Who's in charge of outer space?

Date: 23/05/2017
Source: foxnews.com

In space, no one can hear you scheme. But here on Earth, plans to go where few have gone before are getting louder by the minute.

In February, Virgin Galactic’s SpaceShipTwo passed its third glide-flight test, putting it on pace to offer suborbital space tourism by the end of 2018. In March, Goldman Sachs announced to investors that a single asteroid containing $25 billion to $50 billion of platinum could be mined by a spacecraft costing only $2.6 billion—less than a third of what has been invested in Uber.

“While the psychological barrier to mining asteroids is high,” the Goldman report concludes, “the actual financial and technological barriers are far lower.” In April, NASA selected Trans Astronautica Corp., an aerospace company based in Lake View Terrace, Calif., for $3.25 million in technology study grants. Among TransAstra’s NASA-approved projects: an asteroid-hunting telescope whose stated mission is “to start a gold rush in space.”

The final frontier is starting to look a lot like the Wild West. As more companies announce ambitious plans to do business beyond Earth, serious questions are emerging about the legality of off-planet activity.

This story originally appeared in The Wall Street Journal.

Five Ways Elon Musk’s Brain-Computer Interface Could Transform the World

Date: 18/05/2017
Source: futurism.com

This technology would take the form of an injectable “neural lace” — composed of a mesh of electrodes — that would augment the human brain, adding another layer to the cortex and limbic system that is capable of communicating with a computer (essentially creating cyborgs). This, hypothetically, creates an upgradable, updatable interface that could be applied in countless ways. Some of these include:


Brains and technology both operate using the same vectors: electricity and data. Musk’s Neural Lace would be a system that provides a way for them to communicate directly with each other. To borrow a simile from Phillip Alvelda, the Neural Engineering System Design (NESD) program manager (another nascent BCI), “Today’s best brain-computer interface systems are like two supercomputers trying to talk to each other using an old 300-baud modem […] Imagine what will become possible when we upgrade our tools.” Applications could stretch from the remote operation of technology to the completely hands free and voiceless operation of computers. Researchers in Korea have already used a BCI to control turtles.


Elon Musk’s idea could both initiate brain activity and monitor it. The technology does not necessarily have to be a one-way communication stream, it is capable of both sending messages and creating information in the brain. The high-bandwidth interface could allow you to wirelessly transmit information to the cloud, to computers, or even directly to the brains of other people with a similar interface in their head. There is also the possibility of downloading content to augment your consciousness: think Neo learning kung-fu in the Matrix. While initial tests to improve intelligence haven’t been too successful, if brains and computers speak the same language, then computers can impart information to the brain. The technology is currently being used to allow paralyzed people to communicate, but its uses could extend far beyond that.


As part of this two-way communication stream, robotic arms could communicate fleshy messages by being connected to existing nerve structures. Rather than making the brain learn how to use a new part of the nervous system, robotic limbs could be quickly and easily integrated into the system. This has the potential to revolutionize prosthetic limbs for the disabled, but may also encourage people to rid themselves of their biological arms in favour of mechanical super limbs. Who knows!


As computers and brains would essentially be speaking the same language, emotions could be read as data using electrodes. This would shift technology’s perception of humans from basic recognition to complex understanding. Robot helpers would be able to adapt to your emotional state rather than just responding to commands. Photos and videos could also be implanted with emotional metadata, meaning that one could feel what it would be like to be in any given scenario, rather than just trying to imagine it.


One issue with the lifespan of games is repetition; people become accustomed, know what to expect, or are limited by the programmed narrative. A BCI could improve this situation by having games respond to what your brain is feeling, remaining one step ahead and endlessly diverse. This would be most applicable to the horror genre, in which enemies could come at you when and where you least expect it, providing constant shocks, jumps, and thrills. The Black Mirror episode Playtest is an hour long exploration of just how terrifying this could be. Since AI has been shown to be as creative as a human composer, this reality could be surprisingly close.

As seen @

World champion calls Google’s AlphaGo a “Go god” after defeat Technology

AlphaGo has beaten the reigning world Go champion in the first of three matches

Date: 23/05/2017
source: alphr.com

Last year the world’s top Go player said he would never be beaten by a machine. Today, Ke Jie has called Google’s AlphaGo AI a “Go god”, after losing in a tense match that is sure to be held as a watermark in the progress of artificial intelligence.

The 19-year-old Chinese world champion lost the first of three scheduled matches by only half a point – the closest margin possible in the game. It’s a narrow victory, but the result nevertheless sees AlphaGo take the lead ahead of final matches on Thursday and Saturday.

Ke complimented the AI’s strategy for making “all the stones work across the board”, but said the game had ultimately been a “horrible experience”.

Read the full article @


3-D Printed Ovaries Yield New Life

Date: 16.05.2017
source: discovermagazine.com

It’s another success for members of the same Northwestern University team that in March reproduced an entire menstrual cycle using organs-on-a-chip. This time, they’ve created ovaries from a type of gelatin hydrogel and infused them with immature egg cells before implanting them in female mice. The ovaries behaved like the natural ones, picking out an egg cell to mature and pass along, allowing the mice to bear healthy offspring. The procedure marks another step toward printing replacements for missing or damaged organs.

From Skeleton to Organ

To create their ovaries, the researchers, led by Theresa Woodruff, the director of the Women’s Health Research Institute at Northwestern’s Feinberg School of Medicine, first learned to print the gelatin at exactly the right consistency. It had to be strong enough to handle surgical implantation while porous enough to hold on to egg cells and allow veins to grow. Through a series of trial and error experiments, the researchers discovered the best way to print the scaffolding from gelatin fibers that contained a series of tiny pockets to hold ovarian follicles.

read the whole article @ http://blogs.discovermagazine.com/d-brief/2017/05/16/3d-printed-ovaries-mice/#.WRuCOu0y_tR

Facebook's Future Goals: Brain, Body Hacks for Speech-Free Communication

Date: 20.04.2017
Source: Sci-tech-today.com

Dugan (pictured above), who is vice president of engineering and head of Facebook's Building 8 hardware lab, described these two ambitious goals during the day two keynote of the developers conference in San Jose. Within a few years, Facebook aims to have created non-invasive, scalable technologies that will let people hear through their skin and convey thoughts directly from their brains at a speed of 100 words per minute, she said.

That's because communication via brain activity could capture not only the words we want to convey, but the semantic meaning and imagery behind those words. "Understanding semantics means that one day you may be able to choose to share your thoughts independent of language," Dugan said. "English, Spanish or Mandarin, they become the same."

"One day maybe not so far away, it may be possible for me to think in Mandarin and for you to feel it instantly in Spanish," Dugan said. "Imagine the power it would give to the 700 million people around the world who cannot read or write but can think and feel."

read the whole article @ http://www.sci-tech-today.com/news/Facebook-s-Goals--Brain--Body-Hacks/story.xhtml?story_id=100005NLCQLC

US Stores Dozens of Weapons of Mass Destruction in This Non-Nuclear Country

Date: 16.05.2017
Source: sputniknews.com

Italy has stored US nuclear weapons on its territory as part of NATO's nuclear-sharing arrangement, which has seen Washington station its B61 nuclear bombs in non-nuclear countries. Aviano, a NATO base in the Italian region of Friuli-Venezia Giulia, is home to some 50 B61 bombs, while Ghedi, a base of the Italian Air Force in the region of Lombardy, is estimated to host between 20-40 B61 bombs.
In addition, US tactical nuclear weapons are stored in Belgium, Germany, the Netherlands and Turkey.

Di Ernesto expressed doubt that Italian politicians would force the United States to withdraw its troops, weapons and military installations from the country.
"Sadly, our politicians are fully dependent on Washington," he said. "I don't think that Italian politicians could oppose these bases, taking into account that they are mostly financed by the United States.

Read the whole article @ https://sputniknews.com/military/201705161053657854-us-italy-nuclear-weapons/

490. χαρωπά τα δυό μου χέρια τα κτυπώ

Οταν μπαινεις στην πισινα με τους καρχαριες δεν πρεπει να εισαι σαν χρυσοψαρο.

Τεχνικη καταρτιση.



Ολα μαζι και τιποτα συγκεκριμενο. Ισως καποια μερα καταλαβεις οτι ολα ειναι ενα γελοιο ασκοπο παιχνιδι.

Ναι δεν υπαρχει ουτε μπορει να υπαρξει σκοπος. Νοημα. Ελπιδα.

Κινουμαστε σαν νιφαδες χιονιου μεσα σε μια αμμοθυελλα στην Σαχάρα. Τοσο εφημερα.
Μην το ψαχνεις σου λεω. Flow with the wind λεμε.

Ονειρο ειναι η ζωη και θα περασει προτου προλαβεις να πεις κύμινο.

Ηδονης το αναγνωσμα. Ηδονης το διακυβευμα.

Προχωραμε στα τυφλα με προταγματα περασμενων αιωνων. Ποια ατομικοτητα; Ποια ιδιωτικη πρωτοβουλια; Ποια προσωπικη ελευθερια; Πιστευεις ακομη σε αυτες τις πλανες; Η συσκευη απο οπου διαβαζεις το παρον ειναι ο υπερτατος ρουφιανος.

Ελα να βαραμε παλαμακια όσο η μηχανή μαθαίνει από εμάς για εμάς. Δεν είσαι πλέον το γρανάζι αλλά μια γνωσιακή μονάδα.  

489. Αν ημασταν εξυπνοι εδω θα βρισκομασταν?

Σε καθε περιπτωση πρεπει να κοιτας τον ανθρωπο.

Σαν ειδος, σαν συνολο, σαν ενωση.
Δεν εισαι μια αυθυπαρκτη οντοτητα ξεκομμενη, φυλλο στον ανεμο.
Ολα ειμαστε ενα.
Ξεκινα να κοιτας τον ανθρωπο και ισως επειτα δεις και την υπολοιπη πλαση.

Ο πόνος της ύπαρξης είναι ο ίδιος, άσχετα αν είσαι δισεκατομμυριούχος της Silicon walley είτε παιδικός εργάτης σε βιομηχανία ρούχων στην Ντάκα. Το μόνο που αλλάζει είναι τα μέσα που έχει στην διάθεση του κάθε ένας από εμάς προκειμένου να ξεγελάσει την κοσμική φρίκη που σέρνεται κάτω από κάθε πράξη και σκέψη.

Η φθοροποιός ματαιόπονη αναζήτηση νοήματος εκεί που δεν υπάρχει οδηγεί στην παράνοια. Νομίζεις ότι διαφέρεις ενώ στην ουσία είσαι και εσύ όπως και γω όπως και όλοι μας μελλοντική σκουληκοτροφή ή καύσιμη ύλη για τον κλίβανο. Αργά ή γρήγορα θα ξεχαστείς και ό,τι θεωρείς σημαντικό θα θεωρείται ασήμαντο. Ό,τι σοβαρό σε ανησύχησε θα προκαλεί γέλιο.  

Σε αδικησα; (Απεκρυψα δλδ εν γνωσει μου καποιες παραμετρους προκειμνου να εχω οφελος;)

Η αδικια παλευεται, η ηλιθιοτητα οχι.


Ειναι καποιες δραστηριοτητες που με κανουν να νιωθω γαματος και αλλες που με κανουν να νιωθω σκουπιδι. Απορω λοιπον γιατι επιλεγω την περισσοτερη ωρα τις δευτερες.

Κατακερματισμενες σκεψεις και αδυναμια συγκεντρωσης.
Σκεψεις μονο με ατακες.
Ολοι εδω μπροστα απο μια οθονη να επικοινωνουμε με καποιον χιλιαδες μιλια μακρια και να χανουμε τον διπλανο μας. Δεν υπαρχει ο διπλανος.

Εχω δικιο, εχεις αδικο τελος. Θα γινει αυτο που λεω γιατι ετσι. Μην το παίρνεις προσωπικά, δεν αντλώ καμία περηφάνια από αυτό το αναμφισβήτητο γεγονός διότι είναι αποκλειστικά και μόνο προϊόν τύχης.

Οτιδηποτε με απομακρυνει όμως απο τον στοχο να μην θετω αυτούς τους έστω εφήμερους, ανούσιους στοχους θεωρειται βλαβερο.

Η στιγμη. Η χαρα της στιγμης; Οχι. Η χαρα της συνειδητοποιησης της μοναδικοτητας καθε στιγμης.

Επαναληψη μητηρ πασης μαθησεως.
Αργια μητηρ πασης κακιας.

Ξεκινα να τρεχεις μεχρι να μην ξερεις που εχεις φτασει.
Run forest, run. To the forests, where heavenly things await you. But beware: dont get caught up by them.

Ολα φανταζαν ιδανικα στην αρχη, μα οταν διαπιστωνεις προσωπα αριθμους καταστασεις συμμαχιες αλληλοσυσχετισεις κλικες ευνοιες αδικιες κτλ τοτε επερχεται το ξενερωμα. Τοτε καταλαβαινεις οτι πρεπει να την κανεις.

Να μου πεις, πού δεν θα τα βρεις αυτα;


488. Μακριά. Μακριά εκεί στην Ουαλία

Pws mpainoun ta ellhnika? Ksexasa

ΟΚ το βρήκα. Δεν ήταν και τόσο δύσκολο τελικά.

Δύσκολο είναι να απαρνηθείς την φύση σου. Να ξεχάσεις όλα όσα σού έχουν μάθει να πιστεύεις για ένα ένδοξο παρελθόν που ορίζει και το παρόν.

Μην πιστεύεις τίποτα.

Οτιδήποτε σερβίρεται έτοιμο, αναπόδεικτο και κυρίως με επιθετικούς προσδιορισμούς να θεωρείται τουλάχιστον ανάξιο αν όχι ύποπτο.

Οι κρίσεις και τα άρθρα γνώμης λίγη αξία έχουν στην εξέλιξη της γνώσης και της απαλλαγής του ανθρώπου από την δεισιδαιμόνια.

Μόνο ο Θεός θα σε σώσει τέκνο μου..
Αδερφέ πρέπει να ακολουθήσεις το τάδε μονοπάτι..

Όλα μοιάζουν ως μια μάχη ανάμεσα στον ηλίθιο και τον πανηλίθιο. Τον χριστιανό και τον νεοπαγανιστή. Τον δεξιό και τον αριστερό.

Δεν δέχομαι ιδεολογική, φιλοσοφική, πνευματική κατήχηση από κανέναν. Σκοπό όποιος έχει να με αφυπνίσει και καλά ή να με σώσει μπορεί απλά να πάει να γαμηθεί.

Τόσο απλά.

Ο κόσμος άλλαξε και συνεχίζει να αλλάζει με ρυθμό ακατάληπτο από τον ανθρώπινο νου, τόσο που τα ηλεκτρονικά υποβοηθήματα (όπως το παρόν) κρίνονται κάτι παραπάνω από απαραίτητα.

Δεν ξέρεις από που να πρωτοφυλαχτείς και πού να πρωτοεπιτεθείς.

Μόνη διέξοδος ασφαλούς, περήφανης, ποιοτικής και με νόημα διαβίωσης είναι η διαρκής αμφισβήτηση της παρελθοντικής και της παρούσας κατάστασης. Μια αμφισβήτηση γονιμοποιός ωστόσο που να καλύπτει όλα τα επίπεδα προσωπικό, κοινωνικό, πολιτικό, ιστορικό. Εκ βάθρων ξήλωμα των αντιλήψεων περί κακού και καλού, αγαθού και μιαρού.

Και όπως είπαμε - μακριά από ινστρούχτορες.

Cyber security 'the new frontier of warfare, espionage', Malcolm Turnbull says

DATE: 24/01/2017

Prime Minister Malcolm Turnbull has declared cyber security "the new frontier of warfare" and espionage, while announcing new measures to protect Australian democracy from foreign interference.

Intelligence officials will host unprecedented security briefings with party officials in Canberra next month, amid concerns they may be vulnerable to foreign cyber attacks.

Mr Turnbull said the Government had been shocked by a United States intelligence report claiming Russia ordered a hidden campaign to influence the US presidential election.


Other nations learning from Russian activities: expert

Timothy Wellsmore, director of threat intelligence at global cyber security firm FireEye, said the threats to Australia went beyond China and Russia.

"We've seen some activities in this region from places that you wouldn't expect — like Indonesia [and] even Vietnam," said Mr Wellsmore, who formerly worked as a manager at the Australian Cyber Security Centre.

"There are a lot of other nations that will learn from Russian activities and will turn their offensive capabilities towards [targeting political interests] — if they haven't already."

Assistant Minister for Cyber Security Dan Tehan said every Australian political party must be vigilant and raised some concern about the upcoming Western Australia and Queensland elections.



The world's best poker bot is learning, now crushing humanity again

DATE: 21/01/2017
RETRIEVED: 23/01/2017

For a few days, it looked like the humans had it figured out. Four poker pros facing off against the Libratus AI in a 20-day no-limit Texas Hold'em competition pulled back from an early $193,000 deficit with big wins on days four and six, bringing the deficit down to to $51,000, with one human, Dong King, up $33,000.

"It took us a while to study and get an understanding of what was going on," one of the pros, Jason Les, wrote in an email.

But then the bot started winning again and big. By the end of day 10, it was up a likely insurmountable $677,000, with all of the humans down six figures. (You can see the latest here).

What happened? Simply said, the bot is learning.



NASA's new Psyche mission will take us to a metal asteroid for the first time

It may be the naked core of an ancient plan

DATE: 04/01/2017
RETRIEVED: 23/01/2017

Asteroids are some of the last unexplored territories in the solar system. To help fill in some of the blanks, NASA just announced two upcoming missions that will visit new types of asteroids in the 2030s.

Launching in 2023, the Psyche spacecraft will fly into the asteroid belt between Mars and Jupiter to explore an asteroid quite unlike the balls of mud, ice, and rock we've studied before; "16 Psyche" is a giant hunk of metal. Measuring 130 miles in diameter, it's thought to be made of iron and nickel.

16 Psyche may be the leftover core of a protoplanet—an infant world as large as Mars. Violent collisions are thought to have blasted away its rocky outer layers, leaving behind an asteroid very similar to Earth's own metallic core



China tightens Great Firewall by declaring unauthorised VPN services illegal

Move means all cable and VPN services need prior government approval and comes as Beijing steps up censorship before power-reshuffle party congress

DATE: 23/01/2017

Beijing has launched a 14-month nationwide campaign to crack down on unauthorised internet connections, including virtual private networks (VPN) services – a technology that allows users to bypass the country’s infamous Great Firewall.

A notice released by China’s Ministry of Industry and Information Technology on Sunday said that all special cable and VPN services on the mainland needed to obtain prior government approval – a move making most VPN service providers in the country of 730 million internet users illegal.



Facial recognition, fingerprints to replace passports at Australian airports

Radical security overhaul at Australian airports will replace passport scanners and paper cards with facial recognition technology

DATE: 22/01/2017

Australia has announced a radical overhaul of security at its international airports, with new technology set to replace passports as the means of identifying passengers by 2020.

The Department of Immigration and Border Protection is seeking tenders for a self-processing system that would abolish incoming passenger cards, remove the need for most passengers to show their passports and replace manned desks with electronic stations and automatic triage.

Instead, passengers will be processed by biometric recognition of their face, iris and/or fingerprints, which will be matched to existing data.




DATE COMPILED: 21/01/2017


- Don’t use dictionary words or names in any form in passwords

- Don't use common misspellings of dictionary words either

- Do not use your network username as your password.

- Don’t use easily guessed passwords, such as “password” or “user.”

- Do not choose passwords based upon details that may not be as confidential as you’d expect, such as your birth date, your Social Security or phone number, or names of family members. Never use information in a password or passphrase which can be found online.

- Don't use the name of the computer or your account

- Don’t store your password or passphrase within web applications

- Don't use sample passwords

- Never use the password you’ve picked for your email account at any online site: If you do, and an e-commerce site you are registered at gets hacked, there’s a good chance someone will be reading your e-mail soon.

- Avoid using the same password at multiple Web sites. It’s generally safe to re-use the same password at sites that do not store sensitive information about you (like a news Web site) provided you don’t use this same password at sites that are sensitive.

- Do not use reuse a word or phrase if your account or passphrase has been compromised

- Whatever you do, don’t store your list of passwords on your computer in plain text. Store written copies of your passwords or passphrase safely. I tend to agree with noted security experts Bruce Schneier, when he advises users not to worry about writing down passwords. Just make sure you don’t store the information in plain sight. The most secure method for remembering your passwords is to create a list of every Web site for which you have a password and next to each one write your login name and a clue that has meaning only for you. If you forget your password, most Web sites will email it to you (assuming you can remember which email address you signed up with).

- Never share your password or passphrase

- Do not respond to online requests for Personally Identifiable Information (PII); most organizations – banks, universities, companies, etc. – do not ask for your personal information over the Internet. PII includes but is not limited to:

    Full Name
    Social security number
    Date of birth
    Place of birth
    Driver’s License Number
    Vehicle registration plate number
    Credit card numbers
    Physical appearance
    Gender or race

- Password protect all devices that connect to the Internet and user accounts.


- A password must be at least 12 characters. The longer, the better.

- Select something memorable unique or specific only to you.

- Use multiple character sets. Create unique passwords that that use a combination of words, numbers, symbols, and both upper- and lower-case letters.

- Avoid using simple adjacent keyboard combinations: For example, “qwerty” and “asdzxc” and “123456” are horrible passwords and that are trivial to crack.

- Some of the easiest-to-remember passwords aren’t words at all but collections of words that form a phrase or sentence, perhaps the opening sentence to your favorite novel, or the opening line to a good joke. Do not choose famous or well-known lyrics/lines/etc.

- Use letters chosen from words in a phrase or song lyric

- Combine a few pronounceable "nonsense" words with punctuation

- Add unexpected characters and removing some letters

- Change your password or passphrase regularly

- Use non-secure networks with care. Only connect to the Internet over secure, password- protected networks.

- Always enter a URL by hand instead of following links if you are unsure of the sender.

Trump makes cyberwarfare an official priority for new White House

DATE: 20/01/2017
RETRIEVED: 21/01/2017

Digital weapons would be used to "disrupt and disable propaganda and recruiting" and protect secrets

.....under the section titled America First Foreign Policy, the government calls defeating ISIS and other terroist groups "our highest priority," and says that the U.S. will "engage in cyberwarfare to disrupt and disable propaganda and recruiting" in collaboration with international partners.

Under another section, Making Our Military Strong Again, cyberwarfare is mentioned too.

"Cyberwarfare is an emerging battlefield, and we must take every measure to safeguard our national security secrets and systems," the page reads, adding that the government "will make it a priority to develop defensive and offensive cyber capabilities at our U.S. Cyber Command, and recruit the best and brightest Americans to serve in this crucial area."

President Trump had previously said in October that cybersecurity would be "an immediate and top priority" if elected.




Google’s AI is Learning to Make Other AI

DATE: 20/01/2017
RETRIEVED: 21/01/2017

Imagine the conflicted feelings of the machine learning expert who is creating artificial intelligence (AI) that they know will one day, possibly very soon, be able to create better AI than them. It’s the new age’s way of holding on to the time-honored tradition of having to train your own replacement. Machine learning experts are currently being paid a premium wage due to their limited numbers and the high demand for their valuable skills. However, with the dawn of software that is “learning to learn,” those days may be numbered.

The most prolific minds in AI research from groups such as Google Brain, OpenAI, DeepMind, and university research departments at the nation’s most prestigious tech schools are developing machine-learning systems that can create machine-learning systems. Researchers from Google Brain were able to design software that created an AI system to take a test that measures how well software can process language. The software did better on the test than software designed by humans. So, in a manner of speaking, much like recently reported zebra shark, AI can reproduce asexually.



CONCLUSION: "AI can reproduce asexually."

Facebook job ads suggest ‘mind reading’ social networks could soon be a reality

DATE: 17/01/2017
RETRIEVED: 21/01/2017

The mysterious Building 8 group was launched last year as a DARPA-style agency to drive innovation in “augmented and virtual reality, artificial intelligence, connectivity and other important breakthrough areas.”

The division is headed by former DARPA director and Google executive Regina Dugan and was given an investment commitment of hundreds of millions of dollars by Zuckerberg.

Several open job postings seeking “slightly impatient” individuals are currently listed for a two year technical project.

A brain-computer interface engineer is sought to work in the area of "neuroimaging" and "electrophysiological data" while another position of neural imaging engineer is seeking professionals to develop non-invasive neural imaging methods.

The project is also seeking a haptics specialist to help the company use touch interactions to build “realistic and immersive” experiences.

In a Q&A last year Zuckerberg described how people would be able to “capture a thought... in its ideal and perfect form in your head and share that with the world.”

“One day, I believe we’ll be able to send full rich thoughts to each other directly using technology. You’ll just be able to think of something and your friends will immediately be able to experience it too if you’d like,” he said.



Accidental Politicians: How Randomly Selected Legislators can Improve Parliament Efficiency

DATE: 07/06/2011
RETRIEVED: 21/01/2017
Authors: A. Pluchino, C. Garofalo, A. Rapisarda, S. Spagano, M. Caserta


In governance, sortition (also known as allotment or demarchy) selects officers as a random sample from a larger pool of candidates.[1]
In ancient Athenian democracy, sortition was the traditional and primary method for appointing political officials and its use was regarded as a principal characteristic of democracy.[2]

Sortition is commonly used to select prospective jurors in common law-based legal systems and is sometimes used today in forming citizen groups with political advisory power (citizens' juries or citizens' assemblies).


Sortition to supplement or replace some of the legislators

    "Accidental Politicians: How Randomly Selected Legislators Can Improve Parliament Efficiency": shows how the introduction of a variable percentage of randomly selected independent legislators in a Parliament can increase the global efficiency of a Legislature, in terms of both number of laws passed and average social welfare obtained (this work is in line with the recent discovery that the adoption of random strategies can improve the efficiency of hierarchical organizations "Peter Principle Revisited: a Computational Study").




TITLE: Accidental Politicians: How Randomly Selected Legislators can Improve Parliament Efficiency

1. Abstract
We study a prototypical model of a Parliament with two Parties or two Political Coalitions and we show how the introduction of a variable percentage of randomly selected independent legislators can increase the global efficiency of a Legislature,in terms of both the number of laws passed and the average social welfare obtained.
We also analytically find an ”efficiency golden rule” which allows to fix the optimal number of legislators to be selected at random after that regular elections have established the relative proportion of the two Parties or Coalitions. These resultsare in line with both the ancient Greek democratic system and the recent discovery that the adoption of random strategies can improve the efficiency of hierarchical organizations.


5. Conclusion
In this paper, by means of a prototypical Parliament model based on Cipolla classification, we showed in a quantitative way that the introduction of a well-defined number of random members into the Parliament improves the efficiency of this institution through the maximization of the social overall welfare that depends on its acts. In this respect, the exact number of random members has to be established after the elections, on the basis of the electoral results and of our analytical ”golden rule”: the greater the size difference between the Parties, the greater the number of members that should be lotted to increase the efficiency of Parliament [35].
Of course our prototypical model of Parliament does not represent all the real parliamentary institutions around the world in their detailed variety, so there could be many possible way to extend it. For example it would be interesting to study the consequences of different electoral systems by introducing more than two Parties in the Parliament, with all the consequences deriving from it. Also the government form could be important: our simple model is directly compatible with a presidential system, where there is no relationship between Parliament and Government, whereas, in the case of a parliamentary system, also such a link should to be considered in order to evaluate the overall social welfare. For simplicity, we chose to study a unicameral Parliament, whereas several countries adopt bicameralism. So, simulating another chamber could bring to subsequent interesting extensions of the model. Finally, we expect that there would be also several other social situations, beyond the Parliament,where the introduction of random members could be of help in improving the efficiency. In conclusion, our study provides rigorous arguments in favor of the idea that the introduction of random selection systems, rediscovering the wisdom and the history of ancient democracies, would be broadly beneficial for modern institutions.


https://arxiv.org/abs/1103.1224   (Cornell University Library)

CONCLUSION: There is my truth, there is your truth and...there is the optimal solution.

Bitcoin: Why It Now Belongs in Every Portfolio

DATE: 18/01/2017
RETRIEVED: 19/01/2017

A technology is called “disruptive” if it creates a new market that first disturbs and then displaces an earlier technology.


The digital currency and clearing network is open source, mobile, peer-to-peer, cryptographically protected, privacy oriented and native to the internet. The fusion of these technologies allows for a level of security and efficiency unprecedented in the world of finance.


Bitcoin’s potential is not going unnoticed. After it had been praised by tech moguls such as Bill Gates (“a technological tour de force”) and Gmail founder Paul Buchheit (“Bitcoin may be the TCP/IP of money”), the money started speaking. We saw investments in Bitcoin by top venture capital brass such as Marc Andreessen, Reid Hoffman, Fred Wilson and PayPal cofounder Peter Thiel; by billionaires such as Jeffrey Skoll (eBay cofounder) and Li Ka-shing (by all reports the richest person in Asia); by iconic executives such as Vikram Pandit (Citigroup), Blythe Masters (JPMorgan Chase) and Tom Glocer (Reuters); and most recently by large cap companies such as Google, Qualcomm, NYSE, Nasdaq, USAA (American bank and insurer) and NTT Docomo ($75b Japanese phone operator). Finally, several academic and government heavyweights have also affiliated themselves with Bitcoin companies: Larry Summers (ex-Treasury Secretary, World Bank Chief Economist), James Newsome (CFTC and NYMEX), and Arthur Levitt (SEC). The core value proposition of this network is the fact that, in the words of IBM executive architect Richard Brown, “Bitcoin is a very sophisticated, globally distributed asset ledger.” What Brown and others hint at is that Bitcoin will in the future be able to serve not only as a decentralized currency and payment platform, but also as the backbone for an “internet of property.”

This entails a decentralized global platform, smartphone-accessible, on which companies and individuals can issue, buy and sell stocks, bonds, commodities and a myriad of other financial assets. The effect will be to remove much of the current bureaucracy and barriers to entry, presenting a huge opportunity for the world’s 2.5 billion unbanked people.


The scenarios projected above are, of course, not cast in stone. Bitcoin faces several risks going forward. These include:

     The emergence of a much better digital currency that steals its market lead.
     An undetected bug in the system.
     A hard fork (what happens when some nodes in the network start running a Bitcoin software upgrade that is incompatible with previous versions) causing the Bitcoin payment network to split in two.
     A sustained attack by an organization with substantial financial resources, such as a government.




Storyville -Zero Day: Nuclear Cyber Sabotage BBC Documentary 2017

RETRIEVED: 19/01/2017

Documentary thriller about warfare in a world without rules - the world of cyberwar. It tells the story of Stuxnet, self-replicating computer malware, known as a 'worm' for its ability to burrow from computer to computer on its own. In a covert operation, the American and Israeli intelligence agencies allegedly unleashed Stuxnet to destroy a key part of an Iranian nuclear facility. Ultimately the 'worm' spread beyond its intended target.
Zero Day is the most comprehensive account to date of how a clandestine mission opened forever the Pandora's box of cyber warfare. A cautionary tale of technology, politics, unintended consequences, morality, and the dangers of secrecy.


Stuxnet is a malicious computer worm, first identified in 2010, that targets industrial computer systems and was responsible for causing substantial damage to Iran's nuclear program. The software was designed to erase itself in 2012 thus limiting the scope of its effects. The worm is believed by many experts to be a jointly built American-Israeli cyberweapon,[1] although no organization or state has officially admitted responsibility. Anonymous US officials speaking to The Washington Post claimed the worm was developed during the Bush administration to sabotage Iran's nuclear program with what would seem like a long series of unfortunate accidents.[2]

Stuxnet specifically targets programmable logic controllers (PLCs), which allow the automation of electromechanical processes such as those used to control machinery on factory assembly lines, amusement rides, or centrifuges for separating nuclear material. Exploiting four zero-day flaws,[3] Stuxnet functions by targeting machines using the Microsoft Windows operating system and networks, then seeking out Siemens Step7 software. Stuxnet reportedly compromised Iranian PLCs, collecting information on industrial systems and causing the fast-spinning centrifuges to tear themselves apart.[4] Stuxnet’s design and architecture are not domain-specific and it could be tailored as a platform for attacking modern SCADA and PLC systems (e.g., in automobile assembly lines[vague] or power plants), the majority of which reside in Europe, Japan and the US.[5] Stuxnet reportedly ruined almost one fifth of Iran's nuclear centrifuges.



WhatsApp vulnerability allows snooping on encrypted messages

Exclusive: Privacy campaigners criticise WhatsApp vulnerability as a ‘huge threat to freedom of speech’ and warn it could be exploited by government agencies

DATE: 13/01/2017
RETRIEVED: 15/01/2017

A security vulnerability that can be used to allow Facebook and others to intercept and read encrypted messages has been found within its WhatsApp messaging service.


WhatsApp’s end-to-end encryption relies on the generation of unique security keys, using the acclaimed Signal protocol, developed by Open Whisper Systems, that are traded and verified between users to guarantee communications are secure and cannot be intercepted by a middleman.

However, WhatsApp has the ability to force the generation of new encryption keys for offline users, unbeknown to the sender and recipient of the messages, and to make the sender re-encrypt messages with new keys and send them again for any messages that have not been marked as delivered.

The recipient is not made aware of this change in encryption, while the sender is only notified if they have opted-in to encryption warnings in settings, and only after the messages have been re-sent. This re-encryption and rebroadcasting effectively allows WhatsApp to intercept and read users’ messages.




Gadget mountain rising in Asia threatens health, environment

DATE: 15/01/2017

The waste from discarded electronic gadgets and electrical appliances has reached severe levels in East Asia, posing a growing threat to health and the environment unless safe disposal becomes the norm.

China was the biggest culprit with its electronic waste more than doubling, according to a new study by the United Nations University. But nearly every country in the region had massive increases between 2010 and 2015, including those least equipped to deal with the growing mountain of discarded smartphones, computers, TVs, air conditioners and other goods.

On average, electronic waste in the 12 countries in the study had increased by nearly two thirds in the five years, totaling 12.3 million tons in 2015 alone.

Rising incomes in Asia, burgeoning populations of young adults, rapid obsolescence of products due to technological innovation and changes in fashion, on top of illegal global trade in waste, are among factors driving the increases.


"We are all benefiting from the luxury of these electrical and electronic products to a certain extent, it makes our lives easier, sometimes more complicated," he said. "However if we want to continue like this we must be reusing the resources contained in electronic and electrical equipment."

A smartphone, for example, uses more than half the elements in the periodic table, some of which are very rare, and in the longer-run will be exhausted without recycling, said Kuehr.



The Swedish Kings of Cyberwar

DATE: 13/01/2017

In 2011, the Swedes began sharing their surveillance data with the NSA, which included—as NSA officials described it at the time of the meeting—a “unique collection [of communications data] on high-priority Russian targets such as leadership, internal politics, and energy.”

Noting the Swedish spy agency’s unusual technical abilities and reputation for secrecy, NSA officials also viewed it as an ideal collaborator on its hacking and cyberwarfare project, called Quantum. One of the Quantum programs was an ambitious operation called WINTERLIGHT, which aimed at secretly hacking into high-value foreign computers and computer networks to obtain not only communications data but also any information stored on the hard drives or servers in question. Possible targets might be the administrators of foreign computer networks, government ministries, oil, defense, and other major corporations, as well as suspected terrorist groups or other designated individuals. Similar Quantum operations have targeted OPEC headquarters in Vienna, as well as Belgacom, a Belgian telecom company whose clients include the European Commission and the European Parliament.

According to NSA documents, WINTERLIGHT was using a complex attack strategy to secretly implant a malware program on the targeted computer or network. The NSA’s malware would then divert any signals between those computers and the Internet through “rogue” high-speed surveillance servers, called “FoxAcid” servers, allowing the NSA to access in stealth almost any of the user’s personal data—and even to tamper with data traveling from one user to another. The implications for both spying and offensive cyber operations were far-reaching. Wired has described how the attack on the Belgian telecom was able to

    [map] out the digital footprints of chosen workers, identifying the IP [internet protocol] addresses of work and personal computers as well as Skype, Gmail and social networking accounts such as Facebook and LinkedIn. Then they set up rogue pages, hosted on FoxAcid servers, to impersonate, for example, an employee’s legitimate LinkedIn profile page.



UAE to invest $163bn in renewable-energy projects

Oil-rich Gulf state aims to meet almost half of its power needs from green sources and reduce fossil-fuel use.

DATE: 10/1/2017
RETRIEVED: 11/01/2017

The United Arab Emirates has announced plans to invest $163bn in projects in a bid to generate almost half the country's power needs from renewable sources.

Our 2050 goals for energy mix are to utilize 44% renewable, 38% gas, 12% clean fossil and 6% nuclear energy. - Sheikh Mohammed bin Rashid al-Maktoum, UAE prime minister



General Data Protection Regulation (GDPR)

10 things you need to know about the new EU data protection regulation

DATE: 06/05/2016
RETRIEVED: 11/1/2017

1. This is a regulation, not a directive
2. Data processors will be held responsible for data protection
3. The regulation has global ramifications
4. Users will be able make compensation claims
5. There are tighter rules on transferring data on EU citizens outside the EU
6. Harmonised user request rights
7. New erasure rights
8. It is your responsibility to inform users of their rights
9. Tougher sanctions and streamlined incident reporting
10. Encryption and tokenisation can come to your rescue



GDPR explained: How to prepare for the approaching General Data Protection Regulation (GDPR)

The General Data Protection Regulation (GDPR) will come into force on 25 May 2018, and the British government has confirmed it will adopt the legislation while the country remains in the EU.

With less than 18 months to go until implementation, many of them remain entirely unprepared. More than half (54 percent) of organisations have failed to commence any kind of preparation to meet even the minimum standards of GDPR, according to recent research by information management company Veritas.

The regulation enforces complex data obligations for companies that current policy is unlikely to satisfy, and damaging fines for breaches.



Your Threat Model changed

LinkedIn and eBay founders donate $20m to AI safety research fund

DATE: 11/1/2017

LinkedIn’s founder Reid Hoffman and Omidyar network, the philanthropic nonprofit of eBay founder Pierre Omidyar, are donating $10m each to the Ethics and Governance of Artificial Intelligence Fund, which will distribute money to researchers working on the tough ethical problems raised by AI.


The specific research areas the fund will focus on aren’t fixed, but the possibilities include ethical design – “How do we build and design technologies that consider ethical frameworks and moral values as central features of technological innovation?” – and accountability in AI – “What kinds of controls do we need to minimize AI’s potential harm to society and maximize its benefits?”



Google AI Secretly Uploaded to the Internet, Where it Wreaked Havoc on Gamers Getty Images

DATE: 05/01/2017
RETRIEVED: 11/1/2017

A major training/proving ground for DeepMind’s software has been gaming. The company has developed AI that can play 49 different Atari games at expert levels. Also, in a world-first development, they created software called AlphaGo which challenged the world champion of the ancient Chinese game of Go, and won.

The latest news out of DeepMind comes back to that historic victory. As a means of testing some upgrades to AlphaGo, the company secretly unleashed the AI on some unwitting Go players. AlphaGo completely dominated the competition. More than 50 games were played and AlphaGo won every single one.


NASA Takes A Leap Towards Asteroid Mining In Space: A Highly Ambitious Venture Under NASA's Discovery Program

DATE: 06/01/2017

NASA has started working towards its future missions of asteroid mining in space. Two asteroids missions were integrated into NASA's Discovery Program and were given the green signal to proceed. The announcement made by NASA on Jan. 4, 2017 stated that the Lucy and Psyche asteroid missions are a "go."

Each mission has an estimated budget of $450 million and is expected to launch in the early 2020s. Thomas Zurbuchen, Associate Administrator for Science, NASA, held a teleconference and announced that "These small body missions complement NASA's exploration and are crucial parts of learning about our solar system and crucial parts of our programs going forward."



World Shatters Heat Records in 2016

Last year was the hottest on record by a wide margin, with temperatures creeping close to a ceiling set by nations for limiting global warming

DATE: 06/01/2017
RETRIEVED: 06/01/2017

Last year was the hottest on record by a wide margin, with temperatures creeping close to a ceiling set by almost 200 nations for limiting global warming, the European Union's Copernicus Climate Change Service said on Thursday.

The data are the first of the New Year to confirm many projections that 2016 will exceed 2015 as the warmest since reliable records began in the 19th century, it said in a report.

The Arctic was the region showing the sharpest rise in temperatures, while many other areas of the globe, including parts of Africa and Asia, also suffered unusual heat, it said.

A few parts of South America and Antarctica were cooler than normal.

Global surface temperatures in 2016 averaged 14.8 degrees Celsius (58.64°F), or 1.3C (2.3F) higher than estimated before the Industrial Revolution ushered in wide use of fossil fuels, the EU body said.



Honda’s Safe Swarm concept has cars mimicking fish for safer driving

DATE: 05/01/2017
RETRIEVED: 06/01/2017

Honda is looking to nature to improve the safety of driving, using bio-mimicry of the behavior of a school of fish to inform a new technical concept it’s unveiling at CES called Safe Swarm. Safe Swarm uses vehicle-to-vehicle communication based on the dedicated short range communication standard to provide assistance to a human driver.

Safe Swarm essentially means that cues picked up by one vehicle equipped with connective communication tech can pass along information to others in proximity, far before a driver would be aware of anything. Cars can shuttle their collected knowledge down the line, propagating info about a pile-up potentially miles ahead in near real-time to help make it easier for human drivers to take action to avoid problems before they happen.



What happens when our computers get smarter than we are? | Nick Bostrom

DATE: 27/04/2015
RETRIEVED: 06/01/2017

No Job Is Safe, But These Skills Will Always Be Valued in the Workplace

DATE: 04/01/2017
RETRIEVED: 06/01/2017

“65 percent of children entering grade school this year (2011) will end up working in careers that haven't even been invented yet."


Finland recently shifted its national curriculum to a new model called the “phenomenon-based" approach. By 2020, the country will replace traditional classroom subjects with a topical approach highlighting the four Cs—communication, creativity, critical thinking, and collaboration.


In addition to the four Cs, successful entrepreneurs across the globe are demonstrating three additional soft skills that can be integrated into the classroom—adaptability, resiliency and grit, and a mindset of continuous learning.



Horgos: a future robot export base in China

DATE: 06/01/2017
RETRIEVED: 06/01/2017

A Chinese robot manufacturer is making China's new border city with Kazakhstan its export base, hoping Horgos will provide convenience in trade.

Horgos Boshihao Electronic, a firm registered in southern China's city of Shenzhen, has been ramping up construction of its robot production workshop in Horgos and expects to start production in May.


Boshihao's service robots are able to replace human labor in nursing and education-related duties. Prices range from 5,000 yuan (721 U.S. dollars) to 200,000 yuan, with industrial robots priced between 100,000 yuan to 1 million yuan.

The company is looking at export markets in the Middle East, Central Asia and Russia.



N. Korea holds mass rally after Kim Jong-un’s New Year’s ‘nuke’ message

DATE: 06/01/2017
RETRIEVED: 06/01/2017

Thousands of North Koreans have taken to the streets of the capital Pyongyang after leader Kim Jong-un, in his New Year’s message, announced preparations for a test-launch of banned ICBMs were at the ‘final stage.’
The demonstrators gathered in Kim Il-sung Square in Pyongyang and chanted “long live comrade Kim Jong-un,” AFP reported. Some of them were seen holding banners saying “Let us accelerate the victorious advance of socialism!”


In September, Pyongyang stated that it conducted its fifth nuclear test, announcing it is now capable of mounting nuclear warheads on ballistic rockets.



Edible insect industry group set up to support Southeast Asia

DATE: 03/01/2016
RETRIEVED: 05/01/2016

In the last few years, dozens of edible insect start-ups have popped up in western countries to supply a new wave of interest in bugs as food. This market is now in need of regulation, promotion and support.

This this is the case might might be one reason for the growing number of industry associations are being formed—including one I recently co-founded with some other companies in the region.

The first representative body for manufacturers of insects for food was created by Robert Nathan Allen in 2013 as Little Herds in America. Then came the North America Edible Insect Coalition (NAEIC), formed by start-ups like Exo, Entomo Farms and Chapul.

In Europe, IPIFF, strategically located in Brussels, represents small- and medium-sized companies from the edible insect market, as well as from the feed sector. Lobbying the EU parliament on insects is obviously one of their priorities.

There is also BiiF in Belgium, FFPIDI in France and Switzerland’s GRIMIAM, which successfully campaigned to have the Swiss parliament approve a law on edible insects, which passed in December.



China wages cyber war via dharamsala

DATE: 25/12/2016
RETRIEVED: 04/01/2016

With a view to malign the Central Tibetan Administration (CTA), China is remotely accessing the computer servers in Dharamsala, planting spywares and malwares and disguising the IP address to target computer systems across the globe, said Prime Minister of Central Tibetan Administration Dr Lobsang Sangay.

“China is also seeking to drive a wedge between CTA and foreign governments by infecting our computer systems. Efforts are on to secure the servers in Dharamsala which is used by the Chinese as a transit point to launch cyber attacks globally,” Sangay told The Sunday Standard.

He said a major study on malware attacks against Tibetans conducted by Munk School of Global Affairs at the Toronto University reported that the attacks on the servers and computer system of CTA are “highly targeted and have low anti-virus detection”.  

Intelligence officials say the need of the hour is to develop an indigenous operating systems (OS) for mobile phones and computers as the MS Window-based systems or even the Safari OS used in iPhones and Mac computers could be susceptible to attacks.