OC Library District to join Missouri Evergreen Library Consortium – Areawide News

Felicia Baudry with Equinox Open Library Initiative visited Alton Library to train Oregon County Library District librarians how to use the new software system that will be implemented soon.

Renee Janes

Oregon County Libraries were recently closed to introduce employees to a new software system that will enable librarians and patrons to expand their resources.

The new system they are going to use is called Evergreen, which is software being used, but they are also joining the Missouri Evergreen Library Consortium. It is a consortium of over 50 libraries that have come together to work together and collaborate to make sure they have the best quality system they can provide to their patrons, said Felicia Baudry with Equinox Open Library Consortium.

She explained Evergreen is an open source software used to manage inventory and patrons. This is what will be used to check materials in and out and add patrons. They will also be able to share their materials with other libraries within the Missouri Evergreen and other Missouri Evergreen libraries will be able to share their materials with them. It is an easy way to move materials back and forth between libraries, said Baudry.

The integrated library system will enable patrons to search what is available from other Missouri Evergreen libraries and place holds on them.

It expands their collection, said Baudry.

There are a lot of advantages to joining a library consortium. I think it maximizes the investment that all the funders give to their libraries at state and local levels. So, it expands what they can do and their reach. It helps libraries do, what I think libraries were always intended to do, which is to share information with everyone. It is a nice way to give as much as you can to the community, said Baudry.

Our patrons will be able to log on at home and place holds on books and things like that

The system will enable patrons to log on from wherever they have internet access and search the catalog and place holds on books and have them sent to an Oregon County Library.

Oregon County Library Coordinator Janice Richardson explained patrons accounts will be created when the system goes live, and they will manage their own accounts.

If an individual already has an Oregon County Library card, they will have one when the new system begins. Those without a card will need to visit an Oregon County Library to register. Logging in will not be required to search the system but will be needed to see what they have checked out and place holds on items.

We, as staff, we are doing this training now. We are excited to offer this to the community and would like for everyone to come in and see what its about and use the libraries here, said Richardson

The system will be accessible to patrons at the beginning of February.

Baudry is a trainer with Equinox Open Library Initiative. We are the organization that provides support and training and development for Missouri Evergreen. We also work closely with the Evergreen community to help support the system itself. Because of its open source, it is freely available to anybody who uses it. There is a large community around it that creates documentation, develop features, but we are just one of the organizations that participates in doing that and we are providing the support for Missouri EvergreenWe are two separate entities, but work very closely with the Evergreen community, said Baudry.

See the rest here:
OC Library District to join Missouri Evergreen Library Consortium - Areawide News

Break into the field of AI and Machine Learning with the help of this training – Boing Boing

It seems like AI is everywhere these days, from the voice recognition software in our personal assistants to the ads that pop up seemingly at just the right time. But believe it or not, the field is still in its infancy.

That means there's no better time to get in on the ground floor. The Essential AI & Machine Learning Certification Training Bundle is a one-course package that can give you a broad overview of AI's many uses in the modern marketplace and how to implement them.

The best place to dive into this four-course master class is with the Artificial Intelligence (AI) & Machine Learning (ML) Foundation Course. This walkthrough gives you all the terms and concepts that underpin the entire science of AI.

Later courses let you get your hands dirty with some coding, as in the data visualization class that focuses on the role of Python in the interpretive side of data analytics. There are also separate courses on computer vision (the programming that lets machines "see" their surroundings) and natural language processing (the science of getting computers to understand speech).

The entire package is now available for Boing Boing readers at 93% off the MSRP.

Former Vice President and current 2020 Democratic presidential hopeful Joe Biden says U.S. Section 230 should be immediately revoked for Facebook and other social media platforms, and that Mark Zuckerberg should be submitted to civil liability.

FBI needs to be able to hack into your iphone, Trumps sham AG William Barr says

Gee, thanks.

Anyone who loves biking, skiing, or snowboarding in the great outdoors knows just how difficult it can be to safely transport your gearespecially during extended trips. These three accessories make it easier than ever to securely attach your gear to your car. So if youre planning to embark on a outdoor adventure soon, youd be []

If youre looking to build a career in web development, it starts with Javascript. This programming language was there at the golden age of the internet, and its still the basis for millions of web pages and apps worldwide. Suffice to say, if youre a coder who doesnt know JS yet, youre not a coder. []

Weve all got a perfect website in our minds. In the past, the problem has been the barrier of language specifically, the computer languages used to create those glittering, animation-filled pages you flock to. Now, Mac users have an alternative. Blocs 3 is a website builder that can provide an easy visual interface for []

Excerpt from:
Break into the field of AI and Machine Learning with the help of this training - Boing Boing

Goldwater Scholar wants to use AI to help ensure justice where children are involved > News > USC Dornsife – USC Dornsife College of Letters,…

Math major Zane Durantes research seeks to revitalize endangered languages, predict whether skin lesions are cancerous and enable truthful child eyewitness testimony to be taken seriously by courts. [5 min read]

In cases of abuse or neglect by a caretaker, children are often the only witnesses. Currently, however, our legal system doesnt view their testimony as reliable. Zane Durante, a mathematics major at the USC Dornsife College of Letters, Arts and Sciences, wants to change that.

Durante has been awarded a prestigious Goldwater Scholarship for his research into how to predict whether or not children are being truthful when they provide witness testimony. Durante, who is also majoring in computer science at USC Viterbi School of Engineering, conducts his research at the schools Signal Analysis and Interpretation Laboratory (SAIL). There he analyzes written transcripts of childrens testimony using various machine learning methods and natural language processing. Machine Learning, in simple terms, is the science of getting computers to learn and make rational predictions all on their own.

Eye witness accounts are already unreliable and childrens testimony is considered to be even more unreliable, Durante says. Courts dont always use child testimony, even if it may be the only information they have on determining whether or not abuse has taken place.

Durantes research looks at the vocabulary children use in their testimony.

Basically, were trying to put a score on how certain we are that the child is telling the truth or not, given the testimony, by looking at their language, he explains.

Research may help a child witness tell the truth

The next step, Durante says, is to look at how incorporating audio and video recordings into the researchers machine learning models might improve their estimates on whether or not the child is being truthful or deceptive.

Often, when humans are trying to determine whether or not someones lying, we look at many different things, including voice pitch and micro expressions that may only last for a fraction of a second but indicate a discontinuity between what the persons saying and what theyre thinking and feeling, Durante says. Right now, were just looking at language, but ultimately we think that by incorporating these other features and data into our machine learning models, well get more accurate predictions.

While lie detectors are seen as the standard method of detecting deception, Durante notes that they actually dont work very well, with meta-analysis giving them only about a 65% accuracy rate in determining whether or not a person is lying.

Thats not usually admissible in court, and so we were really looking for something better, he said.

Rather than being used after an interview to evaluate the probability a child witness was lying, the data could ultimately be used to give feedback during the interview to improve questioning so the child is more likely to answer truthfully.

The researchers also look at the emotional content of the words and the agreeability of the language used by the child. Durante and his team have found that the more agreeable child witnesses are, the less likely they are to be telling the truth. Another conclusion is that advanced vocabulary can be a sign of truthfulness because the child is being more descriptive.

Machine learning for social good

Durantes interest in machine learning was sparked in the fall of his freshman year when he joined the Center for AI in Societys student branch, CAIS++. The undergraduate group has student members from a wide range of majors, including engineering, computer science, computational linguistics, neuroscience and mathematics, all of whom are interested in machine learning and its applications for social good.

I liked math and I liked computer science, and machine learning is this really interesting intersection of both, Durante says.

After studying machine learning in the fall, CAIS++ members apply what theyve learned to a project for social good in the spring. Durante led the curriculum last semester, teaching undergraduates machine learning skills, and he will be leading a group through a project this semester

USC Dornsife math major Zane Durante believes his future lies in innovating new methods and applications of machine learning. (Photo: Sajeev Saluja.)

His first project in CAIS++ looked at a type of neural network that could be used to predict whether an image of a skin lesion is malignant or benign. This would have applications for people who couldnt see a dermatologist.

His second project, led by USC Dornsifes Khalil Iskarous, associate professor of linguistics, focused on Ladin, an endangered language in Northern Italy.

Durante felt a personal connection to the project because his father spoke a Northern Italian dialect as his first language.

A major part of any language revitalization process involves linguists transcribing audio data of the spoken language by writing down the phonemes the basic units of sound in a language, like the d sound in dog. This enables them to understand how its spoken and to reconstruct it. Its a slow and laborious process.

It can take four hours to annotate one hour of English audio data, and the process is much slower for endangered languages, Durante says.

To speed it up, Durante and his fellow students are developing an auto-complete process using machine learning to predict phonemes.

At the core of all of the machine learning algorithms that Durante uses in his research is a lot of linear algebra and probability both of which he learned in his USC Dornsife math classes.

Both of those math classes build fundamentals that are necessary if you want to understand at a deep level what the algorithms are doing so you can make modifications to improve them or be more innovative, he said.

Born in Houston to a professor of pharmacology and a medical researcher, Durante moved to Columbia, Missouri, with his family at age 6. He originally aimed to study pre-med courses at university but switched to math and computer science toward the end of high school.

Now he believes his future lies in innovating new methods and applications of machine learning.

Whether thats just new machine learning methods, new methods in natural language processing or computer vision, or some combination of the two, I want to be working on the frontier and pushing the field forward, he says.

Over the summer, he completed an internship at Google where he developed artificial intelligence tools for Google Cloud.

Durante believes AI will speed up many things that society or humanity in general has traditionally been slow at doing, bringing many benefits.

While noting the ethical concerns around the use of AI and acknowledging that he has reservations of his own about some of its potential uses, he says he remains optimistic that the benefits to humanity will outweigh any negative use.

Historically, we can see that as technologies improve, the quality of life has improved tremendously as a result. So, I think anything like machine learning that will make things easier for humans will just make life better for everyone.

More here:
Goldwater Scholar wants to use AI to help ensure justice where children are involved > News > USC Dornsife - USC Dornsife College of Letters,...

Edward Snowden Says The Most Powerful Institutions In Society Have Become The Least Accountable – Moguldom

Written by Ann Brown

Jan 15, 2020

Edward Snowden, the former National Security Agency (NSA) contractor turned whistleblower, recently declared: The most powerful institutions in society have become the least accountable to society.

In 2013, Snowden copied and leaked highly classified information from the NSA when he was a CIA employee and subcontractor. He handed over documents to journalists that detailed surveillance programs run by the NSA. The documents revealed that the NSA has tapped cell phone and Internet communications of people in the general public.

Listen to GHOGH with Jamarlin Martin | Episode 68: Jamarlin Martin Jamarlin talks about the recent backlash against Lebron James for not speaking up for Joshua Wong and the violent Hong Kong protestors.

At a recent Web Summit technology conference in Lisbon, Portugal, Snodwn asked the audience via video link: What do you do when the most powerful institutions in society have become the least accountable to society?

He added: Thats the question our generation exists to answer.

Snowden, who was charged with espionage and theft of government property and had his passport revoked, is living in asylum in Russia. He recently released a memoir, Permanent Record, for which the U.S sued him, alleging he violated non-disclosure agreements he signed when he worked with the NSA and CIA.

They dont like books like this being written, Snowden said. We have legalized the abuse of the person through the personal, he said, adding that the widespread collection of data by governments and corporations entrenches a system that makes the population vulnerable for the benefit of the privileged.

According to Snowden, there is too much attention being placed on data protection when it should be focused on data collection, which he says is the true problem. The problem isnt data protection, the problem is data collection, he noted. Regulation and protection of data presumes that the collection of data in the first place was proper, that it is appropriate, that it doesnt represent a threat or a danger.

The General Data Protection Regulation (GDPR) is a regulation in EU law on data protection and privacy in the European Union and the European Economic Area. Introduced last year, GDPR threatens to impose fines of up to 4 percent of a companys global annual revenues or 20 million euros ($22.3 million) whichever is the higher amount, CNBC reported.

Today those fines dont exist, Snowden argued, and until we see those fines every single year to the Internet giants until they reform their behavior and begin complying not just with the letter but the spirit of the law, it is a paper tiger.

See the original post:
Edward Snowden Says The Most Powerful Institutions In Society Have Become The Least Accountable - Moguldom

AP Explains: The Justice Department’s New Quarrel With Apple – The New York Times

WASHINGTON The deadly shooting of three U.S. sailors at a Navy installation in December could reignite a long-simmering fight between the federal government and tech companies over data privacy and encryption.

As part of its probe into the violent incident, deemed a terrorist act by the government, the Justice Department insists that investigators need access to data from two locked and encrypted iPhones that belonged to the alleged gunman, a Saudi aviation student. The problem: Apple designed those iPhones with encryption technology so secure that the company itself can't read private messages.

The squabble raises two big questions. First, is Apple required to help the government hack its own security technology when requested? Second, is government pressure on this issue the prelude for a broader effort to outlaw encryption technology the feds can't break?

THE QUARREL SO FAR

The Justice Department and Apple have been in talks recently over the Saudi students iPhone. Justice officials contend that they still havent received an answer about whether Apple has the capability to unlock the devices.

During a news conference Monday announcing the findings of the Pensacola station investigation, U.S. Attorney William Barr said its critical for law enforcement to know with whom the shooter communicated and about what, before he died.

So far, Apple has not given any substantive assistance, Barr said. We call on Apple and other technology companies to help us find a solution so that we can better protect the lives of the American people and prevent future attacks.

Apple rejected that characterization. "Our responses to their many requests since the attack have been timely, thorough and are ongoing, the company said.

TRYING THE BACKDOOR

Our phones hold countless messages, files and photos tracings of our everyday life and work. But in 2013, the whistleblower Edward Snowden revealed the extent to which the government was spying on U.S. citizens. Tech companies like Apple and Google began taking steps to shield those digital tracings from prying eyes though often not their own by mathematically scrambling them with encryption.

Apple was one of the first major companies to embrace stronger end-to-end encryption, in which messages are scrambled so that only their senders and recipients can read them. Law enforcement, however, wants access to that information in order to investigate crimes such as terrorism or child sexual exploitation.

Barr and other top cops call the problem going dark, as data they used to be able to scoop up with wiretaps has become harder and harder to read.

Although most law enforcement officials are vague about how to solve the problem, security experts say the authorities are basically asking for an engineered backdoor a secret key that would let them decipher encrypted information with a court order.

But the same experts warn that such backdoors into encryption systems make them inherently insecure. Just knowing that a backdoor exists is enough to focus the world's spies and criminals on discovering the mathematical keys that could unlock it. And when they do, everyone's information is essentially vulnerable to anyone with the secret key.

WHAT LAW ENFORCEMENT CAN DO

Forcing tech companies to engineer backdoors into their security systems would almost certainly require an act of Congress. Legislators, however, have never come close to agreeing on what such a law should look like.

But there are alternatives. Four years ago, the Justice Department took the extraordinary step of asking a federal judge to force Apple to break its own encryption system. The legal move involved an iPhone used by the perpetrator of a December 2015 mass shooting in San Bernardino, California.

Apple acknowledged that it could create the software the feds wanted, but warned that it would be a bad idea. The software could be stolen by hackers and used against other iPhones, the company warned, and might also lead to similar demands from repressive governments around the world.

The FBI ultimately dropped the case shortly before it was to go to trial, saying a third party had found another way of getting into the phone. It never disclosed who that party was; there is an entire industry of shadowy companies such as the Israeli firm Cellebrite that discover or pay for information on flaws in encryption systems. These firms then develop tools to essentially create their own backdoors.

Such companies do significant business with governments and law enforcement. Companies like Apple, meanwhile, do their best to close such loopholes as soon as they learn about them.

WHERE THINGS STAND NOW

Apple is reportedly bracing for another possible legal fight over encryption with the Justice Department. So far, though, there's no clear sign that the government is headed that way .

Theyre just public shaming and asking nicely, said Bruce Schneier, an encryption expert at the Berkman Klein Center for Internet and Society at Harvard University. Hurting everybodys security for some forensic evidence is a dumb tradeoff.

Barr said the growth of consumer apps with end-to-end encryption, from Apple's iMessage to Facebook's WhatsApp and Signal, have aided terrorist organizations, drug cartels, child molesting rings and kiddie porn-type rings. But the government's legal options could be limited.

For one thing, DOJ's own inspector general slammed the department in the aftermath of the San Bernardino case, noting that it had made few attempts to break into the iPhone itself before filing suit. The FBI unit tasked with cracking phones had only sought outside help the day before the department asked a judge to compel Apple's assistance, the inspector general's report found.

The same report found that an FBI section chief knew an outside vendor had almost 90% completed a technique that would have allowed it to break into the phone, even as the Justice Department insisted that forcing Apples help was the only option.

Civil liberties advocates have also protested. The American Civil Liberties Union called Barrs demands dangerous and unconstitutional.

Here we are again, Schneier said. It's stupid every time.

___

Associated Press writer Michael Balsamo contributed to this report.

See more here:
AP Explains: The Justice Department's New Quarrel With Apple - The New York Times

Trump and Comey Are United Against Encrypted Communications – Reason

For all the public sparring between the two inflated egos known as Donald Trump and James Comey, the president and the former FBI director have some important commonalities. For starters, they both hate it when the common people keep secrets from the ruling class of which they represent competing factions.

The point of agreement between the two political antagonists became clear on January 14, when President Trump complained that Apple executives "refuse to unlock phones used by killers, drug dealers and other violent criminal elements." Some of us poked at our ears, wondering if we were hearing echoes. After all, not so long ago, as head of the FBI, Comey tried to force Apple to unlock encrypted cell phones and raged that Apple, Google, and other companies "market something expressly to allow people to place themselves beyond the law."

Trump agreed with Comey back then, too, by the way; in 2016, he called for a boycott of Apple until such time as the company helped the FBI break iPhone security.

Apparently, not as much divides these two men as they like to let on.

In public, Trump calls Comey a "disgrace" and Comey fires back at a man he calls a "strange and slightly sad old guy." Butaside from the fact that they're both correct about each other's flawsthat's intramural combat between power addicts over who should wield the power. That the public should be poked, prodded, and intruded upon is a given for Comey and Trump. And it's a sentiment that binds so many of our would-be lords and masters in public office.

The shared nature of official nosiness becomes clear when you remember last November's bipartisan vote to extend the Patriot Act, a measure that the Electronic Frontier Foundation says "broadly expands law enforcement's surveillance and investigative powers and represents one of the most significant threats to civil liberties, privacy, and democratic traditions in US history." Even as Democrats debated impeaching Donald Trumpa move they later approvedthey overwhelmingly joined with the Trump administration to support the surveillance bill's extension.

Trans-partisan hand-holding on surveillance state measures is certainly nothing new among the political class. The Patriot Act originally passed during the presidency of Republican President George W. Bush, but with plenty of cross-aisle support.

"I drafted a terrorism bill after the Oklahoma City bombing," senator and current leading Democratic presidential wannabe Joe Biden boasted to The New Republic after the Patriot Act's passage. "And the bill John Ashcroft sent up was my bill."

Biden's anti-privacy efforts extend back so far that he inspired Phil Zimmermann to complete the development of PGP encryption software.

Later, as vice president, Biden threatened countries that considered offering asylum to surveillance whistleblower Edward Snowden.

Sen. Elizabeth Warren (D-Mass.), another leading contender for the Democratic presidential nomination, frets that the data encrypted communications will "allow companies to hide from 'government spying'such as text messages and chatroom transcriptshave proven to be 'key evidence' in previous regulatory and compliance cases."

It seems Trump and Comey are in good company on the issue. Well, good-ishfor a certain D.C.-centric value of the word.

"Lawmakers are giving big tech firms an ultimatum: Give police access to encrypted communications or we'll force you," The Washington Post reported last month.

"It ain't complicated for me," Senate Judiciary Committee Chairman Lindsey Graham (R-S.C.) told representatives from Facebook and Apple at a Capitol Hill hearing in December. "You're going to find a way to do this or we're going to do it for you."

"You all have got to get your act together or we will gladly get your act together for you," said Sen. Marsha Blackburn (R-Tenn.), who also sits on the judiciary committee.

Ranking Democratic member Dianne Feinstein (Calif.), meanwhile, said she is "determined to see that there is a way that phones can be unlocked when major crimes are committed," whether tech companies like it or not.

And so on. Trump and Comey's frenemy act opposing communications privacy for people who don't draw government paychecks is the rule, not the exception.

Sure, there are some surveillance skeptics and privacy advocates among the political class. But they're rare, and except for a very few civil liberties-oriented and government-skeptic types who are usually on the outs with the real powerbrokers, they're awfully unreliable on the issue.

The problem is that the Trumps, Comeys, Grahams, Bidens, Feinsteins, Blackburns, and Warrens of the world largely agree that the government that defines their lives and gives them importance should be vastly powerful. The rationales they come up with depend on the specific priorities of the politician in question, the cultural moment, and the audience, but they're forever arguing in favor of an intrusive state from which we can keep no secrets.

"It had become clear, to me at least, that the repeated evocations of terror by the political class were not a response to any specific threat or concern but a cynical attempt to turn terror into a permanent danger that required permanent vigilance enforced by unquestionable authority," whistleblower Edward Snowden wrote of his growing awareness of what lay behind the surveillance state in Permanent Record, his 2019 memoir.

Substitute "violent criminal elements" or "criminal action by Wall Street" or "child abusers" or any other justification politicians might come up with if you wish, but it all leads in the same direction. Ultimately, the members of the political class may fight tooth and nail, but it's not over whether Leviathan should paw through our communications. They just disagree over who should be in charge of the pawing.

Read more:
Trump and Comey Are United Against Encrypted Communications - Reason

Artificial Intelligence – Scratch Wiki

Artificial Intelligence, commonly abbreviated as AI, has a popular connotation within Scratch relating to a computerized mind that consists entirely of programming code.

Its usage in Scratch, albeit somewhat misleading, is most common in projects in which a user can play a game against the computer.

Most projects that use AI use special techniques, such as using variables to store different values. Those values may be previous locations, user input, and so on. They help to calculate different actions that allow the computer to make a good challenge to the player and succeed in its task.

A practical and optimal AI system will use recursion[citation needed] to try to adapt to the circumstances itself. Given (for a game):

A recursive function to return the best move for a player given a board and which player can be written under the following logic:

See the article on game trees for more on recursive functions and their use in constructing AI.

There is also another class of AI that depends solely upon only one of the factors. Such AI are a lot simpler and, in many cases, effective. However, they have not fulfilled the true requirements of an AI. For example, in the project Agent White, the AI moves along a given path and only tries to shoot at you. In this AI, only the user's position matters to the AI; it will rotate so that its gun turns towards the user. In the project Broomsticks, the AI only changes its position with respect to the ball.

AI which can take external stimulus and decide upon the best way to use it is called a learning AI, or an AI that uses something called machine learning. Neural networks are also commonly used for learning AIs. A learning AI is able to learn off of its present and past experiences. One popular way of making a learning AI is by using a neural network. Another is by making a list of things and creating a list of things for every reply (which can be done in Scratch, although with some difficulty as 2D arrays are not easily implemented).

Another type of AI is used in a remix of Agent White found here. In this remix, the AI picks a random path and follows it. It uses Math and future x and y positions based on the current position of a character which you control. Then it slowly moves toward that new position until it either reaches its destination or hits a wall. In this case, instead of Artificial Intelligence, it is more of Artificial Random because it never uses intelligence other than running into walls.

One of the biggest limitations AI has been facing is speed. Scratch is a rather slow programming language; hence most AIs on Scratch are slow because their scripts are too long.

Complications also have been a major problem for AI as all AI programs are very large and complicated, thus the scripts may become long and too laggy to make without crashing Scratch. For example, a simple game of Tic-Tac-Toe with AI will have a script running into multiple pages due to many conditions in if blocks, and sometimes an attempt to speed it up will be made by making it Single Frame.

The complicated script also makes remixing a problem. Because of all this, most AI projects have no improvements, causing the AI to remain glitchy. AIs may make mistakes that are easily avoidable by users, and most mistakes like these are hilariously known as artificial stupidity.

These projects have been using AI in the truest sense possible practically:

Continue reading here:
Artificial Intelligence - Scratch Wiki

High-Technology Discovered in Classical Mythology Reveals …

For the last 70 years science fiction writers and Hollywood movie directors have explored the place of robots and artificial intelligence (AI) in the future of humankind. But automated technologies with greater than human intelligence were first conceptualized in the imaginations of people in ancient societies and were woven into their folkloric systems, according to a highly-original new book.

TitledGods and Robots: Myths, Machines, and Ancient Dreams of Technology , the author, Dr Adrienne Mayor of Stanford University is, according to the university website, an independent folklorist/historian of science investigating natural knowledge contained in pre-scientific myths and oral traditions. In a nutshell, Dr Mayor can be described as a force of mythological and folkloric understanding and her previous works have been featured on NPR, BBC, History Channel, Smithsonian and National Geographic. Now, this new book offers readers comparisons between the legendary figures of ancient myths and the AI driven robots of today which are building tomorrows world.

Vulcan (Hephaestus). Engraving by E. Jeaurat, 1716. ( CC BY 4.0 )

While the corridors of universities and academic institutions are teaming with thousands of professors skilled with powerful oratory abilities in classic teaching environments, Dr Mayor has a quality that must be a thing of great envy with her peer group, that rare skill of original storytelling in written academic form. Not only does her book carefully analyze classic myths in an easy to digest way for the lay-reader, but all the way her methodology and observational stances adhere to the scientific method of investigation. However, where so many academic writers deliver dry base facts and figures with no context in the real world, Dr Mayor subtly prompts readers to project the archetypal messages in timeworn stories into our modern zeitgeist, as we build a new world with AI at the fore.

Medeia and Talus by Sybil Tawse. ( Public Domain )

According to a report about the new book in The Daily Mail , Dr Mayor said ancient people envisioned many of the technology trends we grapple with today including killer androids, driverless technology, GPS and AI-powered helper robots. Illustrating her hypothesis, the creations of Hephaestus, the god of metalworking and an invention in Homers Iliad , were predictions of the rise of humanoid robots. An article about Mayors research in Greek Reporter said AI-powered helper robots andkiller androids, according to Dr Mayor, appear in tales about Jason and the Argonauts, Medea, Daedalus and Prometheus and also the 'bronze killer-robot' Taloswho guarded the island of Crete. Furthermore, the legendary Pandora, who Dr Mayor describes as a 'wicked AI fembot like the replicant in the blockbuster movie Blade Runner, had been programmed to release eternal suffering upon humanity and Though the Greeks did not know how technology would work, they could foreshadow its rise in society, said Mayor.

Pandora trying to close the box that she had opened out of curiosity. ( Public Domain )

A book review on Science Mag , by Sarah Olson, softly criticized Dr Mayor saying Despite her extensive knowledge of ancient mythology, Mayor does little to demonstrate an understanding of modern AI, neural networks, and machine learning; the chatbots are among only a handful of examples of modern technology she explores. While Olsons observation is valid, looking at it another way, isnt this actually a veiled credit to the author? So often modern authors, especially scientific writers, speculate into complicated fields with their core understanding which dilutes the heart of their research. Contrary to this, it would appear Dr Mayor realized her speculations into future technologies including AI would only ever be speculations and rather than opening herself up to the scathing reviews of silicone valley tech geeks, she loyally focused her research on her specialist subject, which is quite clearly classical mythology.

The Science Mag article also criticized Mayor for not having added a few sentences to explain the difference between, say, machine learning and AI, which the reviewer claims makes it difficult for readers to identify the books intended audience. Again, this is possibly another credit to the author. Heres why. In our hyper-commercialized world seldom do authors write honest books simply because they believe a story needs to be written. Because Dr Mayor's book was not written for a defined audience it will be remembered as a brave scientific sentinel that will undoubtedly find or make its readership, organically, over time.

When you read this book, the ultimate takeaway is that the observations are un-skewed and non-sensationalized, neither are they dumbed down to fit into a publishers or predetermined audience. And when a book delivers more suggestions and questions than answers, like this one, it immediately becomes a refreshingly non-egotistical trip through classic mythology. What is more, the author has left sufficient space for readers to indulge in their own ideas and conclusions based on their understanding of technology. Thus, what has actually been published is more than a book, and the work marks a new generation of psychologically interactive mythological learning. You finish the story Dr Mayor began.

An article about Dr Mayors book on News said the author is urging leading tech bosses to closely analyze the stories and characters of Greek mythology as we close in on a future dominated by automated technologies. Gods and Robots offers optimistic insights with cautionary twists while warning of the potential risks of uncontrolled future technologies, and it is clear that Dr Mayor believes herself that AI might one day deliver the mythological worlds our ancient ancestors imagined and immortalized in their folk stories.

Top image: Was artificial intelligence predicted by the Greeks? Source: pict rider via Fotolia

By Ashley Cowie

The rest is here:
High-Technology Discovered in Classical Mythology Reveals ...

Its going to be a Happy New Year for Artificial …

MUMBAI | NEW DELHI: Artificial intelligence (AI) is the buzz in the jobs bazaar as machine learning and the Internet of Things (IoT) increasingly influence business strategies and analytics. Human resource and search experts estimate a 50-60% higher demand for AI and robotics professionals in 2018 even as machines take over repetitive manual work.

Machines are taking over repetitive tasks. Robotics, AI, big data and analytics will be competencies that will be in great demand, said Shakun Khanna, senior director at Oracle for the Asia-Pacific region.

Organisations are being pushed to become even more efficient as jobs turn predictable, said Rishabh Kaul, cofounder of recruitment startup Belong, which helps clients search for and hire AI professionals. There is a significant increase in the adoption of AI and automation across enterprises, leading to a skyrocketing of demand for professionals in these fields, he said.

Jobs in the IoT ecosystem, have grown fourfold in the last three years, according to estimates by Belong. These are related to engagement technologies and data capture among other areas. Demand for professionals in the realm of data analysis, including data scientists, have grown by almost 76% in the past few years in AI.

The demand is at the entry level as well as middle to senior ranks across sectors such as business, financial services and insurance (BFSI), ecommerce, startups, business process outsourcing (BPO), information technology (IT), pharmaceuticals, healthcare and retail. Robotics is required by process-oriented companies for a better customer experience. It helps in cutting down cost and improves efficiency, said Thammaiah BN, managing director, Kelly Services India.

AI is helping companies to be in spaces so far not thought of. Organisations can accomplish new things, new products and services through AI.

Companies want to mine the data they have accumulated over the years, said Sinosh Panicker, partner, Hunt Partners. AI helps them predict and position their products better and push out new things, he said. However, theres an acute demand-supply mismatch for AI talent across industries, experts said. Candidates for AI roles related to natural language processing (NLP), deep learning, and machine learning are thin on the ground, according to the Belong Talent Supply Index. The ratio of the number of people to jobs in deep learning is 0.53, while for machine learning its 0.63 and for NLP its 0.71.

Only 4% of AI professionals in India have worked on cutting-edge technologies such as deep learning and neural networks, the key ingredients in building advanced AI-related solutions, said Kaul.

Roles in data science and data engineering (which are different facets of the AI family of skills) are at the intersection of math, statistics and programming, he said. This isnt typically taught at Indian colleges as part of formal learning.

A few academic institutions such as the Indian Institutes of Technology (IITs) in Kharagpur and Kanpur, the Indian Institute of Information Technology (IIIT) in Hyderabad and the Indian Institute of Science (IISc) in Bengaluru have specialised disciplines or centres for artificial intelligence and machine learning. In fact, according to our internal research, less than 2% of professionals who call themselves data scientists or data engineers have a PhD in AI-related technologies, said Kaul.

Such is the need for talent that it is prompting top business schools, including the Indian Institutes of Management (IIMs), to include AI and machine learning in their curriculum and expose students to the full ecosystem of IoT. The IIMs in Bangalore and Kozhikode and premier B-Schools like the SP Jain Institute of Management & Research (SPJIMR) are offering courses on AI, robotics and IoT that can be connected to business strategy to enhance performance, output and customer experience.

Some are learning skills through various other courses, including online ones. People who are keeping themselves abreast with new age technologies and have the right set of required skills under the same are in high demand, said ABC Consultants director Ratna Gupta.

View original post here:
Its going to be a Happy New Year for Artificial ...

Contact Center Technology – Artificial Intelligence | Avaya

https://www.avaya.com/ecomm/secured/getcart/

https://www.avaya.com/ecomm/secured/dropcart/

https://www.avaya.com/ecomm/secured/removeitem/

https://www.avaya.com/ecomm/updatecontract/

https://www.avaya.com/ecomm/secured/addtocart/

https://www.avaya.com/ecomm/secured/itemprice/feature

https://www.avaya.com/cs/Satellite?pagename=Avaya/Common/LabelsJSON

https://www.avaya.com/ecomm/secured/customer/quote/saveorder/

We're experiencing technical difficulties. Please try again in some time.

https://www.avaya.com/cs/secure/en/store/configurator/

https://www.avaya.com/cs/secure/en/store/configurator2/

https://www.avaya.com/commerce/cart

https://www.avaya.com/cs/secure/en/store/checkout/

https://www.avaya.com/cs/secure/commerce/orderconfirmation

https://www.avaya.com//commerce/additionaloption

https://www.avaya.com/commerce/dashboard/

Avaya2/Account/ResendVerificationEmail

Avaya2/Account/PreSignUp

https://www.avaya.com/commerce/dashboard/

https://www.avaya.com/commerce/dashboard/

https://login.avaya.com/sso/common/logout.jsp?source=https://www.avaya.com/

https://www.avaya.com/ecomm/itemprice/4/1011/

https://www.avaya.com/cs/Satellite?d=&pagename=getBundleCardsData

https://www.avaya.com/cs/Satellite?d=&pagename=getStoreProductData

https://www.avaya.com/ecomm/secured/user/getsoldtos/

https://www.avaya.com/cs/Satellite?d=&pagename=searchStoreProductDetails

https://www.avaya.com/en/products/cloud/small-business-solutions/

https://www.avaya.com/ecomm/secure/orderdetail/

https://www.avaya.com/ecomm/secure/getlicenses/

https://www.avaya.com/ecomm/secure/getsoftwares/

https://www.avaya.com/ecomm/secure/getdownloadurl/

https://www.avaya.com/ecomm/updateitems/

https://www.avaya.com/ecomm/secure/lacstatus/

https://www.avaya.com/ecomm/secure/activatelac/

https://www.avaya.com/ecomm/secure/zang/balance/

https://www.avaya.com/cs/Satellite?pagename=Avaya/Service/StoreProductFilter

https://www.avaya.com/ecomm/secure/getLabProducts

https://www.avaya.com/ecomm/secure/lab/environments/email/

https://www.avaya.com/ecomm/secure/lab/status

https://www.avaya.com/ecomm/secure/lab/start

https://www.avaya.com/ecomm/secure/lab/suspend

https://www.avaya.com/ecomm/secure/lab/delete

https://www.avaya.com/ecomm/secure/lab/destroy

https://www.avaya.com/ecomm/secure/update/labname/

https://www.avaya.com/ecomm/secure/activatelab/

https://www.avaya.com/cs/Satellite?pagename=Avaya2/Service/FindStateByCountry&locale=en_US

https://www.avaya.com/cs/Satellite?pagename=Avaya2/Service/FindCitiesByState&locale=en_US

https://www.avaya.com/cs/Satellite/?pagename=Avaya2/Service/PartnerDirectory&locale=en_US

https://www.avaya.com/cs/Satellite?pagename=Avaya2/Service/PartnerLocator&locale=en_US

https://www.avaya.com/cs/Satellite/?pagename=Avaya2/Service/PartnerCountries&locale=en_US

https://www.avaya.com/cs/Satellite/?pagename=Avaya2/Service/PartnerDetail&locale=en_US

https://www.avaya.com/cs/Satellite?pagename=Avaya2/Service/FindCityByCountry&locale=en_US

https://www.avaya.com/cs/Satellite/?pagename=Avaya2/Service/PartnerDirectory_V3&locale=en_US

https://www.avaya.com/cs/Satellite/?pagename=Avaya2/Service/PartnerDirectory_V4&locale=en_US

https://www.avaya.com/cs/Satellite/?pagename=Avaya2/Service/PartnerDirectory_V3&locale=en_US

https://www.avaya.com/cs/Satellite/?pagename=Avaya2/Service/PartnerLabels&locale=en_US&key=Partner%20Levels

https://www.avaya.com/cs/Satellite/?pagename=Avaya2/CaseStudiesJSON&locale=en_US

https://www.avaya.com/cs/Satellite/?pagename=Avaya2/News/NewsJSON&locale=en_US

https://www.avaya.com/cs/Satellite/?pagename=Avaya2/Blog/getCategoryBlogs

https://www.avaya.com/cs/Satellite/?pagename=Avaya2/Blog/getAuthorBlogs

https://www.avaya.com/cs/Satellite/?pagename=Avaya2/Blog/getBlogsForInputText

https://www.avaya.com/cs/Satellite/?pagename=Avaya2/Blog/BlogCategoryTagList

https://www.avaya.com/cs/Satellite/?pagename=Avaya2/Blog/getBlogsForFilterSection

https://www.avaya.com/blogs/blog-search/

https://www.avaya.com/cs/Satellite/?pagename=Stream/VideoCategoryTypeTagList&locale=en_US

https://www.avaya.com/cs/Satellite/?pagename=Stream/getVideoForFilterSection&locale=en_US

https://www.avaya.com/en/stream-search/

https://www.avaya.com/cs/Satellite/?pagename=Avaya2/Device/deviceCategoryList&locale=en_US

https://www.avaya.com/cs/Satellite/?pagename=Avaya2/getdeviceForFilterSection&locale=en_US

https://www.avaya.com/cs/Satellite/?pagename=Avaya2/DeviceCatelog/getdevicesForCompareSection&locale=en_US

https://www.avaya.com/cs/Satellite/?pagename=Avaya2/DeviceCatelog/getDeviceModelData&locale=en_US

https://www.avaya.com/cs/Satellite/?pagename=Avaya2/DeviceCatelog/getDeviceModelDataList&locale=en_US

https://www.avaya.com/en/devices-and-phones/catalog-search/

https://www.avaya.com/en/devices-and-phones/product-compare/

https://www.avaya.com/ecomm/secure/partnerInfo/

https://www.avaya.com/ecomm/secure/partnerInfo/T1

https://www.avaya.com/ecomm/secure/partnerInfo/T2

https://www.avaya.com/static/avaya/commerce-views/partner-labels-data.html

https://www.avaya.com/static/avaya/commerce-views/uc-product-labels-data.html

https://www.avaya.com/static/avaya/commerce-views/cc-product-labels-data.html

https://www.avaya.com/ecomm/secured/itemprice/feature

https://www.avaya.com/ecomm/secured/itemprice/feature

https://www.avaya.com/ecomm/secure/partner/savequote/

https://www.avaya.com/ecomm/secured/itemprice/feature

https://www.avaya.com/ecomm/secure/checkDirect/

https://www.avaya.com/ecomm/secure/customer/soldToAddress

https://www.avaya.com/ecomm/secure/customer/soldToAddress/endCustomer/

https://www.avaya.com/ecomm/secure/customer/createEndCustomer/

https://www.avaya.com/ecomm/secured/customer/quote/update/shipto/

https://www.avaya.com/ecomm/secured/updatequote/

https://www.avaya.com/ecomm/secured/quote/sendEmailbyAgent/

https://www.avaya.com/ecomm/secured/quote/download/

https://www.avaya.com/ecomm/customer/quote/gettnc/entityId/

https://www.avaya.com/ecomm/secure/customer/quote/savetnc/

https://www.avaya.com/ecomm/secured/customer/quote/saveorder/

https://www.avaya.com/ecomm/secure/customer/general/gettnc/

https://www.avaya.com/ecomm/secure/customer/general/savetnc/

https://www.avaya.com/ecomm/secured/customer/orderinvoicedetail/

https://www.avaya.com/ecomm/secured/customer/orderinvoicedetail/

https://www.avaya.com/ecomm/secured/user/getMyCompanyInfo/

Continue reading here:
Contact Center Technology - Artificial Intelligence | Avaya