I find it interesting that in Snow Crash the (near) future has gotten completely out of hand, while in Anathem a world is depicted that develops more or less cyclically for thousands of years: after the high point of technology (roughly, today’s age) things stay more or less the same, society and prosperity going down and up cyclically without much news being added. Stephenson’s explanation for this is that most people prefer to deal with technology they can understand and tinker with, like internal combustion engines, rather than the more advanced space-age stuff that most Sci-Fi authors (including Stephenson, see Snow Crash) love to make up. Although nobody seems to object to the ubiquity of cell phones connected to the Internet — they are apparently too useful (for society, or for the plot) to ban.
Archive for the ‘computer technologies’ Category
Tags: Anathem, Neal Stephenson, science fiction, technology
Tags: computer technology, edtech, education technology, Educators, Google Drive, Google Forms, tips, tutorials
Tags: artificial intelligence, artificially intelligent lawyer, expert software
Ross, “the world’s first artificially intelligent attorney” built on IBM’s cognitive computer Watson, was designed to read and understand language, postulate hypotheses when asked questions, research, and then generate responses (along with references and citations) to back up its conclusions. Ross also learns from experience, gaining speed and knowledge the more you interact with it.
Tags: breaches, computer systems, email scandal, government servers, hackers, Hillary Clinton, Internet security, security
The underlying presumption of the Clinton email scandal is that the Secretary of State, who had a secure government server guarded by the full resources of the federal government, nonetheless chose to use a unsecured private email server in her home. In doing so, she breached security and put the nation at risk.
That presumption is wrong. The truth is that a government server is not necessarily more secure—and possibly less so—than a private email server, especially one that’s located in a home guarded by the Secret Service. In fact, government servers are breached on a fairly regular basis. To understand why, it’s helpful to know how hackers actually invade computer systems.
Tags: corporations, curator, fail, Google, knowledge, Library, preservation, search engine
Google wrote its mission statement in 1999, a year after launch, setting the course for the company’s next decade:
“Google’s mission is to organize the world’s information and make it universally accessible and useful.”
Tags: gamification, Jim Lunsford, military, training, training games
Jim Lunsford makes games other people don’t. He designs training games for the U.S. military. That’s unusual enough. But he also makes games on subjects that don’t seem very game-like.
Tags: competition, educational games, game elements, gamification, learning
Video games have expanded rapidly and created a large and growing industry since the 1980s.
Putting Elon Musk and Steve Jobs on a Pedestal Misrepresents How Innovation Happens | MIT Technology ReviewPosted: August 4, 2015 in communication, computer technologies, Cool Technology, education innovation, innovation, Leadership, Storytelling
Tags: Elon Musk, leadership, narratives, Steve Jobs, technology innovation, The Great Man myth
“Rather than placing tech leaders on a pedestal, we should put their successes in context, acknowledging the role of government not only as a supporter of basic science but as a partner for new ventures. Otherwise, it is all too easy to denigrate public-sector investment, eroding support for government agencies and training programs and ultimately putting future innovation at risk. As Mazzucato puts it, “It’s precisely because we admire Musk and think his contributions are important that we need to get real about where his success actually comes from.” (excerpt)
Tags: Dark Web, Darknet, Deep Web, Internet, Invisible Internet Project, Silk Road
Dictionary.com’s latest update contains many terms ushered into existence because of technological advancements. Two of these new entries, deep web and dark web, are so technical in nature that we came across a lot of confusion as to what they actually mean in our research. More tech-savvy publications generally have a disclaimer when discussing the dark web, pleading with their readers that this is not to be confused with the deep web, which is related, but not at all the same thing. So, what exactly are the dark web and the deep web, and why are technology reporters so wary when using either term?