What Happens to Society When Robots Replace Workers?
The technologies of the past, by replacing human muscle, increased the value of human effort – and in the process drove rapid economic progress. Those of the future, by substituting for man’s senses and brain, will accelerate that process – but at the risk of creating millions of citizens who are simply unable to contribute economically, and with greater damage to an already declining middle class.
cotton gin... same union propaganda prognostication. Look at how labor intensive the farm used to be as compared to now. Linear thinkers are always wrong, as are Progressive socialists, Rinos, etc. The only thing that drives workers out of work is Gubbermant minimum wage laws, and that is just economics.
Counting the days to commercial fusion. It is not that long now.
mvanwink5 wrote:cotton gin... same union propaganda prognostication. Look at how labor intensive the farm used to be as compared to now. Linear thinkers are always wrong, as are Progressive socialists, Rinos, etc. The only thing that drives workers out of work is Gubbermant minimum wage laws, and that is just economics.
That may be how things worked out in the past, but can you not conceive of the possibility that we may see a paradigm shift in the future?
This thread is mostly devoted to the killing-robot super soldiers, but when you've got a humanoid robot good enough to work as a soldier, you've likely got one or will soon have one good enough to mow lawns or wait tables, or any number of other things.
I see the possibility all too clearly that we may eventually render a huge chunk of the current workforce pointless.
What then?
‘What all the wise men promised has not happened, and what all the damned fools said would happen has come to pass.’
— Lord Melbourne —
A man is always worth what he can produce. When some factor (like minimum wage and mandated benefits) makes the cost of employing him more than the value of what he can produce he becomes unemployable.
The daylight is uncomfortably bright for eyes so long in the dark.
The blurring of boundaries between sites can lead to other problems when the site violates users' expectations. Other times, inline linking can be done for malicious purposes.
Content sites where the object is stored and from which it is retrieved may not like the new placement.
Inline linking to an image stored on another site increases the bandwidth use of that site even though the site is not being viewed as intended. The complaint may be the loss of ad revenue or changing the perceived meaning through an unapproved context.
Cross-site scripting and phishing attacks may include inline links to a legitimate site to gain the confidence of a victim.
Pay-per-content services may attempt to restrict access to their content through complex scripting and inline linking techniques.
Inline objects can be used to perform drive-by attacks on the client, exploiting faults in the code that interprets the objects. When an object is stored on an external server, the referring site has no control over if and when an originally beneficial object's content is replaced by malicious content.
The requests for inline objects usually contain the referrer information. This leaks information about the browsed pages to the servers hosting the objects (see web visitor tracking).
You can do anything you want with laws except make Americans obey them. | What I want to do is to look up S. . . . I call him the Schadenfreudean Man.
Training and Operation of an Integrated Neuromorphic Network Based on Metal-Oxide Memristors http://arxiv.org/abs/1412.0611
Despite all the progress of semiconductor integrated circuit technology, the extreme complexity of the human cerebral cortex makes the hardware implementation of neuromorphic networks with a comparable number of devices exceptionally challenging.
...
We believe that this demonstration is an important step towards the implementation of much larger and more complex memristive neuromorphic networks.
(I get this feeling that Skynet is using us to advance itself, but I can't stop! "Choose the form of your Destructor...")
As mentioned in the comments, that is a very misleading article.
The short version is, you must have the following for the malware to work: a rooted phone, be using a chinese app store (instead of Google Play), install an infected app, and then manually give the app root permissions.
Not really a threat for the vast majority of users.
Thanks for this. I was not worried for myself as I use an iPhone, but this is still the kind of thing people need to be aware of.
I once had a girlfriend who's phone called me without her permission. I listened to her walking down the street, yucking it up with her girlfriends while on her way to a nightclub. I was actually shouting into her phone telling her she had called me by mistake, but she never heard me. After about ten minutes I hung up.
Imagine my surprise the next day when she told me she had stayed home sick the night before. . .
Two and only two dates, despite she was on the outside, just as beautiful as a woman can be. Betrayed by a phone that was smarter than she was.
"Courage is not just a virtue, but the form of every virtue at the testing point." C. S. Lewis
Diogenes wrote:If I recall properly, Zuckerberg, Gates and Stephen Hawking have been making ominous noises about the future ascent of the machines.
Elon Musk actually owns stock in some AI company because he wants to stay abreast of the situation. When asked what specifically he's worried about he basically says he doesn't know, but he knows there is a threat there to be taken seriously.
Too there is some religious warrant for the concern since the Christian apocalyptic texts speak of two "Beasts", the first of which breathes life into the second (which is the first beast's image). It's not too hard to equate breathing life into something as creating AI.
"Courage is not just a virtue, but the form of every virtue at the testing point." C. S. Lewis
GIThruster wrote:Thanks for this. I was not worried for myself as I use an iPhone, but this is still the kind of thing people need to be aware of.
Having an iPhone does not protect you from malware of this type. In fact, an Android and iPhone developer posted to confirm what was needed for this to work, and he mentioned that its actually easier on an iPhone for the malware to take over as (unlike Android) the iPhone doen't prompt the user to verify whether the app should be allowed root permissions when it requests them (the final step in my list). This, to me, makes the iPhone slightly less secure even though overall there is probably equal risk between the two.
I don't understand. You're saying that android viruses can infect iPhones despite they have a different operating system? If this is so, why do they call them "android viruses"?
"Courage is not just a virtue, but the form of every virtue at the testing point." C. S. Lewis