Toggle light / dark theme

Europe has become known as a second-place destination for business, and more recently, innovation.

Disruptive technologies like AI have hailed from the United States for decades with no European challenger in sight.

However, when a four-week-old French AI startup secured €105 million for its seed round, it demonstrated that Europe isn’t as disadvantaged as people think. While AI is a saturated market, quantum computing can allow Europe to survive in a century ruled by China and the US.

NATIONAL HARBOR, Md. (AP) — Artificial intelligence employed by the U.S. military has piloted pint-sized surveillance drones in special operations forces’ missions and helped Ukraine in its war against Russia. It tracks soldiers’ fitness, predicts when Air Force planes need maintenance and helps keep tabs on rivals in space.

Now, the Pentagon is intent on fielding multiple thousands of relatively inexpensive, expendable AI-enabled autonomous vehicles by 2026 to keep pace with China. The ambitious initiative — dubbed Replicator — seeks to “galvanize progress in the too-slow shift of U.S. military innovation to leverage platforms that are small, smart, cheap, and many,” Deputy Secretary of Defense Kathleen Hicks said in August.

While its funding is uncertain and details vague, Replicator is expected to accelerate hard decisions on what AI tech is mature and trustworthy enough to deploy — including on weaponized systems.

Telecommunication goes back a lot further than you might expect. While the word has become synonymous with television broadcasting and phone communication, it really describes any communication system over a distance, and could include smoke signals. These simple signals were used to convey messages from “the enemy is approaching” to the fact that a whale has beached itself and can be butchered for meat.

While some ancient cultures varied smoke colors to convey further information, there’s only so much you can get across with a big fire. One particularly cool ancient version of telecommunication, which aimed to convey more precise meanings, was the hydraulic telegraph, used in Ancient Greece in around 350 BCE.

The idea – thought to have been invented by Aeneas of Stymphalus, a writer on the military at the time – was simple, but neat. Each person you want to communicate with is given a jar of the same size, filled with the same amount of water. Inside the jar is a floating rod, on which was inscribed identical messages that are useful to pass along.

To try everything Brilliant has to offer—free—for a full 30 days, visit http://brilliant.org/ArtemKirsanov/
The first 200 of you will get 20% off Brilliant’s annual premium subscription.

My name is Artem, I’m a computational neuroscience student and researcher. In this video we discuss engrams – fundamental units of memory in the brain. We explore what engrams are, how memory is allocated, where it is stored, and how different memories become linked with each other.

Patreon: https://www.patreon.com/artemkirsanov.
Twitter: https://twitter.com/ArtemKRSV

OUTLINE:

I’ve posted a number of times about artificial intelligence, mind uploading, and various related topics. There are a number of things that can come up in the resulting discussions, one of them being Kurt Gödel’s incompleteness theorems.

The typical line of arguments goes something like this: Gödel implies that there are solutions that no algorithmic system can accomplish but that humans can accomplish, therefore the computational theory of mind is wrong, artificial general intelligence is impossible, and animal, or at least human minds require some as of yet unknown physics, most likely having something to do with the quantum wave function collapse (since that remains an intractable mystery in physics).

This idea was made popular by authors like Roger Penrose, a mathematician and theoretical physicist, and Stuart Hameroff, an anesthesiologist. But it follows earlier speculations from philosopher J.R. Lucas, and from Gödel himself, although Gödel was far more cautious in his views than the later writers.

In recent years, engineers and material scientists have been trying to create increasingly advanced battery technologies that are charged faster, last longer, and can store more energy. These batteries will ultimately play a crucial role in the advancement of the electronics and energy sector, powering the wide range of portable devices on the market, as well as electric vehicles.

Lithium-ion batteries (LiBs) are currently the most widespread batteries worldwide, powering most electronics we use every day. Identifying scalable methods to increase the speed at which these batteries charge is thus one of the primary goals in the energy field, as it would not require switching to entirely new battery compositions.

Researchers at Huazhong University of Technology in China recently introduced a new strategy to develop fast-charging LiBs containing a graphite-based material. Their proposed battery design, outlined in a paper published in Nature Energy, was found to successfully speed up the charging time of LiBs, while also allowing them to retain much of their capacity even after they are charged thousands of times.

To try everything Brilliant has to offer—free—for a full 30 days, visit http://brilliant.org/ArtemKirsanov/
The first 200 of you will get 20% off Brilliant’s annual premium subscription.

My name is Artem, I’m a computational neuroscience student and researcher. In this video we discuss the Tolman-Eichenbaum Machine – a computational model of a hippocampal formation, which unifies memory and spatial navigation under a common framework.

Patreon: https://www.patreon.com/artemkirsanov.
Twitter: https://twitter.com/ArtemKRSV

OUTLINE:

Since I like AI and I’m possibly going into Cyber Security. This is a great use for AI. Catching cyber threats in real time. It’s ML of course.


Powered by artificial intelligence and machine learning, Palo Alto Networks Zero Trust approach unifies network security for companies so they can focus on what they do best.

For IT leaders, building a safe and secure network used to be much easier. Before companies had multiple locations due to hybrid work, data was stored on-site, and employees only accessed it from those locations. Nowadays, with workers logging in remotely, and from a variety of devices, securing data has become significantly more complex. Additionally, many organizations have taken their networks and applications to the cloud, further complicating their security architectures and putting them at risk of cyberattacks.