Thursday, December 22, 2011

Seesmic Problem?

I use seesmic web interface to access my twitter, but or the last couple of days I've been having problems with. I cannot login. What gives?

I even tried to change my password. Mail confirmation was received and I changed the password according the instruction, but I still cannot login. Right now, I am using twitter web interface.

If this problem persists, I may have to ditch seesmic. Oh well.

Monday, December 12, 2011

Keynote on Computational Intelligence

This morning I was asked to give a keynote speech ini a conference. The original keynote speaker was not able to make it and the conference was started this morning. I have spare time in this afternoon, so I said that I am able to do it in this afternoon.

The main idea of my speech is to encourage everybody to do research in the future area. Computational intelligence methodologies and tools are needed to explore the future. One of the application is in the social network area. Many people - especially younger generation - live in two worlds; real world and cyber world. Just like in the real world, there are (social) problems in the cyber world. I gave an example of our twitter research, in which we are trying to understand the structure of Indonesian twitters.

Before that, I told them how little we understood about such problems by showing Barricelli's universe. Barricelli did an experiment - simulation using the first computer, when von Neumann and his group were not using the CPU cycle - about a digital universe. There are codes in Barricelli's program that we don't understand (yet) and was not executed at that time. Little that we know.

The second area that we should look more into is games. I showed them that games are really taking off. Look at Zynga, who made all those interesting games in Facebook. Of course there are more games outside Facebook and those games require good artificial intelligence (AI) engine. (I forgot to mention Siri.)

The third area that they should look into is security. I told them about research that we did in identifying attack and intrusion using neural networks. However we ended up using "conventional" statistics in trying to understand the component of an attack.

That's all folks.