Toggle light / dark theme

(Tech Xplore)—Researchers exploring AI systems are making news and familiarizing the public with terms like reinforcement learning and machine learning. Recent headlines are still making some heads turn in surprise. AI software is “learning” how to replicate itself and to build its own AI child.

As such, Google’s AI created its child AI using , entirely automated.

Meet ‘NASNet.’ Google researchers refer to it as a novel architecture.

Read more

NASA will host a media teleconference at 1 p.m. EST Thursday, Dec. 14, to announce the latest discovery made by its planet-hunting Kepler space telescope. The discovery was made by researchers using machine learning from Google. Machine learning is an approach to artificial intelligence, and demonstrates new ways of analyzing Kepler data.

The briefing participants are:

Read more

But the best science and tech writing goes one step further. With delight and mystery—and sans unnecessary jargon and technical details—this genre can help us better understand some of the world’s most complex and abstract concepts, from gravitational waves (Gravity’s Kiss) to Darwinian evolution (The Evolution of Beauty) to antibiotic resistance (Big Chicken). Each of these remarkable tomes from 2017 does just that, shining a light on the hidden connections and invisible forces that shape the world around us. In doing so, they make our experience of that world that much richer.


Get the best of Smithsonian.com by email. Keep up-to-date on:

Read more

IN AN AGE of nonstop breaches and hacks, getting a handle on your own digital security matters more than ever. But everyone has their own threat model—a set of concerns unique to themselves. The average smartphone user doesn’t need to know what a Faraday cage is; an NSA contractor probably already has a good grasp of security basics. (Or … do they?) In this guide, we’ve included a few ways to improve your online security posture based on those different levels of risk. These won’t prevent the next megabreach or banish ransomware from the earth. They’re not all-encompassing. But they’ll help get you in the mindset of the types of steps you should be taking based on your particular situation. And they’ll help ensure that the next time you read one of those paralyzing headlines, it doesn’t apply to you.


In an age of nonstop breaches and hacks, getting a handle on your own digital security matters more than ever. But everyone has their own threat model—a set of concerns unique to themselves. The average smartphone user doesn’t need to know what a Faraday cage is; an NSA contractor probably already has a good grasp of security basics. (Or … do they?) In this guide, we’ve included a few ways to improve your online security posture based on those different levels of risk. These won’t prevent the next megabreach or banish ransomware from the earth. They’re not all-encompassing. But they’ll help get you in the mindset of the types of steps you should be taking based on your particular situation. And they’ll help ensure that the next time you read one of those paralyzing headlines, it doesn’t apply to you.

Read more