Are we living in a simulation? This laughed-at notion is becoming increasingly acceptable as technological advances are blurring the boundaries between reality and illusion. There is now not one but three different flavors of synthetic reality: Virtual Reality (VR), Augmented Reality (AR) and Mixed Reality (MR).
But there’s a lot of confusion about what each version of reality is. This is something that is akin to evolving technologies. For instance, after decades, there’s still debate over what is artificial intelligence (AI). Continue reading
This article is part of Demystifying AI, a series of posts that (try) to disambiguate the jargon and myths surrounding AI.
If you’re living on this planet, you probably hear a lot about Artificial Intelligence these days. It’s conquering every industry and domain, performing tasks more efficiently than humans, will put humans out of work, and may one day force humans into slavery. You might have also heard about narrow, general and super artificial intelligence, or about machine learning, deep learning, reinforced learning, supervised and unsupervised learning, neural networks, Bayesian networks and a whole lot of other confusing terms.
That’s a lot of jargon to cover in one post, and we’ll leave the learning stuff for another day. In this post, we’ll try to define what AI is (and isn’t maybe) and what are the three main known flavors of AI. Continue reading
One of the most basic practices every cybersecurity guide will recommend is not to click on links and attachments contained in emails coming from unknown sources, and to think twice even if they come from seemingly trustworthy sources.
You think it’s unnecessary caution? Ask John Podesta, chairman of Hillary Clinton’s presidential elections campaign. This is exactly how he (or the operator of his email account) gave away his accounts credentials to hackers. The breach led to a series of damaging and embarrassing leaks which might have cost his boss her chance of becoming president. Continue reading
The main takeaway from the buildup of developments in the cybersecurity landscape is that privacy is becoming a commodity. The CIA is spying on your phone. Hackers are breaking into your home. Your documents, emails, messages, can be intercepted. And Congress is empowering ISPs to pry into your communications.
Long story short, nothing remains secret.
Under such circumstances, encryption becomes your best friend, your last line of defense in protecting your information. Continue reading
If you think someone without your desktop login won’t be able to access your computer’s files, think again. Anyone with mediocre IT skills can take your your hard disk, plug it as a secondary drive to another computer, and extract your files.
So how can you protect your files from hackers?
One option would be to encrypt your sensitive files manually or avoid storing them on your computer altogether and lock them away in a safe cloud. An alternative is to use Full-Disk Encryption (FDE), a technique that scrambles everything stored on your computer and makes it only accessible to the person with the decryption key. Continue reading
Imagine scrolling an online news article by merely staring at the bottom of the webpage. How about reorganizing your desktop files by dragging them around with your gaze?
For years we’ve been using mice and keyboard (and later touch screens) as the main tools to control and send commands to our computers and devices.
But 2016 proved that things are headed for a change. With great leaps in artificial intelligence and machine learning, we saw a new array of highly efficient assistants and devices that can be controlled with voice commands.
The start of 2017 gave a hint at what the next breakthrough might be. Continue reading
Just as blockchain, the technology that underlies bitcoin and other cryptocurrencies, continues to show potential in transforming many industries, it is also showing its potential in the crowdfunding and investment domain.
Initial Coin Offering (ICO) has become a popular way to raise funds for projects that are based on blockchain and cryptocurrencies. An ICO is a cryptocoin crowdsale, where a blockchain-based project allows enthusiasts and supporters to invest in the project by purchasing part of its cryptocurrency tokens in advance. ICOs usually take place in the early phases of a project, and the raised funds are then used to pay development and launch expenses. Continue reading