Shannon and Group Testing: Finding Needles in Haystacks

Total Page:16

File Type:pdf, Size:1020Kb

Shannon and Group Testing: Finding Needles in Haystacks Shannon and group testing: Finding needles in haystacks Oliver Johnson [email protected] Twitter: @BristOliver School of Mathematics, University of Bristol Inaugural Lecture, 1st November 2018 Oliver Johnson @BristOliver Shannon and group testing 1st November 2018 1 / 35 Outline of the talk 1 Catering conundrum 2 How did I get here? 3 Shannon and Information theory 4 Group testing Oliver Johnson @BristOliver Shannon and group testing 1st November 2018 2 / 35 Section 1: Toxic talk treat teaser Professor J is giving his inaugural lecture at Blistor University. 7 plates of delicious post-lecture snacks. Professor J's evil nemesis, Dr X, has poisoned one of them. Whoever eats that snack will fall asleep for 24 hours. How to find the poisoned food, as efficiently as possible? Can pay any PhD student $10 to eat what we tell them. Oliver Johnson @BristOliver Shannon and group testing 1st November 2018 3 / 35 How to solve the mystery? One idea: pay 7 PhD students to eat one snack each. One will fall asleep. Will cost us $70. Better idea: use the following strategy (only costs $30). Olives Nuts Bread Crisps Dip Cheese Jelly sticks straws PhD 1 X × X × X × X PhD 2 XX × × XX × PhD 3 XXXX × × × Oliver Johnson @BristOliver Shannon and group testing 1st November 2018 4 / 35 Outcome Olives Nuts Bread Crisps Dip Cheese Jelly sticks straws PhD 1 X × X × X × X PhD 2 XX × × XX × PhD 3 XXXX × × × Solution: breadsticks were poisoned. This strategy would always work. But what if more than one snack poisoned? Oliver Johnson @BristOliver Shannon and group testing 1st November 2018 5 / 35 More interesting problems What if you had 500 snacks, with 10 poisoned? How many students would we need? What should we get them to eat? How should we find the poisoned snacks? What if some students are immune to poison . or fall asleep anyway? This is group testing. Oliver Johnson @BristOliver Shannon and group testing 1st November 2018 6 / 35 Section 2: Brief history of me Academic careers are a matter of luck. Successes are always team efforts. Survivorship bias and impostor syndrome. Will briefly say how I got here, via Birmingham and Cambridge. Oliver Johnson @BristOliver Shannon and group testing 1st November 2018 7 / 35 Birmingham Attended King Edward's School. Lucky to be encouraged towards maths . and Maths Olympiads in particular. UK team (Sweden 1991, Russia 1992). Learnt a lot of tricks . also that I can't do geometry. Oliver Johnson @BristOliver Shannon and group testing 1st November 2018 8 / 35 Cambridge Queens' College Cambridge as undergrad and PhD student. Took diverse range of courses from General Relativity through to Galois Theory . including Information Theory. Realised I wasn't smart enough to be a number theorist. Oliver Johnson @BristOliver Shannon and group testing 1st November 2018 9 / 35 Cambridge (cont.) PhD (Entropy and Limit Theorems) with Yuri Suhov. Lucky to be exposed to Russian School. Applied for lots of jobs . got the last one (JRF at Christ's College). After 4 years at Christ's, job at Bristol came up . I didn't get it! 3 more postdoc years later, second time lucky. Oliver Johnson @BristOliver Shannon and group testing 1st November 2018 10 / 35 Bristol 2006, moved to Bristol as Lecturer in Statistics. Fantastic city, great department. Found interesting new directions. Including collaborating with biologists (a bit) and engineers (a lot!). Lucky to have some great PhD students: Matt, Leo, Dan, Vaia, Tom, Jennifer, Zichen, Chrys. Oliver Johnson @BristOliver Shannon and group testing 1st November 2018 11 / 35 Section 3: Information theory Claude Shannon (1916{2001) Oliver Johnson @BristOliver Shannon and group testing 1st November 2018 12 / 35 It's rare to talk about maths and science as op- portunities to revel in discovery. We speak, instead about their practical benefits { to society, the econ- omy, our prospects for employment. STEM courses are the means to job security, not joy. Studying them becomes the academic equivalent of eating your vegetables { something valuable, and state sanctioned, but vaguely distasteful. { from A Mind at Play (2017) by Jimmy Soni and Rob Goodman Oliver Johnson @BristOliver Shannon and group testing 1st November 2018 13 / 35 Shannon's 1948 paper One of the most influential scientific papers ever. 110k citations and counting. Impact comparable with e.g. Einstein's work on relativity? Oliver Johnson @BristOliver Shannon and group testing 1st November 2018 14 / 35 What did Shannon do? from A Mathematical Theory of Communication (1948) Boole had introduced binary arithmetic (0s and 1s). Shannon realised any information can be represented as series of these `bits'. Understood we can compress information down to a limit (entropy). Think about \amount of stuff" a message contains. Remove redundancy. Key Idea: Predictable messages are compressible. Oliver Johnson @BristOliver Shannon and group testing 1st November 2018 15 / 35 We all live in Shannon's world Phones Hard Drives Broadband Oliver Johnson @BristOliver Shannon and group testing 1st November 2018 16 / 35 Channels and noise Shannon also modelled noisy (imperfect) `communications channels'. Imagine we send message X : X = (0 0 1 0 1 0 0 1 :::) Measurements inaccurate, environment has interference etc. Through noisy channel may receive Y = (0 1 1 0 1 0 0 0 :::) 6= X Could model this as Y = X + Z, where Z is noise (randomly flip bits). Oliver Johnson @BristOliver Shannon and group testing 1st November 2018 17 / 35 Coping with noise Shannon realised noise needn't be a problem. Can make messages longer (deliberately introduce redundancy). e.g. Naively just repeat message 3 times { call this `rate 1=3'. Even with some errors know what was (probably) sent. In fact, better strategies available. In general rate is `proportion of bits that are message'. How big can rate be? Oliver Johnson @BristOliver Shannon and group testing 1st November 2018 18 / 35 Shannon capacity Shannon introduced `capacity' C of a channel, gave general formula. Think about \width of a pipe". Roughly speaking: 1 [Achievability] For any rate < C, there is a strategy so the message gets through. 2 [Converse] For any rate > C, no such strategy exists. Key Idea: Some problems can't be solved. Oliver Johnson @BristOliver Shannon and group testing 1st November 2018 19 / 35 Section 4: Group testing 1942/3, US wanted to test all men joining army for disease; potentially very expensive. Disease rare: test outcomes known with high probability (predictable). Dorfman's idea: pool blood from a group of people, test it together. If disease present in any blood sample, test is positive. If no disease present, test is negative. Oliver Johnson @BristOliver Shannon and group testing 1st November 2018 20 / 35 Standard noiseless group testing Outcome Test 1 1 1110000 Positive Test 2 0 0 0 01111 Positive Test 3 1 1 0 0 0 0 0 0 Negative Test 4 0 0100000 Positive Test 5 0 0 0 01100 Positive Test 6 0 0 0 01000 Positive Represent pooling strategy via binary test matrix. Rows are tests, columns are people (`items'). Put a 1 if item is in test. Red denotes having the disease (`being defective') { rare. Oliver Johnson @BristOliver Shannon and group testing 1st November 2018 21 / 35 In practice Outcome Test 1 1 1 1 1 0 0 0 0 Positive Test 2 0 0 0 0 1 1 1 1 Positive Test 3 1 1 0 0 0 0 0 0 Negative Test 4 0 0 1 0 0 0 0 0 Positive Test 5 0 0 0 0 1 1 0 0 Positive Test 6 0 0 0 0 1 0 0 0 Positive Want to find defective items in as few tests as possible. Oliver Johnson @BristOliver Shannon and group testing 1st November 2018 22 / 35 Why should we care? It's fun! Applications in . DNA testing for rare genetic conditions, . counting disease prevalence . cognitive radio, . data forensics, . database management, . and many more. Oliver Johnson @BristOliver Shannon and group testing 1st November 2018 23 / 35 My work on group testing algorithms Been thinking how to find defective items. Describe work with Aldridge, Baldassini, Scarlett. Give computationally feasible algorithm (recipe) . with provable performance guarantee. Find defective items from test matrix and outcomes only. Negative test . all items in it are non-defective. Positive test with one item in . that item is defective. Oliver Johnson @BristOliver Shannon and group testing 1st November 2018 24 / 35 How well can we do in general? Suppose N items with K defective, often consider K ∼ Nθ. How well can we do with T tests? Theorem (BJA 2013 { 'strong counting bound') Any matrix and any algorithm has success probability satisfying 2T (suc) ≤ : P N K N Hence (folklore) need T ' log2 K tests (`magic number'). Information theory argument gives this too. N Need this many tests to learn log2 K bits of information. Oliver Johnson @BristOliver Shannon and group testing 1st November 2018 25 / 35 DD algorithm (ABJ 2014): Example Stage 1 1 0 1 0 0 1 0 Negative 1 1 0 1 0 0 1 Positive 1 0 0 0 1 0 0 Negative 0 1 1 0 1 1 0 Positive 1 0 1 1 0 1 0 Positive First, look at negative tests. Test 1 is negative, so items 1,3,6 are non-defective. Test 3 is negative, so items 1,5 are non-defective. Hence items 2,4,7 are possible defectives (PDs). This is the (pre-existing) COMP algorithm. Oliver Johnson @BristOliver Shannon and group testing 1st November 2018 26 / 35 DD example: Stage 2 0 0 0 1 1 1 Positive 0 0 0 1 0 0 Positive 0 1 0 Positive Restrict to submatrix corresponding to the PD set Test 4 is positive with one PD item in, so item 2 is defective.
Recommended publications
  • The Computational Attitude in Music Theory
    The Computational Attitude in Music Theory Eamonn Bell Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences COLUMBIA UNIVERSITY 2019 © 2019 Eamonn Bell All rights reserved ABSTRACT The Computational Attitude in Music Theory Eamonn Bell Music studies’s turn to computation during the twentieth century has engendered particular habits of thought about music, habits that remain in operation long after the music scholar has stepped away from the computer. The computational attitude is a way of thinking about music that is learned at the computer but can be applied away from it. It may be manifest in actual computer use, or in invocations of computationalism, a theory of mind whose influence on twentieth-century music theory is palpable. It may also be manifest in more informal discussions about music, which make liberal use of computational metaphors. In Chapter 1, I describe this attitude, the stakes for considering the computer as one of its instruments, and the kinds of historical sources and methodologies we might draw on to chart its ascendance. The remainder of this dissertation considers distinct and varied cases from the mid-twentieth century in which computers or computationalist musical ideas were used to pursue new musical objects, to quantify and classify musical scores as data, and to instantiate a generally music-structuralist mode of analysis. I present an account of the decades-long effort to prepare an exhaustive and accurate catalog of the all-interval twelve-tone series (Chapter 2). This problem was first posed in the 1920s but was not solved until 1959, when the composer Hanns Jelinek collaborated with the computer engineer Heinz Zemanek to jointly develop and run a computer program.
    [Show full text]
  • The Road Not Taken
    THE ROAD NOT TAKEN John Scales Avery October 27, 2020 Introduction1 Decision trees During each human life, a child starts with many possible destinations. He or she then makes decisions, and each decision more closely defines who the person is and what it is possible for the person to become. The choice of a vocation defines who a person is, as does the choice of a husband or wife. Often chance plays a role. The decision to take a holiday at a particular place may lead to a chance meeting with a life partner. In a human life, we can observe a treelike pattern, similar to the decision tree of a person traveling through a landscape. At each forking of the path, a decision has to be made, and that decision determines more and more closely the traveler’s ultimate destination. Analogously, in a human life, a tree-like series of decisions or external influences more and more closely define the person’s identity and destiny. Each decision is a positive step, since it helps to define a person’s character. But there is sadness too. As we step forward on the road ahead, we must renounce all other possibilities. Although we might embrace our destiny, we sometimes think with regret on the road not taken, and wonder what might have been if we had chosen other paths. Pathfinding The 2014 Nobel Prize in Physiology or Medicine was shared by John O’Keefe, May-Britt Moser and Edvard Moser. They received the prize for discover- ing the histologically observable structures in the brains of mammals which are used to remember pathways, for example the pathway through a maze.
    [Show full text]
  • The University of Chicago Playfulness 1947-2017
    THE UNIVERSITY OF CHICAGO PLAYFULNESS 1947-2017: HERMENEUTICS, AESTHETICS, GAMES A DISSERTATION SUBMITTED TO THE FACULTY OF THE DIVISION OF THE HUMANITIES IN CANDIDACY FOR THE DEGREE OF DOCTOR OF PHILOSOPHY DEPARTMENT OF ENGLISH LANGUAGE AND LITERATURE BY PETER DOUGLAS MCDONALD CHICAGO, ILLINOIS JUNE 2018 Copyright © 2018 by Peter McDonald All Rights Reserved For those who pretended a world into being, and those who made belief. TABLE OF CONTENTS LIST OF FIGURES v ACKNOWLEDGEMENTS vi ABSTRACT ix Introduction Interpreting Play 1 Chapter One Replayability: Play without Truth 32 Chapter Two Secrecy: Play without Reason 87 Chapter Three Trickiness: Play without Rules 142 Chapter Four Fairness: Play without End 200 BIBLIOGRAPHY 262 iv LIST OF FIGURES Figure 1.1. A still from Video Chess depicting Duchamp in sepia. .............................................. 40 Figure 1.2. A still from Video Chess depicting overlaid photos. .................................................. 42 Figure 1.3. A still from Video Chess depicting outlined bodies. .................................................. 42 Figure 1.4. A still from Video Chess depicting abstract outlines.................................................. 43 Figure 1.5. A still from Video Chess depicting blurred areas of color. ........................................ 44 Figure 1.6. Two stills depicting Duchamp and Kubota playing against nude opponents. ............ 47 Figure 1.7. Specrtum Holobyte’s 1987 release of Tetris for the Amiga computer. ...................... 79 Figure 1.8. SexTetris (1993), a variant on the theme of Tetris. .................................................... 80 Figure 2.1. Takako Saito, Spice Chess (1977). ............................................................................. 92 Figure 2.2. A line of empty green blocks leads to a secret exit in Super Mario World. ............. 132 Figure 2.3. Secret exit in “Cheese Bridge,” from Super Mario World.
    [Show full text]
  • When Shannon Met Turing
    DOI: http://dx.doi.org/10.14236/ewic/EVA2017.9 Life in Code and Digits: When Shannon met Turing Tula Giannini Jonathan P. Bowen Dean and Professor Professor of Computing School of Information School of Engineering Pratt Institute London South Bank University New York, USA London, UK http://mysite.pratt.edu/~giannini/ http://www.jpbowen.com [email protected] [email protected] Claude Shannon (1916–2001) is regarded as the father of information theory. Alan Turing (1912– 1954) is known as the father of computer science. In the year 1943, Shannon and Turing were both at Bell Labs in New York City, although working on different projects. They had discussions together, including about Turing’s “Universal Machine,” a type of computational brain. Turing seems quite surprised that in a sea of code and computers, Shannon envisioned the arts and culture as an integral part of the digital revolution – a digital DNA of sorts. What was dreamlike in 1943, is today a reality, as digital representation of all media, accounts for millions of “cultural things” and massive music collections. The early connections that Shannon made between the arts, information, and computing, intuit the future that we are experiencing today. This paper considers foundational aspects of the digital revolution, the current state, and the possible future. It examines how digital life is increasingly becoming part of real life for more and more people around the world, especially with respect to the arts, culture, and heritage. Computer science. Information theory. Digital aesthetics. Digital culture. GLAM. 1. INTRODUCTION 2016, Copeland et al.
    [Show full text]
  • Duke University (North Carolina)
    NONPROFIT ORG. U.S. POSTAGE • DUKE MAGAZINE PAID DUKEMAGAZINE PPCO DUKE UNIVERSITY, BOX 90572 DURHAM, NORTH CAROLINA 27708-0572 SPECIAL ISSUE 2017 SPECIAL ISSUE 2017 MAGAZINE THESECRETSISSUE Whose home is this? For the Duke graduate who lived here, it was a place where all that was collected served as inspiration and homage, and perhaps for visitors, as revelation. Learn the answer and see more, beginning on page 38. Photos by Alex Harris Outrageous ambition Climate change. Energy. Medicine. At Duke, engineering students like Lauren Shum ’17 tackle big challenges head on. Thanks to a planned gift supporting financial aid at the Pratt School of Engineering, we can recruit more students based on their ambition to change the world, rather than their ability to pay. Made possible by you. Grand Challenge Scholar and financial aid recipient Lauren Shum ’17 wants to make solar energy economical. Together with fellow Duke Smart Home students, she designed and installed the solar charging station on a swinging bench by McClendon Bridge. This bright idea gives students a sustainable light and power source. Read about alumnus Chun Lam’s planned gift to benefit engineering students on page 76. Whether you leave a legacy with a planned gift or make an immediate impact with an Annual Fund donation, every dollar makes a difference. Together, we are generating the means for the next generation of Duke students and faculty to advance ideas, make new connections, and move the world forward. giving.duke.edu/giftplanning | (919) 681-0464 GP_Made Possible By You_F3.indd 1 7/31/17 2:16 PM SPECIALISSUE A collection of essays and images from Duke faculty, students, staff, and alumni FROM THE EDITOR 4 Are your secrets safe with Duke? By Robert J.
    [Show full text]
  • 12 Hours • Unabridged  2017 Jimmy Soni and Rob Goodman  2017 Tantor Media, Inc
    Claude Shannon was a tinkerer, a playful wunderkind, a groundbreaking polymath, and a digital pioneer whose insights made the Information Age possible. He constructed fire-breathing trumpets and customized unicycles, outfoxed Vegas casinos, and built juggling robots, but he also wrote the seminal text of the digital revolution. That work allowed scientists to measure and manipulate information as objectively as any physical object. His work gave mathematicians and engineers the tools to bring that world to pass. Now, Jimmy Soni and Rob Goodman bring Claude Shannon's story to life. It's the story of a small-town boy from Michigan whose career stretched from the age of room-sized computers powered by gears and string to the age of the Apple desktop. It's the story of the origins of information in the tunnels of MIT and the "idea factory" of Bell Labs, in the "scientists' war" with Nazi Germany, and in the work of Shannon's collaborators and rivals. It's the story of Shannon's life as an often reclusive, always playful genius. With access to Shannon's family and friends, A Mind At Play explores the life and times of this singular innovator and creative genius. Jimmy Soni is the managing editor of the Huffington Post and a former speechwriter whose writing and commentary have appeared in the Atlantic online and on NPR, among other outlets. Rob Goodman has written speeches and opinion pieces that have appeared on the floors of both houses of Congress, on national television and radio, and in the New York Times, the Washington Post, and the Wall Street Journal.
    [Show full text]
  • A Complete Bibliography of Publications of Claude Elwood Shannon
    A Complete Bibliography of Publications of Claude Elwood Shannon Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233 Salt Lake City, UT 84112-0090 USA Tel: +1 801 581 5254 FAX: +1 801 581 4148 E-mail: [email protected], [email protected], [email protected] (Internet) WWW URL: http://www.math.utah.edu/~beebe/ 09 July 2021 Version 1.81 Abstract This bibliography records publications of Claude Elwood Shannon (1916–2001). Title word cross-reference $27 [Sil18]. $4.00 [Mur57]. 7 × 10 [Mur57]. H0 [Siq98]. n [Sha55d, Sha93-45]. P=N →∞[Sha48j]. s [Sha55d, Sha93-45]. 1939 [Sha93v]. 1950 [Ano53]. 1955 [MMS06]. 1982 [TWA+87]. 2001 [Bau01, Gal03, Jam09, Pin01]. 2D [ZBM11]. 3 [Cer17]. 978 [Cer17]. 978-1-4767-6668-3 [Cer17]. 1 2 = [Int03]. Aberdeen [FS43]. ablation [GKL+13]. above [TT12]. absolute [Ric03]. Abstract [Sha55c]. abundance [Gor06]. abundances [Ric03]. Academics [Pin01]. According [Sav64]. account [RAL+08]. accuracy [SGB02]. activation [GKL+13]. Active [LB08]. actress [Kah84]. Actually [Sha53f]. Advanced [Mar93]. Affecting [Nyq24]. After [Bot88, Sav11]. After-Shannon [Bot88]. Age [ACK+01, Cou01, Ger12, Nah13, SG17, Sha02, Wal01b, Sil18, Cer17]. A’h [New56]. A’h-mose [New56]. Aid [Bro11, Sha78, Sha93y, SM53]. Albert [New56]. alcohol [SBS+13]. Algebra [Roc99, Sha40c, Sha93a, Jan14]. algorithm [Cha72, HDC96, LM03]. alignments [CFRC04]. Allied [Kah84]. alpha [BSWCM14]. alpha-Shannon [BSWCM14]. Alphabets [GV15]. Alternate [Sha44e]. Ambiguity [Loe59, PGM+12]. America [FB69]. American [Ger12, Sha78]. among [AALR09, Di 00]. Amplitude [Sha54a]. Analogue [Sha43a, Sha93b]. analogues [Gor06]. analyses [SBS+13]. Analysis [Sha37, Sha38, Sha93-51, GB00, RAL+07, SGB02, TKL+12, dTS+03].
    [Show full text]
  • Cumulative Bibliography of Library History 2000-2018 | Round Tables
    Cumulative Bibliography of Library History 2000-2018 | Round Tables http://www.ala.org/rt/lhrt/popularresources/libhistorybib/lhrtbibearly2000s Cumulative Bibliography of Library History 2000-2018 BIBLIOGRAPHY OF THE HISTORY OF BOOKS, READING, AND BOOK CULTURE PUBLISHED IN THE LIBRARY HISTORY ROUND TABLE NEWSLETTER (2000-2018) Joel Fishman* and Edward A. Goedeken** Professor Edward Goedeken, Humanities Bibliographer at the Iowa State Library, has since 1990 compiled a semi-annual listing of library history that is published in the Library History Round Table Newsletter. As in previous bibliographies, we have updated the cumulative bibliography backwards to include all references from 2000 down to 2018. Similar to the previous bibliographies, the compilers have cumulated the bibliographies by geographic location. In compiling the bibliography, there have been a few typos corrected, deletion of duplicate entries, and some added entries. TABLE OF CONTENTS A. UNITED STATES…1; B. NON-UNITED STATES/NON-WESTERN HEMISPHERE…111; C. EUROPE…119; D. ASIA/ASIA, AFRICA, THE MIDDLE EAST, AND OTHER …168; E. HISTORY OF BOOKS, READING, INFORMATION, AND BOOK CULTURE …186; F. GENERAL HISTORIOGRAPHY, PHILOSOPHY, AND LIBRARY AND INFORMATION SCIENCE EDUCATION…239 A. UNITED STATES Abbott, Andrew. “Googles of the Past: Concordances and Scholarship,” Social Science History 37 (Winter 2013): 427-55. Abel, Richard. “Papa Abel Remembers–The Tale of a Band of Booksellers, Fascicle 8: The Birth of the Approval Plan,” Against the Grain 21 (February 2009): 82-84. Accardo, Peter X. "The Library of the Hollis Professor of Divinity to 1778: A Checklist," Harvard Library Bulletin New Series. v. 13 (Summer 2002): 45-67. Adams, Stephanie.
    [Show full text]
  • The Cultural Contradictions of Cryptography: a History of Secret Codes in Modern America
    The Cultural Contradictions of Cryptography: A History of Secret Codes in Modern America Charles Berret Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy under the Executive Committee of the Graduate School of Arts and Sciences Columbia University 2019 © 2018 Charles Berret All rights reserved Abstract The Cultural Contradictions of Cryptography Charles Berret This dissertation examines the origins of political and scientific commitments that currently frame cryptography, the study of secret codes, arguing that these commitments took shape over the course of the twentieth century. Looking back to the nineteenth century, cryptography was rarely practiced systematically, let alone scientifically, nor was it the contentious political subject it has become in the digital age. Beginning with the rise of computational cryptography in the first half of the twentieth century, this history identifies a quarter-century gap beginning in the late 1940s, when cryptography research was classified and tightly controlled in the US. Observing the reemergence of open research in cryptography in the early 1970s, a course of events that was directly opposed by many members of the US intelligence community, a wave of political scandals unrelated to cryptography during the Nixon years also made the secrecy surrounding cryptography appear untenable, weakening the official capacity to enforce this classification. Today, the subject of cryptography remains highly political and adversarial, with many proponents gripped by the conviction that widespread access to strong cryptography is necessary for a free society in the digital age, while opponents contend that strong cryptography in fact presents a danger to society and the rule of law.
    [Show full text]
  • Inventing Intelligence: on the History of Complex Information Processing and Artificial Intelligence in the United States in the Mid-Twentieth Century
    UNIVERSITY OF CAMBRIDGE Inventing Intelligence: On the History of Complex Information Processing and Artificial Intelligence in the United States in the Mid-Twentieth Century This thesis is submitted for the degree of Doctor of Philosophy In History and Philosophy of Science By Jonathan Nigel Ross Penn (‘Jonnie Penn’) Pembroke College, Cambridge Examiners: Professor Simon Schaffer, University of Cambridge Professor Jon Agar, University College London Supervisor: Dr. Richard Staley, University of Cambridge Advisor: Dr. Helen Anne Curry, University of Cambridge Word Count: 78,033 Date: 14 December 2020 This thesis is the result of my own work and includes nothing which is the outcome of work done in collaboration except as declared in the Preface and specified in the text. It is not substantially the same as any that I have submitted, or, is being concurrently submitted for a degree or diploma or other qualification at the University of Cambridge or any other University or similar institution except as declared in the Preface and specified in the text. I further state that no substantial part of my thesis has already been submitted, or, is being concurrently submitted for any such degree, diploma or other qualification at the University of Cambridge or any other University or similar institution except as declared in the Preface and specified in the text. It does not exceed the prescribed word limit for the Degree Committee of the Department of History and Philosophy of Science at the University of Cambridge. Copyright Jonnie Penn, 2020. All rights reserved. 2 Abstract Inventing Intelligence: On the History of Complex Information Processing and Artificial Intelligence in the United States in the Mid-Twentieth Century In the mid-1950s, researchers in the United States melded formal theories of problem solving and intelligence with another powerful new tool for control: the electronic digital computer.
    [Show full text]
  • NOTES What Tech
    Introduction: The Mark Zuckerberg quote comes from an interview done for Y Combinator’s “How to Build a Future”-series and can be found here: https://www.ycombinator.com/future/mark/ Franklin Foer spoke about what Silicon Valley’s business model does to our thinking in conversation with Keith A. Spencer, the text of the interview can be found here: https://www.salon.com/2017/09/10/interview-franklin-foers-world-without-mind-describes- how-algorithms-erode-free-will/ In 1995, Richard Barbrook and Andy Cameron endeavored to describe to describe “dotcom neoliberalism” as “the California ideology,” an ideology which concerns some of the nexus this book will deal with (https://www.metamute.org/editorial/articles/californian-ideology). I do not use this term because, as will become clear, I do not think that the combination of counter culture and Ayn Rand is as counterintuitive as Barbrook and Cameron thought it was. If anything, the time that has elapsed since their essay has shown deep and troubling compatibilities. Nevertheless, their presentation is very much worth checking out. Similarly, for the conceptual underpinnings of tech’s regulatory capture since the early 2000s, see: Jonathan Taplin, Move Fast and Break Things: How Facebook, Google, and Amazon Cornered Culture and Undermined Democracy (New York: Hachette, 2017), 127f. The McLuhan-quote can be found in Marshall McLuhan, Understanding Media, ed. Terrence Gordon (Berkeley: Gingko Press, 2017), 31. I owe my sense that algorithms, incentive structures and gamification are clearly intended to push Uber and Lyft drivers towards something resembling full employment without being full employees, from hours spent talking to individual drivers across the Bay Area, as well as hanging out on online forums that cater to gig workers.
    [Show full text]
  • 8. AI's Promise
    Gaming AI Gaming AI Why AI Can’t Think but Can Transform Jobs GEORGE GILDER Seattle Discovery Institute Press 2020 Description Pointing to the triumph of artificial intelligence over unaided humans in everything from games such as chess and Go to vital tasks such as protein folding and securities trading, many experts uphold the theory of a “singularity.” This is the trigger point when human history ends and artificial intelligence prevails in an exponential cascade of self-replicating machines rocketing toward godlike supremacy in the universe. Gaming AI suggests that this belief is both dumb and self-defeating. Displaying a profound and crippling case of professional amnesia, the computer science establishment shows an ignorance of the most important findings of its own science, from Kurt Gödel’s “incompleteness” to Alan Turing’s “oracle” to Claude Shannon’s “entropy.” Dabbling in quantum machines, these believers in machine transcendence defy the deepest findings of quantum theory. Claiming to create minds, they are clinically “out of their minds.” Despite the quasi-religious pretensions of techno- elites nobly saving the planet from their own devices, their faith in a techno-utopian singularity is a serious threat to real progress. An industry utterly dependent on human minds will not prosper by obsoleting both their customers and their creators. Gaming AI calls for a remedial immersion in the industry’s own heroic history and an understanding of the actual science of their own human minds. Copyright Notice Copyright © 2020 by Discovery
    [Show full text]