technology
-
Eating the Future: The Metabolic Logic of AI Slop
Millions of people watch a video of Tel Aviv in smoking ruins after an Iranian attack. Footage from a US bombing of Tehran takes the place of breaking news from a strike that is yet to happen. Look closer, and you see strange image errors and artifacts. The grass beneath the F-35 is eerily green… Continue reading
-
China, Artificial Intelligence and the fear of the West
Almost no one expected it, yet it was predictable: China has entered the global AI competition and intends to win. Continue reading
-
The farcical fate of the corporate droid and their Cadmean victories
In 2018, David Graeber made the term ‘bullshit jobs’ famous, arguing that over half of societal work is pointless and becomes psychologically destructive when paired with a work ethic that associates productivity with self-worth. Now with the advent of AI and quantum computing, the need for human labour and, in fact, human cognition in the… Continue reading
-
Exposing the big con: The false promise of Artificial Intelligence
The leading big tech companies are working hard to sell Artificial Intelligence (AI) as the gateway to a future of plenty for all. And to this point they have been surprisingly successful in capturing investor money and government support, making their already wealthy owners even wealthier. However, that success doesn’t change the fact that their… Continue reading
-
AI is bad for the environment, and the problem is bigger than energy consumption
Artificial intelligence technologies, like chatbots, are attracting growing scrutiny for their voracious energy demands. However, energy consumption is only one part of their broader environmental impact. Continue reading
-
IT Independence is National Security
The NSA’s “Equation Group” is apparently behind the infection with malware of hard drive firmware on computers used by nations considered “enemies” by the United State. The installation of the malware is believed to have required access to trade secrets of IT manufacturers as well as physical access to the soon-to-be infected computers. Popular Science… Continue reading