Sunday, November 30, 2008

Machine Intelligence and its Implications

Last week, Aida and Hakson talked about Artificial Intelligence, a relatively new field in Computer Science and its implications. AI as a field has suffered some setbacks, but a lot of developments are taking place that would help us solve some of the toughest computer science problems. The article spoke about the “law of accelerating returns” or more a belief where technological change has an exponential progression and so AI research that is still in its inchoate stage would be accelerated in the near future.
In class, we discussed combining human and machine intelligence so that it would improve the quality of human life and make us more efficient at what we do. There were some pros and cons to this that were discussed. On one hand, machines would take all the mundane tasks off our hands and let us concentrate more on the problem at hand. However, then we face the problem of becoming way too dependent on machines to the extent that we forget or not be able to do even the simplest tasks on our own. There is also the scenario in which machines take our place and we lose our jobs.
Hence the questions “How can we engineer machine intelligence to be a benefit?”, “Is the current technological revolution similar to the industrial revolution in the 19th century and if so how much change would it bring? “To what extent should we be dependent on machines and robots before they take over?” As computer scientists, we have a technological imperative to solve certain problems. Fields like medicine and healthcare, biology, computing and problem solving have plenty of problems that AI can solve. We should fully invest in trying to combine human and machine intelligence. Humans have special skills like being able to recognize people and machines can perform complex computations quickly. Together, AI can have a significant impact on our lives.

Tuesday, November 25, 2008

Computing for the developing world

Sunil and Benjamin presented on Computing for the Developing World. They described the goals of computing for developing countries, such as increasing access to technology and using technology to improve public systems like healthcare and education. They also shed light on the various constraints involved when creating technology for developing countries, such as: illiteracy, foreignness of technology, lack of infrastructure, and expense.

Some related projects include:

For discussion, we split into two groups.

One group focused on the requirements associated with accomplishing the goals stated above. The group also discussed how to determine what technology would be useful, and how to begin implementing it. Two ways of evaluating what technology would help a particular area are: asking people from the area who are familiar with technology (such as university students), and immersing a technology expert in the culture to allow them time to learn what the community needs. It helps to make sure that those being helped are motivated enough to help bring change, and to demonstrate the usefulness of technology to community leaders to help convince the community as a whole. The group also agreed that each solution needs to be tailored specifically to the area involved. Each village, state, country, etc. will have their own unique constraints. And lastly, it is crucial to keep in the current frame of mind and focus on what we can do now to provide effective technology for the area.

The second group focused on the maintenance of computing systems deployed in developing countries. It was agreed that because hardware is generally unreliable, there should be some sort of localized system for hardware repairs and replacements, which only pulls in new hardware from "upstream" when necessary. Providing local support is also an interesting issue: adoption of a technology must reach some sort of critical mass before providing self-sustaining local support is feasible. It's easy to forget that there's more to maintenance of a technology than the hardware. Maintaining software becomes difficult in this sort of environment: how does a remote developer determine the needs of their users? One idea might be to collect usage data, and send it back to the developer over the Internet. However, the required connectivity is unavailable in many of the targeted areas of the world, and for those in which it is available, it is often prohibitively expensive. The group also discussed some barriers to expanding a deployment to a wider range of regions, such as interface localization, and adapting to differing sets of locally prevalent technologies, such as SMS or internet connectivity.

Friday, November 14, 2008

Electronic Voting

Our discussion last week was on electronic voting; very fitting, considering the historic election taking place that day. It quickly became clear that electronic voting introduces as many problems as it solves and will require many creative solutions to adequately address its shortcomings.

The advantages of voting electronically are many. Fewer people are needed to count or process ballots while making results available almost instantaneously. In addition, it can reduce the level of human error, and can drastically reduce the amount of paper used. At this point, it is hard to deny that electronic voting sounds pretty great. Who doesn't want cheaper, faster and better for the environment?

Unfortunately, what initially look like advantages bring many implications which need to be addressed, the largest and most difficult of which is security. Electronic voting is full of security holes that all need to be filled if people are ever going to trust it. It is also worth considering that such an important event deserves whatever time and resources are necessary for an effective election, whether that comes in dollars (and paper to print ballots).

Let's start from the beginning and work our way through the process.

- Software: All electronic voting machines depend on software for their accuracy and reliability. Someone has to write that software and we need to make sure that votes are not, through maliciousness or incompetence, reported incorrectly.

- Physical security: The voting machines have to get from the factory to the polling place and as the article illustrated, give someone with malicious intent even a couple of minutes alone with one and then can destroy the integrity of every vote entered on that machine.

- Identity verification: How do you verify that people are not voting multiple times? Smart cards can be faked. Having to voter enter personal information could compromise the secrecy of their vote.

- Data collection: Assuming that the software is sound, the machines haven't been tampered with, and each person has only voted once, how do you collect the vote totals? Do you transmit it over a network? Save it on encrypted hard drives?

We discussed several potential solutions to these issues, including open source software, background checks for programmers and technicians, non-partisan inspectors (or inspectors from multiple parties), and printing out paper ballots that can be verified by the voter or even used to cast the actual vote.

In the end, however, it may not be necessary to develop a perfectly secure, fool-proof electronic voting system. Paper ballots have many of the same security risks and can be very prone to error, but at the same time provide a physical record of each vote for future auditing. We closed the discussion wondering whether we could improve upon current paper voting methods, perhaps by using technology to produce easy to use and accurately readable paper ballots.

Tuesday, November 4, 2008

Quantum Internet

Last week, Linden and Sandra did a presentation on the use of quantum mechanics to create secure networks – a quantum internet. This is not the same as quantum computing, which is still only theoretical . Researchers in Vienna have succeeded in creating a secure quantum link over short distances and at relatively low speeds. The main advantage of quantum internet is that it is inherently tamper-proof and very secure. This makes it ideal for transferring encryption keys. If an observer attempts to read the bits, the laws of physics governing the particles make it impossible not to alter their state. If the bits reach the intended target unchanged, then no one else has tried to read them.

Another advantage of the quantum internet is that it utilizes quantum bits, or qubits, that can take on a value of 0 and 1 simultaneously. Also, the idea of quantum entanglement allows one thing to be in two places at once, creating a way for instant communication between two places.
There are several inherent disadvantages to this quantum network, however. Researchers are having trouble coming up with a solution to relaying quantum information over long distances. Repeaters cannot be used, since reading the information changes it irreversibly. This makes it hard to copy, back up, or broadcast data. More research needs to be done on the subject of quantum RAM for these things to be possible.

Another critique of this research is that it is strengthening an already strong part of a security system. Typically, the most vulnerable parts of internet communication isn’t the encryption, but rather the security on both end points. Quantum internet allows a key to be transferred securely, but doesn’t guarantee that key remains safe on the other computer. Keyloggers, hackers, and even onlookers could potentially get the key after it has been received.
With a more secure internet comes the question of who should be allowed to use it. Some countries censor and firewall certain information, and this system would allow invulnerability from censorship. Government may want to enforce restrictions on the type of encryption allowed in order to monitor potentially threatening communication. If this level of encryption was allowed, the government would know that someone was up to something if they were using it.

Another interesting topic discussed was how quantum research is actually making it easier to break current encryption methods. At the same time, it is allowing for a more secure network of information. We also talked about whether quantum research is a good use of taxpayer money, since it has not been extremely productive. However, it can’t be shown to be impossible if it is never researched.

Quantum internet was an interesting topic with many implications to think about. We discussed that it could be focusing on the wrong part of security, and that it raises questions of who should be allowed to use it. On a positive note, notions of instantaneous communication and 100% certainty of no eavesdroppers give potential to ongoing research in the field.