Your new post is loading...
Your new post is loading...
Current selected tag: algoritmos. Clear.
1. The NSA’s Surveillance Algorithm
The NSA’s surveillance programs work, or so they claim, by collecting metadata: not the content of your phone calls and emails, but their length, who they connect you to, and when they happen.
2. Encryption Algorithms
Another way to combat surveillance is to confuse the algorithms—turning their own capabilities against them. Encryption algorithms encode your data, using a secret formula to turn it into an unreadable mass that entities like the NSA can’t process. That’s how post-PRISM services like Silent Circle and Least Authority protect their users’ phone calls and messages from snooping. But encryption algorithms have a very long history.
3. Google Search
If you’ve ever had Google fill in the rest of your search text like a mind-reader, you’ve also experienced an algorithm at work. Compounding what you’ve previously searched with what other users search for every day, Google’s algorithms can predict what you’re looking for with a frightening degree of accuracy.
4. High-Frequency Trading Algorithms
In the heyday of Wall Street, traders shouted across exchange floors to buy and sell stocks. These days, it’s a whole lot quieter—around 50 percent of trading is done by firms specializing in “high-frequency trading” (HFT), which refers to rapid-fire share buys and sells carried out by computer programs rather than humans. Hedge funds that specialize in HFT develop proprietary algorithms to determine what they buy and sell and when, then the programs carry out those instructions in milli- or microseconds.
Algorithms influence even our intimate relationships. The now-iconic surveys of OKCupid, the question-and-answer sessions the dating site spews out to help match its users, provide the data for the site’s compatibility algorithms.
rep.licants.org is a web service allowing users to install an artificial intelligence (bot) on their Facebook and/or Twitter account. From a different set of techniques, the bot attempts to simulate the activity of the user, to improve it by feeding his account and to create new contacts with other users.
The bot does not born with a fictitious identity, but will be added to the real identity of the user to modify it at his convenience. Thus, this bot can be seen as a virtual prothesis added to an user's account, with the aim to build him a greater social reputation. Moreover, this bot can be perceived as a threat by defrauding even more the reality of who is really who on the cyberspace and by showing the poverty of our social interactions on these so-called social networks.
Home | Bot's Diary | About | Stats | Changelog | © 2011 rep.licants.org