Double-edged swords are the rule, rather than the exception, it seems and it is in general a monumental communications failure that risks and vulnerabilities are not sufficiently (publicly) acknowledged and appropriately managed. Should technology creators be held responsible for the potential disorder and malfeasance to which their products and technologies are applied? Notwithstanding the economic […]
Category: technology
A game of information, influence and seeded (or targeted) turbulence is unlikely to be winnable (or won) by reproducing and reinforcing the structural, organisational components that merely reproduce and self-validate the axioms, grammars and rules of that game. These games are won by rewriting the rules; by extending an existing grammar and logical framework in […]
The accelerating hyper-inflation of information and communications technology networks and systems is an overextended structural entity. The primary reason it does not immediately collapse back upon itself is the existence of uncertainty, useful ambiguity and logical entropy. The more components and logical relationships we have, the more those systems themselves generate further artefacts, abstractions and […]
It is so often the case that the strength and the weakness of a technological or organisational system exist in (and as) that same structural and logical artefacts. The indefinite (recursive) extensibility of all material and logical systems is the foundation of, and cause for, this enigmatic duality.
The whole cybersecurity enterprise seems to be built upon a suite of psychological and culturally-reflexive assumptions that assert that there exists even a possibility of logical or systemic closure. No such closure or completion is possible and this is rarely acknowledged.
It is interesting that active intervention, interdiction and an assertion of ideological self-interest through campaigns of enthusiastic (technologically-facilitated) censorship are probably the most expensive and least efficient ways of achieving information-centric goals. It is like attempting to cool a building by adding cold air – far more expensive in terms of energy, resources and information-processing […]
What is perhaps most disturbing about the artival of autonomous systems and AI is not the plausible inevitability of monumental vocational disruption; it is that there are so few ongoing or persistent, well-informed and broadly-accessible public and (non-partisan) political discussions regarding the extent to which these upheavals will reshape entire economic, social and cultural value […]
Has anyone (else) noticed that the proliferation of communications technologies has occurred in direct proportion to the level of misunderstanding and confusion in the world? It is not that we do anything new by misinterpreting each other’s intentions – as people have been doing this for as long as there have been people – we […]
What differentiates reasoning from algorithmic procedure and computation? Does reasoning suggest comprehension, agency, subjectivity or is it just a complex sequence and integrated, autonomously self-propagating network and goal-directed pattern of blind mechanism and self-inflected logic? If reasoning is really just complex algorithm, and if the treasured concepts of our own embodied knowledge and experience are […]
If you listen very carefully you can almost hear a faint whooshing sound as the vacuum created in the wake of the products of our own creative intelligence, which having long ago outpaced us, draws us inexorably along behind it. As the accelerating juggernaut of pure and abstract technological metamorphosis has always – and perhaps […]
The Nasdaq will now be protected by a centaur team of human analysts and deep learning systems. The broader context of autonomous network and data system defence is clearly an accelerating arms race. If there is sufficient perceived benefit to be derived to offset the cost of development, which – as the pursuit of profit […]
Cyber security is a fascinating and rapidly evolving problem-space. What possible solutions exist in regards to coordinated governance and oversight? If a centralised software and hardware development methodology iss used – compliance to formal standards could be assured but the (logically and materially inevitable) emergence of vulnerability and exploit would mean that this systemic coherence […]