to stand by the formal complaint. Under SEC whistleblower rules, he is entitled to legal protection against retaliation, as well as potential monetary rewards.
  • “Security and privacy have long been top companywide priorities at Twitter,” said Twitter spokeswoman Rebecca Hahn. She said that Zatko’s allegations appeared to be “riddled with inaccuracies” and that Zatko “now appears to be opportunistically seeking to inflict harm on Twitter, its customers, and its shareholders.” Hahn said that Twitter fired Zatko after 15 months “for poor performance and leadership.” Attorneys for Zatko confirmed he was fired but denied it was for performance or leadership.
  • A person familiar with Zatko’s tenure said the company investigated Zatko’s security claims during his time there and concluded they were sensationalistic and without merit. Four people familiar with Twitter’s efforts to fight spam said the company deploys extensive manual and automated tools to both measure the extent of spam across the service and reduce it.
  • Overall, Zatko wrote in a February analysis for the company attached as an exhibit to the SEC complaint, “Twitter is grossly negligent in several areas of information security. If these problems are not corrected, regulators, media and users of the platform will be shocked when they inevitably learn about Twitter’s severe lack of security basics.”
  • Zatko’s complaint says strong security should have been much more important to Twitter, which holds vast amounts of sensitive personal data about users. Twitter has the email addresses and phone numbers of many public figures, as well as dissidents who communicate over the service at great personal risk.
  • This month, an ex-Twitter employee was convicted of using his position at the company to spy on Saudi dissidents and government critics, passing their information to a close aide of Crown Prince Mohammed bin Salman in exchange for cash and gifts.
  • Zatko’s complaint says he believed the Indian government had forced Twitter to put one of its agents on the payroll, with access to user data at a time of intense protests in the country. The complaint said supporting information for that claim has gone to the National Security Division of the Justice Department and the Senate Select Committee on Intelligence. Another person familiar with the matter agreed that the employee was probably an agent.
  • “Take a tech platform that collects massive amounts of user data, combine it with what appears to be an incredibly weak security infrastructure and infuse it with foreign state actors with an agenda, and you’ve got a recipe for disaster,” Charles E. Grassley (R-Iowa), the top Republican on the Senate Judiciary Committee,
  • Many government leaders and other trusted voices use Twitter to spread important messages quickly, so a hijacked account could drive panic or violence. In 2013, a captured Associated Press handle falsely tweeted about explosions at the White House, sending the Dow Jones industrial average briefly plunging more than 140 points.
  • After a teenager managed to hijack the verified accounts of Obama, then-candidate Joe Biden, Musk and others in 2020, Twitter’s chief executive at the time, Jack Dorsey, asked Zatko to join him, saying that he could help the world by fixing Twitter’s security and improving the public conversation, Zatko asserts in the complaint.
  • In 1998, Zatko had testified to Congress that the internet was so fragile that he and others could take it down with a half-hour of concentrated effort. He later served as the head of cyber grants at the Defense Advanced Research Projects Agency, the Pentagon innovation unit that had backed the internet’s invention.
  • But at Twitter Zatko encountered problems more widespread than he realized and leadership that didn’t act on his concerns, according to the complaint.
  • Twitter’s difficulties with weak security stretches back more than a decade before Zatko’s arrival at the company in November 2020. In a pair of 2009 incidents, hackers gained administrative control of the social network, allowing them to reset passwords and access user data. In the first, beginning around January of that year, hackers sent tweets from the accounts of high-profile users, including Fox News and Obama.
  • Several months later, a hacker was able to guess an employee’s administrative password after gaining access to similar passwords in their personal email account. That hacker was able to reset at least one user’s password and obtain private information about any Twitter user.
  • Twitter continued to suffer high-profile hacks and security violations, including in 2017, when a contract worker briefly took over Trump’s account, and in the 2020 hack, in which a Florida teen tricked Twitter employees and won access to verified accounts. Twitter then said it put additional safeguards in place.
  • This year, the Justice Department accused Twitter of asking users for their phone numbers in the name of increased security, then using the numbers for marketing. Twitter agreed to pay a $150 million fine for allegedly breaking the 2011 order, which barred the company from making misrepresentations about the security of personal data.
  • After Zatko joined the company, he found it had made little progress since the 2011 settlement, the complaint says. The complaint alleges that he was able to reduce the backlog of safety cases, including harassment and threats, from 1 million to 200,000, add staff and push to measure results.
  • But Zatko saw major gaps in what the company was doing to satisfy its obligations to the FTC, according to the complaint. In Zatko’s interpretation, according to the complaint, the 2011 order required Twitter to implement a Software Development Life Cycle program, a standard process for making sure new code is free of dangerous bugs. The complaint alleges that other employees had been telling the board and the FTC that they were making progress in rolling out that program to Twitter’s systems. But Zatko alleges that he discovered that it had been sent to only a tenth of the company’s projects, and even then treated as optional.
  • “If all of that is true, I don’t think there’s any doubt that there are order violations,” Vladeck, who is now a Georgetown Law professor, said in an interview. “It is possible that the kinds of problems that Twitter faced eleven years ago are still running through the company.”
  • The complaint also alleges that Zatko warned the board early in his tenure that overlapping outages in the company’s data centers could leave it unable to correctly restart its servers. That could have left the service down for months, or even have caused all of its data to be lost. That came close to happening in 2021, when an “impending catastrophic” crisis threatened the platform’s survival before engineers were able to save the day, the complaint says, without providing further details.
  • One current and one former employee recalled that incident, when failures at two Twitter data centers drove concerns that the service could have collapsed for an extended period. “I wondered if the company would exist in a few days,” one of them said.
  • The current and former employees also agreed with the complaint’s assertion that past reports to various privacy regulators were “misleading at best.”
  • For example, they said the company implied that it had destroyed all data on users who asked, but the material had spread so widely inside Twitter’s networks, it was impossible to know for sure
  • As the head of security, Zatko says he also was in charge of a division that investigated users’ complaints about accounts, which meant that he oversaw the removal of some bots, according to the complaint. Spam bots — computer programs that tweet automatically — have long vexed Twitter. Unlike its social media counterparts, Twitter allows users to program bots to be used on its service: For example, the Twitter account @big_ben_clock is programmed to tweet “Bong Bong Bong” every hour in time with Big Ben in London. Twitter also allows people to create accounts without using their real identities, making it harder for the company to distinguish between authentic, duplicate and automated accounts.
  • In the complaint, Zatko alleges he could not get a straight answer when he sought what he viewed as an important data point: the prevalence of spam and bots across all of Twitter, not just among monetizable users.
  • Zatko cites a “sensitive source” who said Twitter was afraid to determine that number because it “would harm the image and valuation of the company.” He says the company’s tools for detecting spam are far less robust than implied in various statements.
  • “Agrawal’s Tweets and Twitter’s previous blog posts misleadingly imply that Twitter employs proactive, sophisticated systems to measure and block spam bots,” the complaint says. “The reality: mostly outdated, unmonitored, simple scripts plus overworked, inefficient, understaffed, and reactive human teams.”
  • The four people familiar with Twitter’s spam and bot efforts said the engineering and integrity teams run software that samples thousands of tweets per day, and 100 accounts are sampled manually.
  • Some employees charged with executing the fight agreed that they had been short of staff. One said top executives showed “apathy” toward the issue.
  • Zatko’s complaint likewise depicts leadership dysfunction, starting with the CEO. Dorsey was largely absent during the pandemic, which made it hard for Zatko to get rulings on who should be in charge of what in areas of overlap and easier for rival executives to avoid collaborating, three current and former employees said.
  • For example, Zatko would encounter disinformation as part of his mandate to handle complaints, according to the complaint. To that end, he commissioned an outside report that found one of the disinformation teams had unfilled positions, yawning language deficiencies, and a lack of technical tools or the engineers to craft them. The authors said Twitter had no effective means of dealing with consistent spreaders of falsehoods.
  • Dorsey made little effort to integrate Zatko at the company, according to the three employees as well as two others familiar with the process who spoke on the condition of anonymity to describe sensitive dynamics. In 12 months, Zatko could manage only six one-on-one calls, all less than 30 minutes, with his direct boss Dorsey, who also served as CEO of payments company Square, now known as Block, according to the complaint. Zatko allegedly did almost all of the talking, and Dorsey said perhaps 50 words in the entire year to him. “A couple dozen text messages” rounded out their electronic communication, the complaint alleges.
  • Faced with such inertia, Zatko asserts that he was unable to solve some of the most serious issues, according to the complaint.
  • Some 30 percent of company laptops blocked automatic software updates carrying security fixes, and thousands of laptops had complete copies of Twitter’s source code, making them a rich target for hackers, it alleges.
  • A successful hacker takeover of one of those machines would have been able to sabotage the product with relative ease, because the engineers pushed out changes without being forced to test them first in a simulated environment, current and former employees said.
  • “It’s near-incredible that for something of that scale there would not be a development test environment separate from production and there would not be a more controlled source-code management process,” said Tony Sager, former chief operating officer at the cyberdefense wing of the National Security Agency, the Information Assurance divisio
  • Sager is currently senior vice president at the nonprofit Center for Internet Security, where he leads a consensus effort to establish best security practices.
  • Zatko stopped the material from being presented at the Dec. 9, 2021 meeting, the complaint said. But over his continued objections, Agrawal let it go to the board’s smaller Risk Committee a week later.
  • “A best practice is that you should only be authorized to see and access what you need to do your job, and nothing else,” said former U.S. chief information security officer Gregory Touhill. “If half the company has access to and can make configuration changes to the production environment, that exposes the company and its customers to significant risk.”
  • The complaint says Dorsey never encouraged anyone to mislead the board about the shortcomings, but that others deliberately left out bad news.
  • The complaint says that about half of Twitter’s roughly 7,000 full-time employees had wide access to the company’s internal software and that access was not closely monitored, giving them the ability to tap into sensitive data and alter how the service worked. Three current and former employees agreed that these were issues.
  • An unnamed executive had prepared a presentation for the new CEO’s first full board meeting, according to the complaint. Zatko’s complaint calls the presentation deeply misleading.
  • The presentation showed that 92 percent of employee computers had security software installed — without mentioning that those installations determined that a third of the machines were insecure, according to the complaint.
  • Another graphic implied a downward trend in the number of people with overly broad access, based on the small subset of people who had access to the highest administrative powers, known internally as “God mode.” That number was in the hundreds. But the number of people with broad access to core systems, which Zatko had called out as a big problem after joining, had actually grown slightly and remained in the thousands.
  • The presentation included only a subset of serious intrusions or other security incidents, from a total Zatko estimated as one per week, and it said that the uncontrolled internal access to core systems was responsible for just 7 percent of incidents, when Zatko calculated the real proportion as 60 percent.
  • When Dorsey left in November 2021, a difficult situation worsened under Agrawal, who had been responsible for security decisions as chief technology officer before Zatko’s hiring, the complaint says.
  • Agrawal didn’t respond to requests for comment. In an email to employees after publication of this article, obtained by The Post, he said that privacy and security continues to be a top priority for the company, and he added that the narrative is “riddled with inconsistences” and “presented without important context.”
  • On Jan. 4, Zatko reported internally that the Risk Committee meeting might have been fraudulent, which triggered an Audit Committee investigation.
  • Agarwal fired him two weeks later. But Zatko complied with the company’s request to spell out his concerns in writing, even without access to his work email and documents, according to the complaint.
  • Since Zatko’s departure, Twitter has plunged further into chaos with Musk’s takeover, which the two parties agreed to in May. The stock price has fallen, many employees have quit, and Agrawal has dismissed executives and frozen big projects.
  • Zatko said he hoped that by bringing new scrutiny and accountability, he could improve the company from the outside.
  • “I still believe that this is a tremendous platform, and there is huge value and huge risk, and I hope that looking back at this, the world will be a better place, in part because of this.”
Javier E

Cognitive Biases and the Human Brain - The Atlantic - 1 views

  • Present bias shows up not just in experiments, of course, but in the real world. Especially in the United States, people egregiously undersave for retirement—even when they make enough money to not spend their whole paycheck on expenses, and even when they work for a company that will kick in additional funds to retirement plans when they contribute.
  • hen people hear the word bias, many if not most will think of either racial prejudice or news organizations that slant their coverage to favor one political position over another. Present bias, by contrast, is an example of cognitive bias—the collection of faulty ways of thinking that is apparently hardwired into the human brain. The collection is large. Wikipedia’s “List of cognitive biases” contains 185 entries, from actor-observer bias (“the tendency for explanations of other individuals’ behaviors to overemphasize the influence of their personality and underemphasize the influence of their situation … and for explanations of one’s own behaviors to do the opposite”) to the Zeigarnik effect (“uncompleted or interrupted tasks are remembered better than completed ones”)
  • If I had to single out a particular bias as the most pervasive and damaging, it would probably be confirmation bias. That’s the effect that leads us to look for evidence confirming what we already think or suspect, to view facts and ideas we encounter as further confirmation, and to discount or ignore any piece of evidence that seems to support an alternate view
  • ...48 more annotations...
  • Confirmation bias shows up most blatantly in our current political divide, where each side seems unable to allow that the other side is right about anything.
  • The whole idea of cognitive biases and faulty heuristics—the shortcuts and rules of thumb by which we make judgments and predictions—was more or less invented in the 1970s by Amos Tversky and Daniel Kahneman
  • versky died in 1996. Kahneman won the 2002 Nobel Prize in Economics for the work the two men did together, which he summarized in his 2011 best seller, Thinking, Fast and Slow. Another best seller, last year’s The Undoing Project, by Michael Lewis, tells the story of the sometimes contentious collaboration between Tversky and Kahneman
  • Another key figure in the field is the University of Chicago economist Richard Thaler. One of the biases he’s most linked with is the endowment effect, which leads us to place an irrationally high value on our possessions.
  • In an experiment conducted by Thaler, Kahneman, and Jack L. Knetsch, half the participants were given a mug and then asked how much they would sell it for. The average answer was $5.78. The rest of the group said they would spend, on average, $2.21 for the same mug. This flew in the face of classic economic theory, which says that at a given time and among a certain population, an item has a market value that does not depend on whether one owns it or not. Thaler won the 2017 Nobel Prize in Economics.
  • “The question that is most often asked about cognitive illusions is whether they can be overcome. The message … is not encouraging.”
  • that’s not so easy in the real world, when we’re dealing with people and situations rather than lines. “Unfortunately, this sensible procedure is least likely to be applied when it is needed most,” Kahneman writes. “We would all like to have a warning bell that rings loudly whenever we are about to make a serious error, but no such bell is available.”
  • At least with the optical illusion, our slow-thinking, analytic mind—what Kahneman calls System 2—will recognize a Müller-Lyer situation and convince itself not to trust the fast-twitch System 1’s perception
  • Kahneman and others draw an analogy based on an understanding of the Müller-Lyer illusion, two parallel lines with arrows at each end. One line’s arrows point in; the other line’s arrows point out. Because of the direction of the arrows, the latter line appears shorter than the former, but in fact the two lines are the same length.
  • Because biases appear to be so hardwired and inalterable, most of the attention paid to countering them hasn’t dealt with the problematic thoughts, judgments, or predictions themselves
  • Is it really impossible, however, to shed or significantly mitigate one’s biases? Some studies have tentatively answered that question in the affirmative.
  • what if the person undergoing the de-biasing strategies was highly motivated and self-selected? In other words, what if it was me?
  • Over an apple pastry and tea with milk, he told me, “Temperament has a lot to do with my position. You won’t find anyone more pessimistic than I am.”
  • I met with Kahneman
  • “I see the picture as unequal lines,” he said. “The goal is not to trust what I think I see. To understand that I shouldn’t believe my lying eyes.” That’s doable with the optical illusion, he said, but extremely difficult with real-world cognitive biases.
  • In this context, his pessimism relates, first, to the impossibility of effecting any changes to System 1—the quick-thinking part of our brain and the one that makes mistaken judgments tantamount to the Müller-Lyer line illusion
  • he most effective check against them, as Kahneman says, is from the outside: Others can perceive our errors more readily than we can.
  • “slow-thinking organizations,” as he puts it, can institute policies that include the monitoring of individual decisions and predictions. They can also require procedures such as checklists and “premortems,”
  • A premortem attempts to counter optimism bias by requiring team members to imagine that a project has gone very, very badly and write a sentence or two describing how that happened. Conducting this exercise, it turns out, helps people think ahead.
  • “My position is that none of these things have any effect on System 1,” Kahneman said. “You can’t improve intuition.
  • Perhaps, with very long-term training, lots of talk, and exposure to behavioral economics, what you can do is cue reasoning, so you can engage System 2 to follow rules. Unfortunately, the world doesn’t provide cues. And for most people, in the heat of argument the rules go out the window.
  • Kahneman describes an even earlier Nisbett article that showed subjects’ disinclination to believe statistical and other general evidence, basing their judgments instead on individual examples and vivid anecdotes. (This bias is known as base-rate neglect.)
  • over the years, Nisbett had come to emphasize in his research and thinking the possibility of training people to overcome or avoid a number of pitfalls, including base-rate neglect, fundamental attribution error, and the sunk-cost fallacy.
  • Nisbett’s second-favorite example is that economists, who have absorbed the lessons of the sunk-cost fallacy, routinely walk out of bad movies and leave bad restaurant meals uneaten.
  • When Nisbett asks the same question of students who have completed the statistics course, about 70 percent give the right answer. He believes this result shows, pace Kahneman, that the law of large numbers can be absorbed into System 2—and maybe into System 1 as well, even when there are minimal cues.
  • about half give the right answer: the law of large numbers, which holds that outlier results are much more frequent when the sample size (at bats, in this case) is small. Over the course of the season, as the number of at bats increases, regression to the mean is inevitabl
  • When Nisbett has to give an example of his approach, he usually brings up the baseball-phenom survey. This involved telephoning University of Michigan students on the pretense of conducting a poll about sports, and asking them why there are always several Major League batters with .450 batting averages early in a season, yet no player has ever finished a season with an average that high.
  • we’ve tested Michigan students over four years, and they show a huge increase in ability to solve problems. Graduate students in psychology also show a huge gain.”
  • , “I know from my own research on teaching people how to reason statistically that just a few examples in two or three domains are sufficient to improve people’s reasoning for an indefinitely large number of events.”
  • isbett suggested another factor: “You and Amos specialized in hard problems for which you were drawn to the wrong answer. I began to study easy problems, which you guys would never get wrong but untutored people routinely do … Then you can look at the effects of instruction on such easy problems, which turn out to be huge.”
  • Nisbett suggested that I take “Mindware: Critical Thinking for the Information Age,” an online Coursera course in which he goes over what he considers the most effective de-biasing skills and concepts. Then, to see how much I had learned, I would take a survey he gives to Michigan undergraduates. So I did.
  • he course consists of eight lessons by Nisbett—who comes across on-screen as the authoritative but approachable psych professor we all would like to have had—interspersed with some graphics and quizzes. I recommend it. He explains the availability heuristic this way: “People are surprised that suicides outnumber homicides, and drownings outnumber deaths by fire. People always think crime is increasing” even if it’s not.
  • When I finished the course, Nisbett sent me the survey he and colleagues administer to Michigan undergrads
  • It contains a few dozen problems meant to measure the subjects’ resistance to cognitive biases
  • I got it right. Indeed, when I emailed my completed test, Nisbett replied, “My guess is that very few if any UM seniors did as well as you. I’m sure at least some psych students, at least after 2 years in school, did as well. But note that you came fairly close to a perfect score.”
  • Nevertheless, I did not feel that reading Mindware and taking the Coursera course had necessarily rid me of my biases
  • For his part, Nisbett insisted that the results were meaningful. “If you’re doing better in a testing context,” he told me, “you’ll jolly well be doing better in the real world.”
  • The New York–based NeuroLeadership Institute offers organizations and individuals a variety of training sessions, webinars, and conferences that promise, among other things, to use brain science to teach participants to counter bias. This year’s two-day summit will be held in New York next month; for $2,845, you could learn, for example, “why are our brains so bad at thinking about the future, and how do we do it better?”
  • Philip E. Tetlock, a professor at the University of Pennsylvania’s Wharton School, and his wife and research partner, Barbara Mellers, have for years been studying what they call “superforecasters”: people who manage to sidestep cognitive biases and predict future events with far more accuracy than the pundits
  • One of the most important ingredients is what Tetlock calls “the outside view.” The inside view is a product of fundamental attribution error, base-rate neglect, and other biases that are constantly cajoling us into resting our judgments and predictions on good or vivid stories instead of on data and statistics
  • In 2006, seeking to prevent another mistake of that magnitude, the U.S. government created the Intelligence Advanced Research Projects Activity (iarpa), an agency designed to use cutting-edge research and technology to improve intelligence-gathering and analysis. In 2011, iarpa initiated a program, Sirius, to fund the development of “serious” video games that could combat or mitigate what were deemed to be the six most damaging biases: confirmation bias, fundamental attribution error, the bias blind spot (the feeling that one is less biased than the average person), the anchoring effect, the representativeness heuristic, and projection bias (the assumption that everybody else’s thinking is the same as one’s own).
  • most promising are a handful of video games. Their genesis was in the Iraq War
  • Together with collaborators who included staff from Creative Technologies, a company specializing in games and other simulations, and Leidos, a defense, intelligence, and health research company that does a lot of government work, Morewedge devised Missing. Some subjects played the game, which takes about three hours to complete, while others watched a video about cognitive bias. All were tested on bias-mitigation skills before the training, immediately afterward, and then finally after eight to 12 weeks had passed.
  • “The literature on training suggests books and classes are fine entertainment but largely ineffectual. But the game has very large effects. It surprised everyone.”
  • he said he saw the results as supporting the research and insights of Richard Nisbett. “Nisbett’s work was largely written off by the field, the assumption being that training can’t reduce bias,
  • even the positive results reminded me of something Daniel Kahneman had told me. “Pencil-and-paper doesn’t convince me,” he said. “A test can be given even a couple of years later. But the test cues the test-taker. It reminds him what it’s all about.”
  • Morewedge told me that some tentative real-world scenarios along the lines of Missing have shown “promising results,” but that it’s too soon to talk about them.
  • In the future, I will monitor my thoughts and reactions as best I can
karenmcgregor

Solving the Puzzle: Network Design Assignment Helpers Unleashed - 0 views

Welcome to https://www.computernetworkassignmenthelp.com, where we unravel the complexities of network design assignments and bring you a team of expert network design assignment helpers ready to a...

#networkdesignassignmenthelper #assignmenthelpservices #onlinelearning #elearning #student #education technology knowledge education

started by karenmcgregor on 08 Dec 23 no follow-up yet
karenmcgregor

Interview with a Packet Tracer Assignment Writing Help Expert - 0 views

Welcome, everyone! Today, we have the privilege of gaining insights from an expert in the field of Packet Tracer assignments. Our distinguished guest from https://www.computernetworkassignmenthelp....

#professionalpackettracerassignmenthelp #assignmenthelpservice #packettracer #packettracerassignmenthelp

started by karenmcgregor on 29 Dec 23 no follow-up yet
« First ‹ Previous 41 - 58 of 58
Showing 20 items per page