unexpected

A wallet returned after 60+ years

From KOMU’s “Sarah’s Stories – Wallet Memories” (KOMU: 4 January 2007):

MEXICO [Misouri] – A local resident enjoyed an early, unexpected Christmas present.

Ray Heilwagen, an 83-year-old World War II veteran, has a story that stretches from France to his front lawn.

During war, a wallet can be a soldier’s most prized pocession, full of photos and other family memories. Like many veterans, Heilwagen carried his wallet on the battlefields of northern France in 1944.

Just after D-Day, a mortar shell hit him in the leg, and the powerful explosion blew him into a nearby river. Heilwagen survived, but he lost his wallet between the battlefield and the tent hospital.

Then, last month, Heilwagen got a phone call.

“[He] wanted to know if I’d ever served in France during World War II. I said, ‘Yeah’ and he said, ‘Did you ever lose a billfold?’ I said, ‘Yeah, I sure did.’ It just kind of shocked me,” Heilwagen remembered.

“I didn’t even know that he lost his wallet, so he calls and says that this man that he doesn’t know calls and says he found his wallet from the service some 60 years later,” added granddaughter Kayla Sudbrock.

“And then he went on to tell me that his father was a World War II veteran and he found the wallet but he didn’t know where I was to return it,” said Heilwagen. “So he took it home with him and stuck it in a drawer some place where it’s been for 62 years.”

Steve Breitenstein of Illinois used the Internet to locate Heilwagen in Mexico. Decades after he lost it on the battlefield, the wallet arrived at Heilwagen’s house in mint condition, with his original Social Security card, his money and memories still intact.

The fact that he got his wallet back after six decades is amazing, but so is the timing because the Illinois man found it on Nov. 11.

“Finding it on that day is so ironic,” said Sudbrock, “that he found his wallet from the service on Veterans’ Day.”

A wallet returned after 60+ years Read More »

Why we can easily remember jingles but not jokes

From Natalie Angier’s “In One Ear and Out the Other” (The New York Times: 16 March 2009):

In understanding human memory and its tics, Scott A. Small, a neurologist and memory researcher at Columbia, suggests the familiar analogy with computer memory.

We have our version of a buffer, he said, a short-term working memory of limited scope and fast turnover rate. We have our equivalent of a save button: the hippocampus, deep in the forebrain is essential for translating short-term memories into a more permanent form.

Our frontal lobes perform the find function, retrieving saved files to embellish as needed. And though scientists used to believe that short- and long-term memories were stored in different parts of the brain, they have discovered that what really distinguishes the lasting from the transient is how strongly the memory is engraved in the brain, and the thickness and complexity of the connections linking large populations of brain cells. The deeper the memory, the more readily and robustly an ensemble of like-minded neurons will fire.

This process, of memory formation by neuronal entrainment, helps explain why some of life’s offerings weasel in easily and then refuse to be spiked. Music, for example. “The brain has a strong propensity to organize information and perception in patterns, and music plays into that inclination,” said Michael Thaut, a professor of music and neuroscience at Colorado State University. “From an acoustical perspective, music is an overstructured language, which the brain invented and which the brain loves to hear.”

A simple melody with a simple rhythm and repetition can be a tremendous mnemonic device. “It would be a virtually impossible task for young children to memorize a sequence of 26 separate letters if you just gave it to them as a string of information,” Dr. Thaut said. But when the alphabet is set to the tune of the ABC song with its four melodic phrases, preschoolers can learn it with ease.

And what are the most insidious jingles or sitcom themes but cunning variations on twinkle twinkle ABC?

Really great jokes, on the other hand, punch the lights out of do re mi. They work not by conforming to pattern recognition routines but by subverting them. “Jokes work because they deal with the unexpected, starting in one direction and then veering off into another,” said Robert Provine, a professor of psychology at the University of Maryland, Baltimore County, and the author of “Laughter: A Scientific Investigation.” “What makes a joke successful are the same properties that can make it difficult to remember.”

This may also explain why the jokes we tend to remember are often the most clichéd ones. A mother-in-law joke? Yes…

Why we can easily remember jingles but not jokes Read More »

Incompetent & they don’t know it

From Erica Goode’s “Incompetent People Really Have No Clue, Studies Find: They’re blind to own failings, others’ skills” (The New York Times: 18 January 2000):

Dunning, a professor of psychology at Cornell, worries about this because, according to his research, most incompetent people do not know that they are incompetent.

On the contrary. People who do things badly, Dunning has found in studies conducted with a graduate student, Justin Kruger, are usually supremely confident of their abilities — more confident, in fact, than people who do things well. …

One reason that the ignorant also tend to be the blissfully self-assured, the researchers believe, is that the skills required for competence often are the same skills necessary to recognize competence.

The incompetent, therefore, suffer doubly, they suggested in a paper appearing in the December issue of the Journal of Personality and Social Psychology.

“Not only do they reach erroneous conclusions and make unfortunate choices, but their incompetence robs them of the ability to realize it,” wrote Kruger, now an assistant professor at the University of Illinois, and Dunning.

This deficiency in “self-monitoring skills,” the researchers said, helps explain the tendency of the humor-impaired to persist in telling jokes that are not funny, of day traders to repeatedly jump into the market — and repeatedly lose out — and of the politically clueless to continue holding forth at dinner parties on the fine points of campaign strategy. …

Unlike unskilled counterparts, the most able subjects in the study, Kruger and Dunning found, were likely to underestimate their competence. The researchers attributed this to the fact that, in the absence of information about how others were doing, highly competent subjects assumed that others were performing as well as they were — a phenomenon psychologists term the “false consensus effect.”

When high-scoring subjects were asked to “grade” the grammar tests of their peers, however, they quickly revised their evaluations of their own performance. In contrast, the self-assessments of those who scored badly themselves were unaffected by the experience of grading others; some subjects even further inflated their estimates of their own abilities.

“Incompetent individuals were less able to recognize competence in others,” the researchers concluded.

Incompetent & they don’t know it Read More »

Providing an opening for criminals without realizing it

From Bush, Kerry cross paths in Iowa (BBC News: 4 August 2004):

US President George W Bush and his Democratic rival John Kerry have spent the day hunting votes within blocks of each other in the state of Iowa.

Mr Bush met supporters at a rally in the town of Davenport, while Mr Kerry held an economic roundtable discussion with business leaders nearby. …

Political pundits were not the only ones taking advantage of the day’s events.

Three local banks were robbed as the campaigns hit Davenport.

The first robbery occurred just as Mr Bush stepped off his plane, local police say.

The second and third robberies – at different banks – took place while the two candidates were addressing their respective Iowa crowds.

Providing an opening for criminals without realizing it Read More »

Banks have more to fear from internal attacks than external

From electricnews.net’s Internal security attacks affecting banks (The Register: 23 June 2005):

Internal security breaches at the world’s banks are growing faster than external attacks, as institutions invest in technology, instead of employee training.

According to the 2005 Global Security Survey, published by Deloitte Touche Tohmatsu, 35 per cent of respondents said that they had encountered attacks from inside their organisation within the last 12 months, up from 14 per cent in 2004. In contrast, only 26 per cent confirmed external attacks, compared to 23 per cent in 2004. Click Here

The report, which surveyed senior security officers from the world’s top 100 financial institutions, found that incidences of phishing and pharming, two online scams which exploit human behaviour, are growing rapidly.

Banks have more to fear from internal attacks than external Read More »

From P2P to social sharing

From Clay Shirky’s “File-sharing Goes Social“:

The RIAA has taken us on a tour of networking strategies in the last few years, by constantly changing the environment file-sharing systems operate in. In hostile environments, organisms often adapt to become less energetic but harder to kill, and so it is now. With the RIAA’s waves of legal attacks driving experimentation with decentralized file-sharing tools, file-sharing networks have progressively traded efficiency for resistance to legal attack. …

There are several activities that are both illegal and popular, and these suffer from what economists call high transaction costs. Buying marijuana involves considerably more work than buying roses, in part because every transaction involves risk for both parties, and in part because neither party can rely on the courts for redress from unfair transactions. As a result, the market for marijuana today (or NYC tattoo artists in the 1980s, or gin in the 1920s, etc) involves trusted intermediaries who broker introductions.

These intermediaries act as a kind of social Visa system; in the same way a credit card issuer has a relationship with both buyer and seller, and an incentive to see that transactions go well, an introducer in an illegal transaction has an incentive to make sure that neither side defects from the transaction. And all parties, of course, have an incentive to avoid detection. …

There are many ways to move to such membrane-bounded systems, of course, including retrofitting existing networks to allow sub-groups with controlled membership (possibly using email white-list or IM buddy-list tools); adopting any of the current peer-to-peer tools designed for secure collaboration (e.g. Groove, Shinkuro, WASTE etc); or even going to physical distribution. As Andrew Odlyzko has pointed out, sending disks through the mail can move enough bits in a 24 hour period to qualify as broadband, and there are now file-sharing networks whose members simply snail mail one another mountable drives of music. …

The disadvantage of social sharing is simple — limited membership means fewer files. The advantage is equally simple — a socially bounded system is more effective than nothing, and safer than Kazaa. …

From P2P to social sharing Read More »

How patents ruined the Wright brothers

From Robert X. Cringely’s “Patently Absurd: Why Simply Making Spam Illegal Won’t Work“:

Nobody can deny that the Wright brothers were pioneers. Their use of a wind tunnel helped define the science of aerodynamics and had influence far beyond their time. But their secrecy and litigious nature held back the progress of flying, and eventually lost them their technical leadership. The Wrights flew in 1903. They made a small public announcement 100 years ago, then went silent until 1908 as they worked to solidify their patent position. While they continued to fly from pastures around Dayton, Ohio, the brothers generally did so in secret, waiting for patents to be issued.

When the Wrights finally appeared in public again five years later, first in Washington, DC, and later in France, the performance of their aircraft still astounded the world. But that was it. Once the brothers filed a patent infringement suit against rival Glenn Curtiss, their attention was totally turned to litigation and their aeronautical progress stopped. Curtiss and Wright eventually merged and built aircraft into the 1940s, but the creative energy by that time was all from Curtiss. By then, Wilbur had died and Orville was best known as the man who signed every pilot license. Though their patent was upheld, they didn’t in any sense control the industry they had invented.

How patents ruined the Wright brothers Read More »

OmniPerception = facial recognition + smart card

From Technology Review‘s’ “Face Forward“:

To get around these problems, OmniPerception, a spinoff from the University of Surrey in England, has combined its facial-recognition technology with a smart-card system. This could make face recognition more robust and better suited to applications such as passport authentication and building access control, which, if they use biometrics at all, rely mainly on fingerprint verification, says David McIntosh, the company’s CEO. With OmniPerception’s technology, an image of a person’s face is verified against a “facial PIN” carried on the card, eliminating the need to search a central database and making the system less intimidating to privacy-conscious users. …

OmniPerception’s technology creates a PIN about 2,500 digits long from its analysis of the most distinctive features of a person’s face. The number is embedded in a smart card-such as those, say, that grant access to a building-and used to verify that the card belongs to the person presenting it. A user would place his or her card in or near a reader and face a camera, which would take a photo and feed it to the card. The card would then compare the PIN it carried to information it derived from the new photo and either accept or reject the person as the rightful owner of the card. The technology could also be used to ensure passport or driver’s license authenticity and to secure ATM or Internet banking transactions, says McIntosh.

OmniPerception = facial recognition + smart card Read More »

Face recognition software as an example of “function creep”

From Technology Review‘s’ “Creepy Functions“:

Consider one example of function creep. The Electoral Commission of Uganda has retained Viisage Technology to implement a face recognition system capable of enrolling 10 million voters in 60 days. The goal is to reduce voter registration fraud. But Woodward notes that the system might also be put to work fingering political opponents of the regime. And Uganda probably isn’t the first country that springs to mind when someone says “due process” or “civil rights.”

From Technology Review‘s’ “Big Brother Logs On“:

Take the fact that the faces of a large portion of the driving population are becoming digitized by motor vehicles agencies and placed into databases, says Steinhardt. It isn’t much of a stretch to extend the system to a Big Brother-like nationwide identification and tracking network. Or consider that the Electoral Commission of Uganda has retained Viisage Technology to implement a “turnkey face recognition system” capable of enrolling 10 million voter registrants within 60 days. By generating a database containing the faceprint of every one of the country’s registered voters-and combining it with algorithms able to scour all 10 million images within six seconds to find a match-the commission hopes to reduce voter registration fraud. But once such a database is compiled, notes John Woodward, a former CIA operations officer who managed spies in several Asian countries and who’s now an analyst with the Rand Corporation, it could be employed for tracking and apprehending known or suspected political foes. Woodward calls that “function creep.”

Face recognition software as an example of “function creep” Read More »

Walke describes the Battle of Island Number 10

From “Operations of the Western Flotilla” by Henry A. Walke, Commander of the Carondelet, describing the Battle of Island Number Ten:

Having received written orders from the flag-officer, under date of March 30th, I at once began to prepare the Carondelet for the ordeal. All the loose material at hand was collected, and on the 4th of April the decks were covered with it, to protect them against plunging shot. Hawsers and chain cables were placed around the pilot-house and other vulnerable parts of the vessel, and every precaution was adopted to prevent disaster. A coal-barge laden with hay and coal was lashed to the part of the port side on which there was no iron plating, to protect the magazine. And it was truly said that the old Carondelet at that time resembled a farmer’s wagon prepared for market. The engineers led the escape-steam, through the pipes aft, into the wheel-house, to avoid the puffing sound it made when blown through the smoke-stacks.

All the necessary preparations having been made, I informed the flag-officer of my intention to run the gauntlet that night, and received his approval. Colonel Buford, who commanded the land forces temporarily with the flotilla, assisted me in preparing for the trip, and on the night of the 4th brought on board Captain Hollenstein, of the Forty-second Illinois, and twenty-three sharp-shooters of his command, who volunteered their services, which were gratefully accepted. Colonel Buford remained on board until the last moment to encourage us. I informed the officers and crew of the character of the undertaking, and all expressed a readiness to make the venture. In order to resist boarding parties in case we should be disabled, the sailors were well armed, and pistols, cutlasses, muskets, boarding-pikes, and hand-grenades were within reach. Hose was attached to the boilers for throwing scalding water over any who might attempt to board. If it should be found impossible to save the vessel, it was designed to sink rather than burn her, as the loss of life would probably be greater in the latter case by the explosion of her magazine. During the afternoon there was promise of a clear, moonlight night, and it was determined to wait until the moon was down, and then to make the attempt, whatever the chances. …

At ten o’clock the moon had gone down, and the sky, the earth, and the river were alike hidden in the black shadow of a thunder-storm, which had now spread itself over all the heavens. As the time seemed favorable, I ordered the first master to cast off. Dark clouds now rose rapidly over us, and enveloped us in almost total darkness, except when the sky was lighted up by the welcome flashes of vivid lightning, to show us the perilous way we were to take. Now and then the dim outline of the landscape could be seen, and the forest bending under the roaring storm that came rushing up the river.

With our bow pointing to the island, we passed the lowest point of land without being observed, it appears, by the enemy. All speed was given to the vessel to drive her through the tempest. The flashes of lightning continued with frightful brilliancy, and “almost every second” wrote a correspondent, “every brace, post, and outline could be seen with startling distinctness, enshrouded by a bluish white, glare of light, and then her form for the next minute would become merged in the intense darkness.” When opposite Battery No. 2, on the mainland, the smoke-stacks blazed up, but the fire was soon subdued. It was caused by the soot becoming dry, as the escape-steam, which usually kept the stacks wet, had been sent into the wheel-house, as already mentioned, to prevent noise. With such vivid lightning as prevailed during the whole passage, there was no prospect of escaping the vigilance of the enemy, but there was good reason to hope that he would be unable to point his guns accurately. Again the smoke-stacks took fire, and were soon put out; and then the roar of the enemy’s guns began, and from Batteries Nos. 2, 3, and 4 came almost incessantly the sharp crack and screaming sound of their rifle-shells, which seemed to unite with the electric batteries of the clouds to annihilate us.

While nearing the island or some shoal point, during a few minutes of total darkness, we were startled by the loud, sharp order, “Hard a-port!” from our brave and skillful pilot, First Master Hoel. We almost grazed the island, and it appears were not observed through the storm until we were close in, and the enemy, having no time to point his guns, fired at random. In fact, we ran so near that the enemy did not, probably could not depress his guns sufficiently. While close under the lee of the island and during a lull in the storm and in the firing, one of our pilots heard a Confederate officer shout, “Elevate your guns!” “Yes, confound you,” said the pilot, in a much lower key, “elevate.” It is probable that the muzzles of those guns had been depressed to keep the rain out of them, and the officers, not expecting another night attack in such a storm, and arriving late, ordered the guns elevated just in time to save us from the direct fire of the enemy’s heaviest fort; and this, no doubt, was the cause of our remarkable escape. Nearly all the enemy’s shot went over us.

Having passed the principal batteries, we were greatly relieved from suspense, patiently endured, however, by the officers and crew. But there was another formidable obstacle in the way — a floating battery, which was the great “war elephant” of the Confederates, built to blockade the Mississippi permanently. As we passed her she fired six or eight shots at us, but without effect. One ball struck the coal-barge and one was found in a bale of hay; we found also one or two musket-bullets. We arrived at New Madrid about midnight with no one hurt, and were most joyfully received by our army. At the suggestion of Paymaster Nixon, all hands “spliced the main brace.”

Walke describes the Battle of Island Number 10 Read More »

Dead for 3 years

From The Telegraph‘s “Skeleton woman’ dead in front of TV for years“:

A woman’s skeleton was discovered in her flat three years after she is believed to have died, it emerged today.

Joyce Vincent was surrounded by Christmas presents and the television and heating in her bedsit were still on.

The 40-year-old’s body was so decomposed that the only way to identify her was to compare dental records with a holiday photograph.

Police believe she probably died of natural causes in early 2003, and was only found in January this year when housing association officials broke into the bedsit in Wood Green, North East London.

They were hoping to recover the thousands of pounds of rent arrears that had piled up since her death.

Dead for 3 years Read More »

Trusted Computing: security for whom? from whom?

From Bruce Schneier’s “Trusted Computing Best Practices“:

The language [in the Trusted Computing Group’s best practices document] has too much wiggle room for companies to break interoperability under the guise of security: “Furthermore, implementations and deployments of TCG specifications should not introduce any new interoperability obstacles that are not for the purpose of security.”

That sounds good, but what does “security” mean in that context? Security of the user against malicious code? Security of big media against people copying music and videos? Security of software vendors against competition? The big problem with TCG [Trusted Computing Group] technology is that it can be used to further all three of these “security” goals, and this document is where “security” should be better defined.

Trusted Computing: security for whom? from whom? Read More »

Thieves use Bluetooth to find laptops in cars

From “Phone pirates in seek and steal mission“:

MOBILE phone technology is being used by thieves to seek out and steal laptops locked in cars in Cambridgeshire.

Up-to-date mobiles often have Bluetooth technology, which allows other compatible devices, including laptops, to link up and exchange information, and log on to the internet.

But thieves in Cambridge have cottoned on to an alternative use for the function, using it as a scanner which will let them know if another Bluetooth device is locked in a car boot.

Det Sgt Al Funge, from Cambridge’s crime investigation unit, said: “There have been a number of instances of this new technology being used to identify cars which have valuable electronics, including laptops, inside.

Thieves use Bluetooth to find laptops in cars Read More »

A 4000 year old ship in the desert

From “World’s oldest ship timbers found in Egyptian desert“:

The oldest remains of seafaring ships in the world have been found in caves at the edge of the Egyptian desert along with cargo boxes that suggest ancient Egyptians sailed nearly 1,000 miles on rough waters to get treasures from a place they called God’s Land, or Punt.

Florida State University anthropology professor Cheryl Ward has determined that wooden planks found in the manmade caves are about 4,000 years old – making them the world’s most ancient ship timbers. Shipworms that had tunneled into the planks indicated the ships had weathered a long voyage of a few months, likely to the fabled southern Red Sea trading center of Punt, a place referenced in hieroglyphics on empty cargo boxes found in the caves, Ward said.

A 4000 year old ship in the desert Read More »

Better technical security increases personal risks

From The New York Times‘ “They Stole $92 Million, but Now What?“:

Just one week ago, Colin Dixon, the manager of a depot where bank notes are stored, was driving home on a quiet Tuesday evening when what he thought was a police car with flashing blue lights pulled him over.

It was the beginning, as it turned out, of Britain’s biggest ever cash caper. Seven days later, a staggering $92 million — around twice the previous record in a country that seems to specialize in mind-boggling robberies — seems simply to have disappeared.

The men who ordered Mr. Dixon, 51, to pull over were not police officers but hoodlums who bundled him into their Volvo and handcuffed him. According to police accounts, he was told that his wife, Lynn, 45, and son Craig, 8, would be shot if he did not cooperate.

Less than two hours later, more bogus police officers called at Mr. Dixon’s home in Herne Bay and told his wife that he had been in an accident. She and her son believed their story and walked into captivity. The family was reunited at a farmhouse, then driven to the depot at Tonbridge, in the county of Kent southeast of London, according to police accounts. Then their ordeal really began. …

The haul was enormous even by the standards of a land that likes to express its criminal landmarks through thefts of industrial proportions — more than twice the $45 million taken in a caper at Northern Bank in Belfast, Northern Ireland, in December 2004, at that time the biggest cash robbery on record. The Irish Republican Army was blamed for that robbery.

But one similarity between the robberies has raised worrisome questions about the way money is protected.

In both cases, employees and families were taken hostage, forcing managers to help the thieves. And so the most vulnerable point in guarding the cash has become the people who know the codes and procedures to bypass sophisticated security systems.

Such tactics “are part and parcel of the shift towards the technologized management of money,” said Tim Newburn, a professor of criminology at the London School of Economics.

According to the BBC, such abductions are known as tiger kidnappings, because the victims are stalked before they are seized. “Tiger kidnapping requires a detailed knowledge of staff — their journeys, their responsibilities and their families — which often comes with the help of a current or former employee.”

In other words, an inside job.

Better technical security increases personal risks Read More »

How a 75-year-old jewel thief did it

From MSNBC’s “75-year-old jewel thief looks back“:

When Doris Payne went to work, she stepped into her fancy dress, high heels and donned a wide-brimmed hat. Her creamy, mocha skin was made up just so, her handbag always designer. Sometimes a pair of plain gold earrings would do. Always, she looked immaculate, well-to-do. …

New York. Colorado. Nevada. California. They all beckoned, and so did Greece and France, England and Switzerland as she plied her trade over five decades. …

There was the February day, eight years ago, when she strolled into the Neiman Marcus store on the Las Vegas Strip and asked to see a pair of diamond earrings. …

Employee Linda Sbrocco showed her several — this one … no, this one … how about that one? Soon Sbrocco was swapping jewelry in and out of cases at a dizzying pace. Payne slipped rings on and off, and had Sbrocco do the same.

Then Payne was gone. And so was a $36,000 marquis cut, 2.48-carat diamond ring.

This was how Doris Payne went about her work as an international jewel thief. …

Every month or every other month — no one knows how many times over more than 50 years — she strolled into a jewelry store and strolled out with a ring worth thousands of dollars.

Occasionally, she was caught. Mostly, she was not. …

She grew up in Slab Fork, W.Va., where her daddy worked in the coal mines and her mother sewed dresses and did alterations for extra money. Payne was the baby, the youngest of six who liked school and loved to show her illiterate father places on the world maps she made out of salt and flour, places she would someday visit. …

“It’s not stealing because I’m only taking what they give me,” Payne said. …

The Jewelers Security Alliance, an industry trade group, got on to Payne in the 1970s. Bulletins went out, warning jewelry stores about a slick, well-dressed black woman who was stealing diamond rings.

Where others might hit a store for several pieces of jewelry, Payne only took one or two expensive rings at a time. But what really made Doris Payne different was that she was so prolific and so good. …

In the early 1970s, Payne tried her skills overseas. First Paris. Then Monte Carlo, where she flew in 1974 and paid a visit to Cartier, coming away with a platinum diamond ring. When she got to the airport in Nice, custom agents suspected she had the ring and stopped her. The ring was never found.

During the investigation, Payne says she was kept in a “fifth-rate motel” by the Mediterranean. One day she asked the woman in charge for nail clippers and for a needle and thread to mend her dress. She used the clippers to pry the ring from its setting, sewed the diamond into her girdle and then tossed the setting into the sea, she says.

She wore her girdle day and night, even when it was wet from washing. Her room was searched every day, but the diamond remained hidden.

She wasn’t always so lucky. She’s been arrested more times than she can remember. One detective said her arrest report is more than 6 feet long — she’s done time in Ohio, Kentucky, West Virginia, Colorado and Wisconsin. …

Through the decades, she has used at least 22 aliases, among them Audrey Davis, Thelma White, Sonya Dowels, Marie Clements, Donna Gilbert.

How a 75-year-old jewel thief did it Read More »

Robot on the run

From The Age:

Scientists running a pioneering experiment with “living robots” which think for themselves said they were amazed to find one escaping from the centre where it “lives”.

The small unit, called Gaak, was one of 12 taking part in a “survival of the fittest” test at the Magna science centre in Rotherham, South Yorkshire, which has been running since March.

Gaak made its bid for freedom yesterday after it had been taken out of the arena where hundreds of visitors watch the machines learning as they do daily battle for minor repairs.

Professor Noel Sharkey said he turned his back on the drone and returned 15 minutes later to find it had forced its way out of the small make-shift paddock it was being kept in.

He later found it had travelled down an access slope, through the front door of the centre and was eventually discovered at the main entrance to the car park when a visitor nearly flattened it with his car. …

And he added: “But there’s no need to worry, as although they can escape they are perfectly harmless and won’t be taking over just yet.”

Robot on the run Read More »

The printed book results in more handwritten mss

From “William Caxton“, at The Science Show:

More than 500 years later a copy of Caxton’s first edition of Chaucer became the most expensive book ever sold, knocked down at auction in the 1990s for 4.6 million pounds. But in the 15th Century, the obvious appeal of the newly printed books lay in their value for money. Books became so commonplace indeed, that some snobs employed scribes to copy Caxton’s printed editions back into manuscript, while both church and government became alarmed at the access to new ideas that the printing press offered to a widening public. [Emphasis added]

The printed book results in more handwritten mss Read More »