Browse Results

Showing 56,601 through 56,625 of 61,741 results

The Second Life Herald: The Virtual Tabloid That Witnessed the Dawn of the Metaverse

by Peter Ludlow Mark Wallace

Ludlow and Wallace take us behind the scenes of the Herald as they report on the emergence of a fascinating universe of virtual spaces that will become the next generation of the World Wide Web: a 3-D environment that provides richer, more expressive interactions than the Web we know today.

The Second Machine Age: Work, Progress, and Prosperity in a Time of Brilliant Technologies

by Erik Brynjolfsson Andrew Mcafee

A revolution is under way.<P> In recent years, Google’s autonomous cars have logged thousands of miles on American highways and IBM’s Watson trounced the best human Jeopardy! players. Digital technologies—with hardware, software, and networks at their core—will in the near future diagnose diseases more accurately than doctors can, apply enormous data sets to transform retailing, and accomplish many tasks once considered uniquely human.<P> In The Second Machine Age MIT’s Erik Brynjolfsson and Andrew McAfee—two thinkers at the forefront of their field—reveal the forces driving the reinvention of our lives and our economy. As the full impact of digital technologies is felt, we will realize immense bounty in the form of dazzling personal technology, advanced infrastructure, and near-boundless access to the cultural items that enrich our lives.<P> Amid this bounty will also be wrenching change. Professions of all kinds—from lawyers to truck drivers—will be forever upended. Companies will be forced to transform or die. Recent economic indicators reflect this shift: fewer people are working, and wages are falling even as productivity and profits soar.<P> Drawing on years of research and up-to-the-minute trends, Brynjolfsson and McAfee identify the best strategies for survival and offer a new path to prosperity. These include revamping education so that it prepares people for the next economy instead of the last one, designing new collaborations that pair brute processing power with human ingenuity, and embracing policies that make sense in a radically transformed landscape.<P> A fundamentally optimistic book, The Second Machine Age will alter how we think about issues of technological, societal, and economic progress.

The Second Quantum Revolution: From Entanglement to Quantum Computing and Other Super-Technologies

by Lars Jaeger

This book tells the story of the second quantum revolution which will shape the 21st century as much as the first quantum revolution shaped the 20th century. It provides unique orientation in today's discussion and the latest progress on the interpretation of quantum physics and its further technological potential. As you read this book the first prototypes of this revolution are being built in laboratories worldwide. Super-technologies such as nanotechnology, quantum computers, quantum information processing, and others will soon shape our daily lives, even if physicists themselves continue to disagree on how to interpret the central theory of modern physics. The book will thus also touch on the profound philosophical questions at the heart of quantum mechanics.

The Second Self, Twentieth Anniversary Edition: Computers and the Human Spirit (The\mit Press Ser.)

by Sherry Turkle

A new edition of the classic primer in the psychology of computation, with a new introduction, a new epilogue, and extensive notes added to the original text.In The Second Self, Sherry Turkle looks at the computer not as a "tool," but as part of our social and psychological lives; she looks beyond how we use computer games and spreadsheets to explore how the computer affects our awareness of ourselves, of one another, and of our relationship with the world. "Technology," she writes, "catalyzes changes not only in what we do but in how we think." First published in 1984, The Second Self is still essential reading as a primer in the psychology of computation. This twentieth anniversary edition allows us to reconsider two decades of computer culture—to (re)experience what was and is most novel in our new media culture and to view our own contemporary relationship with technology with fresh eyes. Turkle frames this classic work with a new introduction, a new epilogue, and extensive notes added to the original text.Turkle talks to children, college students, engineers, AI scientists, hackers, and personal computer owners—people confronting machines that seem to think and at the same time suggest a new way for us to think—about human thought, emotion, memory, and understanding. Her interviews reveal that we experience computers as being on the border between inanimate and animate, as both an extension of the self and part of the external world. Their special place betwixt and between traditional categories is part of what makes them compelling and evocative. (In the introduction to this edition, Turkle quotes a PDA user as saying, "When my Palm crashed, it was like a death. I thought I had lost my mind.") Why we think of the workings of a machine in psychological terms—how this happens, and what it means for all of us—is the ever more timely subject of The Second Self.

The Secret Guide to Computers

by Russ Walter

The Secret Life of Data: Navigating Hype and Uncertainty in the Age of Algorithmic Surveillance (The Information Society Series)

by Aram Sinnreich Jesse Gilbert

How data surveillance, digital forensics, and generative AI pose new long-term threats and opportunities—and how we can use them to make better decisions in the face of technological uncertainty.In The Secret Life of Data, Aram Sinnreich and Jesse Gilbert explore the many unpredictable, and often surprising, ways in which data surveillance, AI, and the constant presence of algorithms impact our culture and society in the age of global networks. The authors build on this basic premise: no matter what form data takes, and what purpose we think it&’s being used for, data will always have a secret life. How this data will be used, by other people in other times and places, has profound implications for every aspect of our lives—from our intimate relationships to our professional lives to our political systems.With the secret uses of data in mind, Sinnreich and Gilbert interview dozens of experts to explore a broad range of scenarios and contexts—from the playful to the profound to the problematic. Unlike most books about data and society that focus on the short-term effects of our immense data usage, The Secret Life of Data focuses primarily on the long-term consequences of humanity&’s recent rush toward digitizing, storing, and analyzing every piece of data about ourselves and the world we live in. The authors advocate for &“slow fixes&” regarding our relationship to data, such as creating new laws and regulations, ethics and aesthetics, and models of production for our data-fied society.Cutting through the hype and hopelessness that so often inform discussions of data and society, The Secret Life of Data clearly and straightforwardly demonstrates how readers can play an active part in shaping how digital technology influences their lives and the world at large.

The Secret Life of Programs: Understand Computers -- Craft Better Code

by Jonathan E. Steinhart

A primer on the underlying technologies that allow computer programs to work. Covers topics like computer hardware, combinatorial logic, sequential logic, computer architecture, computer anatomy, and Input/Output.Many coders are unfamiliar with the underlying technologies that make their programs run. But why should you care when your code appears to work? Because you want it to run well and not be riddled with hard-to-find bugs. You don't want to be in the news because your code had a security problem.Lots of technical detail is available online but it's not organized or collected into a convenient place. In The Secret Life of Programs, veteran engineer Jonathan E. Steinhart explores--in depth--the foundational concepts that underlie the machine. Subjects like computer hardware, how software behaves on hardware, as well as how people have solved problems using technology over time.You'll learn:How the real world is converted into a form that computers understand, like bits, logic, numbers, text, and colorsThe fundamental building blocks that make up a computer including logic gates, adders, decoders, registers, and memoryWhy designing programs to match computer hardware, especially memory, improves performanceHow programs are converted into machine language that computers understandHow software building blocks are combined to create programs like web browsersClever tricks for making programs more efficient, like loop invariance, strength reduction, and recursive subdivisionThe fundamentals of computer security and machine intelligenceProject design, documentation, scheduling, portability, maintenance, and other practical programming realities.Learn what really happens when your code runs on the machine and you'll learn to craft better, more efficient code.

The Secret Life of Word

by Robert Delwood

The Secret Life of Word looks at Microsoft Word from the perspective of technical and other professional writers. It gives writers an in-depth look at the hidden capabilities of Word, and shows how to take advantage of those capabilities without being a programmer. The Secret Life of Word will help you master the full gamut of Word mysteries, including AutoCorrect, QuickParts, BuildingBlocks, macros, Smart Tags, program-less VBA programming, and much more. There's something here for everyone who uses Microsoft Word, from new users to experts.Inside the BookPreface Introduction to Word Automation Creating Macros Find and Replace Fields, Form Fields, and Content Controls AutoCorrect and AutoText/Building Blocks Smart Tags Exchanging Data Code Samples Automation Related Topics Glossary, Bibliography, and Index

The Secret Life: Three True Stories of the Digital Age

by Andrew O'Hagan

From the award-winning author of The Illuminations, a significant and timely work of non-fiction by one of the most important writers of his generation.Julian Assange, a man who, five years ago, seemed to herald a new, enlightened form of democracy -- until, that is, the apparent heroism of WikiLeaks became compromised by his hubris and paranoia. Satoshi Nakamoto, another man who radically reshaped the business of information and secrecy on a global scale. He is known as the elusive inventor of Bitcoin, but who is the real Satoshi -- a lone wolf or a collective of individuals with the talent to reimagine the financial wheel? And Ronald Pinn, a man who does not exist at all, except in the furthest, darkest reaches of O'Hagan's internet use. Driven by an interest in the ease with which it is possible to create an identity in an online world, O'Hagan journeys into the dark web where everything -- sex, drugs, guns -- is for sale.The Secret Life is about these elusive individuals, written in three individual yet deeply connected essays. It is a dazzling book about the porousness between genius and madness, between fact and fiction. It is about nothing less than modern personality in the digital age.

The Secret Life: Three True Stories of the Digital Age

by Andrew O'Hagan

Award-winning essayist and novelist Andrew O’Hagan presents a trio of reports exploring the idea of identity on the Internet—true, false, and in between—where your virtual self takes on a life of its own outside of reality.A Publishers Weekly Best Book of the Year • One of Publishers Weekly's Top 10 Book of Essays and Literary Criticism • One of Chicago Reader's Books We Can’t Wait to ReadThe Secret Life issues three bulletins from the porous border between cyberspace and IRL.“Ghosting” introduces us to the beguiling and divisive Wikileaks founder Julian Assange, whose autobiography O’Hagan agrees to ghostwrite with unforeseen—and unforgettable—consequences. “The Invention of Ronnie Pinn” finds him using the actual identity of a deceased young man to construct an entirely new one in cyberspace, leading him on a journey deep into the Web’s darkest realms. And “The Satoshi Affair” chronicles the strange case of Craig Wright, the Australian Web developer who may or may not be the mysterious inventor of Bitcoin, Satoshi Nakamoto—and who may or may not be willing, or even able, to reveal the truth.These fascinating pieces take us to the weirder fringes of life in a digital world while also casting light on our shared predicaments. What does it mean when your very sense of self becomes, to borrow a term from the tech world, “disrupted”? The Secret Life shows us that it might take a novelist, an inventor of selves, armed with the tools of a trenchant reporter, to find an answer.

The Secret Science of Ciphers

by Nick D'Alto

Even if you aren't a spy, you probably already use cryptography, or the science of secret communication, every day.

The Secret to Cybersecurity: A Simple Plan to Protect Your Family and Business from Cybercrime

by Scott Augenbaum

Cybercrimes are a threat and as dangerous as an armed intruder—yet millions of Americans are complacent or simply uninformed of how to protect themselves. The Secret to Cybersecurity closes that knowledge gap by using real-life examples to educate readers.It’s 2 a.m.—do you know who your child is online with? According to author Scott Augenbaum, between 80 to 90 percent of students say they do whatever they want on their smartphones—and their parents don’t have a clue. Is that you? What about your online banking passwords, are they safe? Has your email account or bank/debit card ever been compromised? In 2018, there were data breaches at several major companies—If those companies have your credit or debit information, that affects you. There are bad people in the world, and they are on the internet. They want to hurt you. They are based all over the world, so they’re hard at “work” when even you’re sleeping. They use automated programs to probe for weaknesses in your internet security programs. And they never stop. Cybercrime is on the increase internationally, and it’s up to you to protect yourself. But how? The Secret to Cybersecurity is the simple and straightforward plan to keep you, your family, and your business safe. Written by Scott Augenbaum, a 29-year veteran of the FBI who specialized in cybercrimes, it uses real-life examples to educate and inform readers, explaining who/why/how so you’ll have a specific takeaway to put into action for your family. Learn about the scams, methods, and ways that cyber criminals operate—and learn how to avoid being the next cyber victim.

The Secrets of AI Value Creation: A Practical Guide to Business Value Creation with Artificial Intelligence from Strategy to Execution

by Wilhelm Bielert Michael Proksch Nisha Paliwal

Unlock unprecedented levels of value at your firm by implementing artificial intelligence In The Secrets of AI Value Creation: Practical Guide to Business Value Creation with Artificial Intelligence from Strategy to Execution, a team of renowned artificial intelligence leaders and experts delivers an insightful blueprint for unlocking the value of AI in your company. This book presents a comprehensive framework that can be applied to your organisation, exploring the value drivers and challenges you might face throughout your AI journey. You will uncover effective strategies and tactics utilised by successful artificial intelligence (AI) achievers to propel business growth. In the book, you’ll explore critical value drivers and key capabilities that will determine the success or failure of your company’s AI initiatives. The authors examine the subject from multiple perspectives, including business, technology, data, algorithmics, and psychology. Organized into four parts and fourteen insightful chapters, the book includes: Concrete examples and real-world case studies illustrating the practical impact of the ideas discussed within Best practices used and common challenges encountered when first incorporating AI into your company’s operations A comprehensive framework you can use to navigate the complexities of AI implementation and value creation An indispensable blueprint for artificial intelligence implementation at your organisation, The Secrets of AI Value Creation is a can’t-miss resource for managers, executives, directors, entrepreneurs, founders, data analysts, and business- and tech-side professionals looking for ways to unlock new forms of value in their company. The authors, who are industry leaders, assemble the puzzle pieces into a comprehensive framework for AI value creation: Michael Proksch is an expert on the subject of AI strategy and value creation. He worked with various Fortune 2000 organisations and focuses on optimising business operations building customised AI solutions, and driving organisational adoption of AI through the creation of value and trust. Nisha Paliwal is a senior technology executive. She is known for her expertise in various technology services, focusing on the importance of bringing AI technology, computing resources, data, and talent together in a synchronous and organic way. Wilhelm Bielert is a seasoned senior executive with an extensive of experience in digital transformation, program and project management, and corporate restructuring. With a proven track record, he has successfully led transformative initiatives in multinational corporations, specialising in harnessing the power of AI and other cutting-edge technologies to drive substantial value creation.

The Security Breach Files: An AFK Book (Five Nights At Freddy's)

by Scott Cawthon

Everything fans will want to know about the newest Five Night's at Freddy's game "Security Breach", in a deluxe hardcover!A deep dive into the newest Five Nights at Freddy's game is presented here in a giant hardcover that will make the perfect addition to any fan’s library. From the newest animatronics to the deepest maps and easter eggs, everything is laid out in awesome detail that will deepen the knowledge of even the most enthusiastic player. A must-have for Freddy Fans!

The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer

by Perry Carpenter Kai Roer

Mitigate human risk and bake security into your organization&’s culture from top to bottom with insights from leading experts in security awareness, behavior, and culture. The topic of security culture is mysterious and confusing to most leaders. But it doesn&’t have to be. In The Security Culture Playbook, Perry Carpenter and Kai Roer, two veteran cybersecurity strategists deliver experience-driven, actionable insights into how to transform your organization&’s security culture and reduce human risk at every level. This book exposes the gaps between how organizations have traditionally approached human risk and it provides security and business executives with the necessary information and tools needed to understand, measure, and improve facets of security culture across the organization. The book offers: An expose of what security culture really is and how it can be measured A careful exploration of the 7 dimensions that comprise security culture Practical tools for managing your security culture program, such as the Security Culture Framework and the Security Culture Maturity Model Insights into building support within the executive team and Board of Directors for your culture management programAlso including several revealing interviews from security culture thought leaders in a variety of industries, The Security Culture Playbook is an essential resource for cybersecurity professionals, risk and compliance managers, executives, board members, and other business leaders seeking to proactively manage and reduce risk.

The Security Development Lifecycle: A Process for Developing Demonstrably More Secure Software

by Michael Howard Steve Lipner

<div xmlns="http://www.w3.org/1999/xhtml"><p>With expert insights, this introduction to the Security Development Lifecycle (SDL) provides you with a history of the methodology and guides you through each stage of the proven process\u2014from design to release\u2014that helps minimize security defects.</p></div>

The Security Dimensions of the Syrian Civil War: The Case of Türkiye (Security, Audit and Leadership Series)

by Mehmet Emin Erendor Serhat Ahmet Erkmen

Syria's bloody civil war has plunged the cradle of the Levant into a painful spiral of violence. This spiral of violence has caused profound social, political, economic, and strategic changes in Syria. But the effects of the civil war are not limited to Syria. The civil war in Syria has become a direct problem not only for Syria but also for Türkiye, Iraq, Lebanon, and Jordan. However, most observers agree that of all Syria's neighbors, Türkiye has been the most affected by the civil war.When one thinks of Türkiye and Syria together in recent years, two concepts come to mind most often: Military operations and migration. However, conflicts in Syria have been perceived in a broader security paradigm in Türkiye.The main topics of the book can be summarized as follows: Border issues, sovereignty disputes, alliances, and military interventions in Türkiye–Syria relations. The effects of the civil war in Syria on Türkiye's foreign policy, economy, social structure, and internal security. Reflections of the civil war on Türkiye's relations with Iran, the US, and Russia. Increasing separatist and radical Salafist terrorism in Türkiye in line with the spillover effect of civil wars. Cross-border operations and Türkiye's military capacity. The problem of migration. Within the framework of the topics addressed, the book provides a comprehensive reading of the security problems caused by the Syrian Civil War on Türkiye. We believe that this book will shed light on why Türkiye perceives what is happening in Syria from a security perspective. In fact, the main idea of the book is simple: Syria has been a security issue for Türkiye since the 1930s, and it is still a security issue now. After approximately 100 years, the main idea has not changed. The only thing that has changed is how security is defined.

The Security Hippie (Security, Audit and Leadership Series)

by Barak Engel

The Security Hippie is Barak Engel’s second book. As the originator of the “Virtual CISO” (fractional security chief) concept, he has served as security leader in dozens of notable organizations, such as Mulesoft, Stubhub, Amplitude Analytics, and many others. The Security Hippie follows his previous book, Why CISOs Fail, which became a sleeper hit, earning a spot in the Cybercannon project as a leading text on the topic of information security management. In this new book, Barak looks at security purely through the lens of story-telling, sharing many and varied experiences from his long and accomplished career as organizational and thought leader, and visionary in the information security field. Instead of instructing, this book teaches by example, sharing many real situations in the field and actual events from real companies, as well as Barak’s related takes and thought processes. An out-of-the-mainstream, counterculture thinker – Hippie – in the world of information security, Barak’s rich background and unusual approach to the field come forth in this book in vivid color and detail, allowing the reader to sit back and enjoy these experiences, and perhaps gain insights when faced with similar issues themselves or within their organizations. The author works hard to avoid technical terms as much as possible, and instead focus on the human and behavioral side of security, finding the humor inherent in every anecdote and using it to demystify the field and connect with the reader. Importantly, these are not the stories that made the news; yet they are the ones that happen all the time. If you’ve ever wondered about the field of information security, but have been intimidated by it, or simply wished for more shared experiences, then The Security Hippie is the perfect way to open that window by accompanying Barak on some of his many travels into the land of security.

The Security Leader’s Communication Playbook: Bridging the Gap between Security and the Business (Internal Audit And It Audit Ser.)

by Jeffrey W. Brown

This book is for cybersecurity leaders across all industries and organizations. It is intended to bridge the gap between the data center and the board room. This book examines the multitude of communication challenges that CISOs are faced with every day and provides practical tools to identify your audience, tailor your message and master the art of communicating. Poor communication is one of the top reasons that CISOs fail in their roles. By taking the step to work on your communication and soft skills (the two go hand-in-hand), you will hopefully never join their ranks. This is not a “communication theory” book. It provides just enough practical skills and techniques for security leaders to get the job done. Learn fundamental communication skills and how to apply them to day-to-day challenges like communicating with your peers, your team, business leaders and the board of directors. Learn how to produce meaningful metrics and communicate before, during and after an incident. Regardless of your role in Tech, you will find something of value somewhere along the way in this book.

The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments

by Douglas Landoll

Conducted properly, information security risk assessments provide managers with the feedback needed to manage risk through the understanding of threats to corporate assets, determination of current control vulnerabilities, and appropriate safeguards selection. Performed incorrectly, they can provide the false sense of security that allows potential threats to develop into disastrous losses of proprietary information, capital, and corporate value. Picking up where its bestselling predecessors left off, The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Third Edition gives you detailed instruction on how to conduct a security risk assessment effectively and efficiently, supplying wide-ranging coverage that includes security risk analysis, mitigation, and risk assessment reporting. The third edition has expanded coverage of essential topics, such as threat analysis, data gathering, risk analysis, and risk assessment methods, and added coverage of new topics essential for current assessment projects (e.g., cloud security, supply chain management, and security risk assessment methods). This handbook walks you through the process of conducting an effective security assessment, and it provides the tools, methods, and up-to-date understanding you need to select the security measures best suited to your organization. Trusted to assess security for small companies, leading organizations, and government agencies, including the CIA, NSA, and NATO, Douglas J. Landoll unveils the little-known tips, tricks, and techniques used by savvy security professionals in the field. It includes features on how to Better negotiate the scope and rigor of security assessments Effectively interface with security assessment teams Gain an improved understanding of final report recommendations Deliver insightful comments on draft reports This edition includes detailed guidance on gathering data and analyzes over 200 administrative, technical, and physical controls using the RIIOT data gathering method; introduces the RIIOT FRAME (risk assessment method), including hundreds of tables, over 70 new diagrams and figures, and over 80 exercises; and provides a detailed analysis of many of the popular security risk assessment methods in use today. The companion website (infosecurityrisk.com) provides downloads for checklists, spreadsheets, figures, and tools.

The Security of Critical Infrastructures: Risk, Resilience and Defense (International Series in Operations Research & Management Science #288)

by Marcus Matthias Keupp

This book analyzes the security of critical infrastructures such as road, rail, water, health, and electricity networks that are vital for a nation’s society and economy, and assesses the resilience of these networks to intentional attacks. The book combines the analytical capabilities of experts in operations research and management, economics, risk analysis, and defense management, and presents graph theoretical analysis, advanced statistics, and applied modeling methods. In many chapters, the authors provide reproducible code that is available from the publisher’s website. Lastly, the book identifies and discusses implications for risk assessment, policy, and insurability. The insights it offers are globally applicable, and not limited to particular locations, countries or contexts. Researchers, intelligence analysts, homeland security staff, and professionals who operate critical infrastructures will greatly benefit from the methods, models and findings presented. While each of the twelve chapters is self-contained, taken together they provide a sound basis for informed decision-making and more effective operations, policy, and defense.

The Seductive Computer

by Derek Partridge

IT systems explode budget estimates, bust production deadlines by years, and then fail to work properly. Why this IT-system crisis? Poor programmers? Inadequate project management? No. The Seductive Computer argues that the fundamental nature of programming technology itself is the real culprit; it promises perfection but can only deliver emergent chaos. It is also an insidiously compelling technology, peculiarly male oriented. IT systems, an unavoidable and increasing reality in all our lives, are something new to man - large-scale discrete complexity. The Seductive Computer explains this novelty that defies human understanding. This book illustrates in a simple yet thorough manner the underlying concepts necessary for understanding the IT-system crisis - not 'How To Program' but what the demands of programming are. It then proceeds to lay out the full gamut of issues - all stemming from the nature of the technology. From development to maintenance IT-system personnel are grappling with incipient chaos. The technicians are seduced by the detailed challenge of the technology. The scientists are seduced by the promises of their technology. The managers and users are seduced by the mysteries of the technology. No IT system is ever fully understood by anyone, so surprising behaviours will always emerge. What can be done? We must rein in our expectations of IT systems: what they can do, and how reliably they can do it. On the positive side, The Seductive Computer discusses novel paradigms that look beyond the current discrete technology: neural computing and precise approximation computing.

The Sega Mega Drive & Genesis Encyclopedia: Every Game Released for Sega's 16-bit Console

by Chris Scullion

“An exhaustive, tremendous look back at one of the most beloved consoles of all time . . . an absolutely barnstorming recollection of a wonderful era.” —Finger GunsThe third book in Chris Scullion’s series of video game encyclopedias, The Sega Mega Drive and Genesis Encyclopedia is dedicated to Sega’s legendary 16-bit video game console. The book contains detailed information on every single game released for the Sega Mega Drive and Genesis in the west, as well as similarly thorough bonus sections covering every game released for its add-ons, the Mega CD and 32X. With nearly a thousand screenshots, generous helpings of bonus trivia and charmingly bad jokes, The Sega Mega Drive and Genesis Encyclopedia is the definitive guide to a legendary gaming system.“The Sega Mega Drive and Genesis Encyclopedia is a must-buy for fans of the console and a perfect addition to any retro game fan’s library.” —Goomba Stomp Magazine

The Selection and Use of Contract Research Organizations: A Guide For The Pharmaceutical And Medical Device Industries

by Shayne C. Gad

Choosing the right contract research organization (CRO) can make the difference between getting a product to market quickly and cost-effectively, and wasting valuable time and money. The vast number of available CROs is increasing all the time, and all of them make impressive claims. The Selection and Use of Contract Research Organizations is your

The Self-Assembling Brain: How Neural Networks Grow Smarter

by Peter Robin Hiesinger

What neurobiology and artificial intelligence tell us about how the brain builds itself How does a neural network become a brain? While neurobiologists investigate how nature accomplishes this feat, computer scientists interested in artificial intelligence strive to achieve this through technology. The Self-Assembling Brain tells the stories of both fields, exploring the historical and modern approaches taken by the scientists pursuing answers to the quandary: What information is necessary to make an intelligent neural network?As Peter Robin Hiesinger argues, “the information problem” underlies both fields, motivating the questions driving forward the frontiers of research. How does genetic information unfold during the years-long process of human brain development—and is there a quicker path to creating human-level artificial intelligence? Is the biological brain just messy hardware, which scientists can improve upon by running learning algorithms on computers? Can AI bypass the evolutionary programming of “grown” networks? Through a series of fictional discussions between researchers across disciplines, complemented by in-depth seminars, Hiesinger explores these tightly linked questions, highlighting the challenges facing scientists, their different disciplinary perspectives and approaches, as well as the common ground shared by those interested in the development of biological brains and AI systems. In the end, Hiesinger contends that the information content of biological and artificial neural networks must unfold in an algorithmic process requiring time and energy. There is no genome and no blueprint that depicts the final product. The self-assembling brain knows no shortcuts.Written for readers interested in advances in neuroscience and artificial intelligence, The Self-Assembling Brain looks at how neural networks grow smarter.

Refine Search

Showing 56,601 through 56,625 of 61,741 results