How facial recognition works (and how to hack your own in Python)

1-xBJ4H2lbCMfzIfMrOm9BEQ

You could not ask for a clearer, easier-to-read, more informative guide to facial recognition and machine learning thank Adam Geitgey's article, which is the latest in a series of equally clear explainers on machine learning, aimed at non-technical people -- and if you are a programmer, he's got links to Python sample source and projects you can use to develop your own versions. Read the rest

Man builds giant, discrete-component-based computer that can play Tetris

Projection: Cylindrical (1)
FOV: 227 x 78
Ev: 6.71

James Newman's "Megaprocessor" is a giant "microprocessor" built on transistors and other discrete components that he soldered onto boards and wired together in frames that stand 2m high and run 10m long. Read the rest

White House contends with AI's big social challenges, July 7/NYC

ainowbag_reflection2 (1) (1)

Meredith from Simply Secure writes, "Artificial Intelligence is already with us, and the White House and New York University’s Information Law Institute are hosting a major public symposium to face what the social and economic impacts might be. AI Now, happening July 7th in New York City, will address the real world impacts of AI systems in the next next 5-10 years." Read the rest

Analyzing all known Metal lyrics with natural language processing

fullmetallyrics

Iain ("an ex-physicist currently working as a data scientist") scraped Dark Lyrics and built a dataset of lyrics to 222,623 songs by 7,364 metal bands, then used traditional natural language processing techniques to analyze them. Read the rest

Even if Moore's Law is "running out," there's still plenty of room at the bottom

Altera_StratixIVGX_FPGA

A very good piece by Tom Simonite in the MIT Technology Review looks at the implications of Intel's announcement that it will slow the rate at which it increases the density of transistors in microprocessors. Read the rest

Google is restructuring to put machine learning at the core of all it does

dream_861ec7825b (1)

Steven Levy is in characteristic excellent form in a long piece on Medium about the internal vogue for machine learning at Google; drawing on the contacts he made with In the Plex, his must-read 2012 biography of the company, Levy paints a picture of a company that's being utterly remade around newly ascendant machine learning techniques. Read the rest

Cataloging the problems facing AI researchers is a cross between a parenting manual and a management book

animation (1)

Concrete Problems in AI Safety, an excellent, eminently readable paper from a group of Google AI researchers and some colleagues, sets out five hard problems facing the field: robots might damage their environments to attain their goals; robots might figure out how to cheat to attain their goals; supervising robots all the time is inefficient; robots that are allowed to try novel strategies might cause disasters; and robots that are good at one task might inappropriately try to apply that expertise to another unrelated task. Read the rest

Algorithms to Live By: what computer science teaches us about everyday decisions

algorithms-to-live-by-brain
Brian Christian and Tom Griffiths' Algorithms to Live By: The Computer Science of Human Decisions is pitched as a combination of personal advice and business book grounded in the lessons of computer science, but it's better than that: while much of the computer science they explain is useful in personal and management contexts, the book is also a beautifully accessible primer on algorithms and computer science themselves, and a kind of philosophical treatise on what the authors call "computational kindness" and "computational stoicism."

Let's teach programming as a tool for analyzing data to transform the world

Globaloria_students_working (1)

Data-scientist Kevin H Wilson argues that computers are tools for manipulating data -- from companies' sales data to the input from games controllers -- but we teach computer programming as either a way to make cool stuff (like games) or as a gateway to "rigorous implementation details of complicated language," while we should be focusing on fusing computer and math curriciula to produce a new generation of people who understand how to use computers to plumb numbers to find deep, nuanced truths we can act upon. Read the rest

Intel x86s hide another CPU that can take over your machine (you can't audit it)

PIC12C508-HD
Recent Intel x86 processors implement a secret, powerful control mechanism that runs on a separate chip that no one is allowed to audit or examine. When these are eventually compromised, they'll expose all affected systems to nearly unkillable, undetectable rootkit attacks. I've made it my mission to open up this system and make free, open replacements, before it's too late.

Emojibot uses deep learning to synthesize expressive new nonverbal communications

emojiland2

Dango is a personal assistant that feeds its users' messages into a deep-learning neural net to discover new expressive possibilities for emojis, GIFs and stickers, and then suggests never-seen combinations of graphic elements to your text messages that add striking nuances to them. Read the rest

Twitterbot that produces endless entries in an imaginary daemonological grimoire

Ckge6x1UYAENpbN

The Lesser Bot is a twitterbot that is writing a machine-generated grimoire, complete with summoning runes, which is timely, given that we're entering the age of demon-haunted computers. Read the rest

Award-winning short sf film written by an AI is pretty good

056c026d-1c66-4d42-9fae-a8e96df290c5-1020x1089

Director Oscar Sharp and AI researcher Ross Goodwin trained a machine-learning system with a huge pile of classic science fiction screenplays and turned it loose to write a short film. What emerged was an enigmatic 9-minute movie called Sunspring, which has just won Sci-Fi London's 48-hour challenge. Read the rest

Password hashing demystified

1200px-Double-alaskan-rainbow

The password breaches are getting stronger and worser, and hardly a week goes by without a dump that's a couple zeroes bigger than the biggest to date -- but not all password breaches are created equal, and a lot depends on whether and how the passwords were hashed. Read the rest

Deep learning AI "autoencodes" Blade Runner, recreates it so faithfully it gets a takedown notice

1-LNPjTuTmTW3Wzeg-3RzlZg

Artist and researcher Terence Broad is working on his master's at Goldsmith's computing department; his dissertation involved training neural networks to "autoencode" movies they've been fed. Read the rest

EFF: FBI & NIST's tattoo recognition program exploited prisoners, profiled based on religion, gave sensitive info to private contractors

why_tattoos_slide

Dave Maass from EFF says, "Right now, NIST researchers are working with the FBI to develop tattoo recognition technology that police can use to learn as much as possible about people through their tattoos. But an EFF investigation has found that these experiments exploit inmates, with little regard for the research's implications for privacy, free expression, religious freedom, and the right to associate. And so far, researchers have avoided ethical oversight while doing it." Read the rest

Generative, collaging architecture system designs impossible, Inception-like cities

26639435895_cfbc2e876c_b

London's Daniel Brown created a generative design system that designs beautiful, brutalist cityscapes that are part Blade Runner Hong Kong, part Inception; he then manually sorts through the results, picks the best, and publishes them in a series called "Travelling by Numbers." Read the rest

More posts