Log

Singularity Hypotheses: A Scientific and Philosophical Assessment

Amnon H. Eden, Johnny H. Soeraker, James H. Moor, Eric Steinhart (eds.) The Frontiers Collection, Springer 2013

A significant advance in singularity scholarship

Ted Goertzel, Professor of Sociology, Rutgers University

The best introduction I know to some profound debates about our future as a species

David Christian, Professor, Macquarie University, Sydney

Riveting … insightful commentaries on [the] continuing co-evolution of computing and humanity

Grady Booch, Chief Scientist for Software Engineering, IBM Research

Singularity Hypotheses: A Scientific and Philosophical Assessment offers authoritative essays and critical commentaries on central questions relating to accelerating technological progress and the notion of technological singularity.

Further information

Related posts:

Can AI be creative?

Last month Deep Mind’s latest AI broke another record, winning 5-0 against one of the world’s strongest professional players. This victory forces us to revisit our preconceptions and recognise how creative machine learning has become.

The Singularity Controversy, Part I

Sapience Technical Report STR 2016-1 Author: Amnon H. Eden ‘The Singularity Controversy, Part I: Lessons Learned and Open Questions: Conclusions from the Battle on the Legitimacy of the Debate‘ informs policy makers on the nature and the merit of the arguments for and against the concerns associated with a potential technological singularity. Part I describes the lessons learned from our investigation of the subject, separating the arguments of merit from the fallacies and misconceptions that confuse the debate and undermine its rational resolution.

Unethical Research: How to Create a Malevolent Artificial Intelligence

Sapience Technical Report STR 2016-03 Author: Roman V. Yampolskiy Cybersecurity research involves publishing papers about malicious exploits as much as publishing information on how to design tools to protect cyber-infrastructure. It is this information exchange between ethical hackers and security experts, which results in a well-balanced cyber-ecosystem. In the blooming domain of AI Safety Engineering, hundreds of papers have been published on different proposals geared at the creation of a safe machine, yet nothing, to our knowledge, has been published on how to design a malevolent machine.

Leave a Reply