Category Archives: Tech

Narro Reading of A physicist on why AI safety is ‘the most important conversation of our time’

Listen on Narro
Should we be worried about the dangerous potential of artificial intelligence?
Sort of, says Max Tegmark, a physicist at the Massachusetts Institute of Technology. Tegmark is a co-founder of the F…

Narro Reading of Google finally admits you don’t need special hardware for augmented reality

Listen on Narro
In 2014 Google said it was going to revolutionize the way we use smartphones through augmented reality. With AR, developers who built apps that worked on Android phones could drop virtual objects alongside real ones through the phone’s camera. These fictional objects would look like they existed in real life, dramatically changing the experience of…

Amazon has an algorithm that designs clothes by replicating human creativity by https://is.gd/8L1w9m

At its core, Amazon’s goal is to remove as much friction as possible from a customer finding what they want, ordering it, and having it land on their doorstep. Its ambitions started with books, but have since extended to just about every other category, including clothes.

MIT Technology Review reports that a team at the e-commerce company, working at a San Francisco research center, has devised an algorithm that analyzes images to learn about specific styles of clothing. It then creates similar new items from scratch.

from https://is.gd/8L1w9m

Selected by Galigio via Computer Borders

Narro Reading of Is Sci-Fi the Next Big Chinese Cultural Export After Kung Fu?

Listen on Narro
Award-winning writer and translator Ken Liu talks about why Obama, Zuckerberg are fans of futuristic stories coming out of China

How to Scan Your Linux Computer for Viruses and Rootkits by https://is.gd/Mcj0vO

Are you worried that your Linux computer may be infected with malware? Have you ever checked? While Linux systems tend to be less susceptible to malware than Windows, they can still be infected. Many times they’re less obviously compromised, too.

There are a handful of excellent open-source tools to help you check if your Linux system has been the victim of malware. While no software is perfect, these three have a solid reputation and can be trusted to find most known threats.

from https://is.gd/Mcj0vO

Selected by Galigio via Computer Borders

Narro Reading of Are Asimov’s laws enough to stop AI stomping humanity?

Listen on Narro
Data, and who has it, is the real concern

Burn. Better. by http://www.etcher.io

Etcher.png

Burn images to SD cards & USB drives, safe & easy. Extract, and run!

from http://www.etcher.io

Selected by Galigio via Computer Borders

Can Business Intelligence Answer the Questions Asked of it Without Big Data? by http://bit.ly/2hNlJgQ

“BI is about providing the right data at the right time to the right people so that they can take the right decisions” – Nic Smith The terms “Big Data” and “Business Intelligence” are often used interchangeably.

However, technically speaking, they are nowhere near each other. In fact, “Business Intelligence” and “Big Data” refer to entirely separate processes that fulfil individual functions, albeit within the same overall domain.

from http://bit.ly/2hNlJgQ

Selected by Galigio via Computer Borders