Richard Feynman, Winner of the 1965 Nobel Prize in Physics, gives us an insightful lecture about computer heuristics: Feynman discusses how computers work, how they file information, how they handle data, how they use their information in allocated processing in...
Category: Computer Science
Transhumanist design is in the spotlight at CHI2015 in Seoul Korea.
Quantum secure authentication has the potential to improve the security of computers, and could help create secure processors for artificial intelligence.
Communication studies, it will be argued, must come to terms with this development and reorient its theoretical framework so as to be able to accommodate and respond to situations where the other in communicative exchange is no longer exclusively human.
Newspapers are testimonials of history. The same is increasingly true of social media such as online forums, online communities, and blogs. By looking at the sequence of articles over time, one can discover the birth and the development of trends that marked society and history – a field known as “Culturomics”. But Culturomics has so far been limited to statistics on keywords.
Large information processing objects have some serious limitations due to signal delays and heat production.
Dr. Seth lloyd examined the computational capacity of the ultimate physically possible laptop computer. There’s only one problem, this ultimate laptop is going to have to contain a small black hole.
Wes Faler at the 28th Chaos Communication Congress (28C3) by the Chaos Computer Club [CCC] demonstrates the use of Cartesian Genetic Programming” (CGP), a powerful tool for creating software and designing physical objects, to invent image filters
So just how smart is an amoeba anyway?
This is a double movie review, Computer Chess vs. Game Over — Kasparov And The Machine.