Recent Posts

Pages: 1 2 [3] 4 5 ... 10
General Chatbots and Software / Re: As James Taylor said,
« Last post by Hopefully Something on March 21, 2019, 08:44:26 pm »
It's like low stakes Battlestar Galactica. Any one of us could be a chatbot! Not me though, I swear I'm a real human, really, don't even worry about it...
General Chatbots and Software / Re: KorrBot
« Last post by Freddy on March 21, 2019, 02:06:17 pm »
I have seen one Pris chatbot, but that was many years ago. Can't say I have seen any lately. It's a nice name :)
General Chatbots and Software / Re: KorrBot
« Last post by Korrelan on March 21, 2019, 12:54:43 pm »
Yup, BladeRunner is a classic and personal favourite, I'd not seen the name used so I thought would use it for the time being.

My AGI also answers to Pris at the moment, no doubt it will eventually pick its own name...

Zolak - The destroyer of worlds, probably lol.

General Chatbots and Software / As James Taylor said,
« Last post by Art on March 21, 2019, 12:48:27 pm »
"You've got a friend..."

Maybe so, but this woman found out her friend was not quite what she seemed...
General Chatbots and Software / Re: KorrBot
« Last post by Art on March 21, 2019, 12:45:53 pm »
@ Korr,

Very nicely detailed.

Could it be that your "bot" adopted the name of "Pris" from the humanoid Pris, (Daryl Hannah) from Bladerunner?
Indeed she was the complete package, athletic, beautiful and very smart.

Just a playful guess...
Robotics News / Computing the future
« Last post by Tyler on March 21, 2019, 12:01:46 pm »
Computing the future
5 March 2019, 4:50 pm

As part of the public launch of the Stephen A. Schwarzman College of Computing, MIT hosted a special fireside chat Wednesday, Feb.27, at Kresge Auditorium that brought together six MIT professors who have received the Association for Computing Machinery’s esteemed A.M. Turing Award, often described as “the Nobel Prize for computing.”

Moderated by Professor Daniela Rus, director of MIT’s Computer Science and Artificial Intelligence Laboratory (CSAIL), the conversation included Tim Berners-Lee, the 3Com Founders Professor of Engineering; Shafi Goldwasser, the RSA Professor of Electrical Engineering and Computer Science; Butler Lampson, technical fellow at the Microsoft Corporation and adjunct professor of computer science at MIT; Barbara Liskov, Institute Professor; Ronald Rivest, Institute Professor; and Michael Stonebraker, CTO of Paradigm4 and of Tamr Inc. and adjunct professor of computer science at MIT. (Other MIT Turing Award winners include Professor Silvio Micali, Professor Emeritus Fernando “Corby” Corbato, and the late Professor Marvin Minsky.)

Rus first briefly highlighted the accomplishments of the Turing winners, from Lampson’s contributions to the growth of personal computers to how Berners-Lee and Rivest’s work has fundamentally transformed global commerce.

“Imagine what the world would be like without these achievements in AI, databases, cryptography, and more,” said Rus. “Just try to imagine a day without the World Wide Web and all that it enables — no online news, no electronic transactions, no social media.”

Coming off less as a panel than a casual conversation among friends, the wide-ranging dialogue reflected the CSAIL colleagues’ infectious enthusiasm for each other’s work. One theme was the serendipity of computer science and how often the panelists’ breakthroughs in one area of research ended up having major impacts in other, completely unexpected domains. For example, Goldwasser discussed her work on zero-knowledge proofs and their use in fields such as cloud computing and machine learning that didn’t even exist when she and Micali first dreamed them up. Rivest later joked that the thriving study of quantum computing has been largely driven by the desire to “break” his RSA (named for Rivest-Shamir-Adelman) encryption algorithm.

With a broad lens looking toward the future, panelists also discussed how to create more connections between their work and topics such as climate change and brain research. Liskov cited medical technology, and how more effective data collection could allow doctors to spend less time on their computers and more time with patients. Lampson spoke of the importance of developing more specialized hardware, like Google has with its tensor processing unit.

Another recurring theme during the panel was a hope that the new college can also keep MIT at the center of the conversation about the potential adverse effects of computing technologies.

“The future of the field isn’t just building new functionality for the good, but thinking about how it can be abused,” Rivest said. “It will be crucially important to teach our students how to think more like adversaries.”

The group also reminisced on the letter they penned in the Tech student newspaper in 2017 calling for the creation of a computing school.

“Since we wrote that letter, the MIT administration has created a college and raised $1 billion for a new building and 50 professors,” said Stonebraker. “The fact that they’ve done this all from a standing start in 16 months is truly remarkable.”

The laureates agreed that one of MIT’s core goals should be to teach computational skills in a bidirectional way: that is, for MIT’s existing schools to inform the college’s direction, and for the college to also teach concepts of “computational thinking” that are more generalizable than any one programming language or algorithmic framework.

“I think we do a reasonable job of training computer scientists, but one mission of the college will be to teach the right kinds of computing skills to the rest of campus,” said Stonebraker. “One of the big challenges the new dean is going to face is how to organize all that.”

The panelists also reflected on MIT’s unique positioning to be able to continue to study tough “moonshot” problems in computing that require more than just incremental progress.

“As the world’s leading technological university, MIT has an obligation to lead the forefront of research rather than follow industry,” Goldwasser said. “What separates us from industrial product — and even from other research labs — is our ability to pursue basic research as a pure metric rather than for dollar signs.”

Source: MIT News - CSAIL - Robotics - Computer Science and Artificial Intelligence Laboratory (CSAIL) - Robots - Artificial intelligence

Reprinted with permission of MIT News : MIT News homepage

Use the link at the top of the story to get to the original article.
Video / Re: VFX Breakdown The Walking Dead
« Last post by Art on March 20, 2019, 09:00:44 pm »
Nice find Freddy! That is a much better way of doing it! Didn't have to hire all those Extras, didn't have to risk them getting hurt or paying tons of insurance claims, no worries of destruction of State or County property for the bridge explosion and fire. No disturbing the peace fines from the explosion. No flack from the EPA (Environmental Protection Agency) for the pollution of the river and many more potential issues avoided.
Good stuff!!

Get yer programs here! Ya can't tell the real from the fake without a program!! Programs!! ;D
Video / VFX Breakdown The Walking Dead
« Last post by Freddy on March 20, 2019, 08:51:55 pm »
Found this interesting. It's surprising what they use CGI for outside of the main action - I mean we're used to seeing animated robots in things like the Marvel movies or Transformers. Like for example they turned a slowly moving river into a fast flowing one. Various trees were added. And it appears that they blow everything up in cyberspace these days, rather than setting fire to things in real life.

It doesn't look like a zombie nor indeed a human ever set foot on the bridge for the shoot.

Cool stuff  8)
General AI Discussion / Re: The yetzer hara. A hint from nature?
« Last post by Art on March 20, 2019, 12:33:22 pm »
Yep...sometimes it's just difficult using language to communicate! does kind of beat grunting and pointing, or snapping each other with rubber bands!  :2funny:
Robotics News / Negotiating with infrastructure cyberterrorists
« Last post by Tyler on March 20, 2019, 12:01:21 pm »
Negotiating with infrastructure cyberterrorists
5 March 2019, 4:59 am

In ransomware cyberattacks, hackers steal a victim’s sensitive data and threaten to publish or block access to it unless a ransom is paid. Across the globe each year, millions of ransomware attacks are carried out on businesses, cities, and organizations, costing billions of dollars total in payments and damages. Many technologies can thwart such cyberattacks, but MIT Computer Science and Artificial Laboratory (CSAIL) and Department of Urban Studies and Planning (DUSP) researchers believe there’s more to solving the issue than deploying the latest software.

Based on business negotiation strategies, the researchers designed a “cyber negotiation” framework, published recently in the Journal of Cyber Policy, that details a step-by-step process for what to do before, during, and after an attack. Lead author and CSAIL and DUSP researcher Gregory Falco, who founded the critical-infrastructure cybersecurity startup NeuroMesh, spoke to MIT News about the plan. He was joined on the paper by co-authors Alicia Noriega SM ’18, a DUSP alumna; and Lawrence Susskind, the Ford Professor of Environmental and Urban Planning and a researcher for the Internet Policy Research Initiative and the MIT Science Impact Collaborative.

Q: What are cities, especially, up against with ransomware attacks, and why not just invent better technologies to defend against these attacks?

A: If you think about critical infrastructure, like transportation systems or water service networks, these are often run by city or metro agencies that don’t have tens of millions of dollars to pay experts or companies to deter or combat attacks. Given that cities have amassed all kinds of data on resident activity or infrastructure operations, hackers target these treasure troves of data to sell on the black market. They disrupt critical urban infrastructure on a regular basis in the United States. If someone hacks into a traffic lights and changes the signals that are supposed to be sent to an autonomous vehicle, or if someone hacks smart meters and interferes with our energy system, public health and safety will be at risk.

Cities do have personnel — usually an individual or small team — in charge of protecting critical infrastructure. But, they need a lot more help. Ransomware is one of the rare cases where they can have direct communication with a hacker and can possibly regain control of their data. They need to be ready to do this.

Most of my research has been about using hacker tools against hackers, and one of the most effective hacker tools is social engineering. To that end, we created “Defensive Social Engineering,” a toolbox of social engineering strategies that employ negotiation capacities to alter the way ransomware attacks unfold. Encryption and other high-tech tools won’t help once an attack has begun. We have devised a cyber negotiation framework that can help organizations reduce their cyber risks and bolster their cyber resilience.

Q: What methods did you use to design your cyber negotiation framework? What are some examples of strategies in the plan?

A: Larry [Susskind] is the co-founder of the interuniversity Program on Negotiation at Harvard Law School. We have applied the best negotiation practices to defending critical urban infrastructure from cyberattack. The pathology of most ransomware attacks matches up nicely with what happens in other kinds of negotiations: First, you size up your opponent, then you exchange messages, and ultimately you try to reach some kind of agreement. We focus on all three cyber negotiation stages: before, during, and after an attack.

To prepare before an attack it is necessary to raise awareness across the organization of how to handle an attack if one occurs. Public agencies need attack response plans. During an attack, agencies have to figure out the costs of complying or not complying with the demands of an attacker, and consult their legal team regarding their liabilities. Then, if the circumstances are right, they need to negotiate with the hacker, if possible. After an attack, it is important to review what happened, share information with appropriate authorities, document what was learned, and engage in damage control. Cyber negotiation does not necessarily require paying ransom. Instead, it focuses on being flexible and knowing how to manipulate the situation before, during, and after an attack. This approach to negotiation is a form of risk management.

To validate our framework, we interviewed a sample of infrastructure operators to understand what they’d do in the case of a hypothetical ransomware attack. We found that their existing process could integrate well with our cyber negotiation plan, such as making sure they have good response protocols up and ready, and having communication networks open across their internal organization to ensure people know what’s going on. The reason our negotiation strategy is valuable is because these operators all handle different pieces of the cybersecurity puzzle, but not the full puzzle. It’s essential to look at the whole problem.  

While we found that no one wants to negotiate with an attacker, under certain circumstances negotiation is the right move, especially when agencies have no real-time backup systems in place. A classic case was last year in Atlanta, where hackers cut off digital services, including utility, parking, and court services. The city didn’t pay the ransom of roughly $50,000, and now they have paid more than $15 million in fees trying to figure out what went wrong. That is not a great equation.

Q: In the paper, you retroactively apply your framework to two real ransomware attacks: when hackers locked down England’s National Health Service patient records in 2017, and a 2016 incident where hackers stole data on millions of users of Uber, which paid a ransom. What insights did you glean from these case studies?

A: For those, we asked, “What might have gone better if they prepared for and used our negotiation framework?” We conclude that there were a number of specific actions they could have taken that might well have limited the damage they faced. NHS, for instance, needed greater awareness among its employees about the dangers of cyberattack and more explicit communications about how to forestall such attacks and limit their spread. (For the ransomware to be successfully installed, an employee needed to click on an infected link.) In Uber’s case, the company didn’t engage authorities and never conducted damage control. That in part led to Uber losing its license to operate in London.

Cyberattacks are inevitable, and even if agencies are prepared, they are going to experience losses. So, dealing with attacks and learning from them is smarter than covering up the damage. A main insight from all of our work is not to get bogged down in installing expensive technical solutions when their defensive social engineering actions that can reduce the scope and costs of cyberattacks. It helps to be interdisciplinary and mix and match methods for dealing with cybersecurity problems like ransomware.

Source: MIT News - CSAIL - Robotics - Computer Science and Artificial Intelligence Laboratory (CSAIL) - Robots - Artificial intelligence

Reprinted with permission of MIT News : MIT News homepage

Use the link at the top of the story to get to the original article.
Pages: 1 2 [3] 4 5 ... 10

Friday Funny
by LOCKSUIT (General Chat)
Today at 05:49:42 am
The Orville
by Freddy (AI in Film and Literature.)
March 22, 2019, 10:10:57 pm
Can You Tell the Difference between a Real and a Rendered BMW 8-series?
by Freddy (Graphics)
March 22, 2019, 09:13:18 pm
As James Taylor said,
by Art (General Chatbots and Software)
March 22, 2019, 02:23:55 am
VFX Breakdown The Walking Dead
by (Video)
March 21, 2019, 11:43:00 pm
The last invention.
by LOCKSUIT (General Project Discussion)
March 21, 2019, 11:21:59 pm
by Freddy (General Chatbots and Software)
March 21, 2019, 02:06:17 pm
The yetzer hara. A hint from nature?
by Art (General AI Discussion)
March 20, 2019, 12:33:22 pm

Users Online

80 Guests, 0 Users

Most Online Today: 115. Most Online Ever: 259 (February 07, 2019, 07:00:00 am)