Mind Matters Natural and Artificial Intelligence News and Analysis

ArchiveArticles

Chimpanzees Uganda Alain Houle CC By 4 0

Claim: Research Shows That Animals Have a Moral Sense

We are informed at Nautilus, the Templeton Foundation’s magazine, that “ It’s time to take moral emotion in animals seriously.” Really?

Philosopher James Hutton starts out his article as a sort of a “trick.” He describes the animals he works with as if they were colleagues. Then, in paragraph four, he announces, “But there are a couple of important details about Amy and Sidney that you should know. The first is that they aren’t workers in any conventional sense, but participants in an experiment.” Coming to the point, they’re dogs. And anyone who had been reading carefully would realize that they were animals, probably dogs or horses. But now here is the supposed big revelation from the University of Vienna experiments Hutton describes: The first big idea is that the moral attitudes of human beings are thoroughly emotional in nature. Of Read More ›

dolbadarn-castle-stockpack-adobe-stock
Dolbadarn Castle

Yes! There Is Evidence For the Intelligent Design of the Brain

If our brains were not intelligently designed, we would have no reason to believe anything our senses tell us

This is a big topic, of course. The brain, like all of biology, is obviously intelligently designed. From the elegant coordination of neural activity between neurons and brain regions to the remarkable law-like behavior of individual molecules and atoms that comprise neurons and neurotransmitters, the brain carries the unmistakable fingerprint of a Designer. But there is another common-sense way to infer design of the brain that is simple and I think quite convincing — it is based on our belief that our perceptions and concepts accord with truth. To see how this points to intelligent design of the brain, consider a very compelling argument for God’s existence proposed by philosopher Richard Taylor (1919–2003) in his book Metaphysics. Thomist philosopher Edward Read More ›

data-transformation-factory-processing-binary-code-stockpack-adobe-stock
data transformation, factory processing binary code

Sometimes, Money Really Is the Explanation

Today's internet is a concentration of power, in terms of information, never before seen in history

Veteran software developer David A. Kruger offered some thoughts on computer security recently at Expensivity. We appreciate the opportunity to republish them here as a series. Last week we looked at the fact that the cybercriminal isn’t necessarily the weirdo in the hoodie. He could just a boring corporate bureaucrat collecting data on you that his boss plans to use later. Now we look at where the money in the business is: It’s All About the Benjamins Why are HDCs [human data collectors] so willing to abuse their own users? For the money and the power that comes from having lots of it. In 2002, Google discovered that the raw human data it was collecting from its users to increase Read More ›

man-chained-to-computer-stockpack-adobe-stock
Man chained to computer

How Social Media Are Ruining Our Lives

If we can’t stand five minutes in a lineup without checking our phones, we have a problem

Recently, Andrew McDiarmid interviewed Christian author Doug Smith about his book [Un]Intentional: How Screens Secretly Shape Your Desires, and How You Can Break Free (2018, updated 2021). Smith tries to help us navigate the unusual time in which we live, when many are absolutely glued to screens”: Doug Smith: I mean, it’s the families at the restaurant, all looking at their screens instead of looking at each other. It’s the near misses on the interstate because somebody was on their phone. I saw a photo recently of people in Ukraine that were waiting for their train to escape the trials there, and they’re all on their phone, right? I have a friend that’s a missionary in Papua, New Guinea, and Read More ›

New York, USA - 26 April 2021: Kubernetes company logo close-up on website page, Illustrative Editorial.
New York, USA - 26 April 2021: Kubernetes company logo close-up on website page, Illustrative Editorial

How Does A Kubernetes Cluster Work?

A general overview of the Kubernetes environment

Now that you have some concrete experience using Kubernetes, this article will present the basic theory of how a Kubernetes cluster works. We won’t talk about how to accomplish these things in the present article – the goal is to provide you with a broad understanding of the components of Kubernetes. Basic Kubernetes Components Kubernetes comes with a lot of different components, and it is hard to get them all shown on the same diagram. Therefore, I will just give a high-level picture of what a Kubernetes cluster looks like. The image below shows the basic setup, which we will cover in this article. You see here a separation between the internal Kubernetes network and the Internet. Note that this Read More ›

A man going through the dark old tunnel. Tunnel with traffic lights and a silhouette of a man

Remember When Near-Death Experiencers Were Mental Cases?

Scientists “knew” it wasn’t true. Then modern medicine started bringing people back from the dead…

Here’s ScienceDaily’s writeup of the near-death experiences paper published at the New York Academy of Sciences. It didn’t used to be the case that near-death experiences got written up anywhere except in a psychiatrist’s notebook. Something is changing: “Cardiac arrest is not a heart attack, but represents the final stage of a disease or event that causes a person to die,” lead author Parnia explains. “The advent of cardiopulmonary resuscitation (CPR) showed us that death is not an absolute state, rather, it’s a process that could potentially be reversed in some people even after it has started. “What has enabled the scientific study of death,” he continues, “is that brain cells do not become irreversibly damaged within minutes of oxygen Read More ›

tunnel-of-light-stockpack-adobe-stock
tunnel of light

Neuroscientists: Near-death perceptions not just hallucinations

Published in the Annals of the New York Academy of Sciences

One of the authors, Sam Parnia is a well-known researcher in this area: Due to advances in resuscitation and critical care, many people are surviving near-death experiences. Survivors’ recalled experiences are not consistent with hallucinations, but instead, follow a specific narrative arc involving perception. Scientific advances in the 20th and 21st centuries have led to a major evolution in the understanding of death. At the same time, for decades, people who have survived an encounter with death have recalled unexplained lucid episodes involving heightened consciousness and awareness. These have been reported using the popular—yet scientifically ill-defined—term “near-death experiences”. A multidisciplinary team of national and international leaders, led by Sam Parnia, MD, Ph.D., director of Critical Care and Resuscitation Research at Read More ›

backgrounds-3d-illustration-alien-planet-sci-fi-game-stockpack-adobe-stock
Backgrounds 3D illustration Alien planet Sci-fi Game

Would Advanced Aliens Be Fully Mechanical? Or Like Octopuses?

Astrobiologist Dirk Schultze-Makuch muses on the possibilities

Musing on a recent open-access study at PNAS, astrophysicist Dirk Schulze-Makuch notes at BigThink a couple of things that separate really smart life forms from the others. One of them, he guesses, is bilateral symmetry (life forms whose left and right sides are mirror images): “symmetry requires less information for DNA to encode and allows more flexibility to develop future traits that may be advantageous.” He also notes that smart life forms tend to be mobile rather than stationary: “We don’t know of any intelligent plants or fungi, for the simple reason that stationary things don’t have to be smart.” Well, wait. It’s not so much that stationary life forms don’t have to be smart as… what good would it Read More ›

charting-consciousness-stockpack-adobe-stock.jpg
Charting Consciousness.

The Physics of Consciousness: There IS Such a Thing?

There are no really good theories of consciousness but some physicists, including Roger Penrose, make a good stab at it. Jordan Peterson listens

Yes. Jordan Peterson talks to Roger Penrose about that: Dr. Peterson recently traveled to the UK for a series of lectures at the highly esteemed Universities of Oxford and Cambridge. This conversation was recorded during that period with Sir Roger Penrose, a British mathematical physicist who was awarded the 2020 Nobel Prize in Physics for “discovering that black hole formation is a robust predictor of Einstein’s general relativity.” Moderated by Dr. Stephen Blackwood. ___________ Chapters ___________ [0:00] Intro [1:00] Is Consciousness Computational? [3:20] Turing Machines [6:30] Determinism & the Arrow of Time [12:15] Consciousness & Reductionism [17:30] Emergent Randomness & Evolution [23:00] The Tiling Problem, Computation, & AI [29:30] Escher, Brains, Bach [39:00] Pattern Recognition & Intuition [45:30] Mathematical Representations Read More ›

view-on-desert-stockpack-adobe-stock
View on desert

Sci Fi Saturday: The Vixen! She’s Back! Firefly TV Heats Up

So why is Captain Mal sitting naked in a desert? We get to hear the story leading up to that

The opening scene features Captain Mal sitting naked in a desert. A caption advises us that we must go back to seventy-two hours earlier to understand how that happened. Mal, you see, meets an old buddy and shares hugs and swapS banter until the buddy informs him that he is married. Mal is excited to hear this wonderful news until he sees a familiar face — Saffron, the vixen who’d tricked him into believing she was his bride in a previous episode. She is now hitched to Mal’s pal; so imagine the poor sap’s shock when the Saffron and Mal draw guns on one another. After a brief squabble, the swindled husband leaves Saffron in Mal’s angry hands. To save Read More ›

security-worker-during-monitoring-video-surveillance-system-stockpack-adobe-stock
Security worker during monitoring. Video surveillance system.

The Cybercriminal Isn’t Necessarily Who You Think…

Chances are, the “human data collector” is just someone who works for a company that makes money collecting data about you

Veteran software developer David A. Kruger offered some thoughts on computer security recently at Expensivity and we appreciate the opportunity to republish them here as a series. Yesterday’s discussion focused on ruining cybercriminals’ lives by making their businesses unprofitable. And now, let’s look at who the cybercriminal typically is… it’s more complicated than his iconic hoodie. And it’s way worse too. Close Encounters of the Third Kind We have been taught to think of cyberattackers as being one of two kinds, criminal cyberattackers who gain control of others’ data to make money, or military/terroristic cyberattackers who gain control of others’ data to project military or political power. There is a third kind: Software makers who systematically destroy privacy, so they can gain control Read More ›

lhasa-jokhang-temple-tibet-china-stockpack-adobe-stock
Lhasa Jokhang Temple, Tibet, China

How China Controls Hollywood — and Your Mind?

That is, if you pay any attention to Hollywood’s products

King’s College prof Robert Carle offers some thought about China and Hollywood at MercatorNet. On an elaborate apology tour (his words) Disney boasted that few people had seen its Kundun film. Good business strategy? Hey, it gets worse: By the turn of the century, Hollywood directors and producers had learned not to broach subjects (Tibet, Xinjiang, Hong Kong, Taiwan, Tiananmen) that offend the Communist Chinese. They had also standardised a lobbying process to get China’s approval for its films. Early in the movie’s life cycle, international distributors meet with Chinese film bureau officials. American studios have to satisfy layers of Chinese bureaucrats before a movie hits the market. Schwartzel recounts dozens of stories of how American films have been edited Read More ›

crypto-currency-and-cryptocurrency-questions-and-investing-uncertainty-as-a-virtual-blockchain-money-investment-risk-with-a-golden-coin-representing-bitcoin-stockpack-adobe-stock
Crypto currency and cryptocurrency questions and investing uncertainty as a virtual blockchain money investment risk with a golden coin representing bitcoin

The Great Paradox of Cryptocurrency: Is It Freer or Not?

Many insist it is freer but, as a new book reveals, that’s not clear

In a prepublication review of Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency, Wired’s top editor Gideon Lichfield comments on the big crypto paradox: Its transactions are anonymous, but since every single one is public, stored on a blockchain that (by design) anyone can look at, they are like the broken stalks left by a thief fleeing through a wheat field—a bounty of data for experts in digital forensics, who can piece together identifying patterns. As Andy has previously written, this supposedly untraceable and secure form of money is in fact notoriously hard to launder and easy to steal, and the digital paper trails created by inexperienced criminals using it carelessly for more than a Read More ›

girl-solving-mathematical-addition-stockpack-adobe-stock
Girl solving mathematical addition

No, Civilization Has NOT Won the War on Math. Not Yet Anyway…

The war on math is now coming down to the race — not the ideas — of mathematicians

Legal scholar Jonathan Turley muses on the latest assault on math teaching in schools: We previously discussed the view of University of Rhode Island and Director of Graduate Studies of History Erik Loomis that “Science, statistics, and technology are all inherently racist.” Others have agreed with that view, including denouncing math as racist or a “tool of whiteness.” Now, as part of its “decolonization” efforts, Durham University is calling on professors in the math department to ask themselves if they’re citing work from “mostly white or male” mathematicians. According to the Telegraph and The College Fix a guide instructs faculty that “decolonising the mathematical curriculum means considering the cultural origins of the mathematical concepts, focusses, and notation we most commonly use.”  It adds: “[T]he question of whether we have allowed Read More ›

Elon_Musk_at_a_Press_Conference

Musk Offers Twitter $41 Billion, Exciting Free Speech Advocates

Will Musk succeed in his effort to "unlock" Twitter's free speech potential?

News has moved fast since it was revealed last week that Elon Musk purchased a 9.2% stake in Twitter. Since then, Musk was offered a seat on Twitter’s board, an offer he at first accepted, and then declined. Now, Musk has upped the ante by offering to buy Twitter for $41 billion. In his letter to the board, Musk referenced his desire to make Twitter “the platform for free speech around the globe,” and stated that he has the ability to “unlock” Twitter’s “extraordinary potential.” Here’s his full letter: Bret TaylorChairman of the Board, I invested in Twitter as I believe in its potential to be the platform for free speech around the globe, and I believe free speech is Read More ›

business-technology-internet-and-networking-concept-young-businesswoman-working-on-his-laptop-in-the-office-select-the-icon-security-on-the-virtual-display-stockpack-adobe-stock
Business, technology, internet and networking concept. Young businesswoman working on his laptop in the office, select the icon security on the virtual display.

Computer Safety Expert: Start Helping Ruin Cybercriminals’ Lives

Okay, their businesses. Unfortunately, part of the problem is the design of programs, written with the best of intentions…

Veteran software developer David A. Kruger offered some thoughts on computer security recently at Expensivity and we appreciate the opportunity to republish them here as a series. Yesterday’s discussion focused on agile software development. Today’s discussion looks at making life somewhat less comfortable for the guy who wants to steal your credit card number. Ruining the Economics of Cyberattack Would fully implementing controllable data and full scope authentication prevent every cybersecurity failure? Of course not. There are scenarios, particularly those aided by human gullibility, ineptitude, and negligence, where cybersecurity can and will continue to fail. However, cyberattacks are carried out by human beings for the purpose of acquiring money and/or exercising power, and there is a cost/benefit analysis behind every attack. Controllable Read More ›

beautiful-autumn-tree-with-mushrooms-and-moss-in-forest-stockpack-adobe-stock
Beautiful autumn tree with mushrooms and moss in forest

Not Just Plants — Even Fungi Like Mushrooms — Talk To Each Other?

They are NOT judging us but they do have complex communications systems interacting with their environment

The patterns that fungi like mushrooms use to communicate are said to be “strikingly similar” to those of human speech. But how?: Fungi send electrical signals to one another through hyphae—long, filamentous tendrils that the organisms use to grow and explore. The Guardian reports that previous research shows that the number of electrical impulses traveling through hyphae, sometimes likened to neurons, increases when fungi encounter new sources of food, and that this suggests it’s possible that fungi use this “language” to let each other know about new food sources or injury. Natalia Mesa, “Can Mushrooms “Talk” to Each Other?” at The Scientist (April 6, 2022) The paper is open access. That would make fungi, one of the kingdoms of life, Read More ›

matching-keys-made-of-circuits-led-lights-encryption-crypto-stockpack-adobe-stock
matching keys made of circuits & led lights, encryption & crypto

New Clue in the Problem That Haunts All Cryptography?

A string that has no description shorter than itself is a good bet for cryptography. If the hacker doesn’t know it, he can’t use shortcuts to guess it.

A central problem in all computer security (branch of cryptography) is the one-way problem. Cryptography should function as a one-way street: You can go north but you can’t go south. So if a hacker doesn’t have the code to go north, he can’t go anywhere. Which is where the computer security expert would like to leave the hacker… Is there such a thing as a one-way function in mathematics? Mathematician Erica Klarreich says, probably yes, and explains what it looks like: To get a feel for how one-way functions work, imagine someone asked you to multiply two large prime numbers, say 6,547 and 7,079. Arriving at the answer of 46,346,213 might take some work, but it is eminently doable. However, Read More ›

math-equations-of-artificial-intelligence-ai-deep-learning-computer-program-technology-illustration-rendering-stockpack-adobe-stock
Math Equations of Artificial intelligence AI deep learning computer program technology - illustration rendering

Does Information Have Mass? An Experimental Physicist Weighs In

Physicist Melvin Vopson argues that information has mass; Eric Holloway replies that, if so, it must come from outside the universe. Meanwhile…

It’s generally held that information does not have mass. However, physicist Melvin Vopson, reflecting on the work of Rolf Landauer (1927–1999), offers a somewhat alarming view: Not only does information have mass but that — at the rate we humans output it now — its energy will outweigh Earth. Yesterday, Eric Holloway offered a response to that claim: Let’s accept that creation of information can indeed increase the amount of energy and mass in a system. But, according to the conservation of energy, the energy in a closed system remains constant. So, if Vopson is correct we now have a mystery because his theory is in tension with the conservation of energy. The only solution is that the system is Read More ›

computer-code-on-a-screen-with-a-skull-representing-a-computer-virus-malware-attack-stockpack-adobe-stock
Computer code on a screen with a skull representing a computer virus / malware attack.

The Sweet Science of Agile Software Development

Effective security, as opposed to partial security, increases costs in the short run but decreases them in the long run

Veteran software developer David A. Kruger offered some thoughts on computer security recently at Expensivity and we appreciate the opportunity to republish them here as a series. Yesterday’s discussion focused on putting a lid on risks. Today’s discussion looks at the sweet science of agile software development — proactive, not reactive responses. Agile Software Development, Known Art, and Updates to the Rescue The “get out of it one piece of software and data at a time” requirement seems daunting, if not impossible, but it isn’t as bad as it sounds due to agile software development, the availability of “known art,” and the speed at which large-scale software changes propagate via the Internet. A key attribute of agile software development is frequently Read More ›