Toggle light / dark theme

Quoted: “I recall reading somewhere that “Ethereum is to Bitcoin as an iPhone is to a calculator”, which is a pretty good analogy. Bitcoin proved to us that it was possible to keep a tamper-proof system synchronised across the globe. There really is no reason the same system can’t be applied to other problems in the same way we apply normal computers to them.

Ethereum is a single computer spread out over the internet, processing the information we all feed it together. I guess you could call it a ‘shared consciousness’ if you wanted to.

In this computer, information cannot be suppressed. In this computer, ideas and trust rule. Work and reputation are visible and independently verifiable. Anyone can contribute and everyone is automatically safe. Collaboration will overcome privatisation as people work together to build an open network of ideas contributing to the betterment of us all. They are calling it internet 3.0. And though web 2.0 was a thing in some ways, I think we’ll look back at everything up until this point as the first internet. The internet we built by adapting old communication lines into new ways of communicating. The internet we built when we were still used to centralising responsibility for things.”

Read the article here > http://pospi.spadgos.com/2014/11/30/injustice-ethereum-and-the-information-renaissance/

Article: Harnessing “Black Holes”: The Large Hadron Collider – Ultimate Weapon of Mass Destruction

Posted in astronomy, big data, computing, cosmology, energy, engineering, environmental, ethics, existential risks, futurism, general relativity, governance, government, gravity, information science, innovation, internet, journalism, law, life extension, media & arts, military, nuclear energy, nuclear weapons, open source, particle physics, philosophy, physics, policy, posthumanism, quantum physics, science, security, singularity, space, space travel, supercomputing, sustainability, time travel, transhumanism, transparency, treatiesTagged , , , , , , , , , , , , | Leave a Comment on Article: Harnessing “Black Holes”: The Large Hadron Collider – Ultimate Weapon of Mass Destruction

Harnessing “Black Holes”: The Large Hadron Collider – Ultimate Weapon of Mass Destruction

Why the LHC must be shut down

CERN-Critics: LHC restart is a sad day for science and humanity!

Posted in astronomy, big data, complex systems, computing, cosmology, energy, engineering, ethics, existential risks, futurism, general relativity, governance, government, gravity, hardware, information science, innovation, internet, journalism, law, life extension, media & arts, military, nuclear energy, nuclear weapons, particle physics, philosophy, physics, policy, quantum physics, science, security, singularity, space, space travel, supercomputing, sustainability, time travel, transhumanism, transparency, treatiesTagged , , , , , , , , | 1 Comment on CERN-Critics: LHC restart is a sad day for science and humanity!

PRESS RELEASE “LHC-KRITIK”/”LHC-CRITIQUE” www.lhc-concern.info
CERN-Critics: LHC restart is a sad day for science and humanity!
These days, CERN has restarted the world’s biggest particle collider, the so-called “Big Bang Machine” LHC at CERN. After a hundreds of Million Euros upgrade of the world’s biggest machine, CERN plans to smash particles at double the energies of before. This poses, one would hope, certain eventually small (?), but fundamentally unpredictable catastrophic risks to planet Earth.
Basically the same group of critics, including Professors and Doctors, that had previously filed a law suit against CERN in the US and Europe, still opposes the restart for basically the same reasons. Dangers of: (“Micro”-)Black Holes, Strangelets, Vacuum Bubbles, etc., etc. are of course and maybe will forever be — still in discussion. No specific improvements concerning the safety assessment of the LHC have been conducted by CERN or anybody meanwhile. There is still no proper and really independent risk assessment (the ‘LSAG-report’ has been done by CERN itself) — and the science of risk research is still not really involved in the issue. This is a scientific and political scandal and that’s why the restart is a sad day for science and humanity.
The scientific network “LHC-Critique” speaks for a stop of any public sponsorship of gigantomanic particle colliders.
Just to demonstrate how speculative this research is: Even CERN has to admit, that the so called “Higgs Boson” was discovered — only “probably”. Very probably, mankind will never find any use for the “Higgs Boson”. Here we are not talking about the use of collider technology in medical concerns. It could be a minor, but very improbable advantage for mankind to comprehend the Big Bang one day. But it would surely be fatal – how the Atomic Age has already demonstrated — to know how to handle this or other extreme phenomena in the universe.
Within the next Billions of years, mankind would have enough problems without CERN.
Sources:
- A new paper by our partner “Heavy Ion Alert” will be published soon: http://www.heavyionalert.org/
- Background documents provided by our partner “LHC Safety Review”: http://www.lhcsafetyreview.org/

- Press release by our partner ”Risk Evaluation Forum” emphasizing on renewed particle collider risk: http://www.risk-evaluation-forum.org/newsbg.pdf

- Study concluding that “Mini Black Holes” could be created at planned LHC energies: http://phys.org/news/2015-03-mini-black-holes-lhc-parallel.html

- New paper by Dr. Thomas B. Kerwick on lacking safety argument by CERN: http://vixra.org/abs/1503.0066

- More info at the LHC-Kritik/LHC-Critique website: www.LHC-concern.info
Best regards:
LHC-Kritik/LHC-Critique

Tyler Hayes | Fast Company


“The inherently robotic system begs to be humanized and explained. The first question Taylor had to ask himself was if what Tocchini was attempting was even possible. Could he translate design intention into an algorithm that was always producing new and relevant results—something that satisfied a broad range of needs and desires?” Read more

by — ARS Technica
If you’ve ever lived with roommates, chances are you shared a “transactive” memory system with them. One person might have remembered to pay the bills, while another knew the contact details of the plumber. It’s common to find social systems that share the information needed by a group across all the members of that group. Systems like these make life easier for individuals, who need only keep track of who knows which nugget.

Transactive memory systems are a common feature of human social groups, but they can be technological, too—and in the case of the Internet, the relationship can be a pretty powerful one. There are already indications that we treat the Internet like a transactive memory partner, remembering only where to find information, rather than the content itself. But could we also be blurring the boundary between our own internal knowledge and the easily accessed knowledge available via search engines? A group of researchers at Yale University think that we are. Read more

By — Fast Companyhttp://b.fastcompany.net/multisite_files/fastcompany/imagecache/1280/poster/2015/03/3044336-poster-p-1-app-maps-addresses-of-anti-gun-violence-activists.jpgOn Thursday morning, a handful of anti-gun-violence activists realized there is an app in the Google Play Store with their names on it—literally. The app, Gunfree Geo Marker, features a map pinpointing the home and work addresses of politicians, gun control organization employees, and “random anti-gun trolls” who “push the anti-gun agenda in any way, shape or form.”

Clicking on a person’s name in the menu reveals their address on a Google map, along with the app creator’s reasons for including that person in the app.Read more

MIT Technology Review -

In the world of Internet marketing and clickbait, the secret of virality is analogous to the elixir of life or the alchemy that turns lead into gold. It exists as a kind of Holy Grail that many search for and few, if any, find.

The key question is this: what is the difference between stories that become viral and those that don’t?Read more

Jordan Pearson — Motherboard

It’s 2020, and you’ve signed up for a weight-loss program. You’re alone on a Saturday night because your significant other is out of town, none of your friends are available to catch a flick at the theatre, and a pizza is sounding pretty good. You Google the address for your favorite joint and walk over instead of ordering dro​ne delivery because it’s cheaper, and you’re old fashioned like that. Just before you order at the counter, however, your friend calls you to ask if you want to see a movie after all.

How did this happen? An algorithm analyzing your communications and monitoring your friend netw​orks learned that your partner was away, and your Facebook posts revealed that you wanted to see a movie but nobody was available. Sentiment analysis of your tweets​ suggested that you were feeling alone and a little sad.
Read more

Laura Bliss — CityLab
Image Flickr/mkhmarketing
Judging from some of Facebook’s most viral images in history—textbooks wrapped in paper bags, futuristic beach houses, Barack and Michelle mid-hug—it seems safe to say that, content-wise, a mix of nostalgia and aspiration makes ‘book users click, like, comment, and share. On Flickr, it’s cool nature shots. Instagram loves the Kardashians.

But favorite subjects come and go, while the viral cycle lives on. What if you could predict the kinds of photos most likely to strike a nerve? Given the incredible amount of data available on how online users engage with images, is there a way to measure the objective qualities of an image’s shareability?
Read more

By Glenn Fleishman — MIT Technology Review

http://img2.wikia.nocookie.net/__cb20131116163647/deadliestwarrior/images/3/37/Zombie-hands.jpg

A zombie network of home routers highlights the importance of prioritizing smart appliance security.

Plenty of science-fiction stories feature ordinary household appliances staging a revolt. In an episode of Futurama, toasters and home robots rise up against their human oppressors. Two trends are now starting to make such scenarios seem less far-fetched.

One is the wave of Internet of things devices being developed for homes—on full display at the CES trade show last week. The other is the increased hacking of home networking gear—as demonstrated by a zombie horde of home network routers discovered recently.

Read more