325 Matching Annotations
  1. Last 7 days
  2. Nov 2022
    1. Eamonn Keogh is an assistant professor of Computer Science at the University ofCalifornia, Riverside. His research interests are in Data Mining, Machine Learning andInformation Retrieval. Several of his papers have won best paper awards, includingpapers at SIGKDD and SIGMOD. Dr. Keogh is the recipient of a 5-year NSF CareerAward for “Efficient Discovery of Previously Unknown Patterns and Relationships inMassive Time Series Databases”.

      Look into Eamonn Keogh's papers that won "best paper awards"

    1. “The metaphor is that the machine understands what I’m saying and so I’m going to interpret the machine’s responses in that context.”

      Interesting metaphor for why humans are happy to trust outputs from generative models

    1. The rapid increase in both the quantity and complexity of data that are being generated daily in the field of environmental science and engineering (ESE) demands accompanied advancement in data analytics. Advanced data analysis approaches, such as machine learning (ML), have become indispensable tools for revealing hidden patterns or deducing correlations for which conventional analytical methods face limitations or challenges. However, ML concepts and practices have not been widely utilized by researchers in ESE. This feature explores the potential of ML to revolutionize data analysis and modeling in the ESE field, and covers the essential knowledge needed for such applications. First, we use five examples to illustrate how ML addresses complex ESE problems. We then summarize four major types of applications of ML in ESE: making predictions; extracting feature importance; detecting anomalies; and discovering new materials or chemicals. Next, we introduce the essential knowledge required and current shortcomings in ML applications in ESE, with a focus on three important but often overlooked components when applying ML: correct model development, proper model interpretation, and sound applicability analysis. Finally, we discuss challenges and future opportunities in the application of ML tools in ESE to highlight the potential of ML in this field.

      环境科学与工程(ESE)领域日益增长的数据量和复杂性,伴随着数据分析技术的进步而不断提高。先进的数据分析方法,如机器学习(ML) ,已经成为揭示隐藏模式或推断相关性的不可或缺的工具,而传统的分析方法面临着局限性或挑战。然而,机器学习的概念和实践并没有得到广泛的应用。该特性探索了机器学习在 ESE 领域革新数据分析和建模的潜力,并涵盖了此类应用所需的基本知识。首先,我们使用五个示例来说明 ML 如何处理复杂的 ESE 问题。然后,我们总结了机器学习在 ESE 中的四种主要应用类型: 预测、提取特征重要性、检测异常和发现新材料或化学品。接下来,我们介绍了 ESE 中机器学习应用所需的基本知识和目前存在的缺陷,重点介绍了应用机器学习时三个重要但经常被忽视的组成部分: 正确的模型开发、适当的模型解释和良好的适用性分析。最后,我们讨论了机器学习工具在 ESE 中的应用所面临的挑战和未来的机遇,以突出机器学习在这一领域的潜力。

    1. "On the Opportunities and Risks of Foundation Models" This is a large report by the Center for Research on Foundation Models at Stanford. They are creating and promoting the use of these models and trying to coin this name for them. They are also simply called large pre-trained models. So take it with a grain of salt, but also it has a lot of information about what they are, why they work so well in some domains and how they are changing the nature of ML research and application.

    1. Technology like this, which lets you “talk” to people who’ve died, has been a mainstay of science fiction for decades. It’s an idea that’s been peddled by charlatans and spiritualists for centuries. But now it’s becoming a reality—and an increasingly accessible one, thanks to advances in AI and voice technology. 
  3. Oct 2022
    1. There's no market for a machine-learning autopilot, or content moderation algorithm, or loan officer, if all it does is cough up a recommendation for a human to evaluate. Either that system will work so poorly that it gets thrown away, or it works so well that the inattentive human just button-mashes "OK" every time a dialog box appears.

      ML algorithms must work or not work

    1. You are all computer scientists. You know what FINITE AUTOMATA can do. You know what TURING MACHINES can do. For example, Finite Automata can add but not multiply. Turing Machines can compute any computable function. Turing machines are incredibly more powerful than Finite Automata. Yet the only difference between a FA and a TM is that the TM, unlike the FA, has paper and pencil. Think about it. It tells you something about the power of writing. Without writing, you are reduced to a finite automaton. With writing you have the extraordinary power of a Turing machine.
  4. Sep 2022
    1. The rules recorded in natural language are readable not only by humans but also by the computer and therefore no longer need to be programmed by a software developer. This task is now taken over by openVALIDATION.
    1. Self excited dc generators can further be divided into three types -     (a) Series wound - field winding in series with armature winding     (b) Shunt wound - field winding in parallel with armature winding     (c) Compound wound - combination of series and shunt winding

      Types of AC generator

    1. Taking carbon steel as an example, as shown in Picture 1, using a 1000w fiber laser cutting machine, for carbon steel materials thickness below 10mm, when the thickness of carbon steel is less than 2mm, the cutting speed per minute can be up to 8 meters. When the thickness is 6mm, the cutting speed is about 1.6 meters per minute, and when the thickness of the carbon steel is 10 mm, the cutting speed is about 0.6 to 0.7 meters per minute.

      Taking carbon steel as an example, as shown in Picture 1, using a 1000w fiber laser cutting machine, for carbon steel materials thickness below 10mm, when the thickness of carbon steel is less than 2mm, the cutting speed per minute can be up to 8 meters. When the thickness is 6mm, the cutting speed is about 1.6 meters per minute, and when the thickness of the carbon steel is 10 mm, the cutting speed is about 0.6 to 0.7 meters per minute.

      • Taking carbon steel as an example, as shown in Picture 1, using a 1000w fiber laser cutting machine, for carbon steel materials thickness below 10mm, when the thickness of carbon steel is less than 2mm, the cutting speed per minute can be up to 8 meters. When the thickness is 6mm, the cutting speed is about 1.6 meters per minute, and when the thickness of the carbon steel is 10 mm, the cutting speed is about 0.6 to 0.7 meters per minute.

      It can be seen that when the thickness of carbon steel material is less than 2mm, customers who attach great importance to cutting speed can consider using 2000W fiber laser cutting machine, but the 2000W machine is much higher than 1000W in equipment price and operating cost. When the carbon steel material is larger than 2mm, the 2000W machine is not much faster than the 1000W cutting speed. Therefore, the 1000W fiber laser cutting machine is more cost-effective than the 2000W fiber laser cutting machine.

      The cutting speed can directly reflect the efficiency of the fiber laser cutting machine. For cutting different materials with different thickness, the cutting speed will also change greatly. The thicker the thickness, the slower the speed!

  5. Aug 2022
    1. And just a fewyears later, it was jubilantly discovered that machine translation and automaticabstracting were also just around the corner.




    1. In 1896, Dewey formed a partnership with Herman Hollerith and the Tabulating Machine Company (TMC) to provide the punch cards used for the electro-mechanical counting system of the US government census operations. Dewey’s relationship with Hollerith is significant as TMC would be renamed International Business Machines (IBM) in 1924 and become an important force in the information age and creator of the first relational database.
  6. Jul 2022
    1. because it only needs to engage a portion of the model to complete a task, as opposed to other architectures that have to activate an entire AI model to run every request.

      i don't really understand this: in z-code thre are tasks that other competitive softwares would need to restart all over again while z-code can do it without restarting...

  7. Jun 2022
    1. A huge amount of Bridgewater's efforts goes into gathering data on credit and equity, and understanding how that affects demand from individual market participants, such as a bank, or from a group of participants (such as subprime-mortgage borrowers). Bridgewater predicted the euro-zone debt crisis by totting up how much debt would need to be refinanced and when; and by examining all the potential buyers of that debt and their ability to buy it. Mr Volcker describes the degree of detail in Mr Dalio's work as “mind-blowing” and admits to feeling sometimes that “he has a bigger staff, and produces more relevant statistics and analyses, than the Federal Reserve.”
    2. “The economy is like a machine.” This machine may look complex but is, he insists, relatively simple even if it is “not well understood”. Mr Dalio models the macroeconomy from the bottom up, by focusing on the individual transactions that are the machine's moving parts. Conventional economics does not pay enough attention to the individual components of supply and, above all, demand, he says. To understand demand properly, you must know whether it is funded by the buyers' own money or by credit from others.
    3. In the early 1980s Mr Dalio started writing down rules that would guide his investing. He would later amend these rules depending on how well they predicted what actually happened. The process is now computerised, so that combinations of scores of decision-rules are applied to the 100 or so liquid-asset classes in which Bridgewater invests. These rules led him to hold both government bonds and gold last year, for example, because the deleveraging process was at a point where, unusually, those two assets would rise at the same time. He was right.
    4. He has even simulated being an investor in markets in those periods by reading daily papers from these eras, receiving data and “trading” as if in real time.


    1. Even if the original webpage disappears, you can often use this informationto locate an archived version using the Wayback Machine, a project of theInternet Archive that preserves a record of websites: https://archive.org/web/.

      It would be useful to suggest here:

      Ideally one's note taking applications would automatically archive web pages to the Internet Archive as you take notes from them. This means that if they should disappear in the future, you'd have recourse to a useful and workable back up.

    1. determine the caliphate; and another group led by Mu'awiya in the Levant, who demanded revenge for Uthman's blood. He defeated the first group in the Battle of the Camel; but in the end,

      this is another post

    1. Discussion of the paper:

      Ghojogh B, Ghodsi A, Karray F, Crowley M. Theoretical Connection between Locally Linear Embedding, Factor Analysis, and Probabilistic PCA. Proceedings of the Canadian Conference on Artificial Intelligence [Internet]. 2022 May 27; Available from: https://caiac.pubpub.org/pub/7eqtuyyc

  8. May 2022
    1. You can now tag citations in @CiteULike with #CITO! Add the tag "cito--(relationship)--permalink". Example:"cito--usesmethodin--423382".
    1. Machine Tags

      A new kind of tags — machine tags — are supported now. A machine tag, e.g. meta:language=python consists of a namespace (meta), a key (language) and a value (python). Everyone can created machine tags, but the meta: namespace is protected and tags in there will be created by the site itself.

      The codesite itself uses machine tags to make various properties of recipes accessible to the search:

      • meta:language

        The programming language of the recipe, e.g. python, perl or tcl.

      • meta:min_$lang_$majorver

        Those tags describe the minimum language version. If a recipe requires Python 2.5 it would have the tag meta:min_python_2=5.

      • meta:license

        The license that was selected by the author, e.g. psf, mit or gpl.

      • meta:loc

        This tag contains a number describing the lines of code in a recipes. It counts only the number of lines in the code block but not any lines in the discussion of in comments. This makes it possible to search for short recipes with less than ten lines or very large ones.

      • meta:score

        The current score of the recipe. This is the same number that is displayed besides the recipe title and can only be influenced by voting on recipes. That way you could even search for down-voted recipes

      • meta:requires

        Stores information about additional requirements of the recipes, e.g. required python modules. You can find recipes using python's collections module that way.

      All those tags cannot be changed directly because they are generated from a recipe's properties.

    1. We also support machine tags that follow the pattern NAMESPACE:KEY=VALUE. For example: geo:lat=43.555 camel:size=medium machine:tag=with space Machine tags are not revealed to the user on the track pages.

  9. Apr 2022
    1. ReconfigBehSci. (2021, July 19). this is how the failure to understand what efficacy means and how it relates to outcomes will be seized on over and over again. Cookie cutter fallacies require cookie cutter clarification by machine tools to be combatted effectively (at least at current levels of moderation) [Tweet]. @SciBeh. https://twitter.com/SciBeh/status/1417164191664730112

  10. Mar 2022
    1. "Who controls the past controls the future. Who controls the present controls the past," as Rage Against the Machine sang in their 1999 song "Testify." OK, actually it's a quote from George Orwell's 1984, but hey.
    1. he basic function of an anaesthesia machine is to prepare a gas mixture of precisely known, but variable composition. The gas mixture can then be delivered to a breathing system.
    2. Safe use of anaesthesia machine depends upon an interaction between the basic design of the machine with its safety features and the knowledge and skills of the anaesthesiologist.
    1. So my idea was to create a machine-tag format based on Wikipedia topics, allowing any content creator to tag content with any topic in Wikipedia. By using Wikipedia as an index, this format provides very specific identification of content across a vast knowledge domain. Call it the Dewey Decimal System for the web: “The Wiki Decimal System.” In general, the problem with machine tags is how to make them easy to add for regular folks. Although the format itself is simple, the tags are typically lengthy and require you to know the data ID for what you want to tag. Enter my hack: A web page that takes your text and builds the list of Wikipedia machine tags automatically.
  11. Feb 2022
  12. Jan 2022
      • astro:name=NGC 4565
      • astro:orientation=11.73
      • astro:RA=189.083922302

      The metadata is structured. So structured that we can represent the example machine tags in a table:

      <table> <thead><tr> <th style="text-align:center">namespace</th> <th style="text-align:center">predicate</th> <th style="text-align:center">value</th> </tr> </thead> <tbody> <tr> <td style="text-align:center">astro</td> <td style="text-align:center">name</td> <td style="text-align:center">NGC 4565</td> </tr> <tr> <td style="text-align:center">astro</td> <td style="text-align:center">orientation</td> <td style="text-align:center">11.73</td> </tr> <tr> <td style="text-align:center">astro</td> <td style="text-align:center">RA</td> <td style="text-align:center">189.083922302</td> </tr> </tbody> </table>

      Or in a tree:

        |-- name
        |   `-- NGC 4565
        |-- orientation
        |   `-- 11.73
        `-- RA
            `-- 189.083922302
    1. Formats for Disk Images Another piece of the packaging puzzle is disk image formats. There are many. Each has its own benefits and detriments, but I’m not going to get into those here. Again, this is nowhere near a comprehensive list — just something to help with getting your bearings. I’d like to comment on a couple of the formats that I’ve recently encountered. VDI – VirtualBox’s internal default disk image format is VDI. Nevertheless, this is not what is used by Vagrant boxes. VMDK – One of the most common formats. VMWare’s products use various versions and variations of VMDK disk images. Several versions and variations exist, so it’s very important to understand which one you’re working with and where it can be used.
    2. Open Virtual Appliance (OVA) An OVA is an OVF file packaged together with all of its supporting files (disk images, etc.). You can read about the requirements for a valid OVA package in the OVF specification. Oftentimes people will say “an OVF” and really mean “an OVA.”
    3. File Formats for Virtual Machines Open Virtualization Format (OVF) The OVF Specification provides a means of describing the properties of a virtual system. It is XML based and has generous allowances for extensibility (with corresponding tradeoffs in actual portability). Most commonly, an OVF file is used to describe a single virtual machine or virtual appliance. It can contain information about the format of a virtual disk image file as well as a description of the virtual hardware that should be emulated to run the OS or application contained on such a disk image.
    1. Virtual machines (VMs) revolutionized the data center. With the ability to easily spin up a machine and even roll back to a working state, VMs bring a level of ease IT would never have enjoyed. Rolling back your VM is handled by way of snapshots.

      File Formats for Virtual Machines Open Virtualization Format (OVF)

      The OVF Specification provides a means of describing the properties of a virtual system. It is XML based and has generous allowances for extensibility (with corresponding tradeoffs in actual portability). Most commonly, an OVF file is used to describe a single virtual machine or virtual appliance. It can contain information about the format of a virtual disk image file as well as a description of the virtual hardware that should be emulated to run the OS or application contained on such a disk image.

      Oracle VM VirtualBox can import and export virtual machines in the following formats:

      Open Virtualization Format (OVF). This is the industry-standard format. See Section 1.14.1, “About the OVF Format”.
      Cloud service formats. Export to and import from cloud services such as Oracle Cloud Infrastructure is supported. See Section 1.15, “Integrating with Oracle Cloud Infrastructure”. 

      1.14.1. About the OVF Format

      OVF is a cross-platform standard supported by many virtualization products which enables the creation of ready-made virtual machines that can then be imported into a hypervisor such as Oracle VM VirtualBox. Oracle VM VirtualBox makes OVF import and export easy to do, using the VirtualBox Manager window or the command-line interface.


      Using OVF enables packaging of virtual appliances. These are disk images, together with configuration settings that can be distributed easily. This way one can offer complete ready-to-use software packages, including OSes with applications, that need no configuration or installation except for importing into Oracle VM VirtualBox.

    1. Here, the card index func-tions as a ‘thinking machine’,67 and becomes the best communication partner for learned men.68

      From a computer science perspective, isn't the index card functioning like an external memory, albeit one with somewhat pre-arranged linked paths? It's the movement through the machine's various paths that is doing the "thinking". Or the user's (active) choices that create the paths creates the impression of thinking.

      Perhaps it's the pre-arranged links where the thinking has already happened (based on "work" put into the system) and then traversing the paths gives the appearance of "new" thinking?

      How does this relate to other systems which can be thought of as thinking from a complexity perspective? Bacteria perhaps? Groups of cells acting in concert? Groups of people acting in concert? Cells seeing out food using random walks? etc?

      From this perspective, how can we break out the constituent parts of thought and thinking? Consciousness? With enough nodes and edges and choices of paths between them (or a "correct" subset of paths) could anything look like thinking or computing?

    1. We are definitely living in interesting times!

      The problem with Machine learning in my eyes seems to be the non-transparency in the field. After all what makes the data we are researching valuable. If he collect so much data why is only .5% being studied? There seems to be a lot missing and big opportunities here that aren't being used properly.

  13. Dec 2021
    1. as of February 2021, Europeana comprises 59%images and 38% text objects, but only 1% sound objects and 2% video objects.3 DPLA iscomposed of 25% images and 54% text, with only 0.3% sound objects, and 0.6% videoobjects.4Another reason, beyond cost, that audiovisual recordings are not widely accessible is the lack ofsufficiently granular metadata to support identification, discovery, and use, or to supportinformed rights determination and access control and permissions decisions on the part ofcollections staff and users.

      Despite concerted efforts, there is a minimal amount of A/V material in Europeana and DPLA. This report details a pilot project to use a variety of machine-generated-metadata mechanisms to augment the human description efforts. Although this paragraph mentions rights determination, it isn't clear from the problem statement whether the machine-generated description includes anything that will help with rights. I would expect that unclear rights—especially for moving image content—would be a significant barrier to the open publication of A/V material.

    1. This comparison is not to claim that the index catalog is already a Turing machine. Comparisons, transfers, and analogies are not that simple. If the elements of a universal discrete machine are present, they still lack the computational logic of an operating system, the development of which constitutes Turing ’ s foundational achievement. What is described here is merely the fact that the card catalog is liter-ally a paper machine, similar to a nontrivial Turing machine only in having similar components — no more, no less.

      I felt some of this missing piece and so included the idea of human interaction as part of the process to make up the balance.

    2. s Alan Turing proved only years later, these machines merely need (1) a (theoretically infi nite) partitioned paper tape, (2) a writing and reading head, and (3) an exact

      procedure for the writing and reading head to move over the paper segments. This book seeks to map the three basic logical components of every computer onto the card catalog as a “ paper machine,” analyzing its data processing and interfaces that may justify the claim, “Card catalogs can do anything!”

      Purpose of the book.

      A card catalog of index cards used by a human meets all the basic criteria of a Turing machine, or abstract computer, as defined by Alan Turing.

  14. Nov 2021
    1. Its main feature isthat it is in a more readable textual format, as compared to the binary format ofmachine code.

      assembly code 和 machine code 相比最大的区别是什么?

    1. In America, of course, we don’t have that kind of state coercion. There are currently no laws that shape what academics or journalists can say; there is no government censor, no ruling-party censor. But fear of the internet mob, the office mob, or the peer-group mob is producing some similar outcomes. How many American manuscripts now remain in desk drawers—or unwritten altogether—because their authors fear a similarly arbitrary judgment? How much intellectual life is now stifled because of fear of what a poorly worded comment would look like if taken out of context and spread on Twitter?

      Fear of cancel culture and social repercussions prevents people from speaking and communicating as they might otherwise.

      Compare this with the right to reach, particularly for those without editors, filtering, or having built a platform and understanding how to use it responsibly.

  15. Oct 2021
    1. ”My expectation is that we will hear many, many nice speeches, we will hear many pledges that - if you really look into the details - are more or less meaningless but they just say them in order to have something to say, in order for media to have something to report about," she said."And then I expect things to continue to remain the same. ... The COPs as they are now will not lead to anything unless there is big, massive pressure from the outside."

      Greta Thunberg on COP26

      In which Greta calls bullshit on the capitalist entropy machine’s attempts to spin the culture of learned helplessness, trained incapacities, and bureaucratic intransigence that is designed to maintain the status quo while pretending to be the world’s saviours through philanthropy, social entrepreneurship, and greenwashing.

      via Twitter

    1. Design for the Real World

      by Victor Papanek

      Papanek on the Bauhaus

      Many of the “sane design” or “design reform” movements of the time, such as those engendered by the writings and teachings of William Morris in England and Elbert Hubbard in the United States, were rooted in a sort of Luddite antimachine philosophy. By contrast Frank Llloyd Wright said as early as 1894 that “the machine is here to stay” and that the designer should “use this normal tool of civilization to best advantage instead of prostituting it as he has hitherto done in reproducing with murderous ubiquity forms born of other times and other conditions which it can only serve to destroy.” Yet designers of the last century were either perpetrators of voluptuous Victorian-Baroque or members of an artsy-craftsy clique who were dismayed by machine technology. The work of the Kunstgewerbeschule in Austria and the German Werkbund anticipated things to come, but it was not until Walter Gropius founded the German Bauhaus in 1919 that an uneasy marriage between art and machine was achieved.

      No design school in history had greater influence in shaping taste and design than the Bauhaus. It was the first school to consider design a vital part of the production process rather than “applied art” or “industrial arts.” It became the first international forum on design because it drew its faculty and students from all over the world, and its influence traveled as these people later founded design offices and schools in many countries. Almost every major design school in the United States today still uses the basic foundation course developed by the Bauhaus. It made good sense in 1919 to let a German 19-year-old experiment with drill press and circular saw, welding torch and lathe, so that he might “experience the interaction between tool and material.” Today the same method is an anachronism, for an American teenager has spent much of his life in a machine-dominated society (and cumulatively probably a great deal of time lying under various automobiles, souping them up). For a student whose American design school slavishly imitates teaching patterns developed by the Bauhaus, computer sciences and electronics and plastics technology and cybernetics and bionics simply do not exist. The courses the Bauhaus developed were excellent for their time and place (telesis), but American schools following this pattern in the eighties are perpetuating design infantilism.

      The Bauhaus was in a sense a nonadaptive mutation in design, for the genes contributing to its convergence characteristics were badly chosen. In boldface type, it announced its manifesto: “Architects, sculptors, painters, we must all turn to the crafts.… Let us create a new guild of craftsmen!” The heavy emphasis on interaction between crafts, art, and design turned out to be a blind alley. The inherent nihilism of the pictorial arts of the post-World War I period had little to contribute that would be useful to the average, or even to the discriminating, consumer. The paintings of Kandinsky, Klee, Feininger, et al., on the other hand, had no connection whatsoever with the anemic elegance some designers imposed on products.

      (Pages 30-31)

  16. Sep 2021
    1. a class of attacks that were enabled by Privacy Badger’s learning. Essentially, since Privacy Badger adapts its behavior based on the way that sites you visit behave, a dedicated attacker could manipulate the way Privacy Badger acts: what it blocks and what it allows. In theory, this can be used to identify users (a form of fingerprinting) or to extract some kinds of information from the pages they visit
  17. Aug 2021
    1. Fukuyama's answer is no. Middleware providers will not see privately shared content from a user's friends. This is a good answer if our priority is privacy. It lets my cousin decide which companies to trust with her sensitive personal information. But it hobbles middleware as a tool for responding to her claims about vaccines. And it makes middleware providers far less competitive, since they will not be able to see much of the content we want them to curate.

      Is it alright to let this sort of thing go on the smaller scale personal shared level? I would suggest that the issue is not this small scale conversation which can happen linearly, but we need to focus on the larger scale amplification of misinformation by sources. Get rid of the algorithmic amplification of the fringe bits which is polarizing and toxic. Only allow the amplification of the more broadly accepted, fact-based, edited, and curated information.

    2. Facebook deploys tens of thousands of people to moderate user content in dozens of languages. It relies on proprietary machine-learning and other automated tools, developed at enormous cost. We cannot expect [End Page 169] comparable investment from a diverse ecosystem of middleware providers. And while most providers presumably will not handle as much content as Facebook does, they will still need to respond swiftly to novel and unpredictable material from unexpected sources. Unless middleware services can do this, the value they provide will be limited, as will users' incentives to choose them over curation by the platforms themselves.

      Does heavy curation even need to exist? If a social company were able to push a linear feed of content to people without the algorithmic forced engagement, then the smaller, fringe material wouldn't have the reach. The majority of the problem would be immediately solved with this single feature.

  18. Jul 2021
    1. Suppose Google were to change what’s on that page, or reorganize its website anytime between when I’m writing this article and when you’re reading it, eliminating it entirely. Changing what’s there would be an example of content drift; eliminating it entirely is known as link rot.

      We don't talk about content drift very much. I like that some sites, particularly wiki sites, actually document their content drift in diffs and surface that information directly to the user. Why don't we do this for more websites? The Wayback machine also has this sort of feature.

  19. Jun 2021
    1. The problem is, algorithms were never designed to handle such tough choices. They are built to pursue a single mathematical goal, such as maximizing the number of soldiers’ lives saved or minimizing the number of civilian deaths. When you start dealing with multiple, often competing, objectives or try to account for intangibles like “freedom” and “well-being,” a satisfactory mathematical solution doesn’t always exist.

      We do better with algorithms where the utility function can be expressed mathematically. When we try to design for utility/goals that include human values, it's much more difficult.

    2. many other systems that are already here or not far off will have to make all sorts of real ethical trade-offs

      And the problem is that, even human beings are not very sensitive to how this can be done well. Because there is such diversity in human cultures, preferences, and norms, deciding whose values to prioritise is problematic.

  20. May 2021
  21. Apr 2021
    1. Machine learning app development has been gaining traction among companies from all over the world. When dealing with this part of machine learning application development, you need to remember that machine learning can recognize only the patterns it has seen before. Therefore, the data is crucial for your objectives. If you’ve ever wondered how to build a machine learning app, this article will answer your question.

    1. The insertion of an algorithm’s predictions into the patient-physician relationship also introduces a third party, turning the relationship into one between the patient and the health care system. It also means significant changes in terms of a patient’s expectation of confidentiality. “Once machine-learning-based decision support is integrated into clinical care, withholding information from electronic records will become increasingly difficult, since patients whose data aren’t recorded can’t benefit from machine-learning analyses,” the authors wrote.

      There is some work being done on federated learning, where the algorithm works on decentralised data that stays in place with the patient and the ML model is brought to the patient so that their data remains private.

  22. Mar 2021
  23. Feb 2021
    1. TRAILBLAZER-WORKFLOW is another dream ‘o mine come true. It allows creating long-term processes (or state machines) based on BPMN diagrams that can be modeled using our editor.
    1. propose to create a new academic discipline called “machine behavior.” It approaches studying AI systems in the same way we’ve always studied animals and humans: through empirical observation and experimentation

      We do this all the time; observe people's behaviour and then make inferences about their intentions.

    1. rethink the intricate, and increasingly inti-mate, configurations of the human and the machine.
    2. take as my focus the study ofhow the effect of machines-as-agents is generated and the latter’s impli-cations for theorizing the human.
  24. Jan 2021