Scientists Want Your Slips of the Tongue


You know that feeling when you’re halfway through a sentence and can’t think of the next word you need? It’s a word you know, but you can’t quite bring it to mind. There’s a name for that phenomenon…what is it, again?

Oh right, the “tip of the tongue.”

Everyday failures in our speech, like forgetting a word or saying the wrong one, are great fodder for scientists who want to understand language. But they’re hard to study in the lab, because you can’t force someone to make a mistake. Most of the time, we speak just fine.

So University of Kansas psychologist Michael Vitevitch has created an online tool for anyone, anytime, to record their speech errors. It’s like an ongoing goof diary for the public. And he hopes that if enough people use it, the data collected will be useful to the researchers who want to learn more about our minds.

“Most things break at their weak points,” Vitevitch says, “and the systems involved in language processing are no different.” The errors we make in speaking reveal where the weakest links are in the process of turning thoughts into sounds. For example, one of those weak points is getting from the meaning of a word to the word itself—when we can’t make the leap, we have a tip-of-the-tongue problem.

This is the most fascinating type of error to Vitevitch. “You know a word and have used it in the past, but now that you need it, it stays just out of reach,” he says. These errors “are very telling about how faulty and transient our memory can be.” But they aren’t the only mistakes his new online tool will track.

The tool is called SpEDi, for “Speech Error Diary.” It collects three categories of mistakes: words that are misspoken, words that are misheard, and words on the tip of your tongue. Vitevitch describes how SpEDi works in Frontiers of Science.

New visitors to the SpEDi website will be prompted to register. They’ll create a profile that includes details like their education level and what languages they speak. (Errors by multilingual people are especially interesting, Vitevitch says. Rather than making the leap from one word-idea to one word-form, they have to choose between multiple forms.) Then, anytime users make one of these errors—or hear someone else screw up—they can record it.

They’ll be prompted to describe the error in detail. There’s more than one way to misspeak, of course. There’s the malapropism, where you use a word that sounds similar to the one you want but has a totally different meaning (as in the recent headline about the amphibious pitcher). There’s swapping sounds in adjacent words (if you swap the first letters, it’s a spoonerism, named for a certain Reverend Spooner who allegedly made a lot of them). There’s blending two words into one.

If you mishear the lyrics of a song, it’s a mondegreen.* There are whole websites devoted to funny examples of these, but SpEDi is also interested in the non-musical (and unfunny) misheard words. And if you have a tip-of-the-tongue problem, the website will ask for the details of the missing word—even if you haven’t found it yet.

The website also gently asks if you’re sure this word exists. On a seven-point scale, “How certain are you that you will be able to recall this word?” Finally, a space for additional notes lets you record “that the error occurred in a noisy environment,” Vitevitch notes in his paper, or “that an alcoholic beverage had been consumed shortly before the error was made.”

Vitevitch is spreading the word about SpEDi on social media and to other language researchers. Anyone who registers for the site can download all the raw data it’s gathered so far, and use that data for their own research if they want. By opening up the diary to everyone, and leaving it open indefinitely, Vitevitch hopes to build a research tool that’s truly useful.

“I hope people will see that they don’t need to have a PhD to be involved in and contribute to science,” Vitevitch says. For this particular experiment, they only need to be people who have made a mistake. And we all make mistakes.

“Back in college I called my current girlfriend the name of my previous girlfriend,” Vitevitch recalls. “You only make that error once.”


Beyond Tupac Can Hologram Concerts Take Off?


There’s little doubt that if Jimi Hendrix, Janis Joplin or Jim Morrison headlined a concert today, it would be the hottest ticket in town.

It could happen tomorrow.

Entertainment companies are spending big bucks to fit venues with holographic technology capable of resurrecting beloved musicians, comedians and even Jesus Christ. For all the futuristic glitz holograms exude, today’s notable holographic performances are still based on a 19th century parlor trick. However, there are researchers around the world working to bring holographic technology into the 21st century.

Pepper’s Ghost

John Henry Pepper was a British scientist and inventor who’s best known for making a “ghost” appear on stage during an 1862 demonstration at the Polytechnic Institute in London. Pepper fitted an angled pane of glass on stage to reflect a brightly lit actor hiding beneath the stage. The actor’s reflection was refracted through the angled glass and directed onto the stage. As a result, it looked as if a ghost was floating on stage.

It was fitting, then, that 150 years after Pepper’s demonstration, Tupac Shakur appeared on stage at Coachella in much the same way. A Mylar film was placed on the big stage at a 45-degree angle; a high-definition video feed was projected onto a reflective screen, and finally bounced off the Mylar film to create the illusion. Tupac’s head was digitally recreated, then placed atop a body double. Pepper’s Ghost had returned in a big way.

You can see variations of Pepper’s Ghost everywhere: teleprompter screens, Disney’s Haunted Mansion ride and Jimmy Kimmel Live. In fact, the setup is simple enough that you can easily make ghosts appear in your living room with a little effort.

High-Tech Holograms

With the help of scientists around the world, holograms are getting a 21st century makeover. There are labs around the world dedicated to advancing holographic technologies in myriad ways. Take, for instance, the Digital Nature Group in Japan. The DNG team combined femtosecond lasers, mirrors and cameras to produce holograms that you can actually touch. A femtosecond is a quadrillionth of a second, and the team’s laser transmits bursts that last 30 to 270 femtoseconds. The image that results is actually light emitted by the plasma created when the laser ionizes the air.

The result is a holographic image that feels a bit like sandpaper or a static shock. However, an incredibly small image is produced. The DNG team is working on producing larger images with lasers, but the proof-of-concept study means all sorts of science-fiction computer displays may someday be possible. Think back to the move “Minority Report,” and you can get a sense of the type of holographic, tangible display that might be possible.

Commercial Tech

In the meantime, profit-seeking companies are buying up licenses to resurrect our favorite celebrities to put on timeless performances. Alkiviades David, founder of Hologram USA, bought the patent for the technology that created the Tupac hologram. He plans to put on shows featuring Ray Charles, Richard Prior and Liberace to name a few. Even living artists are embracing holograms to perform multiple live shows simultaneously, like Mariah Carey did in Europe a few years ago.

The trick now is to digitally reproduce dead icons in a way that is indistinguishable from the real person, as Vulture reports:

It’s entirely possible, even probable, that, at some point, David’s technology will be fully able to create and project a celebrity digital likeness that’s indistinguishable from the real thing, one that moves fluidly and organically and delivers unerringly consistent performances.

For now, holographic performances are still a 150-year-old illusion that’s yet to hit the big-time.

Electronics-Sniffing Dogs Help Solve Cybercrimes


A dog’s nose knows best, even in the digital age.

By now you’ve probably heard about the downfall of former Subway spokesman Jared Fogle, who has said he will plea guilty to having paid minors for sex and having obtained child pornography. But an interesting factoid of the case is that justice was served thanks to dogs trained to sniff out electronics. From iPads to tiny memory cards, these dogs with a rare talent are finding themselves in high demand in an era rife with cyber crime.

Follow Your Nose

There are just three dogs in the United States trained to find electronic components with their noses. Bear, an electronics-sniffing black lab, helped officers locate 16 smartphones, 10 flash drives and six laptops during an 11-hour search last month of Fogle’s home. How are dogs able to find what to the rest of us has no smell whatsoever?

For some insight, we can look to Jack Hubball, a chemist who discovers the chemical compounds that dogs are eventually trained to find. He identified the so-called accerlerants (gasoline, diesel, kerosene, etc.) dogs should focus on to sniff out arson, and helped train dogs to find narcotics and bombs.

To fight computer crimes, Hubball tested circuit boards, flash drives and other electronics components to isolate a single common chemical in each device, which police are keeping under wraps. After isolating the chemical, it was a matter of homing dogs’ sniffers onto the telltale compound, as Bloomberg reported:

After months of training, the dogs were able to detect the odor of the chemical in people’s hands, concrete blocks, metal boxes and clothing. The dogs also had to ignore distracting smells such as food and coffee.

The dogs have since been involved in numerous child pornography warrants, as well as other investigations where electronic documents were key evidence. After helping with the Fogle investigation, Bear’s trainer says he’s received some 30 inquiries from police who want to buy their own electronics-sniffing dog, the International Business Times reports.

Super Sniffers

Apart from electronics, dogs are putting their noses to work in a multitude of disciplines – from fighting crime to diagnosing diseases. In one of the largest studies of its kind, dogs detected the presence of prostate cancer with 98 percent accuracy in the urine of 600 test patients. Dogs can also detect lung cancer simply by sniffing patients’ breath. Dogs have been used to sniff out bed bugs, explosives, dead bodies, contamination in water and more.

In other words, if something smells fishy, it may be time to call on man’s best friend to lend a helping hand — or snout.


Personal Finance Articles, Not Another One How To Change Your Mind About Your Personal Finance NOW

Many personal finance articles have been written on the issue of money.  Can’t say I have been moved to action by many.  First I’d like to say it is ok that you feel down about the current situation about your personal finances.  I give you permission to feel your feeling for the next 24 hours and then pull yourself by your boot straps and let’s what we can do.

There exist many a definition, I want to share with you  my personal finance definition:

Financial freedom is not an event, it is a skill.

I bet right now with the current economic situation you are saying to yourself, “I just wish I could the lotto!”  Boy don’t we all and yet statistics and personal finance facts show that the majority of people who win the lottery, end up broke and worse off before their winnings! Imagine that.  You among the many seeking wealth, riches, fame few people realize that money isn’t the solution to their problems;  the way you think about money is the problem and the solution.

I can almost see you going oh yeah, give me the money and I’ll show you change in mindset!

My favorite entrepreneur of all times, Henry Ford was once asked, “What if you lost everything you own?” He responded without missing a beat: “I’d have it all back and more within 5 years.”

Being a master of your own personal finance is not about what is in the bank; it’s about the ability to acquire the skill that will show you how to produce new streams of income and wealth based on your knowledge and experience.

So before we go any further on this issue let us tackle the real problem here that is impeding your personal finance for good!  Why you might ask?  Well without the mastery of these 5 steps, your desire for your goal for financial success and financial freedom is highly unlikely!  This is why big players in any industry have coaches, Oprah has a life coach, football players and basketball players have coaches and mentors.  Tiger woods after every bad game will go in for coaching and training.  Why?  Those who achieve great financial success do not go it alone.  They always have a team.  Those who achieve great poverty have the do it yourself mentality!

Why is it important to plan personal finances? Well…here are:

5 Steps That Will Guarantee You Become Master Your Personal Finances

1. How do you think about money? Say you come up with an idea to do something. Do you think that will never work?  Are you afraid to follow through?  Are you scared of loosing money or do you see every dollar spent as an investment?

2. How do you manage and invest your time?  The average man has at his disposal  6 discretionary hours.  This is time they can do whatever they want.  No work, no chores etc.  Many will watch T.V., attend pricey sports events, spend money on meals at a restaurant and movies, see where I am going with this? Do you do personal finance budgeting?

3. How do you leverage the talents and life experiences you ALREADY POSSESS?
Most people see their experiences as failures.  They only talk of how they tried to do something as failed.  Thomas Edison failed more than I care to count, and yet he persisted to light the whole world. Many of life’s failures are people who did not realize how close they were to success when they gave up. Thomas A. Edison

4. Do you have a mentor and coach with a proven personal finance curriculum? This is the true measure of your desire for financial freedom.  This is where you literally put your money where your mouth is, can’t afford a mentor you say?  Well what was the last book you read? Gossip magazines do not count as literature sorry :!

5. What do you think is “risky,” and what do you think is “safe and secure”?  Most people never break into the realm of the 5% wealthy group who own 95% of  the worlds resources because they want to play it safe.  They want the money, the fame, the accolades but they feel they should not have to go through the process of creating this wealth.  No wonder the internet and other places are full of scams and get rich quick opportunities.  Remember this success does not  happen overnight, but one night success does happen.  Someone once said to meFree Articles, it takes 3 years to be an overnight success!

Health Care and Long Term Care The Internet and the Texas Legislature Can Help

Many Americans are now turning to the Internet as a de facto second opinion when it comes to their health, according to a just-released Pew study. In fact, “81% of U.S. adults use the Internet and 59% say they have looked online for health information in the past year.”

With the Internet such a prominent part of our daily lives, this should come as no surprise. Online resources are just one of many ways that people access information about their health, though consulting a physician is still considered very important. But online, one can find much more than a simple diagnosis. AARP Health is just one example, with support groups, webinars, health information, and information on health issues that specifically affect older Americans, such as Medicare and the new health care law.

In Texas–where we have 3 million Medicare beneficiaries, an estimated 5 million family caregivers, and about 100,000 residents in skilled nursing facilities–this provides a very useful set of tools.

These days it’s much easier to find a skilled nursing or assisted living facility. Quality is still an issue that needs to be tackled–and as such it is a major focus of our legislative work in Texas this session. With sources like Nursing Home Compare from or the Department of Aging and Disability Services’ Quality Reporting System, homes and facilities are compared and rated so that the quality of service is right at your fingertips. When it comes to finding the right place for your loved one, nothing could be more important.

More and more people go online to find information these days, and many baby boomers are quite savvy at it. It’s become easier for people to access useful resources about their health: be it for diagnosis, opinion, support, or even to find a physician or facility. This doesn’t have to be a bad thing. People should be able to do some quick comparisons online. But it’s important to differentiate between sources that are reliable and those that aren’t. The web is a vast resource, full of good information, but it’s good to be careful and check multiple sources.

When it comes to your health, the Internet is only one of several resources. It can provide useful background, but always consult a physician for serious concerns.

Of course, the web isn’t only a resource for information and diagnoses. It can be a source of strength and support as well. According to surveys conducted by Pew, a growing number of people use the internet in a more social way. One reason it may be so catching for older adults is the ability to connect with people who may share in their struggles – as this group is much more likely to live with a chronic condition. In addition, a growing number of caregivers use it to connect and better provide for those they care for,

Increased internet access led to a rise in racial hate crimes in the early 2000s

New research from Carlson School of Management Professor Jason Chan and NYU Stern Professors Anindya Ghose and Robert Seamans finds that broadband availability increased the incidence of racial hate crimes committed by lone-wolf perpetrators in the United States during the period 2001-2008. The addition of a single broadband provider led to as much as a 20 percent rise in racial hate crimes in areas where racial tensions were especially high.

Their study, the first of its kind to document the relationship between the Internet and hate crimes, sourced data from the Federal Bureau of Investigation, the Federal Communications Commission, the U.S. Census Bureau and the U.S. Bureau of Labor Statistics. According to FBI data, almost two-thirds of reported hate crimes arose from racial bias, making it by far the most typical form of bias-motivated crime in the U.S.

Using a large-scale data set from 2001-2008, the authors show:

  • An increase in the number of broadband providers led to an increase in racial hate crimes, particularly among lone-wolf perpetrators.
  • The addition of one broadband provider in every county in the U.S. would have caused 865 additional incidents of racially driven crimes on an annual basis.
  • Yet the Internet’s impact on hate crime was not uniform and was predominantly present in areas with higher levels of racism, identified by the amount of racial segregation present and the proportion of racially charged search terms used.
  • Greater Internet access did not cause an increase in the formation of off-line hate groups. However, it may have enhanced the efficiency with which extremists could spread hate ideology and spur like-minded individuals to carry out lone-wolf attacks.

Furthermore, the authors consider the effectiveness of current Internet regulations and reflect on future policy implications. “Technologically driven solutions fall short in addressing an issue that is inherently social in nature,” argues Professor Ghose. “Instead of engaging in a technological rat race with extremists, we should consider incorporating critical literacies — including digital media, anti-racism and social justice — into school curricula as an alternative strategy.”

“The positive relationship between broadband providers and the number of hate crimes is mainly found in places that have high levels of racism,” says Professor Chan. “The likely reason behind this is the Internet facilitates this specialization of interest. That is to say users will search out content online that is congruent to their beliefs or preferences and are not as likely to look up content that is counter to what they believe in.”

Why Advertisers Should Work With an Agency Trading Desk

Many advertisers chose to manage programmatic buying in-house, but outsourcing to an agency trading desk can be a better option for small and midsized advertisers. Here are five reasons why:

1. Skill is important when it comes to programmatic media buying. Agency trading desks (ATDs) are specialists because programmatic media buying is their primary focus. They’re constantly running campaigns for multiple clients and handling a consistent influx of media spend. Furthermore, they focus on serving similar clients, enabling them to become experts at campaign management for a specific industry (e.g., pharmaceutical, automotive). The ATD’s insight into the success and failure of other industry players ensures that their clients keep up with the competition and learn collectively from others’ mistakes.

2. ATDs can expertly run campaigns across multiple platforms (demand-side platforms and other related technologies) at scale. Successfully managing a large number of campaigns across platforms isn’t a piece of cake. In addition to a main demand-side platform (DSP), the ATD may have several specialists DSPs that serve as niche retargeting platforms by excelling at techniques like CRM or trigger email. The ATD will also have a couple audience data management platforms in their stack. It will use an ad server for the purpose of serving complex creatives, working with rich media and HTML5 creatives, and even for executing custom ad formats. An ad server can also be used to collect attribution-based data for reporting purposes. The ATD will need to bring performance data together on a reporting or performance aggregation platform. Operating multiple types of technologies in tandem requires knowledge about how to connect these ad technologies effectively for different types of clients.

3. ATDs benefit from the ownership and use of historical bidding data. (This is, of course, assuming that the ATD uses a DSP that allows it to collect bidding data.) When running repeat campaigns for the same customers, ATDs can use historical data to improve performance. This becomes really handy if an ATD is working with a customer who has campaigns that are conversion focused.

If you’re training an algorithm, a certain number of positive actions are required to create an example group for the algorithm to learn, train and build a bidding model. Usually, you’ll need to accumulate at least 100 positive actions or conversions for the algorithm to learn. For a small advertiser, 100 conversions is a big number. Hence, if the ATD is accumulating historical bidding data, it’s laying the groundwork for more efficient algorithm training and launching campaign optimization algorithms that are conversion focused.

4. A small advertiser with $5,000 for display ads can accumulate some data, but it will be minuscule compared to what an ATD accumulates across its entire client base. By managing multiple clients and aggregate budgets, an ATD learns the best places to buy and direct buy. It can also conduct better buys by leveraging different clients across an industry to achieve economies of scale. With more money to bargain with, the ATD simply has more power to reach the places a small advertiser can’t alone.

5. An ATD has tags all over the place, which is incredibly useful for collecting audience data and retargeting. For example, if an ATD has 10 different automotive clients, it will collect a similar audience for these similar companies. If it collects a wide variety of different, smaller variables, it can start to describe micro populations within the larger automotive audience. A smart ATD will make sure its data is fed into a powerful data management platform that will make it easy to conduct lookalike audience modeling and find new, targetable audience segments. Running many campaigns is a valuable experience for ATDs. It’s an opportunity to learn as much as possible about targetable audiences. This information can help ATDs create and improve audience segments. (Individual advertisers would rarely achieve the necessary volume or scale.)

Ultimately, a smaller advertiser will find that an ATD can offer a lot when it comes to programmatic media buying.

Ivan Roubtsov  is the director of marketing at Quebec, Montreal-based AdGearOpens in a new window, a digital advertising technology company providing software and services for the digital media industry

Did ISIS Sympathizers Create Fake Facebook Page for U.S. Cop

An unknown individual used a retired Colorado state trooper’s identity to set up a fake Facebook account and friend both real cops and apparent ISIS sympathizers, officials revealed in a recent internal bulletin.

“[We assess] with high confidence that it was designed under false pretenses to gather information regarding law enforcement members,” said the bulletin from the Colorado Information Analysis Center, a division of the state’s Department of Public Safety.

Authorities said the account was created Oct. 12, and CIAC contacted the retired trooper the next day. He said he was unaware of the account.

Some of the individuals who accepted friend requests from the account were current law enforcement officers. Others “appear to be sympathizers of [ISIS],” said the bulletin. “Some individuals are possibly members with radical Islamic ideology and anti-Semitic beliefs who have gruesome pictures of beheadings and killings on this social media site.”

Imagery from a Facebook account that friended a fake Facebook account established using the identity of a retired Colorado state trooper. CIAC

The bulletin showed some of the photos posted by the apparent jihadis, and warned police officers that terrorists might try to harvest their personal information via social media in order to launch an attack.

“International terrorist organizations and criminal domestic groups continue to violently target law enforcement and military members in the United States,” the bulletin said. “They seek to exploit their personal information on social media.”

CIAC reminded officers to be careful with their social media and with “whom they allow into their digital community. Please review the requester’s entire profile and avoid relying on mutual friends to assess the legitimacy of the requestor.”

Capt. J.P. Burt, director of CIAC, told NBC News that the incident was both instructive and disconcerting.

“Luckily, we caught it [the fake account] very early, but it’s scary,” said Burt, who thinks the intrusion was a sign of broader efforts to exploit “gaps and weaknesses” among law enforcement and the military.

Burt would not identify the victim, elaborate on who could be responsible or say whether the account was created in the U.S. But he said that amid rapid changes in technology, the intrusion served as a warning to everyone from cops to the public at large not to “take friend requests or e-mail at face value.”

“We as a society have to be responsible and not believe everything we see on the Internet,” Burt said. “You have to vet it.”

The FBI would not comment on the fake Facebook page, but a spokesperson said the page was the kind of threat the FBI usually investigates.

A senior U.S. intelligence official said “Facebook Phishing” is a tactic that had previously been employed by terror groups, but had not yet been used by ISIS.

Cybersecurity consultant Suzanne Vautrinot, a retired Air Force major general who formerly headed the service’s Cyber Command, said she was familiar with this form of cyber spoofing from criminals, but not terror groups.

Vautrinot said the technique may proliferate. “It’s a fact of life that it’s difficult to find, but particularly difficult to prevent,” she said. “Because it’s so successful, it will be widely used. It doesn’t take a lot of brain power.”

On Friday, the Office of the Director of National Intelligence released video showing how enemies of the U.S. can use social media to gather intelligence on individuals and ultimately defense contractors and the intelligence community.

Earlier this month, federal prosecutors charged a hacker living in Malaysia with giving ISIS more than a thousand names of Americans, including diplomats and local government officials, for a kill list. Ardit Ferizi, originally from Kosovo, had culled the names from 100,000 identities stolen from the Phoenix server of an unnamed U.S. retailer.

Cyber Warriors Need Not Be Soldiers

Throughout history, warriors of all cultures have trained their bodies to endure physical hardship and combat, whether they wielded swords and shields or carried guns and ammunition. In the 21st century, countries such as China and Estonia have recruited a new breed of warriors who fight as part of cyber militias rather than as official military personnel in uniform. Such cyber warriors often represent civilians with high-tech jobs who spend their days tapping away at keyboards rather than practicing how to accurately shoot an assault rifle or pass fitness tests. A number of U.S. military officers and national security experts say that the United States also needs to begin recruiting tech-savvy civilians without requiring them to become traditional soldiers.

The U.S. military has trained a growing number of uniformed cyber warriors. But it faces a special challenge in recruiting a certain caliber of computer professionals who would rather work at high-paying jobs in Silicon Valley than enlist for military service. That issue came up during a session of the “Future of War” conference hosted by the New America Foundation on Feb. 25, when an audience member asked a panel of experts if the U.S. should “militarize” the country’s technological talent and resources in Silicon Valley.

“Somebody who is high on Coke, skittles and slinging code is not a good candidate for basic training,” said Brad Allenby, professor of engineering and ethics at Arizona State University, in response.

Giving Up Guns for Computers

U.S. military generals have previously echoed Allenby’s sentiment in less colorful terms. Lt Gen Robert Brown, commander of the U.S. Army Combined Arms Centre at Fort Leavenworth, spoke about the challenge of recruiting individuals with cyber skills who were “not natural candidates for a military career” during a previous New America Foundation event in December, according to The Telegraph. The general talked about possibly lowering or removing the physical and combat training standards for cyber warriors.

“They grew up on Google and wear ponytails,” Lt Gen Brown said. “We need to look at ways to bring them into the Army without necessarily going through the same training procedures as our combat troops.”

One possible approach was voiced by Lt Gen Edward Cardon, commanding general for United States Army Cyber Command. Lt Gen Cardon talked about the long-term goal of recruiting 30 percent of the U.S. Army Cyber Command’s talent from civilians through a two-year career field. He spoke during another New America Foundation conference called “Cybersecurity for a New America” on Feb. 23

The U.S. is not alone in trying to ease military training standards for cyber warrior recruits. The U.K.’s Ministry of Defense plans to waive physical fitness requirements on a case by case basis for a new cyber reservist unit made up of 500 computer professionals, according to The Telegraph. Such reservists will also be exempt from carrying weapons or being deployed abroad.

That U.K. approach may prove more appealing for computer experts than serving as a traditional military reservist. But Peter Singer, a strategist and senior fellow at the New America Foundation, suggested that U.S. should consider a civilian militia approach that exists outside the traditional military. During the Future of War conference, Singer pointed to the Estonian Cyber Defense League as a leading example.

“The Estonia model is more like a militia model or a civil air patrol model where you’re pulling in experts but not dropping them into a formal military organization,” Singer said.

You’re in the Cyber Militia Now

Estonia formed the Estonian Cyber Defense League after suffering from cyber attacks during a 2007 incident involving tensions with Russia. The hackers behind the 20o7 cyber assault launched Distributed denial of service (DDoS) attacks that targeted Estonia’s reliance upon Internet service for a fully-functional government and economy. The cyber attacks disrupted credit card and automatic teller transactions for several days, took down the government’s parliamentary email server and crippled the IT capabilities of government ministries.

As a paramilitary organization, the Estonian Cyber Defense League includes some of the country’s best information technology and security professionals from both the public and private sectors, according to LTC Scott Applegate, author of a 2012 paper titled “Leveraging Cyber Militias as a Force Multiplier in CyberOperations.” Such a cyber militia provides motivated civilians with a way to serve in times of crisis without having to formally join the military.

Still, Singer observed that the U.S. Department of Defense and defense contractors might hesitate at the idea of a cyber militia intruding on their turf. He also pointed out that Silicon Valley remains largely distrustful of the U.S. national security establishment, especially after Edward Snowden’s leaks of National Security Agency files revealed widespread surveillance of the Internet and cellular networks. That culture gap means many computer professionals many not be so eager to heed Uncle Sam’s call to become cyber warriors.

The U.S. has already fallen behind the times in recruiting either a cyber reservist force or cyber militia. China has organized a civilian cyber militia to support its military since 2005; even earlier than the Estonian Cyber Defense League. The Chinese cyber militia consists of “workers with high-tech day jobs” who “focus on various aspects of military communications, electronic warfare, and computer network operations,” according to the annual report by the U.S.-China Economic and Security Review Commission released in 2012.

How Facebook Keeps Paul Walker’s Memory Alive

Picture a group of mourners surrounding a tombstone within a huge graveyard. Their voices blend together in a respectful murmur of words such as “Miss you so much” and “You always gonna be my brother.” Then the imaginary tombstone’s face displays an image of actor Vin Diesel, his head bowed as if in grief, standing opposite deceased actor Paul Walker. The tagline “One last ride” appears above the film title “Furious 7.”

The seventh film in the high-octane “Fast and Furious” franchise may appear to be an unlikely vehicle for memorializing Paul Walker, who died in a car crash on Nov. 30, 2013. But the real-life relationships of the close-knit “Fast and Furious” cast and the running theme in the films about the importance of family make “Furious 7″ a surprisingly suitable vehicle for sending off Walker in style—especially given that the actor’s brothers helped finish filming the movie in his place. In that spirit, Walker’s official Facebook page has become an online memorial to the deceased actor that also promotes the newest film in the “Fast and Furious” franchise. Fans flock to Paul Walker’s page to both pay their respects and get hyped for the actor’s last appearance in the series.

“A lot of my research has found that postmortem social networking practices are not sanctified,” said Jed Brubaker, a Ph.D. candidate in the department of Informatics at the University of California, Irvine. “While there is a kind of reverence that enters into these spaces, it doesn’t have the overwhelming sense of a graveyard. Instead, what we find is a blend of a familiar social media genre form of communication intermixed with a more traditional funerary style similar to how you would talk at a funeral or gravesite.”

Brubaker has collaborated with Facebook in studying death and social media since last year, but has conducted research on such topics for the past six years. While his research hasn’t focused specifically on celebrities, he sees many similarities between the fan comments left on Paul Walker’s Facebook page and the comments left on the Facebook profiles of ordinary people who have passed on.

The rise of Facebook and other social networks has changed the cultural way that people approach death, Brubaker explains. When Facebook profiles linger on beyond the lives of their owners, they allow people to maintain a continuing relationship with the deceased. Friends and family can often still post to the dead person’s profile, send them messages and browse through the photos of the deceased. Facebook allows for such relationships with deceased Facebook users through its “memorialized account” feature and “legacy contact” option that allows people to designate someone to manage their memorialized account after they die.

“Social media is a place where the kinds of things you could do to interact with people while they were alive are still available after they die,” Brubaker said.

Paul Walker’s Facebook page isn’t exactly the same as any given person’s personal profile. For one thing, it’s a Facebook page tailored for businesses, brands and organizations rather than personal Facebook profile. Walker seemed to personally post messages to the Facebook page every now and then. For example, his last message wished people a happy Thanksgiving. But most messages were posted by a team of publicists under the collective name “Team PW.”

The nature of relationships with a celebrities also makes a difference in how fans continue to interact with Walker’s Facebook page. It’s probably safe to assume that most never actually got the chance to meet Walker in person and form a personal connection. Fans grieved for Walker, but the nature of their relationship with him through social media didn’t necessarily change much.

“The ways that someone can be a fan are still available after Paul Walker has died,” Brubaker said. “In the case of a celebrity death, the individual relationship to the deceased hasn’t changed because they never met in real life.”

One thing that people can find “incredibly distressing” is when a memorialized Facebook profile posts a status update. Even if the family member or another legacy contact signs the message, the appearance of a dead person’s profile posting a message can still seem haunting to the deceased’s Facebook network, Brubaker explained. He added that the team managing Walker’s Facebook page seems to try avoiding such confusion by signing all messages with “Team PW” and avoiding the use of first person pronouns such as “I” or “We.”

The release of “Furious 7″ and Walker’s continued social medial presence have helped keep the actor in the public eye. “Fast and Furious” castmates such as Vin Diesel and Jordana Brewster have made emotional speeches remembering Walker in the run-up to the release of the latest film.

At the same time, Walker’s Facebook fan page maintains almost 40 million “likes” and continues to attract thousands of “likes” and “shares” for each new status update post. A survey commissioned by Variety last year showed that Walker was more influential than living Hollywood celebrities among Americans between the ages of 13 and 18.

Most deceased people’s Facebook profiles won’t attract nearly as much attention as the Facebook fan pages of celebrities. But just having that digital presence after death allows for each individual’s “fans”—family and friends—from all different geographic locations to continue celebrating and remembering the deceased for a long time afterward. Many family and friends return year after year for certain anniversaries or other events, Brubaker said.

“One thing I find interesting is how, by virtue of us all having pages or profiles that remain on Facebook or other social media platforms, we all get a micro form of celebrity in a sense,” Brubaker said. “That is a substantial difference you can see social media having on everyday American deaths.”

When Robot Personalities Mimic the Dead

Hollywood actress Audrey Hepburn and martial arts legend Bruce Lee represent just a few of the dead celebrities whom have been resurrected as digital avatars in TV commercials to sell products such as chocolate or whiskey. A Google patent raises a new possibility by describing robot personalities based upon the voices and behaviors of dead celebrities or loved ones. Such a vision may not necessarily come true, but it raises the question of whether people would feel comfortable dealing with a robot that actively mimics deceased people.

The patent awarded to Google on March 31, 2015, focuses on the idea of creating robot personalities that could be downloaded as software and transferred between different robots through an online service. It also describes the idea of creating customizable robot personalities tailored to the preferences of human users. That lays the groundwork for a future where robotic hardware could update and switch their software personalities based on the specific human customers they’re serving. The patent also covers the idea of a base personality that act out different moods such as happiness, fear, surprise, and thoughtfulness. Google’s patent even uses well-known celebrities — such as a perplexed “Woody Allen robot” or a derisive “Rodney Dangerfield robot” — to describe a range of possible robot moods.

“The personality could be multifarious, in the sense of multiple personalities, which may be selected by the robot according to cues or circumstances, or a personality could be selected by a user (a human),” according to the Google patent. “The robot may be programmed to take on the personality of real-world people (e.g., behave based on the user, a deceased loved one, a celebrity and so on) so as to take on character traits of people to be emulated by a robot.”

To be fair, companies frequently patent ideas that never become commercial products for one reason or another. On the other hand, Google has gone on a notable robot buying spree by snapping up at least eight robotics companies in six months just last year. The technology giant clearly sees a big future in robotics one way or the other. And as the patent suggests, the company has put some thought into how future robots might socially interact with humans on a more regular basis.

Bring Out Your Dead

Customizable robot personalities represent a logical extension of smartphone assistants such as Apple’s Siri. But the “deceased love one” and “celebrity” personality examples described by the Google patent almost certainly won’t meet with universal joy and acceptance if they ever become a reality. We only need to look at past commercials that resurrected deceased celebrities as computer-generated avatars to get some idea about the people’s possible reactions, said Karl MacDorman, a robotics researcher at Indiana University. MacDorman has spent much of his research career studying the “uncanny valley,” an idea that describes how certain human-like figures in animated films or robotics can come off as appearing eerie or creepy.

The idea of using dead celebrities in commercials was alive and well even before the arrival of modern computer-generated imagery (CGI) techniques; older commercials simply combined old footage of the celebrities with new footage through computer compositing techniques. Remember John Wayne in all those Coors Light commercials? How about Fred Astaire dancing with a Dirt Devil vacuum cleaner? Or Audrey Hepburn being repurposed for selling Gap jeans?

More recently, the advancement of CGI technology has allowed advertising executives to direct the digital avatars of deceased celebrities in ways that they never acted before while still living. That has given rise to controversial cases such as a digital avatar of Orville Redenbacher cracking awkward jokes about mp3 players in a 2007 popcorn commercial. YouTube comments ranged from some people being impressed to others describing the digital avatar’s look as “creepy” or like a “zombie.”

MacDorman personally thought that the digital recreation of Redenbacher lacked authenticity, in part because the voice in the commercial failed to capture the real-life Redenbacher’s distinctive Indiana accent. But the robotics researcher also conducted an informal poll of about 20 people to gauge their reactions to the Orville Redenbacher commercial.

“Some people thought it was Orville Redenbacher, and it didn’t bother them at all,” MacDorman said. “Others could tell it was computer generated. Others thought the idea of resurrecting Orville Redenbacher was really sick. There was quite a diversity of opinion.”

In 2013, martial artist Bruce Lee was digitally resurrected for a Johnnie Walker whiskey ad. That commercial drew less controversy about the appearance of the digital avatar — perhaps because of the better CGI — but still drew disapproving comments about the use of Lee’s likeness to sell whiskey. Some people suggested that the whiskey commercial was disrespectful because Lee was a “health nut” who was never big on alcohol, according to Time.

Last year, actress Audrey Hepburn was given the digital avatar treatment in a Galaxy (Dove) chocolate commercial. That commercial was generally successful in winning over audiences, judging by the YouTube comments. Rather than having Hepburn hawk the product directly to customers, the commercial featured the digital Hepburn in a romantic scene vaguely reminiscent of some of her more famous Hollywood roles. It even plucked at heart strings with the inclusion of the famous song “Moon River” sung by Hepburn in the 1961 film “Breakfast at Tiffany’s.” Altogether, the commercial wisely allowed Hepburn to stay in character, MacDorman said.

Maybe some future robot owners might find it amusing or even comforting to have their robot speak and behave like their favorite celebrity, dead or alive. Whether or not such a future might happen depends in large part upon how celebrities and their descendants — or whatever entity owns the right to their likeness — choose to participate in such projects. For example, fans of deceased comedian Robin Williams might be either relieved or disappointed to find out that he chose to restrict exploitation of his likeness for at least 25 years after his death, according to the Hollywood Reporter.

We Have the Technology

But individuals could still choose whether or not they would want robot personalities based on a “deceased loved one.” The technology may already exist for enabling a robot personality that can partially simulate a real-life person’s personality. A real-life person’s interactions with other people could provide behavioral data for developing a robot personality based on the person, MacDorman said. Ideally, the real-life person might even directly control the robot’s behavioral actions for a while so that the robot could build up a database of behavior. Existing software can already create a synthesized version of someone’s voice based on vocal samples.

The Google patent describes an example of how a personality program could vacuum up information from a person’s smartphone or laptop to create a new personality based on a living or dead person:

Adoption of a personality, or some personification attributes, could be more direct, such as a simple user command to adopt a character by name: “Be mom”; “Become Gwynneth”; “Adopt persona Beta.” The character (personality) may be a program already stored, or it could be something in the cloud. If the later, the robot would interact with the cloud to pull sufficient information regarding the “new” persona to thereby recreate a simulacrum for the robot. The information for the persona could also come from a user device. Such as, in response to a “Be mom” command, “mom” may not be known to the robot. The robot processor can then search user devices for information about “mom”… For example, the robot may be able to determine “mom’s” voice from recordings, and further how the user interacts with “mom” from text messages and recordings. A photograph of “mom” may result in a display for the monitor of FIG. 2C.

Google may or may not choose to ever provide future robot owners with such robot personality options. But whatever the legal situation, such options will almost inevitably spark broader discussions among individual families and within society as a whole about resurrecting the dead in robotic form.

“While an individual may find comfort in having a robot or digital double impersonate a deceased loved one, others may well find this creepy, and the practice could be stigmatized,” MacDorman said.

X-Ray Vision of an Exploding Lithium Ion Battery

Lithium-ion batteries have drawn lots of headlines in recent years, and not in a good way. From the fires caused by the batteries in Boeing planes to exploding Tesla car batteries, these ubiquitous batteries powering our tech have shown they have a dark side.

These fiery events are extremely rare. However, scientists want to understand why these explosions occur, especially since phones, tablets and automobiles will be increasingly reliant on these batteries in the future.

And this week scientists took a big step toward discerning the root cause of blow-ups, by observing and recording a lithium-ion battery meltdown, for the first time, using X-ray vision.

Thar’ She Blows!

The experimental design was quite simple: Scientists subjected two commercially available lithium batteries to external heat. Then, they filmed the batteries using thermal and high frequency X-ray imaging. The goal was to determine how, and when, a runaway reaction (aka, BOOM!) occurred.

Scientists found that lithium-ion batteries start to break down when temperatures reach 194 degrees Fahrenheit. As the temperature rose, thermal and chemical reactions inside the superheated battery produced gas pockets that deformed the spiral layers inside the cell.

This set up a domino effect that led to higher temperatures and more gas. The gases built up until there was nowhere to go but out. When the battery literally blew its lid, hot gas and molten material jetted out. Meanwhile temperatures inside the cell hit 1,985 degrees — hot enough to melt copper — researchers reported Tuesday in Nature Communications.

Making Batteries Safer

Scientists hope their findings help engineers better understand the explosive personality of lithium ion batteries, and design safeguards against disaster. Future research may look into other common assaults, such as stabbing and crushing the batteries, to see how, exactly, they fail.

Google Envisions Robot Remote Controls That Know Your Face

Cuddly robot toys such as Furby or AIBO the robot dog have won many human hearts and minds over the past decade. That may be why Google researchers envision the possibility of turning such robot toys into intelligent remote controls for home entertainment systems. But the idea of a teddy bear or doll constantly watching or listening in a home has already stirred some controversy about home privacy.

A Google patent application spotted by SmartUp, a legal technology firm, describes how an “anthropomorphic device” with hidden cameras for eyes and microphones for ears could automatically translate simple voice commands into actions that activate smart TVs, DVRs, DVD players and other devices. Instead of manually pushing buttons on remote controls or even a large universal remote control, people could simply tell their robot remote control to stream the latest episode of a favorite TV show through their Blu-ray player or Apple TV. The Google patent — filed in 2012 but published on the U.S. Patent and Trademark Office website on May 21, 2015 — suggests that the anthropomorphic device could simplify the process of accessing TV shows and movies through the growing swarm of home devices and online services. The patent also includes drawing concepts for the lovable robot toy as a teddy bear and a stuffed rabbit.

“There are at least some advantages to an anthropomorphic device taking on a familiar, toy-like, or “cute” form…” according to the Google patent application. “Some users, especially young children, might find these forms to be attractive user interfaces. However, individuals of all ages may find interacting with these anthropomorphic devices to be more natural than interacting with traditional types of user interfaces.”

The device — let’s just call it “Teddy” — would work something like this. If Teddy detects a person in the room, it would look at that person so that its camera and microphones are pointed in his or her direction. The Teddy might simply recognize the person visually through its camera. Or it might turn its head in the direction of the person based on the sound of his or her voice. A person could also directly address Teddy by name or by using certain keywords, which would be Teddy’s cue to look in his or her direction. Teddy might even use video captured by its camera to read the lips of someone speaking, in case the audio coming in through the microphone is too soft or distorted.

The Teddy may not necessarily take the form of a physical toy; Google’s patent application also allows for the possibility of a hologram or a virtual avatar that only appears on a screen. But the main function of being able to translate voice commands into actions for coordinating home media devices would remain the same in any case. Google’s patent specifically describes the possibility of the Teddy device communicating with an “cloud-based” online server that could handle much of the computer processing. Alternately, the Teddy device might be a more capable robot with its own self-contained computer processing power and data storage.

They See You When They’re Sleeping

It’s worth keeping in mind that companies file patents all the time which never translate into commercial products. Still, Google’s patent idea for a smart Teddy has already led to some alarm. Representatives for watchdog groups expressed worries about a cuddly device capable of constantly monitoring people with cameras and microphones. “The privacy concerns are clear when devices have the capacity to record conversations and log activity,” said Emma Carr, director of Big Brother Watch, in a BBC News interview. “When those devices are aimed specifically at children, then for many this will step over the creepy line.”

Google’s patent idea includes a description of how Teddy might still be listening or detecting movement even when it appears to be “asleep.” This makes sense if you want to save battery power for Teddy by having a “sleep mode” that still allows it to respond when needed, but it does admittedly come off sounding a bit eerie.

It should be noted that while the anthropomorphic devices described herein may have eyes that can “close,” or may be able to simulate “sleeping,” the anthropomorphic devices may maintain their camera and microphones in an operational state. Thus, the anthropomorphic devices may be able to detect movement and sounds even when appearing to be asleep. Nonetheless, when in such a “sleep mode” an anthropomorphic device may deactivate or limit at least some of its functionality in order to use less power.

Other possibilities for Teddy include having a “profile” of each resident in a home. That would allow Teddy to tailor its actions and responses to individual residents, but it would need to store representative voice samples or possibly a facial picture so that it could recognize people by their voice or face. A separate Google patent application on robots with multiple personalities tailored to the preferences of individual people — even personalities based on dead celebrities or family members — could also theoretically come into play and allow a Teddy to change its behavior based on the person it’s interacting with.

How Robot Remote Controls Can Respect Privacy

The early concerns swirling around Google’s patent idea are similar to those that have arisen around existing smart devices designed for home entertainment. For example, Samsung’s Smart TVs have a voice recognition system that allows people to change the channel or volume level with voice commands. Such smart TVs already caused some controversy over fears that they were recording people’s living room conversations, which prompted Samsung to post a clarification about the data being stored. Similarly, Microsoft had to assuage privacy concerns over its Xbox One and Kinect accessory that can capture videos, photos, facial expressions and even read heart rates.

For the most part, Google’s patent idea for Teddy seems to mainly put a personable face on existing home entertainment devices; it’s the difference between interacting with a cuddly robot toy and a faceless remote control or device. It also hints at a possible future of homes filled with social robots designed to interact well with humans. Such social robots would likely have many, if not most, of the capabilities found in Google’s patent filing.

Certain design choices may lead people to see a Teddy device or social robots as behaving in a creepy manner, but they don’t necessarily compromise home privacy any more than the Microsoft Kinect or any existing devices that can silently monitor people’s behaviors. It’s up to companies to have transparent privacy policies that explain what a Teddy or any smart device can or can’t do. If companies also clearly allow customers to set privacy levels on devices, that may go a long way toward reassuring fears over the future Teddy sitting on the couch.

UPDATE: A previous version of this post mistakenly described SmartUp as a law firm. I’ve corrected the post to reflect the fact that SmartUp is actually a legal technology firm that has a platform for connecting consumers with attorneys.