|
|
Books > Computing & IT > General
Each of the chapters in this volume devotes considerable attention
to defining and elaborating the notion of the frame problem-one of
the "hard problems" of artificial intelligence. Not only do the
chapters clarify the problems at hand, they shed light on the
different approaches taken by those in artificial intelligence and
by certain philosophers who have been concerned with related
problems in their field. The book should therefore not be read
merely as a discussion of the frame problem narrowly conceived, but
also as a general analysis of what could be a major challenge to
the design of computer systems exhibiting general intelligence.
This book addresses how computers affect people's everyday lives.
Using actual situations and problems that people have encountered
with current software applications, this book offers academics ways
to examine how new situations are created through computer use. It
contains some of the very first papers on very important topics
including the AEGIS disaster, the intriguing new world of MUD
environments, and community networks, including a study of
Community Memory in Berkeley, possibly the world's first community
computer system. The first half contains critical studies, in which
the authors explain ways of describing real situations where people
are already using computers. This situations are often problematic
and much more complicated than the scenarios that the designers
envisioned when designing the system. The second half of the book
contains constructive studies, reporting experiences in trying to
build systems in new ways, with a fully developed consciousness of
what people need and the interactions between computer systems and
social systems.
Stunning advances in digital technology have given us a new wave of
disarmingly human-like AI systems. Chatbots like ChatGPT, Claude and
Gemini put the knowledge of all the world’s experts at our fingertips,
and can generate meaningful sentences, equations and computer code. The
march of this new technology is set to upturn our economies, challenge
our democracies, and refashion society in unpredictable ways. We can
expect these AI systems to soon be making autonomous decisions on the
user’s behalf, with transformative impact on everything we do. It is
vital we understand how they work. Can AI systems ‘think’, ‘know’ and
‘understand’? Could they manipulate or deceive you, and if so, what
might they make you do? Whose interests do they ultimately represent?
And when will they be able to move beyond words and take actions for
themselves in the real world?
To answer these questions, neuroscientist and AI researcher Christopher
Summerfield explains how these strange new minds work. He charts the
evolution of AI, from the earliest inklings about thinking machines in
the seventeenth century to today’s gargantuan deep neural networks. The
resulting book is the most accessible, up-to-date and authoritative
exploration of this radical new technology. Ultimately, armed with an
understanding of AI’s mysterious inner workings, we can begin to
grapple with the existential question of our age: can we look forward
to a technological utopia, or are we in the process of writing
ourselves out of history?
Intellectual property is rapidly becoming one of the most
controversial aspects of American law with both domestic and
international implications. The controversy over copyright law is
largely a result of the rapidly growing internet which threatens
clear copyright ownership. In fact, Halbert argues, the internet,
through its emphasis on information exchange, inherently challenges
the concept of intellectual property rights developed in the 18th
century to protect written--not word-processed--works.
Halbert critiques the theoretical foundations and the present
American approach to copyright law, and she concludes that we
should not uncritically extend copyright law to the internet. More
generally, we should keep the concept of intellectual property from
colonizing knowledge and ideas. She attempts to describe how new
technologies are brought within the boundaries of the intellectual
property discourse and given legal legitimacy. Halbert touches on
the historical roots of copyright law, the manner in which
copyright law is used today, and provides a critique of our current
attitudes toward intellectual property. Court cases, government
documents, public policy recommendations, international trade
agreements, the actions of key industries, and popular opinion
provide insight into how intellectual property as a concept is
being defined in the information age and used to enforce property
boundaries. An important resource for scholars and professionals
alike working in copyright related industries.
In this long-awaited update to IBM i Security Administration and
Compliance, security expert Carol Woodbury tells you everything you
need to know about IBM i security. Written in a clear, jargon-free
style, this book explains the importance of developing a security
policy and gives detailed guidance on how to implement and maintain
such a system.
Drawn from actual excel conundrums posted on the author's website,
www.mrexcel.com, this high-level resource is designed for people
who want to stretch Excel to its limits. Tips for solving 100
incredibly difficult problems are covered in depth
and include extracting the first letter of each word in a
paragraph, validating URL's, generating random numbers without
repeating, and hiding rows if cells are empty. The answers to these
and other questions have produced results that have even surprised
the Excel development team.
In the arena of Parasitic-Aware Design of CMOS RF Circuits, efforts
are aimed at the realization of true single-chip radios with few,
if any, off-chip components. Ironically, the on-chip passive
components required for RF integration pose miore serious
challenges to SOC integration than the active CMOS and BJT devices.
This is not surprising since modern digital IC designs are
dominated as much, or more, by interconnectg characteristics than
by active device properties. In any event, the co-integration of
active and passive devices in RFIC design represents a serious
design problem and an even more daunting manufacturing challenge.
If conventional mixed-signal design techniques are employed,
parasitics associated with passive elements (resistors, capacitors,
inductors, transformers, pads, etc.) and the package effectively
de-tune RF circuits rendering them sub-optimal or virtually
useless. Hence, dealing with parasitics in an effective way as part
of the design process is an essential emerging methodology in
modern SOC design. The parasitic-aware RF circuit synthesis
techinques described in this book effectively address this critical
problem.
|
|