Toggle light / dark theme

IN THE NEAR FUTURE, we should anticipate certain technological developments that will forever change our world. For instance, today’s text-based ChatGPT will evolve to give rise to personal “conversational AI” assistants installed in smart glasses and contact lenses that will gradually phase out smartphones. Technological advances in fields such as AI, AR/VR, bionics, and cybernetics, will eventually lead to “generative AI”-powered immersive neurotechnology that enables you to create virtual environments and holographic messages directly from your thoughts, with your imagination serving as the “prompt engineer.” What will happen when everyone constantly broadcasts their mind?

#SelfTranscendence #metaverse #ConversationalAI #GenerativeAI #ChatGPT #SimulationSingularity #SyntellectEmergence #GlobalMind #MindUploading #CyberneticImmortality #SimulatedMultiverse #TeleologicalEvolution #ExperientialRealism #ConsciousMind


Can the pursuit of experience lead to true enlightenment? Are we edging towards Experiential Nirvana on a civilizational level despite certain turbulent events?

After almost a decade, Google have finally managed to develop a file sharing function like Apple’s AirDrop. Called Nearby Share, here’s how your use it.

Whatever your opinion about which operating system is the best, iOS has had one major advantage over Android and Windows for some time, its AirDrop feature. In fact, for more than a decade, AirDrop has been a source of pride for Apple users and a cause of resentment for many who desire an easy way to share files between Windows and Android.


Pornpak Khunatorn/iStock.

Fascinating proposal for methodology.


Models are scientific models, theories, hypotheses, formulas, equations, naïve models based on personal experiences, superstitions (!), and traditional computer programs. In a Reductionist paradigm, these Models are created by humans, ostensibly by scientists, and are then used, ostensibly by engineers, to solve real-world problems. Model creation and Model use both require that these humans Understand the problem domain, the problem at hand, the previously known shared Models available, and how to design and use Models. A Ph.D. degree could be seen as a formal license to create new Models[2]. Mathematics can be seen as a discipline for Model manipulation.

But now — by avoiding the use of human made Models and switching to Holistic Methods — data scientists, programmers, and others do not themselves have to Understand the problems they are given. They are no longer asked to provide a computer program or to otherwise solve a problem in a traditional Reductionist or scientific way. Holistic Systems like DNNs can provide solutions to many problems by first learning about the domain from data and solved examples, and then, in production, to match new situations to this gathered experience. These matches are guesses, but with sufficient learning the results can be highly reliable.

Mixed reality (MR) and Augmented Reality (AR) technologies merge the real world with computer-generated elements, allowing users to interact with their surroundings in more engaging ways. In recent years, these technologies have enhanced education and specialized training in numerous fields, helping trainees to test their skills or make better sense of abstract concepts and data.

Researchers at University of Calgary have been trying to develop interfaces and systems that could enhanced MR visualizations. In a paper set to be presented at CHI 2023 LBW, they introduced HoloTouch, a system that can augment mixed reality graphics and charts using smartphones as physical proxies.

“To me, this paper was inspired for the most part by a work that I published during my final undergraduate year,” Neil Chulpongsatorn, one of the researchers who carried out the study, told Tech Xplore “They both originated from my interest in mixed reality interactions for data representations.”

The Near–Ultrasound Invisible Trojan, or NUIT, was developed by a team of researchers from the University of Texas at San Antonio and the University of Colorado Colorado Springs as a technique to secretly convey harmful orders to voice assistants on smartphones and smart speakers.

If you watch videos on YouTube on your smart TV, then that television must have a speaker, right? According to Guinevere Chen, associate professor and co-author of the NUIT article, “the sound of NUIT harmful orders will [be] inaudible, and it may attack your mobile phone as well as connect with your Google Assistant or Alexa devices.” “That may also happen in Zooms during meetings. During the meeting, if someone were to unmute themself, they would be able to implant the attack signal that would allow them to hack your phone, which was placed next to your computer.

The attack works by playing sounds close to but not exactly at ultrasonic frequencies, so they may still be replayed by off-the-shelf hardware, using a speaker, either the one already built into the target device or anything nearby. If the first malicious instruction is to mute the device’s answers, then subsequent actions, such as opening a door or disabling an alarm system, may be initiated without warning if the first command was to silence the device in the first place.

Can you imagine if we had computer/brain interfaces what would happen? We’ll need brain firewalls and antivirus.


Android apps digitally signed by China’s third-biggest e-commerce company exploited a zero-day vulnerability that allowed them to surreptitiously take control of millions of end-user devices to steal personal data and install malicious apps, researchers from security firm Lookout have confirmed.

The malicious versions of the Pinduoduo app were available in third-party markets, which users in China and elsewhere rely on because the official Google Play market is off-limits or not easy to access. No malicious versions were found in Play or Apple’s App Store. Last Monday, TechCrunch reported that Pinduoduo was pulled from Play after Google discovered a malicious version of the app available elsewhere. TechCrunch reported the malicious apps available in third-party markets exploited several zero-days, vulnerabilities that are known or exploited before a vendor has a patch available.

Sophisticated attack

In a world first, a team of University of Wisconsin-Madison materials engineers have created carbon nanotube transistors that outperform state-of-the-art silicon transistors.

A big milestone for nanotechnology, this breakthrough could enable longer battery life, faster wireless communication and faster processing speeds for devices like smartphones and laptops.

The researchers reported their advance in a paper published Sept. 2, 2016, in the journal Science Advances. Read the open access paper here: http://advances.sciencemag.org/content/2/9/e1601240

Read the full story here: http://bit.ly/2c0GBMo

It’s past time the world moves away from text-based passwords and verifications for mobile phones and starts embracing more secure image-based solutions, say computer scientists from the University of Surrey.

In a new study, Surrey scientists demonstrate an image-based authentication system called TIM (Transparent Image Moving) for mobile phones to help reduce the risk of shoulder surfing attacks. TIM requires users to select and move predefined images to a designated position for passing authentication checks, similar to those required for .

The proof-of-concept study found that 85% of TIM users believed it could help them to prevent password guessing and shoulder surfing attacks. The study also found that 71% of participants think TIM is a more usable image-based solution than others on the market. The research has been published in the Journal of Information Security and Applications.