/r/FuturologyInAction

Photograph via snooOG

Acerbic analysis of technophilia's derangement of policy, planning and pop culture.

This sub is for:

1: Mocking undercritical technophilia, such as the reskinned eugenics called transhumanism, pie in the sky fusion or geoengineering, or nanotech euphoria.

2: Dank memes, writings, vids, .GIFs and etc. about the above.

3: Serious talk about how technophilia deranges everything from policy to the writing of good SF.

4: Sardonic commentary/snark at the expense of technophiles as a group.

Rules

1: if you’re gonna come here to try and proselytize your particular flavor of technophilia when it’s ox gets gored, don’t bother. If you’re gonna disagree about the subject suitability for the sub, don’t be obviously a true believer.

2: Don’t touch the poo, unless you’re already a member of the shat-upon sub. Use your NP links. Don’t mock individuals ad hominem, unless they’re walking avatars of the subject matter, like Yud, or Dvorsky or Bostrom or Posthuman Studios. No flaming brigades.

3: NSFW and NSLF content must be marked as such, otherwise you will eat a ban.

4: We are technoskeptics, not Anarcho-primitivists. Just because the technophiles are so bad that they make you look good in comparison doesn’t mean you ain’t shite.

5: We are skeptics about transhumanism and other technophilia, not a transphobic hate subreddit. You want that shit, GB2 gendercrit or whatever dumbshite name you like.

6: Expanding on the above, bigotry of any kind – gender, race, class, orientation – will be punished severely.

7: We are a left – from liberal to actual socialists, anarchists and other reds – sub. We don’t want tories or fash or DarkNeoWhateverists coming in to post decadence rants. However, just because we’re left, doesn’t mean ‘leftist’ technophiles will escape our amusement.

8: Don’t make us come over there.

Essential reading:

Dale Carrico

The Superlative Summary

Athena Andreadis

The Charlatan-Haunted World

Won’t ANYONE Think of the Sexbots?!

I Coulda Been a Messiah!

The Baffler

Mouthbreathing Machiavellis Dream of a Silicon Reich

/r/FuturologyInAction

263 Subscribers

1

3 Ways AI Overcomes Customs Delays

AI Overcomes Customs Delays: Navigating through transportation, shipping, and logistics is like navigating through an asteroid field in space – it’s complicated.

Mistakes in handling these documents can cause problems like extra fees, spoiled products, late deliveries, and even canceled orders. These mistakes don’t just hurt profits, they also make customers unhappy and damage the reputation of the company.

Studies show that for every international shipment, there are about 36 different documents exchanged, but only one percent of these are digital. This means many companies are still dealing with a lot of paper.

The main problems causing delays are often simple but happen a lot. However, if companies use AI and new technology, they can prevent these issues and improve their processes.

By using AI solutions made specifically for this, companies can tackle three common challenges in transportation and logistics.

1 .Cut down on doing too much manual typing of data.2. Make sure documents are correct and follow the rules.3.

0 Comments
2024/04/08
13:48 UTC

1

Việt Nam, Korea partners promote global AI Hub: 'agreed five deals on co-operation and development of Artificial Intelligence (AI) technology'

0 Comments
2023/10/31
23:36 UTC

1

Exclusive: Wuhan Earthquake Monitoring Center suffers cyberattack from the US; investigation underway

The Wuhan Earthquake Monitoring Center has recently suffered a cyberattack launched by an overseas organization, the city's emergency management bureau which the center is affiliated to said in a statement on Wednesday. This is another case of its kind following the June 2022 cyberattack from overseas against a Chinese university.
The expert panel on the case found that the cyberattack was initiated by hacker groups and lawbreakers with governmental backgrounds from outside the country. Preliminary evidence suggests that the government-backed cyberattack on the center came from the US, the Global Times has learned.
The Wuhan Municipal Emergency Management Bureau said in a statement on Wednesday that some of the network equipment of the front-end station collection points of the Wuhan Earthquake Monitoring Center, were subjected to a cyberattack by an overseas organization, as monitored by the National Computer Virus Emergency Response Center (CVERC) and Chinese internet security company 360.
The center has immediately sealed off the equipment that was affected and reported the attack to the public security authorities, in order to investigate the case and handle the hacker organization and criminals according to law, said the statement.
The Wuhan public security bureau Jianghan sub-bureau confirmed the discovery of a Trojan horse program originating from abroad at the Wuhan Earthquake Monitoring Center. According to the public security bureau, this Trojan horse program can illegally control and steal seismic intensity data collected by the front-end stations. This act poses a serious threat to national security.
The public security authorities have opened a case for investigation into this matter and further conducted technical analysis on the extracted Trojan samples. It has been preliminarily determined that the incident was a cyberattack initiated by foreign hacker organizations and outlaws.
Professionals told the Global Times that seismic intensity data refers to the intensity and magnitude of an earthquake, which are two important indicators of its destructive power.
The data is closely related to national security, experts told the Global Times. For example, these factors need to be taken into account when constructing certain military defense facilities.
The Wuhan Earthquake Monitoring Center is another national unit that has been subjected to cyberattack from outside the country following the attack on Northwestern Polytechnical University (NWPU) in Xi'an, Northwest China's Shaanxi Province, by an overseas hacker group in June 2022.
After the attack on NWPU, the CVERC and the company 360 jointly formed a technical team to conduct a comprehensive technical analysis of the case. They concluded that the cyberattack was conducted by the Tailored Access Operations (TAO) of the US' National Security Agency (NSA).
Expert technical team composed by the CVERC and the internet security company 360 has arrived in Wuhan to carry out evidence-collection work of the latest case, the Global Times has learned. Preliminary evidence indicates that the cyberattack on the Wuhan Earthquake Monitoring Center had come from the US.
According to company 360's monitoring results, the NSA has carried out cyberattacks on at least hundreds of important domestic information systems in China, and a Trojan horse program called "validator" was found to be running in the information systems of a number of departments, transmitting information to the NSA headquarters.
Moreover, the findings show that a large number of "validator" Trojan horses are running in critical information infrastructure not only in China, but also in other countries, and the number of such programs planted in these countries' systems far exceeds that of China.
The CIA is another notorious US cyber-attacking and stealing organization, in addition to the NSA. According to the research of the CVERC, the CIA's cyberattacks have been characterized by automation, systematization and intelligence.
The CIA's latest cyber weapons use extremely strict espionage specifications with various attack techniques interlocked. It now covers almost all internet and Internet of Things assets around the world, and can control other countries' networks and steal their important and sensitive data anytime, anywhere.
Observers pointed out that the US, while intensifying attacks on global targets and stealing secrets, has spared no effort accusing other countries.
It has gathered its so-called allies, trumpeting theory of "China's cyber-threat" and denigrating and slandering China's cyber-security policy, which has been repeatedly refuted by Chinese Foreign Ministry.
During a regular press conference on July 19, Chinese Foreign Ministry spokesperson Mao Ning said China is a victim of cyberattacks and is strongly opposed to such undertakings.
"The US has carried out indiscriminate, large-scale cyberattacks against other countries over the years," she said. "The US Cyber Force Command blatantly declared last year that the critical infrastructure of other countries is a legitimate target for US cyberattacks. Such moves have raised concern." # Cyber attack # Wuhan Earthquake Monitoring Center

0 Comments
2023/07/31
01:53 UTC

1

Rethinking the role of business - The future of business and its responsibility on our society and the environment.

Do you think it's enough for businesses to do things right? Or is it more important for them to do the right thing?

The new way to measure business is here. In order to trigger profound shifts in capital allocation so that the most negative business models are faded away and the most positive ones are financially supported to thrive. In order to be effective, the public and investors need to know which business models to support. It's not always as straight forward to determine as it is with cigarettes and fossil fuels.  Impaakt.com is a startup based in Switzerland that aims to provide data set that is robust so that investors have information that is current, based on facts and vigorous impact analysis in order to make informed decisions. 

0 Comments
2021/01/21
14:31 UTC

1

We are not going to escape to other planets

1 Comment
2016/09/28
23:54 UTC

3

SpaceX rocket carrying Facebook bandwidth carrying satellite explodes.

0 Comments
2016/09/01
21:56 UTC

Back To Top