What’s next for AI | MIT Technology Review

What’s next for AI | MIT Technology Review

In the US, the Federal Trade Commission is also closely watching how companies collect data and use AI algorithms. Earlier this year, the FTC forced weight loss company Weight Watchers to destroy data and algorithms because it had collected data on children illegally. In late December, Epic, which makes games like Fortnite, dodged the same fate by agreeing to a $520 million settlement. The regulator has spent this year gathering feedback on potential rules around how companies handle data and build algorithms, and chair Lina Khan has said the agency intends to protect Americans from unlawful commercial surveillance and data

 
Read More
Looking beyond “technology for technology’s sake” | MIT News

Looking beyond “technology for technology’s sake” | MIT News

Austen Roberson’s favorite class at MIT is 2.S007 (Design and Manufacturing I-Autonomous Machines), in which students design, build, and program a fully autonomous robot to accomplish tasks laid out on a themed game board.

“The best thing about that class is everyone had a different idea,” says Roberson. “We all had the same game board and the same instructions given to us, but the robots that came out of people’s minds were so different.”

The game board was Mars-themed, with a model shuttle that could be lifted to score points. Roberson’s robot, nicknamed Tank Evans after a character from the

 
Read More
An open-source tool for software security | MIT News

An open-source tool for software security | MIT News

The unfortunate reality of the software security industry is that it’s much easier to attack a system than it is to safeguard it. Hackers only need to find one vulnerability to have success, while software developers need to protect their code against all possible attacks.

The asymmetry means that when a solo programmer unwittingly makes a popular app, it quickly becomes a vulnerable fish in an ocean of threats. Larger companies have software security teams, but they’ve developed a reputation among developers for slowing down deployments as they painstakingly review lines of code to safeguard against attacks.

Now the startup

 
Read More