Toggle light / dark theme

Neural networks have become enormously successful – but we often don’t know how or why they work. Now, computer scientists are starting to peer inside their artificial minds.

A PENNY for ’em? Knowing what someone is thinking is crucial for understanding their behaviour. It’s the same with artificial intelligences. A new technique for taking snapshots of neural networks as they crunch through a problem will help us fathom how they work, leading to AIs that work better – and are more trustworthy.

In the last few years, deep-learning algorithms built on neural networks – multiple layers of interconnected artificial neurons – have driven breakthroughs in many areas of artificial intelligence, including natural language processing, image recognition, medical diagnoses and beating a professional human player at the game Go.

The trouble is that we don’t always know how they do it. A deep-learning system is a black box, says Nir Ben Zrihem at the Israel Institute of Technology in Haifa. “If it works, great. If it doesn’t, you’re screwed.”

Neural networks are more than the sum of their parts. They are built from many very simple components – the artificial neurons. “You can’t point to a specific area in the network and say all of the intelligence resides there,” says Zrihem. But the complexity of the connections means that it can be impossible to retrace the steps a deep-learning algorithm took to reach a given result. In such cases, the machine acts as an oracle and its results are taken on trust.

TED curator Chris Anderson just announced the world’s biggest speaking fee — a $4.5m (£3.1m) cheque to be awarded to a speaker at the 2020 TED conference. There’s just one catch: the speaker must be an artificial intelligence, which convinces the audience that it has mastered the art of the 18-minute TED talk.

The IBM Watson AI X Prize, announced on Wednesday at the TED conference in Vancouver, will offer $4.5 million to the team that develops an artificial intelligence showing “how humans can collaborate with powerful cognitive technologies to tackle some of the world’s grand challenges”.

Peter Diamandis, chairman of the X Prize Foundation, said the winner would be chosen by the TED audience in 2020, when three finalists — either AIs or AI human partnerships — “come on stage to deliver jaw-dropping, awe-inspiring TED talks”.

Read more

Well, US is failing on building a competitive waiter to go up against China’s version.


America is getting crushed by China. Not in trade or weapons or any of those things that don’t matter. We’re losing the war of the Roseys. Don’t believe me? Take a look at the new robot above, serving up deliciousness at a farmhouse restaurant in Sanmenxia, China.

Or look at this December photo of Tete, a robot in Qingdao, China. Tete can communicate over 200 words and has no trouble delivering dishes.

Read more

And, who said Transformers were only in movies — think again.


A shape-shifting robot could work alongside human troops to bring military capabilities to the next level. The unmanned ground vehicle developed by Estonian defence company Milrem has an adaptable build, so components can be swapped out to suit the needs of different missions

A shape-shifting robot could work alongside human troops to bring military capabilities to the next level. The unmanned ground vehicle developed by Estonian defence company Milrem has an adaptable build, so components can be swapped out to suit the needs of different missions.

Lookout for MAZAR Bot — Androids should be scared.


One interesting feature of Mazar is that it can not be installed on smartphones running Android with “Russian” selected as the operating system’s language.

The malware allows the attackers to spy on nearly every activity capable on an Android device, including establishing a backdoor connection, sending premium SMS messages, reading texts sent to the device, including bank authentication PINs.

Turn off “Unknown Sources” on your device — The best way to avoid downloading malicious items is to not allow unknown sources to install stuff on your device. The app asks for wide ranging permissions, including the ability to send SMS, have full internet access, and the ability to erase a phone.