Prof. Peter Shor of MIT

https://youtu.be/6qD9XElTpCE The Story of Shor’s Algorithm, Straight From the Source | Prof. Peter Shor.Related topics:Quantum Turing machineSimon’s problemQuantum error correctionQuantum informationQuantum factoringQuantum computing algorithmsQuantum computers videoQuantum algorithms PDFWhat happened to quantum computersShor’s Algorithm Wikipedia https://youtu.be/8eH63I4jOMY?si=9Njak_styeYZw-LG Quantum Computing – Green Family Lecture at IPAM at UCLA

The future of war…

https://youtu.be/MZ60UDys_ZE A shadow war is a war that, officially, does not exist. As mercenaries, hackers and drones take over the role armies once played, shadow wars are on the rise. States are evading their responsibilities and driving the privatization of violence. War in the grey-zone is a booming business: Mercenaries and digital weaponry regularly carry…… Continue reading The future of war…

MY.DOOM: Earth’s Deadliest [Computer] Viruses

https://youtu.be/7kPNVKqSGz0 The Mydoom computer virus is by far the fastest spreading e-mail worm in history. Mydoom was first sighted on 26 January 2004 and also surpassed the previous record set by Sobig The Sobig Worm was a computer worm that infected millions of Internet-connected, Microsoft Windows computers in August 2003. Although there were indications that…… Continue reading MY.DOOM: Earth’s Deadliest [Computer] Viruses

A. I. iNvestigated

https://youtu.be/rb7NddXDdxs?si=rK6L4vBX5Epy34y3 ‘Deepfakes, destruction’: Artificial intelligence’s ‘real danger’ to humanity…Sky News Australia investigates the dangers artificial intelligence poses against humans and the impending battle humanity faces…. https://youtu.be/DaTXtUoN9Cg?si=_DOSZ9_qNQN4NecY How AI Is Changing The Future Of The Human Race | Spark…

Capabilities of Hackers, Tools Hackers use, and 5 Things You Can Do To Protect Yourself

https://youtu.be/9x7LKoutoVE Capabilities of Hackers, Tools Hackers use, and 5 Things You Can Do To Protect Yourself.These are just a few of the tools that Ryan can effectively operate to penetrate various aspects of our daily lives, such as cars, locations with access codes, RFIDs, Wi-Fi, and more. Ryan also provides guidance on what we can…… Continue reading Capabilities of Hackers, Tools Hackers use, and 5 Things You Can Do To Protect Yourself

From Selfish Gene to Selfish Ledger

https://youtu.be/iZaYBbX3yUw An internal leaked video from Google. It raises couple of philosophical questions. What defines us as a human, our freedom, privacy, responsibility to public goods, and role of Government or Google like organizations. What do you call Google plan in this movie? Is it brainwash, manipulation or simple nudge? https://youtu.be/hGNZNKNlx_4 …