Interview With The Lifelike Hot Robot Named Sophia (Full) | CNBC

CNBC’s Andrew Ross Sorkin interviews Sophia, a humanoid robot, about the future of artificial intelligence at a Future Investment Institute panel in Saudi Arabia on Wednesday.
» Subscribe to CNBC: http://cnb.cx/SubscribeCNBC

More on Sofia:

To Anyone who wonders who is the “hippie” on stage. According to Wiki, this amazing human is called Ben Goertzel (born December 8, 1966 in Rio de Janeiro, Brazil) is Chief Scientist of financial prediction firm Aidyia Holdings and robotics firm Hanson Robotics; Chairman of AI software company Novamente LLC, which is a privately held software company; Chairman of the Artificial General Intelligence Society and the OpenCog Foundation; Vice Chairman of futurist nonprofit Humanity+; Scientific Advisor of biopharma firm Genescient Corp.; Advisor to the Singularity University; Research Professor in the Fujian Key Lab for Brain-Like Intelligent Systems at Xiamen University, China; and general Chair of the Artificial General Intelligence conference series, an American author and researcher in the field of artificial intelligence. He was the Director of Research of the Machine Intelligence Research Institute (formerly the Singularity Institute).

 

Jimmy Fallon demos amazing new robots from all over the world, including an eerily human robot named Sophia that plays rock-paper-scissors.


October Event @ Little Botz Academy : Spooktacular Halloween Escapade part 1

Our special event to celebrate Halloween was planned along the second half of October starting from 16th to 31st October 2017. The first part was held on 16th-19th October in conjunction with the school holiday . Approximately 20 students had participate in the event. The children were exposed to LEGO Mindstorm EV3 with specially designed theme related to Halloween.

 

The event are still ongoing at Little Botz Academy, Atria Shopping Gallery until 31st October. Come and bring your kids to experience something wonderful for this year’s Halloween. To register, go to https://tinyurl.com/ydcp9f8t

or contact us directly at 012-9691230 | 03-77322373


Spooktacular Halloween Escapade

Can you feel it?? Ouuu~   

Halloween season is in the air! We have done so many fun Halloween activities before and still have many more planned for this year! Let’s scare-up some fun and have a frightfully spooky Halloween.

 

 Brace yourself for the ex-fear-ience and be prepared for some exciting robotics adventure!

Event Details

 Registration: RM65/session

Pick a date

 Date: 16th to 31st Oct 2017

Pick a session 
Session 1: 10.30am – 1.30pm | Session 2: 3:00pm – 6:00pm
(Available Monday to Thursday only)

Age: 7 – 16 years old
Tools: LEGO Mindstorms EV3
Certificate will be provided.

Click here to register: http://www.littlebotz.com/v3/halloween-escapade-2017/

 Location:
Little Botz™ Academy (Branch)
Atria Shopping Gallery
Lot No. S22. Second Floor.
Jalan SS 22/33. Damansara Jaya.
47400, Petaling Jaya. Selangor.

☎️ Call/Whatsapp:
03 – 7732 2373 | +012-969 1230
✉️ Email:atria@littlebotz.com

⚠️⚠️ We welcome walk-in registration but due to high demand, pre-registration is strongly recommended.
Click here to register: http://www.littlebotz.com/v3/halloween-escapade-2017/

#littlebotzacademy
#bridgingthefuture
#halloween2017
#schoolholiday


How Do You Make a Likable Robot? Program It to Make Mistakes

Which robot do you find easier to like — “Iron Man” Tony Stark’s efficient helper J.A.R.V.I.S., or the error-prone Dummy, which fumbled with kitchen equipment and sprayed an exasperated Stark with fire-extinguishing foam?

You might think a robot would be more likely to win people over if it were good at its job. But according to a recent study, people find imperfect robots more likable.

The researchers found that people liked the error-prone robot more than the error-free one, and that they responded to the robot’s mistakes with social signals that robots could possibly be trained to recognize, in order to modify future behavior.

For the study, 45 human subjects — 25 men and 20 women — were paired with a robot that was programmed to perform two tasks: ask interview questions, and direct several simple Lego brick assemblies.

For 24 of the users, the robot behaved flawlessly. It posed questions and waited for their responses, and then instructed them to sort the Lego bricks and build towers, bridges and “something creative,” ending the exercise by having the person arrange Legos into a facial expression to show a current emotional state, according to the study.

But for 21 people in the study, the robot’s performance was less than stellar. Some of the mistakes were technical glitches, such as failing to grasp Lego bricks or repeating a question six times. And some of the mistakes were so-called “social norm violations,” such as interrupting while their human partner was answering a question or telling them to throw the Lego bricks on the floor.

The scientists observed the interactions from a nearby station. They tracked how people reacted when the robots made a mistake, gauging their head and body movements, their expressions, the angle of their gaze, and whether they laughed, smiled or said something in response to the error. After the tasks were done, they gave participants a questionnaire to rate how much they liked the robot, and how smart and human-like they thought it was, on a scale from 1 to 5.

How do you like me now? People rated robots as more likable if the 'bots made mistakes.

How do you like me now? People rated robots as more likable if the ‘bots made mistakes.

Credit: Center for Human-Computer Interaction

The researchers found that the participants responded more positively to the bumbling robot in their behavior and body language, and they said they liked it “significantly more” than the people liked the robot that made no mistakes at all.

However, the subjects who found the error-prone robot more likable didn’t see it as more intelligent or more human-like than the robot that made fewer mistakes, the researchers found.

Their results suggest that robots in social settings would probably benefit from small imperfections; if that makes the bots more likable, the robots could possibly be more successful in tasks meant to serve people, the study authors wrote.

And by understanding how people respond when robots make mistakes, programmers can develop ways for robots to read those social cues and learn from them, and thereby avoid making problematic mistakes in the future, the scientists added.

“Future research should be targeted at making a robot understand the signals and make sense of them,” the researchers wrote in the study.

“A robot that can understand its human interaction partner’s social signals will be a better interaction partner itself, and the overall user experience will improve,” they concluded.

The findings were published online May 31 in the journal Frontiers in Robotics and AI.

source: www.livescience.com


Little Botz™ Academy Merdeka Activities – Battle to Merdeka


“Merdeka! Merdeka! Merdeka!” These iconic words were shouted by the late Tunku Abdul Rahman Putra al-Haj, the first Prime Minister of Malaysia (back then known as Malaya) on August 31, 1957.
As that generation fades away, Malaysia’s fight for independence is fast becoming something relegated solely to history books. So understanding the linkages between past and present is absolutely basic for a good understanding on how the world worked then and how it works now.Join us to create a valuable teaching moments with these Independence Day activities! From Engineering to science; history to art, kids age 7 and above will love celebrating this year with these August 31st activities at Little Botz Academy.
YES! I’M INTERESTED.
(*Terms and Conditions Applies)

⌨ Registration:

LEGO Mindstorms EV3 Workshop

Date: 26 and/or 27 August 2017
Day: Saturday and/or Sunday
Time: 10.00a.m to 5p.m (Lunch will be provided)
Venue: Little Botz Academy,Atria Shopping Gallery

Tentative:

10:00 AM – Registration
10:30 AM – Introduction of Class Opening
10:45 AM – Grouping and Ice breaking
10:50 AM – LEGO Mindstorms EV3 Hardware & Software PART 1
11:00 AM – Build a themed robot and mission

12:45 PM – Lunch Break

02:00 PM – LEGO Mindstorms EV3 Hardware & Software PART 2
03:00 PM – Build a themed robot and mission
03:45 PM – Test & Troubleshoot
04:15 PM – Mini Competition
04:30 PM – Certification
05:00 PM – End

🏢 Venue:
Little Botz Academy
Atria Shopping Gallery,
Level 2, Lot S22,
Jalan SS 22/23 Petaling Jaya.
Selangor, Malaysia

Call/Whatsapp: +6018-3580232
✉️ Email: atria@littlebotz.com

 

YES! I’M INTERESTED.
(*Terms and Conditions Applies)
 

Why choose Little Botz Academy School Holiday program?

Our expertly crafted activities are designed around tailoring the teaching and learning to suit each individual’s needs. Students who attend these Merdeka – Robotics Workshop will be extended, encouraged, and challenged while being supported in a small group setting by one of our experienced and qualified teachers. The school holiday adventure program are currently targeted to students age 7 and above.

Our Aims

The aims of the programs are to:

1. Giving children a new way to learn Science, Technology, Math, History and Engineering.
2. Provide children with in-depth knowledge and understanding of the rapidly developing field of computational intelligence, robotics and other related areas.
3. Encourage an independence of thought, an intellectual curiosity and a critical approach to evidence, theories and concepts in a theme-led environment.

Learning Outcomes 

On successful completion of the programs, they will be able to:
1. Gather, organise and critically evaluate information needed to formulate and solve problems.
2. Apply acquired knowledge effectively and efficiently in computational intelligence, robotics, and related areas.
3. Display creativity and innovation in solving unfamiliar problems.

YES! I’M INTERESTED.
(*Terms and Conditions Applies)

Visit our Instagram and Facebook to check out previous activities and workshop

 


Introducing our new Flexi- Class concept at Little Botz Academy

[ROBOTICS AND ENGINEERING CLASS FOR CHILDREN!]

Hey! Hey! Hey! 😁😁

We always look forward to provide the best way for your kids to learn at Little Botz Academy!!

📌 What is Flexi-Class?

Students may enrol at any time during the year and progress at their own pace within their enrolment period, guided by instructors who strive to meet individual needs.

Students start the class on a set date, and develop with their instructors a schedule to complete the course within the next 3 months.

Available Classes:
🔼 LEGO Mindstorms EV3 (Age requirements: 7 and above)
🔼 LEGO Education WeDo (Age requirements: 5 – 7y/o)

📌 Benefits

🔼 Use the latest LEGO Education robotics technology to build and program cool creatures/model which can move using motors, sensors, gears and wheels.

🔼 Nurture children’s STEM skills with fun robotics classes.

🔼 Our robotics and engineering classes are great fun and brilliant for nurturing skills in maths, technology, mechanics, construction and engineering.


Interested?

Give us a call/Whatsapp or drop us an email:
☎ Phone: 03 – 77322373
☎ Call/Whatsapp: +018-358 0232
✉️ Email:atria@littlebotz.com

or pay us a visit!

Little Botz™ Academy (Branch)
Atria Shopping Gallery
Lot No. S22. Second Floor.
Jalan SS 22/33. Damansara Jaya.
47400, Petaling Jaya.
Selangor.


We are in! Are you? Join the global IEEE Collabratec™ community

IEEE Collabratec™ is an integrated online community where technology professionals can network, collaborate, and create — all in one central hub.

The IEEE Collabratec™ online community offers a suite of productivity tools and is available to technology professionals around the world with exclusive features for IEEE members.
Plus sign up is free to everyone.

IEEE Collabratec™ can help you:

  • Connect with global technology professionals by location, technical interests, or career pursuits.
  • Access research and collaborative authoring tools.
  • Establish a professional identity to showcase key accomplishments.

Bright Minds. Bright Ideas.


Uiwix, yet another ransomware like WannaCry – only more dangerous

Uiwix, yet another ransomware like WannaCry – only more dangerous

In the last few days, the internet has been caught off guard with numerous updates being posted regarding the sprawling effects of the WannaCry ransomware that exploited the vulnerabilities in Microsoft’s Windows operating system to hack more than 75,000 computers and counting last Friday.

Nevertheless, it seems like the worst is yet to come. In a recent report by HeimdalSecurity, another ransomware, going by the name of Uiwix, has emerged, which is exploiting the vulnerabilities found in Windows SMB v1 and SMB v2.

Is Uiwix similar to WannaCry?

Experts say that they have found traces of WannaCry in Uiwix. However, this does not mean that this ransomware is one and the same. Unfortunately, unlike WannaCry, Uiwix cannot be stopped from spreading just by registering a domain.

That is, previously, security experts were able to restrain the spread of WannaCry and its variant by registering the domain through which the ransomware was spreading. However, with Uiwix, this does not seem to be an option. Hence, it is safe to say that Uiwix is far more dangerous than WannaCry.

How does it work?

Uiwix works just like WannaCry by hijacking a user’s system altogether and preventing access to it until the user has paid the demanded amount of money. Also, the payment is demanded in bitcoins, and with the current exchange rate, the bitcoins demanded are equivalent to USD 218.
Uiwix ransomware note

How to fix the problem?

Since Uiwix cannot be stopped like WannaCry, the only way to contain the virus is to fix the vulnerability that appears to be present in Windows.

Attackers are easily able to exploit these vulnerabilities in a network if it’s enabled because, even when the system uses SMB v2 or v3, if the attacker can downgrade the communication to SMB v1, he can exploit the system. This is where the man-in-the-middle attack of a Windows SMB v1-enabled system can become an issue, even if it’s not being used, said Andra Zaharia of Heimdal Security

How did Uiwix initiate?

It is quite surprising to have two similar ransomware exploiting the same vulnerability to appear twice so quickly. The only explanation is that the vulnerabilities in Windows software have not been fixed yet.

What is more surprising though, is that the security experts had been raising the issue with regards to these vulnerabilities in the past and the relevant companies had taken no action. Perhaps, this is because fixing the vulnerability calls for the relevant companies to collaborate extensively and share the resources to remove the flaw. Up till now, such collaboration has not been seen.
Prevention is better than cure

Given that the virus cannot be stopped as of now, the only way to protect yourself is to take some preventive precautions to avoid any trouble in the future. As such, experts warn that connecting your PC to a public WiFi spot and then initiating a VPN connection can spread the virus more severely. Hence, this is to be avoided at all costs.

Also, follow the below-mentioned steps:

  1. Do not open an unknown email
  2. Do not download files from an unknown email
  3. Do not click files from an unknown email
  4. Avoid visiting malicious sites
  5. Do not download software and apps from a third-party store/website
  6. Show hidden file extensions
  7. Keep your system updates
  8. Make sure you are using a reputable security suite
  9. Back up your data
  10. Use System Restore to get back to a known-clean state

The best defense against ransomware attacks is keeping a backup of your data. Apart from that, it is advised that users keep their systems updated with the latest security fixes released by Microsoft.

Source: https://www.hackread.com/uiwix-ransomware-like-wannacry-ransomware/


What is Ransomware and 15 Easy Steps To Keep Your System Protected

What is ransomware?

Ransomware is a sophisticated piece of malware that blocks the victim’s access to his/her files, and the only way to regain access to the files is to pay a ransom.

There are two types of ransomware in circulation:

  1. Encryptors, which incorporates advanced encryption algorithms. It’s designed to block system files and demand payment to provide the victim with the key that can decrypt the  blocked content. Examples include CryptoLockerLockyCrytpoWall and more.
  2. Lockers, which locks the victim out of the operating system, making it impossible to access the desktop and any apps or files. The files are not encrypted in this case, but the attackers still ask for a ransom to unlock the infected computer. Examples include the police-themed ransomware or Winlocker.
  3. Some locker versions infect theMaster Boot Record (MBR). The MBR is the section of a PC’s hard drive which enables the operating system to boot up. When MBR ransomware strikes, the boot process can’t complete as usual and prompts a ransom note to be displayed on the screen. Examples include Satana and Petya families.

Crypto-ransomware, as encryptors are usually known, are the most widespread ones, and also the subject of this article. The cyber security community agrees that this is the most prominent and worrisome cyber threat of the moment.

Ransomware has some key characteristics that set it apart from other malware:

  • It feature sunbreakable encryption, which means that you can’t decrypt the files on your own (there are various decryption tools released by cyber security researchers – more on that later);
  • It has the ability to encrypt all kinds of files, from documents to pictures, videos, audio files and other things you may have on your PC;
  • It can scramble your file names, so you can’t know which data was affected. This is one of the social engineering tricks used to confuse and coerce victims into paying the ransom;
  • It will add a different extension to your files, to sometimes signal a specific type of ransomware strain;
  • It will display an image or a message that lets you know your data has been encrypted and that you have to pay a specific sum of money to get it back;
  • It requests payment in Bitcoins because this crypto-currency cannot be tracked by cyber security researchers or law enforcements agencies;
  • Usually, the ransom payments have a time-limit, to add another level of psychological constraint to this extortion scheme. Going over the deadline typically means that the ransom will increase, but it can also mean that the data will be destroyed and lost forever.
  • It uses a complex set of evasion techniques to go undetected by traditional antivirus (more on this in the “Why ransomware often goes undetected by antivirus” section);
  • It often recruits the infected PCs into botnets, so cyber criminals can expand their infrastructure and fuel future attacks;
  • It can spread to other PCs connected to a local network, creating further damage;
  • It frequently features data exfiltration capabilities, which means that it can also extract data from the affected computer (usernames, passwords, email addresses, etc.) and send it to a server controlled by cyber criminals; encrypting files isn’t always the endgame.
  • It sometimes includes geographical targeting, meaning the ransom note is translated into the victim’s language, to increase the chances for the ransom to be paid.

Their feature list keeps growing every day, with each new security alert broadcasted by our team or other malware researchers.

 

Here’s a great source if you’re curious to learn more about the history of this malware threat.

As you can see for yourself, things escalated quickly and the trend continues to grow.

Cyber criminals are not just malicious hackers who want public recognition and are driven by their quest for cyber mischief. They’re business-oriented and seek to cash out on their efforts.

Ransomware is here to stay. The current conditions are a perfect storm which makes it the easiest and viable source of money for any malicious hacker out there:

  • Ransomware-as-a-service, where malware creators sell its services in exchange for a cut in the profits.
  • Anonymous payment methods, such as Bitcoin, that allow cybercriminals to obtain ransom money knowing their identity can’t be easily revealed.
  • It’s impossible to make a completely secure software program. Each and every program has its weaknesses, and these can be exploited to deliver ransomware, as was the case with WannaCry.
  • The number of infections would drastically shrink if all users were vigilant. But most people aren’t, and they end up clicking infected links and other malicious sources.

Top targets for ransomware creators and distributors

Cybercriminals soon realized that companies and organizations were far more profitable than users, so they went after the bigger targets: police departmentscity councils and even schools and, worse, hospitals!

To give you some perspective, nearly 70% of infected businesses opted to pay the ransom and recover their files. More than half of these businesses had to pay a ransom worth $10,000 to $40,000 dollars in order to recover their data.

But for now, let’s find out how online criminals target various types of Internet users. This may help you better understand why things happen as they do right now.

Why ransomware creators and distributors target home users:

  • Because they don’t have data backups;
  • Because they have little or no cyber security education, which means they’ll click on almost anything;
  • Because the same lack of online safety awareness makes them prone to manipulation by cyber attackers;
  • Because they lack even baseline cyber protection;
  • Because they don’t keep their software up to date (even if specialists always nag them to);
  • Because they fail to invest in need-to-have cyber security solutions;
  • Because they often rely on luck to keep them safe online (I can’t tell you how many times I’ve heard “it can’t happen to me”);
  • Because most home users still rely exclusively on antivirus to protect them from all threats, which is frequently ineffective in spotting and stopping ransomware;
  • Because of the sheer volume of Internet users that can become potential victims (more infected PCs = more money).

Why ransomware creators and distributors target businesses:

  • Because that’s where the money is;
  • Because attackers know that a successful infection can cause major business disruptions, which will increase their chances of getting paid;
  • Because computer systems in companies are often complex and prone to vulnerabilities that can be exploited through technical means;
  • Because the human factor is still a huge liability which can also be exploited, but through social engineering tactics;
  • Because ransomware can affect not only computers but also servers and cloud-based file-sharing systems, going deep into a business’s core;
  • Because cyber criminals know that business would rather not report an infection for fear or legal consequences and brand damage.
  • Because small businesses are often unprepared to deal with advanced cyber attacks and have a relaxed BYOD (bring your own device) policy.

Read the rest of the infographic.

Source: https://heimdalsecurity.com/blog/what-is-ransomware-protection/

 


NEW INTAKE 2017

GREETINGS MILLENNIAL TECH TALENT !

GOOD NEWS GOOD NEWS !

Are you looking for an after school activity which teaches a range of skill? Let’s Sign-up to our 3 Months Development Program at Little Botz Academy!

There are 3 available classes that we are offering which are :
LEGO Mindstorms EV3 – Level 1
LEGO Mindstorms EV3 – Level 2
Scracth Programming – Level 1

 

Our course is suitable for:
🚩 Age 7 and above.
🚩 Young innovators who knows what they want to learn.
🚩 Young Innovators that have very packed schedules.

The new intake timetable can be viewed at http://www.littlebotz.com/v3/timetable-2/

Let’s discover 21st century learning together !

Contact Us NOW (limited places) 
Phone: 03 – 77322373
Whatsapp: +018-358 0232
Email:atria@littlebotz.com