PC AI sucks at Civilization, reads manual, starts kicking ass The Massachusetts institute of technology have been experimenting with their computers' AI. Specifically the way they deal with the meaning of words. You might think that the best way to analyse this kind of thing would be with a human to PC conversation, like in Short Circuit. That's not the case. Instead, the boffins handed over PC classic, Civilization, and let the AI get on with it. Then the researchers handed over the instructions and taught the PCs a "machine-learning system so it could use a player's manual to guide the development of a game-playing strategy." Associate professor of computer science and electrical engineering, Regina Barzilay, offered insight into why they used a game manual to prove their point. Civ was picked because it's a really fun game, and they didn't want the computers to get bored during the testing. Not really. These kind of systems could make developer's jobs a lot easier. What's the best AI you've ever played against? (via Reddit)
Tiny Satellite To Scrawl Morse Code Messages Across the Night Sky The Coming Technological Singularity ==================================================================== The Coming Technological Singularity: How to Survive in the Post-Human Era Vernor Vinge Department of Mathematical Sciences San Diego State University (c) 1993 by Vernor Vinge (Verbatim copying/translation and distribution of this entire article is permitted in any medium, provided this notice is preserved.) This article was for the VISION-21 Symposium sponsored by NASA Lewis Research Center and the Ohio Aerospace Institute, March 30-31, 1993. It is also retrievable from the NASA technical reports server as part of NASA CP-10129. A slightly changed version appeared in the Winter 1993 issue of _Whole Earth Review_. How We Predict Each Other's Choices Humans may not be mind readers, but our brains are able to predict other people's decisions pretty well. New research on this phenomenon shows that two spots in the brain weigh the risk and reward of the choice someone else is making. "Perhaps we may one day better understand how and why humans have the ability to predict others' behavior, even those with different characteristics," Hiroyuki Nakahara, of the RIKEN Brain Science Institute, in Japan, said in a statement. "Ultimately, this knowledge could help improve political, educational and social systems in human societies." To study this, 39 participants watched another person play a game (on a computer screen) and predicted what choices that person would make based on the person's prior moves. Meanwhile, the researchers scanned the players' brains using functional magnetic resonance imaging (fMRI), a technique that can detect brain activity. The study is detailed in tomorrow's (June 21) issue of the journal Neuron.
Turing Test [<< | Prev | Index | Next | >>] Turing Test Human: Hello Computer: Hi. Human: What's your name? Computer: Can we cut the small talk and get to something interesting? Human: Ur, ok... [<< | Prev | Index | Next | >>] GOOGLE HACKING TO HACK INTO A LIVE SECURITY CAMERA « FREE EDUCATION Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information. In this post I will show how to use Google Hacking to Hack into a Live Security Camera. There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time. •inurl:”CgiStart? For Example use this query inurl:”viewerframe? Wow, you can see a live cam on your PC screen!! As you can see in the above screenshot, you now have access to the Live cameras which work in real-time. Like this: Like Loading...
Four Years Later By Mike Deering The date is four years from now, and the world is on the verge of something wonderful. The big news of the last twelve months is the phenomenal success of Ben Goertzel's Novamente program. It has become a super tool for solving complex problems. Nevertheless, the success of the Novamente system has made Ben Goertzel rich and famous, making frequent appearances on the talk show circuit, as well as, visits to the White House. The Novamente phenomena has triggered an explosion of public interest and research in AI. In their posh new building in Atlanta, we find Eliezer working with the seedai system of his own design. "I am going to read you a short story." he says. "Okay." replies the computer. "Mary had a little lamb, whose fleece was white as snow." "The story was about a girl, and a sheep, and a school, and a ..." Interrupting the computer, "What was the girl's name?" "Mary." responds the computer. "What is your name?" Sabine comes through the door, "How's it going?" "Great!
How to Watch Security Camera Streams on the Internet: 6 steps Favorite This Article Edit Article Search Queries Edited by anthony eide, Josh H., Maluniu, Sondra C and 101 others Security cameras are everywhere, it seems, but what are they looking at? If you have ever been curious about it, we will show you not only how to see through the eyes of Big Brother, but even how you can sometimes zoom, pan, tilt, capture, and save images right from your computer! Ad Steps 1Open up your web browser. 4Manipulate the camera. Search Queries 1The list is continuously evolving so if you find a query that doesn't work, edit this page and remove it from the list.inurl:/view.shtmlinurl:ViewerFrame? Tips You can take a screenshot or use a screen recording program to record the video stream. Warnings This does not fall within most school or business guidelines for acceptable use of their computers.
AI Cracks Mystery of 4-Millennia-Old Code (Partially)AI Cracks Mystery of 4-Millennia-Old Code (Partially) Those of you who watched Terminator as a warning of the future may want to pack your bags: an artificial intelligence has just beaten the best human experts at a problem, one that some of them said was utterly impossible. We recommend bringing some EMP weapons, and we hear that there's a nice spot for a city near the Earth's core. The problem was that of the Indus script, writings left behind by the people of the Indus Valley four millennia ago - people thoughtless enough not to drop a dictionary into their ruins. "They've tried to connect it to everything from Egyptian to Easter Island text, so they don't know what the hell it is"-kind-problems, with no success, and five years ago linguists started to claim it wasn't a language at all but a sequence of pretty pictures. Among the languages linked to the mysterious script are Chinese Lolo, Sumerian, Egyptian, Dravidian, Indo-Aryan, Old Slavic, even Easter Island — and, ultimately, no language at all.
How to use Google for Hacking, how to hack security cameras, Hacking Personal and Confidential Documents ~ Dunya Infocom blog Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. 1. There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time. Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. As you can see in the above screenshot, you now have access to the Live cameras which work in real-time. intitle:”Live View / – AXIS” Click on any of the search results to access a different set of live cameras. 2. 3. “?
Agents An agent is an animate entity that is capable of doing something on purpose. That definition is broad enough to include humans and other animals, the subjects of verbs that express actions, and the computerized robots and softbots. But it depends on other words whose meanings are just as problematical: animate, capable, doing, and purpose. The task of defining those words raises questions that involve almost every other aspect of ontology. Animate. Psychology of Agents Linguistically, an agent is an animate being that can perform some action, and an action is an event that is initiated or carried out by some animate being. The word animate comes from the Latin anima, which means breath or soul. We must inquire for each kind of living thing, what is its psyche; what is that of a plant, and what is that of a human or a beast. Aristotle's hierarchy of functions was based on his extensive study of the plants and animals known in his day. Competence Levels Avoiding. Artificial Psyches
Popular Surveillance Cameras Open to Hackers, Researcher Says | Threat Level In a world where security cameras are nearly as ubiquitous as light fixtures, someone is always watching you. But the watcher might not always be who you think it is. Three of the most popular brands of closed-circuit surveillance cameras are sold with remote internet access enabled by default, and with weak password security — a classic recipe for security failure that could allow hackers to remotely tap into the video feeds, according to new research. The cameras, used by banks, retailers, hotels, hospitals and corporations, are often configured insecurely — thanks to these manufacturer default settings, according to researcher Justin Cacak, senior security engineer at Gotham Digital Science. Cacak and his team were able to view footage as part of penetration tests they conducted for clients to uncover security vulnerabilities in their networks. “All the ones we found have remote access enabled by default,” Cacak says.