Fun and Games

Watch Google’s DeepMind AI Computer Dominate Old Atari Games

(Screengrab: Google's Atari Breakout).

Google’s artificial intelligence firm, DeepMind Technologies, has been making headlines with a computer that can program itself, a quest for “AI scientists” and software that can learn to play classic Atari games better than a human expert.

Today, a video showing their famed software learning to play Breakout and mastering nine other Atari games including Enduro, Boxing and Demon Attack has resurfaced online. Although it was uploaded to YouTube last April, it seems it’s finally receiving the attention it deserves.   Read More

Dating: The Final Frontier

Silicon Valley Techies Are Signing Up to Be Sugar Daddies

Ms. Kross is the new president of ArrangementFinders.com. (Getty)

Arrangement Finders is a dating site catering to a very specific clientele: wealthy, heterosexual men, and the women who want to date them.

Founded in 2009, the site announced on Friday it was bringing on porn performer and producer Kayden Kross as its new president. We caught up with Ms. Kross to congratulate her on the new position, as well as hear the latest about the burgeoning sugar daddies site. Read More

the robots are coming

This Fleet of Robots Can Identically Forge Handwriting, Signatures

Screen Shot 2015-01-23 at 11.52.03 AM

A new company called Bond specializes in helping busy people keep communication with loved ones personal. Simply type up a note you’d like to send someone, and Bond will put it on stationary in a curly cursive or other friendly font and mail it for you. It’s like in the movie Her, except the message contains your own sentiments. Oh yeah, and it can also be written in your own handwriting, if you so choose.

Bond  has made this possible by building a fleet of robots that can identically copy a person’s handwriting. These are more than the simple autopens that have been signing signatures for decades; these robots go beyond replication, using software that actually learns all the intricacies and imperfections of a handwriting sample—from the way one connects letters to the spaces between words and lines—to produce writing indistinguishable from something the person would’ve written himself. Read More

uber it

Uber Finally Admits They’re a Taxi Company, Applies for License in India

Screen Shot 2015-01-23 at 9.27.42 AM

Uber has always dodged taxi regulation with a Silicon Valley pitch that they’re not a taxi company, they’re a “platform” for connecting drivers to riders. Finally, India has gotten them to drop the shtick.

On Wednesday, Uber applied for a license under New Delhi’s Radio Taxi Scheme, according to an Uber blog post published late last night. In order to comply with the local laws, Uber is going to have to add a panic button to their app, have over 200 cars on the road and maintain a 24-hour call center. Read More

Internet of Things

Press This Button and Something Will Happen on the Internet

Screen Shot 2015-01-22 at 2.21.11 PM

If there’s anything that Netflix, Tumblr and the Internet in general have taught us, it’s that laziness knows no bounds. Still, sometimes we all wish that there was a way to make the Internet do your bidding without actually having to type things out.

Luckily, Internet of Things (IoT) company Spark, a startup that makes kits and cores for building smart devices, is now selling something they call the Internet Button. It’s a physical, light-up, WiFi-enabled button that you can easily program to execute a single, potentially evil command—any command you need, like: Read More

National Security

Pentagon Chief Weapons Tester: Almost All Military Programs Vulnerable to Cyber-Attacks

Screen Shot 2015-01-22 at 12.07.13 PM

As the President pushes dated cybersecurity legislation and Band-Aid solutions, the Department of Defense reminds us that we have much bigger threats to our cybersecurity than shared our HBO Go passwords.

After a year of running dozens of tests and simulations on over 40 military weapons systems, Pentagon Director of Operations Test and Evaluation (DOT&E) Michael Gilmore found that almost all of them have some kind of major cybersecurity weakness.

“Cyber adversaries have become as serious a threat to U.S. military forces as the air, land, sea, and undersea threats represented in operational testing for decades,” Mr. Gilmore wrote in his annual report for 2014. “Any electronic data exchange, however brief, provides an opportunity for a determined and skilled cyber adversary to monitor, interrupt, or damage information and combat systems.” Read More