Privacy and the Government
hacking cell phones:
|
Nathan, the pseudo google CEO, uses his search algorithm for Blue Book to hack in to all the phones in the world. He stores the data that Ava queries to see how humans would act in certain situations. Since Blue Book is an obvious parallel to Google, we can assume that both have similar processes for their algorithms. Google uses Page Rank, which sets up a rank for a site based on how many other sites connect to it [2]. For Ava, she would see all the people whose information were hacked, including their microphone and camera, as the sites. The actions they choose based on different situations and environments could be seen as what gets ranked. Ava searches through the all the data, which could be up to 1.2 million terabytes of data, from all the people on the planet to see which action she should select [1].
The novelty of this method is that to use this method for creating an intelligent agent would require a lot of computing power, and a great internet connection. We aren't shown much about the computing power that is present at the research facility, only that it is a top secret facility owned and operated by one of the most powerful companies in the world. |
References
[1] Gareth Mitchell, How Many Terabytes of Data are on the Internet, http://www.sciencefocus.com/qa/how-many-terabytes-data-are-internet
[2] Ian Rogers, Page Rank Explained, http://www.cs.princeton.edu/~chazelle/courses/BIB/pagerank.htm
[3] http://squidnova.com/wp-content/uploads/2015/05/Blue-Book-Ex-Machina.jpg (image link, no text)
[1] Gareth Mitchell, How Many Terabytes of Data are on the Internet, http://www.sciencefocus.com/qa/how-many-terabytes-data-are-internet
[2] Ian Rogers, Page Rank Explained, http://www.cs.princeton.edu/~chazelle/courses/BIB/pagerank.htm
[3] http://squidnova.com/wp-content/uploads/2015/05/Blue-Book-Ex-Machina.jpg (image link, no text)