focusmotion.io — the world’s first machine learning SDK to track, learn, and analyze human motion on any sensor, on any OS, on any platform. You (or your users) train it on what combination of sensor patterns to label as a particular gesture or movement, and then it’ll throw those labels whenever.
SpeechKITT — open source flexible GUI for interacting with Speech Recognition in your web app.
The Humanities Majors Designing AI Interactions — who else are you going to get to do it? As in fiction, the AI writers for virtual assistants dream up a life story for their bots. Writers for medical and productivity apps make character decisions such as whether bots should be workaholics, eager beavers or self-effacing. “You have to develop an entire backstory — even if you never use it,” Ewing said.
SCHAFT’s Bipedal Robot — not an Austin Powers reference, but a clever working proof-of-concept. In theory, bipedalism allows robots to go wherever we can (versus, say, a Dalek).
Centaurs Not Butlers (Matt Jones) — In competitive chess, teams of human and non-human intelligences are referred to as ‘Centaurs’ How might we create teams of human and non-human intelligences in the service of better designed systems, products, environments?
Casino-Funded In-Game War — this was just the opening round of what could be the largest military mobilization in that game’s history. Digging deeper into the subject, we’ve been able to chart the rise of a new in-game faction, called the Moneybadger Coalition, a group of thousands of players being bankrolled by an online casino. (via BoingBoing)
More Chinese Mobile UI Trends — This year, Microsoft China released an AI chatbot called 小冰 (xiǎobīng) that has been popular. She’s accessible via the web, via a standalone app, via WeChat, via Cortana, and through a dedicated button in Xiaomi’s own seldom-used messaging app. It’s fun to toss annoying questions at her and see how she responds. Some people even confide in her. She’s kind of the love child of Siri, ELIZA, and Cleverbot.
Accountable Machines — Some of the proposals discussed at our workshop included having machine learning processes verify the outcomes of algorithmic decisions and provide transparency, and that systems should be designed to permit auditing as well as to audit other related systems. To me this appeared as an especially accountable version of bureaucracy, where results from each system’s accounting dynamically report up through an iterative (but still accountable) chain of command. This is not bureaucratic in the sense of inventing process for its own sake, but it is bureaucratic in the sense that it establishes many processes of accountability that are the responsibility of entities who report to one another through a structure where trust is related to the capacity to validate decisions.
Russia Bans Queue — banned the Polish board game that recreates the experience of life under Communism. Games that are simulations are effective educational experiences, too effective for Russia.
Tech Economies Must Still Make Things (Vaclav Smil) — Bill Gates’s favorite scientist/policy analyst weighs in on the next economy. Take away manufacturing and you’re left with…selfies.
On the Impending Crypto Monoculture (Peter Gutmann) — A number of IETF standards groups are currently in the process of applying the second-system effect to redesigning their crypto protocols. A major feature of these changes includes the dropping of traditional encryption algorithms and mechanisms like RSA, DH, ECDH/ECDSA, SHA-2, and AES, for a completely different set of mechanisms, including Curve25519 (designed by Dan Bernstein et al), EdDSA (Bernstein and colleagues), Poly1305 (Bernstein again) and ChaCha20 (by, you guessed it, Bernstein). What’s more, the reference implementations of these algorithms also come from Dan Bernstein (again with help from others), leading to a never-before-seen crypto monoculture in which it’s possible that the entire algorithm suite used by a security protocol, and the entire implementation of that suite, all originate from one person. How on earth did it come to this?
HCI Pioneers — Ben Schneiderman’s photo collection, acknowledging pioneers in the field. (via CCC Blog)
A Burglar’s Guide to the City (BLDGBLOG) — For the past several years, I’ve been writing a book about the relationship between burglary and architecture. Burglary, as it happens, requires architecture: it is a spatial crime. Without buildings, burglary, in its current legal form, could not exist. Committing it requires an inside and an outside; it’s impossible without boundaries, thresholds, windows, and walls. In fact, one needn’t steal anything at all to be a burglar. In a sense, as a crime, it is part of the built environment; the design of any structure always implies a way to break into it. Connection to computer security left as exercise to the reader.
Trial by Machine (Roth) — The current landscape of mechanized proof, liability, and punishment suffers from predictable but underscrutinized automation pathologies: hidden subjectivities and errors in “black box” processes; distorted decision-making through oversimplified — and often dramatically inaccurate — proxies for blameworthiness; the compromise of values protected by human safety valves, such as dignity, equity, and mercy; and even too little mechanization where machines might be a powerful debiasing tool but where little political incentive exists for its development or deployment. […] The article ultimately proposes a systems approach – “trial by cyborg” – that safeguards against automation pathologies while interrogating conspicuous absences in mechanization through “equitable surveillance” and other means. (via Marginal Revolution)
Distributed Ledger Technology: Blackett Review (gov.uk) — Distributed ledgers can provide new ways of assuring ownership and provenance for goods and intellectual property. For example, Everledger provides a distributed ledger that assures the identity of diamonds, from being mined and cut to being sold and insured. In a market with a relatively high level of paper forgery, it makes attribution more efficient, and has the potential to reduce fraud and prevent “blood diamonds” from entering the market. Report includes recommendations for policy makers. (via Dan Hill)
Engineers of Jihad (Marginal Revolution) — brief book review, tantalizing. The distribution of traits across disciplines mirrors almost exactly the distribution of disciplines across militant groups…engineers are present in groups in which social scientists, humanities graduates, and women are absent, and engineers possess traits — proneness to disgust, need for closure, in-group bias, and (at least tentatively) simplism…
Box of a Trillion Souls — review and critique of some of Stephen Wolfram’s writing and speaking about AI and simulation and the nature of reality and complexity and … a lot.
Alphabet Starting Sidewalk Labs (NY Times) — “We’re taking everything from anonymized smartphone data from billions of miles of trips, sensor data, and bringing that into a platform that will give both the public and private parties and government the capacity to actually understand the data in ways they haven’t before,” said Daniel L. Doctoroff, Sidewalk’s chief executive, who is a former deputy mayor of New York City and former chief executive of Bloomberg. Data, data, data.
The 2016 Car Hacker’s Handbook (Amazon) — will give you a deeper understanding of the computer systems and embedded software in modern vehicles. It begins by examining vulnerabilities and providing detailed explanations of communications over the CAN bus and between devices and systems. (via BoingBoing)
More Exoskeletons Seeking FDA Approval — The international group of exoskeleton providers with various FDA or CE certifications is growing and currently includes: Ekso in the US; Cyberdyne in the EU and Japan; ExoAtlet from Russia; and Israel’s ReWalk. Other providers are in the process of getting approvals or developing commercial versions of their products. My eye was caught by how global the list of exoskeleton companies is.
Everything You Know About AI Is Wrong (Gizmodo) — an interesting run-through of myths and claims about AI. I’m not ready to consider all of these “busted,” but they are some nice starters-for-ten in your next pub argument about whether the Matrix is coming.
Crossword-Solving Neural Networks — Hill describes recent progress in learning-based AI systems in terms of behaviourism and cognitivism: two movements in psychology that effect how one views learning and education. Behaviourism, as the name implies, looks at behaviour without looking at what the brain and neurons are doing, while cognitivism looks at the mental processes that underlie behaviour. Deep learning systems like the one built by Hill and his colleagues reflect a cognitivist approach, but for a system to have something approaching human intelligence, it would have to have a little of both. “Our system can’t go too far beyond the dictionary data on which it was trained, but the ways in which it can are interesting, and make it a surprisingly robust question and answer system – and quite good at solving crossword puzzles,” said Hill. While it was not built with the purpose of solving crossword puzzles, the researchers found that it actually performed better than commercially-available products that are specifically engineered for the task.
Mathematical Foundations for Social Computing (PDF) — collection of pointers to existing research in social computing and some open challenges for work to be done. Consider situations where a highly structured decision must be made. Some examples are making budgets, assigning water resources, and setting tax rates. […] One promising candidate is “Knapsack Voting.” […] This captures most budgeting processes — the set of chosen budget items must fit under a spending limit, while maximizing societal value. Goel et al. prove that asking users to compare projects in terms of “value for money” or asking them to choose an entire budget results in provably better properties than using the more traditional approaches of approval or rank-choice voting.
Intelligence-Augmented Rat Cyborgs in Maze Solving (PLoS) — We compare the performance of maze solving by computer, by individual rats, and by computer-aided rats (i.e. rat cyborgs). They were asked to find their way from a constant entrance to a constant exit in 14 diverse mazes. Performance of maze solving was measured by steps, coverage rates, and time spent. The experimental results with six rats and their intelligence-augmented rat cyborgs show that rat cyborgs have the best performance in escaping from mazes. These results provide a proof-of-principle demonstration for cyborg intelligence. In addition, our novel cyborg intelligent system (rat cyborg) has great potential in various applications, such as search and rescue in complex terrains.
Paul Ford on Racter — But don’t get too ahead of things. Using Racter is not as different from using Siri as you might expect. It’s just that Siri has petabytes of stuff in her brain, whereas Racter has a floppy’s worth. Computers have changed a ton in the last 30 years, humans barely at all. Don’t mistake their progress for ours. We’ve learned how to talk to computers, and they’ve learned how to pretend to understand us. Useful when driving. People love chatting with their Amazon Echo. But the conversation still doesn’t really mean anything.
Not Quite So Broken TLS (Adrian Colyer) — instead of ad-hoc codery, A precise and testable specification (in this case for TLS) that unambiguously determines the set of behaviours it allows (and hence also what it does not). The specification should also be executable as a test oracle, to determine whether or not a given implementation is compliant. The paper outlines this for TLS, but I see formal methods growing in importance in coming years. We can’t build an airport with cardboard on a swamp. In this metaphor, cardboard represents our ad hoc dev practices and the swamp is our platform of crap code. The airport is … look, never mind, I’ll work on the metaphor. Read the paper.
Security Without Identification (PDF) — a David Chaum paper from 1985. Digital pseudonyms, handheld signing devices, Current systems emphasize the one-sided security of organizations attempting to protect themselves from individuals; the new approach allows all parties to protect their own interests. The new approach relies on individuals keeping secret keys from organizations and organizations devising other secret keys that are kept from individuals. During transactions, parties use these keys to provide each other with specially coded confirmation of the transaction details, which can be used as evidence.
Killing Slow Chrome Tabs (Medium) — There is one not-so-well known tool in Chrome, that allows you to analyse how much resources the individual tabs consume. It is called Task Manager and you can find it in Menu > More Tools > Task Manager.