Stuart Russell, The Future of AI: What if We Succeed?, panel at IJCAI 13, Beijing, ... Panel discussion live on NHK TV (Japan), World Economic Forum, Davos, ... Interview on Hub Culture TV, World Economic Forum, Davos, January 23, 2015.
How will advances in artificial intelligence, smart sensors and social technology change our lives?
• Rodney Brooks, Founder, Chairman and Chief Technical Officer, Rethink Robotics, USA; Technology Pioneer
• Anthony Goldbloom, Founder and Chief Executive Officer, Kaggle, USA; Technology Pioneer
• Hiroaki Nakanishi, Chairman and Chief Executive Officer, Hitachi, Japan
• Kenneth Roth, Executive Director, Human Rights Watch, USA
• Stuart Russell, Professor, University of California, Berkeley, USA; Global Agenda Council on Artificial Intelligence & Robotics
• Hiroko Kuniya, Anchor and Presenter, Today's Close-Up, NHK (Japan Broadcasting Corporation), Japan; Global Agenda Council on Japan
Today two billion phones are in use worldwide, and this number is expected to double by the end of the decade. To get an idea how much time people will then spend on their smartphones it helps to look at today’s young people. Today’s #Dailychart shows that, according to Ofcom, those aged between 16 to 24 years use their device nearly four hours a day; those aged between 55 to 64 only half as much http://econ.st/1JQGLT4
名科學家Freeman Dyson在波士頓大學管理學院的講座: Heretical Thoughts About Science and Society Uploaded on Mar 30, 2010第一個非科學預言即：強國各領風騷150年，2070年中國因美國外務過寬廣多，窮於應付而登場.....作為曾是強國英國的子民，曾是一流國民，甘居二等國家的公民.....美國人適應不再是世界主宰之人文主義觀點...... http://hcbooks.blogspot.tw/…/sun-genome-and-internet-21-fre… Freeman Dyson: The Scientist as Rebel《反叛的科學家》The Sun, the Genome, and the Internet資 21世紀三事
Freeman Dyson: Heretical Thoughts About Science and Society Uploaded on Mar 30, 2010 Freeman Dyson with dry wit and self-effacing good humor explains that by heretical he means ideas that go against prevailing dogmas, and that in his self-appointed role as heretic, he is unimpressed by conventional wisdom.
Bill Nye, 59, is a science educator, writer and television personality who was the host of the popular children’s science show “Bill Nye, the Science Guy.” He was born in Washington and graduated from Sidwell Friends.
If your last name hadn’t been Nye, you wouldn’t be known as the Science Guy?
Joe Heim joined The Post in 1999. He is currently a staff writer for the Metro section's Local Enterprise team. He also writes Just Asking, a weekly Q&A column in the Sunday magazine and is the paper's resident Downton Abbey expert. View Archive
Yes, it has occurred to me, but I played the hand I was dealt. In Denmark, where my ancestors are from, it’s pronounced “knee.” If you go to any Scandinavian country, our name is on everything. It means new. New and improved.
Bill New, the science guy?
Yeah, I know.
I think Nye worked out well. Rhyming is everything.
Well, it’s not everything, but it sure helped me.
When you were growing up in D.C., what were things that got you interested in science?
I always say the bees. I watched bees on azalea bushes. This was a big thing for me. I remember being just fascinated. How can these large animals fly around with such tiny wings? It really was amazing.
What’s the first experiment you remember doing?
The one that really sticks with me is that I got stung by a bee. My mom put ammonia on it, and it felt better. My brother had a chemistry set, and he made ammonia in the palm of my hand with two powders. And I remember thinking, That is the coolest thing. The bee sting was a drag, but I thought that was just fantastic.
What grade does America deserve in science?
Well, this is the world’s most technically advanced society, and we have people denying climate change. These guys are still in deep denial, and future generations, what few of them will be alive, are just going to go, “What were you freaking people doing? What was wrong with you?” So, in a sense, an F. But if it makes you feel any better, you can say a B-minus. We have this top tier [of scientists] in the U.S., the people who graduated from Stanford, from Berkeley, from MIT, Cornell. Those people are still exceptional and really good. But we have this enormous gap between that and just regular software writers and farmers and people that need to be scientifically literate.
Is Congress friend or enemy to scientists?
Some of each. Whenever you have the head of the Senate science committee writing a book about the conspiracy of climate denial, you have a problem. I’m saying that in a way to be ironic and hilariously funny, but[Senator James] Inhofe is leaving the world worse than he found it. He doesn’t mean to, I understand that, but, nevertheless, he is.
How did a strange lump of bronze and decayed wood discovered in a shipwreck reveal the first ever computer? Learn more about the complex clockwork device, created in the time of Archimedes, that could predict the positions of the sun, moon and planets, and even when the Olympic games fell.
Spyware Embedded by U.S. in Foreign Networks, Security Firm Says By NICOLE PERLROTH and DAVID E. SANGER February 17, 2015
美國被指在敵國電腦永久性植入監控軟件 NICOLE PERLROTH, DAVID E. SANGER 2015年02月17日
SAN FRANCISCO — The United States has found a way to permanently embed surveillance and sabotage tools in computers and networks it has targeted in Iran, Russia, Pakistan, China, Afghanistan and other countries closely watched by American intelligence agencies, according to a Russian cybersecurity firm.
In a presentation of its findings at a conference in Mexico on Monday, Kaspersky Lab, the Russian firm, said that the implants had been placed by what it called the “Equation Group,” which appears to be a veiled reference to the National Security Agency and its military counterpart, United States Cyber Command.
周一，俄羅斯公司卡巴斯基實驗室(Kaspersky Lab)在墨西哥的一次會議上介紹其調查結果稱，這些工具由它所謂的「方程組」(Equation Group)植入，這裡似乎是暗指國家安全局(National Security Agency)及其對應的軍事機構網絡戰司令部(United States Cyber Command)。
It linked the techniques to those used in Stuxnet, the computer worm that disabled about 1,000 centrifuges in Iran’s nuclear enrichment program. It was later revealed that Stuxnet was part of a program code-named Olympic Games and run jointly by Israel and the United States.
Kaspersky’s report said that Olympic Games had similarities to a much broader effort to infect computers well beyond those in Iran. It detected particularly high infection rates in computers in Iran, Pakistan and Russia, three countries whose nuclear programs the United States routinely monitors.
Some of the implants burrow so deep into the computer systems, Kaspersky said, that they infect the “firmware,” the embedded software that preps the computer’s hardware before the operating system starts. It is beyond the reach of existing antivirus products and most security controls, Kaspersky reported, making it virtually impossible to wipe out.
In many cases, it also allows the American intelligence agencies to grab the encryption keys off a machine, unnoticed, and unlock scrambled contents. Moreover, many of the tools are designed to run on computers that are disconnected from the Internet, which was the case in the computers controlling Iran’s nuclear enrichment plants.
Kaspersky noted that of the more than 60 attack groups it was tracking in cyberspace, the so-called Equation Group “surpasses anything known in terms of complexity and sophistication of techniques, and that has been active for almost two decades.”
Kaspersky Lab was founded by Eugene Kaspersky, who studied cryptography at a high school co-sponsored by the K.G.B. and once worked for the Russian military. Its studies, including one describing a cyberattack of more than 100 banks and other financial institutions in 30 countries, are considered credible by Western experts.
The fact that security software made by Kaspersky Lab is not used by many American government agencies has made it more trusted by other governments, like those of Iran and Russia, whose systems are closely watched by United States intelligence agencies. That gives Kaspersky a front-row seat to America's digital espionage operations.
The firm’s researchers say that what makes these attacks particularly remarkable is their way of attacking the actual firmware of the computers. Only in rare cases are cybercriminals able to get into the actual guts of a machine.
Recovering from a cyberattack typically involves wiping the computer’s operating system and reinstalling software, or replacing a computer’s hard drive. But if the firmware gets infected, security experts say, it can turn even the most sophisticated computer into a useless piece of metal.
In the past, security experts have warned about “the race to the bare metal” of a machine. As security around software has increased, criminals have looked for ways to infect the actual hardware of the machine. Firmware is about the closest to the bare metal you can get — a coveted position that allows the attacker not only to hide from antivirus products but also to reinfect a machine even if its hard drive is wiped.
“If the malware gets into the firmware, it is able to resurrect itself forever,” Costin Raiu, a Kaspersky threat researcher, said in the report. “It means that we are practically blind and cannot detect hard drives that have been infected with this malware.”
The possibility of such an attack is one that math researchers at the National Institute of Standards and Technology, a branch of the Commerce Department, have long cautioned about but have very rarely seen. In an interview last year, Andrew Regenscheid, a math researcher at the institute, warned that such attacks were extremely powerful. If the firmware gets corrupted, Mr. Regenscheid said, “your computer won’t boot up and you can’t use it. You have to replace the computer to recover from that attack.”
隸屬於商務部(Commerce Department)的國家標準與技術研究院(National Institute of Standards and Technology)的數學研究人員多年來一直在發出警告，稱存在遭遇這種攻擊的可能性，但很少能實際見到它的發生。去年接受採訪時，該研究院的數學研究人員安德魯·雷根沙伊德(Andrew Regenscheid)警告稱，這類攻擊極其有力。雷根沙伊德表示，如果固件被感染了，「電腦就無法啟動和使用。不得不換電腦才能從攻擊中恢復過來。」
That kind of attack also makes for a powerful encryption-cracking tool, Mr. Raiu noted, because it gives attackers the ability to capture a machine’s encryption password, store it in “an invisible area inside the computer’s hard drive” and unscramble a machine’s contents.
Kaspersky’s report also detailed the group’s efforts to map out so-called air-gapped systems that are not connected to the Internet, including Iran’s nuclear enrichment facilities, and infect them using a USB stick. To get those devices onto the machines, the report said, the attackers have in some cases intercepted them in transit.
Documents revealed by the former National Security Agency contractor Edward J. Snowden detailed the agency’s plans to leap the “air gaps” that separate computers from the outside world, including efforts to install specialized hardware on computers being shipped to a target country. That hardware can then receive low-frequency radio waves broadcast from a suitcase-size device that the N.S.A. has deployed around the world. At other times the air gaps have been leapt by having a spy physically install use a USB stick to infect the adversary's computer.
前國家安全局承包商僱員愛德華·J·斯諾登(Edward J. Snowden)泄密的文件，詳細記述了國家安全局為跨越將電腦同外部世界隔離開的「物理距離」而展開計劃，包括在運往目標國家的電腦上安裝專業硬件等活動。這種硬件能接收NSA部署在世界各地的一種手提箱大小的設備發出的低頻無線電波。有的時候則直接跨過隔離帶，通過讓間諜使用U盤的方式，直接安裝到敵方的電腦里。
Basing its estimate on the time stamps in code, the Kaspersky presentation said, the Equation Group had been infecting computers since 2001, but aggressively began ramping up their capabilities in 2008, the year that President Obama was elected, and began doubling down on digital tools to spy on adversaries of America.
While the United States has never acknowledged conducting any offensive cyberoperations, President Obama discussed the issue in general in an interview on Friday with Re/code, an online computer industry publication, describing offensive cyberweapons as being unlike traditional weapons.
“This is more like basketball than football, in the sense that there’s no clear line between offense and defense,” said Mr. Obama, himself a basketball player. “Things are going back and forth all the time.”
Betting on red gives the punter an 18-in-37 chance (in America) or 18-in-38 chance (in Europe) of success in roulette. If the odds were just one-in-four, then the whole game would be much more discouraging. But those have been the chances, over the last 20 years, of largecap US mutual funds beating the markethttp://econ.st/1zIwdd6