« on: July 24, 2015, 11:54 AM »
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Logical Fallacies, the illustrated guide. Nice.^luv it! (:If you like logic, argumentation, and fallacies, you'll enjoy this:
Oh, and if you like football, that's a bonus too.-Renegade (July 15, 2015, 11:20 PM)-Deozaan (July 16, 2015, 12:03 AM)
^Any time-travelers here want to comment on this article?-Arizona Hot (July 08, 2015, 05:39 PM)
I already did, next Thursday.-AzureToad (July 13, 2015, 09:42 AM)
Have you seen my reply to that?-Arizona Hot (July 13, 2015, 11:25 AM)
Oh yeah, hey, that's one of the best ways to create realistic characters with good back stories; name them all after your closest friends, relatives, and neighbors, work up a good narrative, and then forget to change out the names for fictional ones just before publishing. jkkyrathaba, can you tell us more about Spunky exe? Did you write it yourself, or find it? Is there a web page for it or a video? More information on what it does, etc.?
It's an AHK script I wrote that incorporates some of the AutoCorrect.ahk script and has some additions of my own. Basically, it uses hotstrings and replaces some errors "on the fly" -- mainly misspellings.
The pseudonym choice for the other three books was due to concerns that family members would identify some themes/characters as being reflections of themselves, if they knew I was the author
Branding is important, but after two years of dipping my toes in this writing industry, I think the majority of Kindle authors are posers, exaggerating their reported sales, etc.-kyrathaba (July 07, 2015, 06:10 AM)
Actually, little kids already have a time-honored AI response to everything they wish to mock (or truly lack adult understanding of).
This is more important of a discovery/result than you might think. It's a huge new step in "artificial intelligence" because unlike the typical need in early-generation scientific studies to keep muddying factors out of study parameters, there's nothing stopping a mix of iterative machine-learn/hand-code/machine-learn/hand-code.
You can build an "AI" out of modules. You might catch it twice-per-module-shift but then you would with real people too. Then once it knows "what it is talking about", that local expertise module comes into use.
And the "meaning of life" module is important because that's one of the famous categories in "Loebner 1.0" style contests to bust up the machine. But if it can almost sound like a burnt out college student, then when the questioner gets bored of his/her/(its?) "little joke", the convo goes back to the "meaty topic" and the comp just keeps right on going shifting modules again.
To me this is one of the raw fundamental fears we expressed in early scifi about machines/robots, because you just keep loading these convo engines aka "brains" at high speed en masse, and suddenly humans feel threatened because it takes us exhaustively long to gain our own experience and the comp just gets pushed a new module in minutes.
Notice how anti-AI folks keep using versions of "No True Scotsman" to hold back recognition that AI is coming. Once you have a comp mind engine that can do seventy things moderately well, what is left for a person of personhood?-TaoPhoenix (July 03, 2015, 02:51 PM)
^Agreed and curious; one would think it extremely valuable to establish a name and go with it.Three more books, each under a different pseudonym.how fascinating!!! can you tell us more about the books and why use a different pseudonym for each? I would have thought it would be beneficial to establish a name..-mouser (July 07, 2015, 01:38 AM)
It makes more sense in RTL langauges than in LTR languages.I think it also makes great counter-culture. (:-Renegade (July 03, 2015, 02:01 AM)
Reading your messages I get perplexed. You talk about things that already exist for many years.Hi Giampy, your next post will be your 400th, in case you might want to go to the;-Giampy (June 29, 2015, 03:12 AM)
I remember LaBrea. The original author almost abandoned the project, citing potential legal action against him because the nature of LaBrea goes against certain provisions of the Federal Wiretap Act, namely:Yes, I made a note of highlighting the LaBrea article's prehistoric date, partly in hopes that an updated version might address such legal or technical concerns.Any person who intentionally intercepts, endeavors to intercept, or procures any other person to intercept or endeavor to intercept, any wire, oral, or electronic communication…intentionally discloses, or endeavors to disclose, to any other person the contents of any wire, oral, or electronic communication, knowing or having reason to know that the information was obtained through the interception of a wire, oral, or electronic communication in violation of this subsection; intentionally uses, or endeavors to use, the contents of any wire, oral, or electronic communication, knowing or having reason to know that the information was obtained through the interception of a wire, oral, or electronic communication in violation of this subsection…
Basically, LaBrea does exactly that; intercepts electronic communication. How that actually would play out in the courts is another matter, as TechRepublic's John McCormick pointed out back in 2003:You probably think that this is a really stupid idea—the concept that you could be violating the law merely by monitoring what a trespasser does on a system you own. But that’s just your common sense speaking, and any lawyer will tell you that the law has little or nothing to do with common sense.
I think the honeypot concept mouser is talking about involves more of a "mousetrap" aspect; an application places a special file or fake network connection that looks (to a ransomware program) like something it would want to access and modify, but is in fact actively monitored by said 'honeypot' application such that when the file or network is accessed, the process doing the access is immediately targeted and shut down. Sounds like a good idea to me; how to implement? Beyond me.-Edvard (June 28, 2015, 03:30 PM)
Does anyone know of any mainstream security software that uses a "honeypot" approach of watching for certain files being modified? i.e. which tries to catch these kinds of ransomware evils by catching and killing them as soon as they try to modify a document that the security software knows should never be changed/deleted.I don't even understand the procedural explanation on this, let alone the technical end, but it does mention your keyword honeypot:-mouser (June 27, 2015, 01:22 PM)