Weekly QUEST Discussion Topics and News May 10th

advertisement
Weekly QUEST Discussion Topics and News
Friday May 10th, 2013
A Framework / Theory for Artificial Consciousness:
A framework is not a detailed hypothesis or set of hypotheses; rather, it is a
suggested point of view for an attack on a scientific problem, often
suggesting testable hypotheses – we will discuss how defining
characteristics of consciousness can provide the guidance to developing a
mathematical framework for QUEST. We will focus on which of the tenets /
fundamental laws we’ve discussed are critical to embody in QUEST
solutions and thus the mathematical framework must support.
THE ULTIMATE GOAL of a theory of consciousness is a simple and elegant
set of fundamental laws, analogous to the fundamental laws of physics.
•
What might the underlying fundamental laws be?
•
There is no reason they should not be strongly constrained
to account accurately for our own first-person experiences, aswell as
the evidence from subjects’ reports.
•
If we find a theory that fits the data better than any other
theory of equal simplicity, we will have good reason to accept it.
•
If the theory leads to the engineering of systems that
demonstrate an engineering advantage then that will be a success!
News Articles
1. Hackers and Jihad
http://www.washingtontimes.com/news/2013/may/6/jihadis-andhackers-teaming-launch-cyberattacks-us/
Middle East- and North Africa-based criminal hackers are preparing
cyberattacks this week against the websites of high-profile U.S.
government agencies, banks and other companies, according to the
Department of Homeland Security…attacks, dubbed #OpUSA, for
Operation USA, will begin Tuesday, the department said in a
warning bulletin circulated to the private sector last week…attacks
are called for in the name of Anonymous, the leaderless coalition of
hackers whose trademark Guy Fawkes mask has become a global
symbol for their anarchistic spirit…"OpUSA poses a limited threat of
temporarily disrupting U.S. websites," the homeland security bulletin
states, saying the attackers will likely use commercial hacking tools in
a variety of "nuisance-level" strikes, defacing websites or temporarily
knocking them offline…More dangerous, though, is the developing
alliance the organization of the attacks seems to presage between
criminal hackers and violent Islamic extremists…bulletin notes that
the attacks are being promoted by the moderators of websites and
discussion forums that host al Qaeda and other Islamic extremist
material, in addition to calls through more conventional hacker
channels like the bulletin board Pastebin…collaboration may "signal
an emerging trend of Middle East- and North Africa-based criminally
motivated hackers collaborating with others regardless of their
motivation," like Islamic extremists…Future public statements "may
provide insight into whether these [hacker] groups are radicalizing
toward violence and whether they would potentially partner with or
conduct attacks on behalf of violent extremists."…
2. Data made me do it
http://www.technologyreview.com/news/514346/the-data-mademe-do-it/
told me a story about awakening at dawn to catch a flight from
Shanghai. That’s when an app he’d begun using, Google Now, told
him his flight was delayed…software scours a person’s Gmail and
calendar, as well as databases like maps and flight schedules. It had
spotted the glitch in his travel plans and sent the warning that he
shouldn’t rush…Weigend, a fast-talking consultant and lecturer on
consumer behavior, such episodes demonstrate “the power of a
society based on 10 times as much data.” If the last century was
marked by the ability to observe the interactions of physical
matter—think of technologies like x-ray and radar—this century, he
says, is going to be defined by the ability to observe people through
the data they share…So-called anticipatory systems such as Google
Now represent one example of what could result. We’re already
seeing the transformations that big data is causing in advertising and
other situations where millions of people’s activity can be measured
at a time. Now data science is looking at how it can help individuals.
Timely updates on a United Airways flight may be among the tamer
applications. Think instead of statistical models that tell you what job
to take, or alert you even before you feel ill that you may have the
flu…Driving this trend is a swelling amount of personal data available
to computers. The amount of digital data being created globally is
doubling every two years, and the majority of it is generated by
consumers, in the form of movie downloads, VOIP calls, e-mails,
cell-phone location readings, and so on, according to the
consultancy IDC. Yet only about 0.5 percent of that data is ever
analyzed….the merger of big data and personal data has been a
goal for some time. It creates tools advertisers can use, and it makes
products that are particularly “sticky,” too…Exposing more personal
data seems inevitable. With the huge jump in sales of smartphones
packed with accelerometers, cameras, and GPS, “people have
become instrumented to collect and transmit personal data,”…
Wolfram is interested in predictive apps, but also in the insights
that large data sets can have on personal behavior, something he
calls “personal analytics.”… holdup, says Wolfram, is that some of
the most useful data isn’t being captured, at least not in a way that’s
easily accessible. Part of the problem is technical, a lack of
integration. But much data is warehoused by private companies like
Facebook, Apple, and Fitbit, maker of a popular pedometer…
3. Internet of things kit
http://www.technologyreview.com/news/514541/twitter-tests-atoolkit-that-puts-the-internet-in-things/
Twitter recently developed a whimsical tweet-enabled cuckoo clock.
It uses a toolkit that could help other designers and engineers test
ways for new products to contribute to, and feed on, the social
network’s chatter. Twitter created the clock, called #Flock, last
month in partnership with London-based technology consultancy
Berg; the clock responds to incoming tweets, @-messages, and
retweets by animating small wooden puppets…toolkit made by Berg
is designed to make it easier for consumer-tech companies to
prototype similar “connected products” and experiment with their
novel user experiences. As the cost of networking technology has
plummeted and wireless connectivity has become more ubiquitous,
connected products have begun to enter the mainstream
marketplace (see “Nest’s Smarter Home”). The concept of the
“Internet of things” first emerged in the late 1990s. It proposed that
physical objects not normally thought of as “computers”—like
boxes in a warehouse or appliances in a home—could be networked
together using small, cheap digital transmitters and receivers…basic
engineering challenges of connecting physical objects to the Internet
are still too daunting to encourage rapid innovation. “Our ambition is
to let you go from zero to your first connected product in a day,” says
Webb. “We all cut our teeth developing for the Web, and we
wanted to create a way to experiment with hardware that’s just as
agile.” The Berg Cloud dev kit includes two small circuit boards and
microcontrollers with access to a set of Web APIs, allowing the
microcontroller to send and receive data from Internet applications.
Another device in the kit, called a Bridge, provides wireless
connectivity, and a built-in mobile user interface called Remote can
access, manage, and control the system via iPhone, Android, or
Windows Phone devices…“Prototyping interactions in physical
objects is difficult enough without tackling the networking
aspect,”… “Internet of things” has already influenced technology
companies like GE and IBM, who see the potential of networked
components in industrial equipment (such as aircraft and power
stations) to add cloud-computing functionality and data-driven
intelligence to basic infrastructure…
4. DARPA direction
http://www.eetimes.com/design/military-aerospacedesign/4412758/DARPA-refocuses-amid-terror--tech-and-fundingshifts
Defense Advanced Projects Agency (DARPA) released anew
framework, reinterpreting its mission in light of three new
realities.Terrorist groups and individuals emphasize new threats,
consumers have access to sophisticated technologies and U.S.
defense funding is expected to decline for the foreseeable future.
new focus calls for developing systems that are "more adaptable so
they can be configured" for a variety of uses, she said. Other efforts
will focus on relatively low cost capabilities "that inflict cost on our
adversaries to respond,"… DARPA is working on "a new generation
of electronic warfare that will leapfrog what others can do," she
said. It is also developing "a new suite of technologies for timing
and position so our people won't be as dangerously reliant on GPS
as they are today,"
5. Deep Learning
http://www.nytimes.com/2012/11/24/science/scientists-seeadvances-in-deep-learning-a-part-of-artificialintelligence.html?ref=science
technology companies are reporting startling gains in fields as
diverse as computer vision, speech recognition and the
identification of promising new molecules for designing
drugs…advances have led to widespread enthusiasm among
researchers who design software to perform human activities like
seeing, listening and thinking…technology, called deep learning, has
already been put to use in services like Apple’s Siri virtual personal
assistant…what is new in recent months is the growing speed and
accuracy of deep-learning programs, often called artificial neural
networks or just “neural nets” for their resemblance to the neural
connections in the brain…Toronto computer scientist Geoffrey E.
Hinton won the top prize in a contest sponsored by Merck to design
software to help find molecules that might lead to new drugs…From
a data set describing the chemical structure of 15 different
molecules, they used deep-learning software to determine which
molecule was most likely to be an effective drug
agent…achievement was particularly impressive because the team
decided to enter the contest at the last minute and designed its
software with no specific knowledge about how the molecules bind
to their targets. The students were also working with a relatively
small set of data; neural nets typically perform well only with very
large ones…marketers can comb large databases of consumer
behavior to get more precise information on buying habits. And
improvements in facial recognition are likely to make surveillance
technology cheaper and more commonplace…Last year, for
example, a program created by scientists at the Swiss A. I. Lab at
the University of Lugano won a pattern recognition contest by
outperforming both competing software systems and a human
expert in identifying images in a database of German traffic
signs…summer, Jeff Dean, a Google technical fellow, and Andrew Y.
Ng, a Stanford computer scientist, programmed a cluster of 16,000
computers to train itself to automatically recognize images in a
library of 14 million pictures of 20,000 different objects. Although
the accuracy rate was low — 15.8 percent — the system did 70
percent better than the most advanced previous one…
Download