It was in 2013 we first published an article on e-bikes here, and then again an update in 2016. Now in 2018 the e-bikes have made their presence felt with ever increasing numbers showing up on the bike paths that I pass or cross on my morning walk.
Most interesting is the age group taking up biking, or should that be ‘assisted biking’, certainly not youngsters, although probably the young at heart.
Artificial Intelligence = Not originating naturally, made by human skill in imitation of something natural.
To define Artificial Intelligence as the Oxford Dictionary has [above] may already be needing a rethink given the rate of knots at which we are broadening and redefining the concept.
But first things first, what do we know about AI? Well, we know that there are several types of AI and that they are the barriers that separate machines from us and indeed us from them.
Following on from the Facebook disclosures one does wonder whom else might be cashing in on knowing what your internet activities, and much else besides, are, and whether such data is being misused.
Who would gain worthwhile advantage from that knowledge or would, or could, on-sell the data to 3rd parties?
The latest admission from Facebook that up to 87million Facebook users may have had their information “improperly shared” with Cambridge Analytica is a sharp increase on the 50 million estimate that had previously been touted.
In Australia the Australian Privacy Commissioner has launched a formal investigation into the improper sharing of the data of Aussie Facebook users that could lead to a hefty fine and new regulations, if the Aussie commissioner decides it is just not cricket.
It is 1995 and the latest computers boast the latest computer chips or processors from the big manufacturers of such things like Intel, ARM, AMD and others.
Two decades later the millions of computers using these chips are now suddenly found to have a flaw, in fact two, named Meltdown and Spectre, rather ominous names.
What does it mean to me and you, only that some hacker has found a way to access the entire memory of a vulnerable computer, i.e. your password, log-ins and files cached by various applications you are using, and other sensitive data could be read by the hacker.