Saudi Arabia gives robot citizenship

As part of a publicity stunt to encourage investment, Saudi Arabia has given citizenship to a new robot, designed to show human emotions by facial expressions.

A humanoid robot took the stage at the Future Investment Initiative yesterday and had an amusing exchange with the host to the delight of hundreds of delegates. Smartphones were held aloft as Sophia, a robot designed by Hong Kong company Hanson Robotics, gave a presentation that demonstrated her capacity for human expression.

Sophia made global headlines when she was granted Saudi citizenship, making the kingdom the first country in the world to offer its citizenship to a robot.

Below the fold I have embedded the video of Sophia’s conversation with the host. It is obvious that most of the conversation was scripted. It is also obvious that robots still have a long way to go before their facial expressions appear natural to the human eye.

Posted north of Phoenix as we climb up onto the Colorado Plateau. Just saw the last saguaro in the cacti’s northern range limits.
» Read more

3D printing and how it will change what things look like

Link here. The article not only outlines some of the newer developments in 3D printing, it gives a nice look at how that technology is literally going to change what the things it builds look like.

Simple shapes are popular in human designs because they’re easy. Easy to design, especially with CAD, and easy to manufacture in a world where manufacturing means taking a big block or sheet of something, and machining a shape out of it, or pouring metals into a mold.

But manufacturing is starting to undergo a revolutionary change as 3D printing moves toward commercially competitive speeds and costs. And where traditional manufacturing incentivizes the simplest shapes, additive manufacturing is at its fastest and cheapest when you use the least possible material for the job. That’s a really difficult way for a human to design – but fairly easy, as it turns out, for a computer. And super easy for a giant network of computers.

The result: a stronger object, less weight, and less cost.

Some Amazon Echo speakers can be hacked to spy on you

Some of Amazon’s Echo speakers, designed to listen and record conversations if so commanded, can be hacked to record everything and transmit those recordings remotely.

First of all, you have to have actual access to the device to mess with its hardware. Then, you have to make sure it’s either a 2015 or 2016 model, as brand new Echo versions can’t be hacked similarly.

But if these conditions are met, then a hacker can quickly take the Echo’s base apart and load on it custom firmware that will instruct it to record everything spoken around it. That data can then be sent out to a remote server. That’s what Barnes did in his security tests. Hacking a home speaker may be the best way to spy on certain targets, even if this implies infiltrating their homes to actually mess with the hardware.

This is why I want nothing to do with smart machines. The dumber the machine, the better. I see no reason for my speakers, my washing machine, my car, or my stove, to be connected the internet. All such capability provides is a way to cause problems.

The city of the future will watch you all the time

New computer software is making it possible for computers to quickly analyze the data provided by surveillance cameras, which in turn will allow businesses and government to track and identify city dwellers all the time.

Through partner businesses, Nvidia’s technology is set to take things even further, enabling autonomous aerial systems streaming video back from the sky, security robots driving themselves around looking for trouble spots, and ultra high resolution, super-wide panoramic cameras that capture a whole scene instead of needing to track and follow objects.

And instead of just recording and storing footage, every camera’s output would be constantly analyzed and crunched into useful data points. We’re talking facial recognition, vehicle recognition, and pattern tracking in road and pedestrian traffic.

Clearly this will be useful in a law enforcement and security sense, and several Nvidia partners are working along these lines. BriefCam, for example, is demonstrating technology that tracks individuals and vehicles through security footage, then produces super-quick review videos in which all events in a given time frame can be made to happen in a condensed format where a bunch of them are on screen at once.

It seems to me that this new technology fits very well with the urban leftist culture that runs most American cities these days. These fascist communities, run almost exclusively by Democrats, will cheer this surveillance as a way to protect themselves from bad things, including people with opinions they don’t like. Consider how useful this would have been to Berkeley, for instance, during its recent struggle to keep conservative speakers out of town.

Making a Linux laptop

Yesterday while I was sitting at my desk working on my Linux desktop computer, I got a phone call from someone from “Windows Technical Support.” The man on the line said to me, quite nicely, that they had noticed a problem with my computer and wanted to help me fix it.

I said, “You are talking about my Windows desktop computer, the one I am working right now, correct?”

The man said sweetly, “Yes, sir. That’s the computer we have seen a problem with.”

I answered sweetly, “I just want to be sure, so let me ask again. You are referring to the Windows computer in front of me, the one on my desk?”

He responded, “Yes sir. Could you press your start menu please and go to settings?”

Unfortunately, I had too much work to do, and couldn’t spend more time with him. I would have liked to have led him along for as long as possible, but simple didn’t have the time. Instead, I said, “Um, I can’t really go to my Windows settings because my desktop is a Linux computer, and has been for a decade. Have you heard of Linux?”

Instantly the phone went dead.

I tell this tale because it is only one more reason I abandoned Windows back in 2006. With Linux I have no viruses to worry about, and scammers like this can’t do me any harm.

Anyway, this post really isn’t about Windows scammers. Instead, I want to relate my experience this past week in setting up my first Linux laptop, following the step-by-step instructions provided by James Stephens and posted here on Behind the Black last year in the following series:
» Read more

DARPA tests anti-terrorist radiation detection network

In an experiment testing a technology designed to detect the radiation from a terrorist-deployed small nuclear bomb, DARPA in October deployed more than a thousand volunteers in Washington DC to test a detector that can be carried in a backpack.

Recently, a geneticist was mysteriously abducted in Washington DC, leading to the US government deploying a small army of detectives to foil a dirty bomb plot. At least, that was the fictional scenario of a DARPA field test that saw a thousand volunteers equipped with smartphone-sized radiation detectors fan out over the National Mall in a radioactive scavenger hunt to test the progress of the agency’s SIGMA project, which is tasked with developing technology to combat nuclear terrorism.

Nuclear terrorism is one of the top nightmares of security services. Not only is the prospect of a dirty bomb involving radioactive materials dispersed by conventional explosives alarming, but tracking down illegal nuclear materials in an urban setting requires covering far too large an area for fixed sensors. Since 2014, DARPA has been working on how to produce a portable sensor array based on low-cost, high-efficiency, radiation sensors networked by smartphone networks to detect gamma and neutron radiation and evaluate the information in real time

According to DARPA, the SIGMA array was first tested in New York and New Jersey using 100 sensors. For the Washington test, 1,000 sensors were carried in backpacks by hundreds of ROTC cadets from the universities in the National Capital Region, midshipmen from the US Naval Academy, and DARPA personnel coordinated by the University of Maryland’s National Consortium for the Study of Terrorism and Responses to Terrorism (START).

Developing technology that can find and catch a terrorist who is trying to deploy a nuclear bomb in an urban area is certainly a good thing. I can’t help worry, however, about some larger philosophical concerns. Putting aside the specific technology being tested, the infrastructure being developed here that will make it easy for the government to deploy thousands of volunteers to hunt down an individual makes me a bit uncomfortable.

First computer music recording restored

Engineers have restored the first recording of computer-generated music from 1951.

The oldest recording of computer music was made in late 1951 by a BBC outside broadcast unit at the University of Manchester for the BBC Home Service program Children’s Hour. The rough two-minute recording is of the Ferranti Mark I computer playing “God Save the King”, “Baa Baa Black Sheep”, and the popular swing-band hit “In the Mood.” The recording was made on mobile recording equipment and etched into a 12-inch, single-sided acetate disc, as was normal for the time.

The restoration determined that the record, one of only two in existence, played the music at the wrong speed. To make it sound correct, “it had to be sped up, extraneous noise filtered out, and digitally pitch-corrected to remove wobbles.”

You should definitely listen to it. Quite fascinating, especially since it includes the candid commentary of the technicians as they tried to get the computer to play.

Hackers devise method to take over wireless keyboards/mouses

Your modern wireless computer is not safe: Hackers have devised an attack that is capable of not only recording the keystrokes and mouse actions of wireless devices, it can also take over the computer, and it can do it from hundreds of feet away.

On Tuesday Bastille’s research team revealed a new set of wireless keyboard attacks they’re calling Keysniffer. The technique, which they’re planning to detail at the Defcon hacker conference in two weeks, allows any hacker with a $12 radio device to intercept the connection between any of eight wireless keyboards and a computer from 250 feet away. What’s more, it gives the hacker the ability to both type keystrokes on the victim machine and silently record the target’s typing.

The keyboards’ vulnerability, according to Bastille’s chief research officer Ivan O’Sullivan, comes from the fact that they all transmit keystrokes entirely without encryption. The manufacturers’ only plan against attackers spoofing or eavesdropping on their devices’ communications is to depend on the obscurity of the radio protocols used. “We were stunned,” says O’Sullivan. “We had no expectation that in 2016 these companies would be selling keyboards with no encryption.”

In other words, if you use a wireless keyboard or mouse, your system is very vulnerable and exposed.

I find this story amusing in a sense, since my friends constantly make fun of me for not upgrading to these devises. I however see no reason to spend money on a new keyboard when the old wired one I have works fine. Now I have good reason, when I do upgrade, to avoid the wireless route.

Swedish engineer test flies human-carrying drone

A Swedish engineer, in his garage, has built a flying vehicle using drones and gasoline engines.

You have to see the thing to understand how insanely simple, crazy, and cool this is. For example, the whole thing is essentially nothing more than a seat surrounded by eight drones, their spinning propellers rotating only about two feet from the passenger.

But it appears to work, though the design is without doubt not quite finalized. I have embedded a video of one of his test flights below the fold. This was fortunately an unmanned flight, because about three minutes in the vehicle goes out of control and crashes.
» Read more

Getting and Installing Linux – Part 5

Running Windows programs on Linux:

An overview of WINE and Virtual Machine

by James Stephens

In addition to all the software available for Linux, Linux also possesses the ability to run Windows software using either WINE or in a virtual machine. This can be valuable in many ways, from running legacy software to running Windows and Linux on the same machine at the same time.

WINE is the open source implementation of CrossOver, which Apple users may already be familiar. It is essentially a translator: WINE sits between a Windows application and the Linux system, presenting what appears to be a Windows system to an application and generating Linux instructions for processing. It’s not a perfect solution, but it’s pretty good. It’s fast and efficient, requiring little more resources then the application itself, making it suitable for older machines. When properly configured, Windows applications install as if in Windows and run on Linux like any other application. The backward compatibility of WINE is actually better then that of Windows itself. So if you have beloved but outdated software you can run it again with WINE. In my case that is a Windows 3.1 controlled audio mixing console. A lot of people like to play the old Windows 95 games. For more information including a list of compatible Windows software and performance assessments go to www.winehq.org
» Read more

Flyboard Air company purchased

The company that designed the Flyboard Air jet hoverboard, featured here only two days ago in the Evening Pause, has been purchased by Implant Sciences, a company whose primary focus until now was explosive detection technology for the Homeland Security.

Implant Sciences is currently looking into the possibility of selling its explosives detection business, and the purchase of Zapata is subject to shareholder approval. Overall though, it seems pretty confident that the move could lead to big things. “We are beyond excited to have visionaries like Franky Zapata and his team on board and we are thrilled to allow for shareholders to benefit from the many breakthrough products he has already invented and the new innovations he will be unveiling in coming months and years.” said Implant Sciences president Robert Liscouski.

EPA’s gasoline efficiency tests are garbage

Our government in action: The tests the EPA uses to establish the fuel efficiency of cars are unreliable, and likely provide no valid information at all about the fuel efficiency of the cars tested.

The law requiring cars to meet these fuel efficiency tests was written in the 1970s, and specifically sets standards based on the technology then. Worse,

[T]he EPA doesn’t know exactly how its CAFE testing correlates with actual results, because it has never done a comprehensive study of real-world fuel economy. Nor does anyone else. The best available data comes from consumers who report it to the DOT—hardly a scientific sampling.

Other than that, everything is fine. Companies are forced to spend billions on this regulation, the costs of which they immediately pass on to consumers, all based on fantasy and a badly-written law. Gee, I’m sure glad we never tried this with healthcare!

Getting and Installing Linux – Part 4

The Software Manager

by James Stephens

A computer is nothing more than a toy unless it has the tools you need to get your work done, and Linux has a great set of tools. Most distributions come loaded with the tools most people use every day, a full office suite, graphics and media packages and so on. If you want more, a world of software awaits at your fingertips via the Software Manager. Think of it as the app store for your distribution, with tens of thousands of official titles vetted and available for download, most free of charge. No longer are you left to the wilds of the Internet to find what you need.

Most Linux Software is functionally equivalent to that of Apple or Windows. Most open source titles are ported to all platforms including Linux. So if you use an open source title such as Audacity or VLC media player, just type its name into the Linux Software Manager search bar and you will find it. For propitiatory titles such as Photoshop just define what it does, image manipulation for example, and the Software Manager will suggest Linux equivalents like GIMP or KRITA. In addition Photoshop and some other Windows software run great on Linux using WINE – the Windows compatibility layer. More about that later.
» Read more

Breakthrough on battery life?

New research might have discovered engineering that could significantly increase the efficiency of the batteries we use.

This is where Mya Le Thai’s magic gel comes in. Typically, a Lithium Ion battery can go through between 5000 and 7000 recharge cycles before it dies and will also gradually lose its energy storage capacity over time. When researchers applied Thai’s plexiglass-like gel to gold nanowires in a manganese dioxiode shell, it increased that number to over 200,000 and the battery didn’t lose any of its power or storage capacity over a period of three months.

Getting and Installing Linux – Part 3

UEFI and booting Linux on Win 8.1 & 10 machines

by James Stephens

Unified Extensible Firmware Interface (UEFI) is intended to be a modern alternative to BIOS. Ideally UEFI-(Secure Boot) blocks malware from being loaded when the computer is booted by using digital keys which software must possess in order to be booted onto the computer. UEFI supplants the traditional BIOS and it’s post screen, appreciably shortening boot times but sometimes adding a few more steps to set up a computer to boot into Linux. If necessary UEFI-(Secure Boot) may be disabled to allow access to the BIOS and the booting of non-UEFI complaint operating systems, such as 32 bit Linux or legacy Windows, and set up the computer to boot into Linux as I described in the previous post. But I recommend using UEFI if at all possible.
» Read more

Why I use Linux

Linux can be a pain sometimes, and it requires a bit more hands-on work by the user to make it function, but overall in the ten years since I abandoned Windows and switched to Linux (first with the Debian operating system and now with Kubuntu) I have found my work on my computer to be far more satisfying and successful. I can mostly get things done the way I like to do them, not as dictated by some software geek working at Microsoft’s headquarters.

Which is why this story interested me: “I thought my daughter clicked on ransomware – it was the damn Windows 10 installer.” It describes a number of stories where Windows 10 took control of a person’s computer and imposed an upgrade, against their will.

This story, among many others, only confirmed for me that my decision in 2006 was a wise one. I will never return to Windows, and if I was certain that computer projectors could read Linux laptops I’d switch the laptop to Linux as well.

It is just a shame however that so many people still stick with Windows, as it often makes doing their work difficult, if not impossible. When a product doesn’t work for you, you find another product. That’s how freedom and competition work.

South Korea commits almost a billion dollars to AI research

In reaction to the recent Go victory by a computer program over a human, the government of South Korea has quickly accelerated its plans to back research into the field of artificial intelligence with a commitment of $863 million and the establishment of public/private institute.

Scrambling to respond to the success of Google DeepMind’s world-beating Go program AlphaGo, South Korea announced on 17 March that it would invest $863 million (1 trillion won) in artificial-intelligence (AI) research over the next five years. It is not immediately clear whether the cash represents new funding, or had been previously allocated to AI efforts. But it does include the founding of a high-profile, public–private research centre with participation from several Korean conglomerates, including Samsung, LG Electronics and Hyundai Motor, as well as the technology firm Naver, based near Seoul.

The timing of the announcement indicates the impact in South Korea of AlphaGo, which two days earlier wrapped up a 4–1 victory over grandmaster Lee Sedol in an exhibition match in Seoul. The feat was hailed as a milestone for AI research. But it also shocked the Korean public, stoking widespread concern over the capabilities of AI, as well as a spate of newspaper headlines worrying that South Korea was falling behind in a crucial growth industry.

South Korean President Park Geun-hye has also announced the formation of a council that will provide recommendations to overhaul the nation’s research and development process to enhance productivity. In her 17 March speech, she emphasized that “artificial intelligence can be a blessing for human society” and called it “the fourth industrial revolution”. She added, “Above all, Korean society is ironically lucky, that thanks to the ‘AlphaGo shock’, we have learned the importance of AI before it is too late.”

Not surprisingly, some academics are complaining that the money is going to industry rather than the universities. For myself, I wonder if this crony capitalistic approach will produce any real development, or whether it will instead end up to be a pork-laden jobs program for South Korean politicians.

What next for the computer Go program?

Link here.

The software uses neural networks to learn from experience. For example, to train for its Go match the computer program studied 30 million Go board positions from human games, then played itself again and again to improve its skills.

DeepMind’s founder and chief executive Demis Hassabis mentioned the possibility of training a version of AlphaGo using self-play alone, omitting the knowledge from human-expert games, at a conference last month. The firm created a program that learned to play less complex arcade games in this manner in 2015. Without a head start, AlphaGo would probably take much longer to learn, says Bengio — and might never beat the best human. But it’s an important step, he says, because humans learn with such little guidance.

DeepMind, based in London, also plans to venture beyond games. In February the company founded DeepMind Health and launched a collaboration with the UK National Health Service: its algorithms could eventually be applied to clinical data to improve diagnoses or treatment plans. Such applications pose different challenges from games, says Oren Etzioni, chief executive of the non-profit Allen Institute for Artificial Intelligence in Seattle, Washington. “The universal thing about games is that you can collect an arbitrary amount of data,” he says — and that the program is constantly getting feedback on what’s a good or bad move by playing many games. But, in the messy real world, data — on rare diseases, say — might be scarcer, and even with common diseases, labelling the consequences of a decision as ‘good’ or ‘bad’ may not be straightforward.

Hassabis has said that DeepMind’s algorithms could give smartphone personal assistants a deeper understanding of users’ requests. And AI researchers see parallels between human dialogue and games: “Each person is making a play, and we have a sequence of turns, and each of us has an objective,” says Bengio. But they also caution that language and human interaction involve a lot more uncertainty.

It’s a sweep!

Google’s AlphaGo computer program today completed a three game sweep of Go professional champion Lee Sedol.

This might be the best quote from the article:

The algorithm seems to be holding back its power. Sometimes it plays moves that lose material because it is seeking simply to maximise its probability of reaching winning positions, rather than — as human players tend to do — maximise territorial gains. Jackson thinks that some of these odd-looking moves may have fooled Lee into underestimating the machine’s skills at the beginning of game 1 — which, I suppose, makes AlphaGo a kind of computerized hustler.

1 2 3 4 5 6 8