Toggle light / dark theme

8 technologies in Westworld and when we’ll see them

It seems like every television season plays host to a single show that takes over our cultural consciousness by coating modern fears in fantastical drama.

Game of Thrones taps into the cutthroat nature of modern politics, while The Walking Dead plays into our ever-present fear of a worldwide contagion. This year, with Elon Musk’s dire warnings about the dangers of artificial intelligence, Siri and Alexa permeating our personal lives, and self-driving cars threatening to run down groups of children, Westworld is posed to be that show.

Westworld is complex. It’s that complexity, interwoven with mysteries and plot twists, that produces the hours of online speculation and wild fan theories that are the hallmark of anything worth watching.

Modular Exoskeletons

WeaRobot wants to democratize robotic exoskeletons. They want to make modular exoskeletons, so that is more affordable. The exoskeleton can boost the mobility joint by joint. Just supporting the movement of one knee or one elbow or assembling all modules for a full body exoskeleton. This is targeted at enhancing mobility and function for the growing elderly population.

WeaRobot is breaking apart robotic exoskeletons to make them more affordable and adaptable.

Robotic exoskeletons are electromechanical suits that can give paraplegic people the chance to walk again. Full body suits produce impressive results, such as teaching dormant body parts to move on their own again. But they are expensive, ranging from $40,000 to more than $100,000. Now, a Mexican robotics startup is breaking exoskeletons down into smaller pieces, with the goal of making this medical technology affordable and adaptable.

Telegram announces first winners of million dollar bot comp

Telegram has announced the first winners of its bot competition. The BotPrize was announced in April and will see $1 million awarded to developers of the best Telegram bots submitted. The first winners come from the worlds of photo-editing, productivity, games, dating and finance.

Telegram is a messaging service with a focus on speed and security. Launched in 2013, it is cloud-based, meaning that user content syncs instantly across the platforms on which the service can be used, including PC, Mac, Linux, Android, iOS and Windows Phone.

The firm’s BotPrize will help to increase the number of bots available on the service and accelerate the speed with which the number is increased. For the uninitiated, bots are effectively apps in themselves with which users can interact via messaging. They typically run inside messaging apps such as Facebook Messenger or, in this instance, Telegram.

A Better Journalist? AI Are Better at Predicting Elections Than Humans

In Brief:

  • The AI, called MogIA, based its analysis on 20 million data points from platforms such as Google, Twitter, and YouTube.
  • The AI aims at learning from the environment, developing its own rules at the policy layer, and developing expert systems without discarding any data.

MogIA, an artificial intelligence (AI) system developed by an Indian start-up, correctly predicted the outcome of this year’s elections. It based its analysis on 20 million data points from platforms such as Google, Twitter, and YouTube, reviewing public engagement across various posts in relation to individual candidates.

Battle of the Bots: How AI Is Taking Over the World of Cybersecurity

Google has built machine learning systems that can create their own cryptographic algorithms — the latest success for AI’s use in cybersecurity. But what are the implications of our digital security increasingly being handed over to intelligent machines?

Google Brain, the company’s California-based AI unit, managed the recent feat by pitting neural networks against each other. Two systems, called Bob and Alice, were tasked with keeping their messages secret from a third, called Eve. None were told how to encrypt messages, but Bob and Alice were given a shared security key that Eve didn’t have access too.

ai-cybersecurity-7

In the majority of tests the pair fairly quickly worked out a way to communicate securely without Eve being able to crack the code. Interestingly, the machines used some pretty unusual approaches you wouldn’t normally see in human generated cryptographic systems, according to TechCrunch.

Building the foundation for AI-enabled computer vision

To better understand how the brain identifies patterns and classifies objects — such as understanding that a green apple is still an apple even though it’s not red — Sandia National Laboratories and the Intelligence Advanced Research Projects Activity are working to build algorithms that can recognize visual subtleties the human brain can divine in an instant.

They are overseeing a program called Machine Intelligence from Cortical Networks, which seeks to supercharge machine learning by combining neuroscience and data science to reverse-engineer the human brain’s processes. IARPA launched the effort in 2014.

Sandia officials recently announced plans to referee the brain algorithm replication work of three university-led teams. The teams will map the complex wiring of the brain’s visual cortex, which makes sense of input from the eyes, and produce algorithms that will be tested over the next five years.

Biometric Security Gains Popularity, But Is Far from Foolproof

Whenever cybersecurity is discussed, the topic of biometric authentication rises alongside it as a better, more effective, more secure method of security. But is it? Do biometrics actually provide a safer way to complete purchase transactions online?

“Biometrics are a device-specific authentication method,” said Madeline Aufseeser, CEO of online fraud prevention company Tender Armor, of the ways biometric authentication is presently used to secure a digital purchase transaction (as opposed to logging into a bank’s web site, to view an account or transfer money). “Typically the same biometric method does not work across multiple purchasing channels today. The fingerprint used to make a purchase with a smartphone cannot necessarily be used to authenticate a phone order purchase or purchase made with a computer. When you confirm [a purchase transaction] with your fingerprint on a smartphone, all that’s saying is that’s the same fingerprint that’s allowed to use this phone, or the specific application on the phone. Because the fingerprint is only resident and stored on the phone, the phone is authenticating itself, not the cardholder conducting the transaction.”

This sounds a little odd compared to what we might have heard about the capabilities of biometrics previously, mainly because it goes against a core assumption: that a biometric identifier (like a fingerprint) goes with transactional data, from the phone or device, to the payment processor, to the merchant.