Free Essay

If We Attach a Camera or a Microphone to a Computer, It Can Receive Data from the World. Does This Mean That the Computer Can “Perceive the World”?

In:

Submitted By insubstantial
Words 917
Pages 4
The development of mechanisms able to interact with the environment is rising with the passing of the years. Nowadays, our lives are very much dependent on technology due to the fact everything is now computerized or very close to work independently from the human hand. As a consequence of all these advancements, there is the belief that if a camera and a microphone are attached to a computer it can receive data from its surroundings; therefore the computer can “perceive the world” the same way humans do.

Bearing in mind this previous statement, it is important to highlight the main differences between the ways human beings perceive and obtain information from their environment and the ways computers do this exact same thing. First, taking into a count perception, for men, is given through two main ways, externally and internally. Externally refers to the five human senses, which are, sight, smell, touch, taste and hearing. It is proven and known that these senses exist since the conceiving of a human baby and are developed accordingly to his or her growth. With the use of the senses, human beings can perceive the world in different areas, like the colours and sizes of things with the sight; the roughness or softness of objects with the touch and the bitterness or sweetness of food with the taste, among others. Even though, there are computers programmed in order to be able to receive this same information with the use of cameras, microphones and other mechanisms, the development of a computer with the capacity to collect information the same way as humans do hasn’t being reached yet, because not only humans act in their environments and store the information acquired but they associate the information acquired by a sense with the one acquired by another so that the perception of the object or place being analysed is much more accurate and precise.

Moreover, 99% of the data collected by human beings is tied to subjectivity due to the internal method men have to gather information. When talking about the internal system people have to perceive their surroundings, it refers to the idea or image that is created in their brains after the object or place is processed by the senses, this means that not only the picture, sound or flavour will be displayed inside the people’s minds but as well the feelings and effects it creates will matter when referring to the perception someone has about something. Considering the effects these thoughts might have, they not only include whether the person likes it or not, but at the same time, how it makes him or her feel, happy, sad, excited, angry, among others; as well as any memory it might bring back. Which takes us to another big difference between human and programmed perception, feelings and effects.

A starting point for this argument is the differences and similarities between how the human body delivers information and how a computer does. Even though the brain is connected to the rest of the body through nerves and glands that transport data in a similar way computer’s cables and chips do, for example the way the brain uses neurotransmitters to send a signal from a neuron to a target cell can be easily contrasted to the connections made in a robot’s electronic circuit which is usually made of individual and different electronic components and wire through which electric current is passed. Despite that, the release of endorphins and other neurotransmitters by glands not only fulfils the purpose of transmitting the information but as well produces actions and reaction of the body of a person and his or her mood as well as stated by Neurogistics Inc (2010) this brain chemicals that communicate information throughout our brain and body that can also affect the temperament of people. In fact, when accomplishing the receiving and processing of information by a human being, whether it has the purpose of simply storing or making the body move, among other objectives it might have, the person will interpret this information according to his or her likings and at the same time it will free emotions and develop mood-changes.

On the contrary, computers or robots programmed to “act” and “perceive” the environment they are placed in as a human, have not yet managed to acquire the connectivity skill man has, in which every single thought or action is related to all five senses, feelings and memories the individual might have about it. In addition to this, even though a processor is predetermined to “feel” somehow when facing a situation that is part of the list implemented in the computer, the mechanism is not feeling, but is following the instructions given by its creators and programmers to act in a certain way when fronting an specific occasion.

In conclusion and to summarize, even though computers can be programmed to act and perform certain gestures or noises during an specific situation with the help of mechanisms such as cameras and microphones, they have not reached the point where they are able to perceive the world as human beings do, because there is no robot that has yet developed the capacity humans have of connecting every though with all five senses, feeling and memories and due to the fact the do not “feel” or actually “perceive” by themselves, but they simply follow instructions assigned by their creators.

LIST OF REFERENCES: Neurogistics Inc. (2010). What are neurotransmitters?. Retrieved from http://www.neurogistics.com/TheScience/WhatareNeurotransmi09CE.asp

Similar Documents

Free Essay

Introduction to Multimedia Systems

...Introduction to Multimedia Systems This Page Intentionally Left Blank Introduction to Multimedia Systems Editors Gaurav Bhatnagar Shikha Mehta Sugata Mitra Centre for Research in Cognitive Systems (CRCS) NIITUd. New Delhi, India ACADEMIC PRESS A Harcourt Science and Technology Company San Diego San Francisco New York Boston London Sydney Tokyo Cover art: © 2001 John Foxx Images This book is printed on acid-free paper, w Copyright © 2002 by ACADEMIC PRESS All Rights Reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Requests for permission to make copies of any part of the work should be mailed to: Permissions Department, Harcourt Inc., 6277 Sea Harbor Drive, Orlando, Florida 32887-6777 Explicit permission from Academic Press is not required to reproduce a maximum of two figures or tables from an Academic Press chapter in another scientific or research publication provided that the material has not been credited to another source and that full credit to the Academic Press chapter is given. Academic Press A division of Harcourt, Inc. 525 B Street, Suite 1900, San Diego, Cahfomia 92101-4495, USA http://www.academicpress.com Academic Press Harcourt Place, 32 Jamestown Road, London NWl 7BY, UK http ://www. academicpress...

Words: 60427 - Pages: 242

Free Essay

Google Glass

...Gregory Bateson on second-order cybernetics / 8 2.3. The kinship between human, animal and machine, Donna Haraway’s theory of the cyborg / 12 2.4. The disembodiment of the human being, Katherine N. Hayles’ theory of the posthuman / 14 3. Chapter 2 – Google Glass, Individuation and the Black Box / 21 3.1. Introduction to Google Glass / 21 3.2. Google Glass and Gregory Bateson’s theory of self-corrective systems / 24 3.3. Industrialization of memory through Google Glass and Bernard Stiegler’s theory of the exterior milieu / 26 3.4. Google Glass as a black box and W. Ross Ashby’s theory of the black boxing / 29 3.5. Experience Design, Olia Lialina and the disappearing user / 30 3.6. Miniaturization of technology, Google Glass as a ubiquitous computer through Mark Weiser’s theory / 32 4. Chapter 3 – Google Glass as an Extension of the Human Being: MediumSpecificity and Becoming Posthuman / 34 4.1 Media ecology through Marshall McLuhan and Google Glass as an extension of the human being / 34 4.2 Perceptual and behaviour change through Google Glass / 39 4.3 Change of time and space perception, McLuhan and the global village / 41 4.4 Human being’s freedom to ideological change through Donna Haraway’s cyborg theory / 42 5. Conclusion / 44 6. Bibliography   2  INTRODUCTION Google Glass is a technological device designed and created by the media giant Google. The device is an upcoming...

Words: 19980 - Pages: 80

Premium Essay

Management Information Systems

...Office Applications in Business Problem-Solving Cases in Microsoft Access & Excel, Sixth Annual Edition • Brady, Monk Succeeding in Business Applications with Microsoft Office 2007 • Bast, Gross, Akaiwa, Flynn, et.al Succeeding in Business with Microsoft Office Excel 2007 • Gross, Akaiwa, Nordquist Succeeding in Business with Microsoft Office Access 2007 • Bast, Cygman, Flynn, Tidwell Databases Database Systems, Eighth Edition • Rob, Coronel Concepts of Database Management, Sixth Edition • Pratt, Adamski Data Modeling and Database Design • Umanath, Scamell A Guide to SQL, Seventh Edition • Pratt A Guide to MySQL • Pratt, Last Guide to Oracle 10g • Morrison, Morrison, Conrad Oracle 10g Titles Oracle9i Titles Enterprise Resource Planning Concepts in Enterprise Resource Planning, Third Edition • Monk, Wagner Data Communications Data Communications and Computer Networks: A Business User’s Approach, Fourth Edition • White Systems Analysis and Design Systems Analysis and Design in a Changing World, Fifth Edition • Satzinger, Jackson, Burd Object-Oriented Analysis and Design with the Unified Process • Satzinger, Jackson, Burd Systems Analysis and Design for the Small Enterprise, Third Edition • Harris Security Management of Information Security, Second Edition • Whitman, Mattord Principles of Information Security, Third Edition • Whitman, Mattord Readings and Cases in the Management of Information Security • Whitman, Mattord Hands-On Information Security Lab Manual, Second Edition • Whitman,...

Words: 223685 - Pages: 895

Free Essay

Cybersecurity

...in importance in the coming years; 2) that such issues, if not well managed, could provide a major source of international friction, especially in U.S.-China relations; and 3) the newness of the field added a particularly complicating factor, making cybersecurity one of the most important but least understood emerging flashpoints in global security. A key aspect of the effort was to convene several dozen knowledgeable Americans from both the private and public sector, including the civilian government, military, corporate, think tank, and university communities. With such dynamic and fast-changing events playing out, the Brookings project not only sought to study the key issues in cybersecurity and how they impact U.S.-China relations, but also to break down some of the organizational and bureaucratic stovepipes that have limited leaders and expert groups as they seek to build the type of understanding crucial for developing sound policies. The working group did not seek to provide final answers to all the various questions that trouble relations in this space. Rather, participants saw a critical need first to build a framework for understanding the key trends and risks in the cyber arena, as a basis for C y b e r s eC...

Words: 17963 - Pages: 72

Free Essay

Business

...Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, e-mail: brandreview@wiley.com. Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission. All other trademarks are the property of their respective owners. Wiley Publishing, Inc., is not associated with any product or vendor mentioned in this book. LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER AND THE AUTHOR MAKE NO REPRESENTATIONS OR WARRANTIES...

Words: 155013 - Pages: 621

Free Essay

Free Software, Free Society: Selected Essays of Richard M. Stallman

...org Free Software Foundation Boston, MA USA First printing, first edition. Copyright © 2002 Free Software Foundation, Inc. ISBN 1-882114-98-1 Published by the Free Software Foundation 59 Temple Place Boston, MA Tel: 1-617-542-5942 Fax: 1-617-542-2652 Email: gnu@gnu.org Web: www.gnu.org GNU Press is an imprint of the FSF. Email: press@gnu.org Web: www.gnupress.org Please contact the GNU Press for information regarding bulk purchases for classroom or user group use, reselling, or any other questions or comments. Original artwork by Etienne Suvasa. Cover design by Jonathan Richard. Permission is granted to make and distribute verbatim copies of this book provided the copyright notice and this permission notice are preserved on all copies. Permission is granted to copy and distribute translations of this book into another language, from the original English, with respect to the conditions on distribution of modified versions above, provided that it has been approved by the Free Software Foundation. i Short Contents Editor’s Note . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 A Note on Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Topic Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Section One . . . . . . . ...

Words: 101866 - Pages: 408

Premium Essay

Voice, Video, Network

...VOICE, VIDEO, AND DATA NETWORK CONVERGENCE VOICE, VIDEO, AND DATA NETWORK CONVERGENCE ARCHITECTURE AND DESIGN, FROM VOIP TO WIRELESS JUANITA ELLIS CHARLES PURSELL JOY RAHMAN Amsterdam Boston London New York Oxford San Francisco Singapore Sydney Tokyo Paris San Diego This book is printed on acid-free paper. Copyright 2003, Elsevier Science (USA). All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Permissions may be sought directly from Elsevier’s Science & Technology Rights Department in Oxford, UK: phone: (+44) 1865 843830, fax: (+44) 1865 853333, e-mail: permissions@elsevier.com.uk. You may also complete your request on-line via the Elsevier Science homepage (http://elsevier.com), by selecting “Customer Support” and then “Obtaining Permissions.” Explicit permission from Academic Press is not required to reproduce a maximum of two figures or tables from an Academic Press chapter in another scientific or research publication provided that the material has not been credited to another source and that full credit to the Academic Press chapter is given. Academic Press An imprint of Elsevier Science 525 B Street, Suite 1900, San Diego, California 92101-4495, USA http://www.academicpress.com Academic Press 84 Theobald’s Road, London WC1X 8RR...

Words: 125371 - Pages: 502

Premium Essay

Art of Deception

...without the use of technology. Contents Foreword Preface Introduction Part 1 Behind the Scenes Chapter 1 Security's Weakest Link Part 2 The Art of the Attacker Chapter 2 When Innocuous Information Isn't Chapter 3 The Direct Attack: Just Asking for it Chapter 4 Building Trust Chapter 5 "Let Me Help You" Chapter 6 "Can You Help Me?" Chapter 7 Phony Sites and Dangerous Attachments Chapter 8 Using Sympathy, Guilt and Intimidation Chapter 9 The Reverse Sting Part 3 Intruder Alert Chapter 10 Entering the Premises Chapter 11 Combining Technology and Social Engineering Chapter 12 Attacks on the Entry-Level Employee Chapter 13 Clever Cons Chapter 14 Industrial Espionage Part 4 Raising the Bar Chapter 15 Information Security Awareness and Training Chapter 16 Recommended Corporate Information Security Policies Security at a Glance Sources Acknowledgments Foreword We humans are born with an inner drive to explore the nature of our surroundings. As young men, both Kevin Mitnick and I were intensely curious about the world and eager to prove ourselves. We were rewarded often in our attempts to learn new things, solve puzzles, and win at games. But at the same time, the world around us taught us rules of behavior that...

Words: 125733 - Pages: 503

Free Essay

Arduino

...Audrey Doyle Proofreader: Teresa Elsey Indexer: Lucie Haskins Cover Designer: Karen Montgomery Interior Designer: David Futato Illustrator: Robert Romano Printing History: March 2011: First Edition. Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered trademarks of O’Reilly Media, Inc. Arduino Cookbook, the image of a toy rabbit, and related trade dress are trademarks of O’Reilly Media, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly Media, Inc., was aware of a trademark claim, the designations have been printed in caps or initial caps. While every precaution has been taken in the preparation of this book, the publisher and authors assume no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein. ISBN: 978-0-596-80247-9 [LSI] 1299267108 Table of Contents Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....

Words: 90321 - Pages: 362

Free Essay

Code

...Markets Department at the Perseus Books Group, 11 Cambridge Center, Cambridge MA 02142, or call (617) 252-5298, (800) 255-1514 or e-mail special.markets@perseusbooks.com. CIP catalog record for this book is available from the Library of Congress. ISBN-10: 0–465–03914–6 ISBN-13: 978–0–465–03914–2 06 07 08 09 / 10 9 8 7 6 5 4 3 2 1 Code version 1.0 FOR CHARLIE NESSON, WHOSE EVERY IDEA SEEMS CRAZY FOR ABOUT A YEAR. Code version 2.0 TO WIKIPEDIA, THE ONE SURPRISE THAT TEACHES MORE THAN EVERYTHING HERE. C O N T E N T S Preface to the Second Edition Preface to the First Edition Chapter 1. Code Is Law Chapter 2. Four Puzzles from Cyberspace PART I: “REGULABILITY” ix xiii 1 9 Chapter 3. Is-Ism: Is the Way It Is the Way It Must Be? Chapter 4. Architectures of Control Chapter 5. Regulating Code PART II: REGULATION BY CODE 31 38 61 Chapter 6. Cyberspaces Chapter 7. What Things Regulate Chapter 8. The Limits in Open Code PART III: LATENT AMBIGUITIES 83 120 138 Chapter 9. Translation Chapter 10. Intellectual Property Chapter 11. Privacy Chapter 12. Free Speech Chapter 13. Interlude PART IV: COMPETING SOVEREIGNS 157 169 200 233 276 Chapter 14. Sovereignty Chapter 15. Competition Among Sovereigns 281 294 PART V: RESPONSES Chapter 16. The Problems We...

Words: 190498 - Pages: 762

Premium Essay

Mba in a Day

...Professor Stralser’s advice invaluable for business professionals, but those in the arts who are more focused on their creative endeavors would benefit from reading MBA In A Day® to help strengthen their business skills.” —Bobi Leonard, CEO, Arcara Enterprises, Inc. “Steve’s book is a valuable asset to anyone needing to avoid the pitfalls of business, be they a small business owner, a physician, a lawyer, or just about anyone who deals with business. Just because you have not had the opportunity to study for a formal MBA, why be at a disadvantage in the business world? In just a few days of quality reading time you will level the playing field. Let your own brainpower do the rest.” —George Reiss, MD, Clinical Instructor, Mayo Clinic; Eye Physician, Phoenix Coyotes Professional Hockey Club “Professor Stralser’s MBA In A Day® contains insights that are incredibly valuable for any entrepreneur obsessed with success. They provide quick access to sound practical thinking on the real-world business issues most likely to confront the busy start-up entrepreneur.” —Michael Hool, Partner, Rogers & Theobald, LLC; Chairman, Arizona Venture Capital Conference “Steve has an uncanny ability to distill business concepts to their true fundamentals without confusing or losing the audience. He also provides user-friendly templates that can help readers begin to improve their knowledge and performance immediately.” —Ed Robinson, Capacity Building Solutions Inc.; TEC Chair, Group 663 ...

Words: 92092 - Pages: 369

Premium Essay

Business Research Methods

...Research Methods –STA630 VU Research Methods (STA630) Contents Lesson 1: INTRODUCTION, DEFINITION & VALUE OF RESEARCH ........................ 14 What is Research?................................................................................................................... 14 What is the value of Research? ............................................................................................... 14 Research helps in developing methodologies ......................................................................... 15 We are surrounded by research............................................................................................... 16 Lesson 2: SCIENTIFIC METHOD OF RESEARCH & ITS SPECIAL FEATURES ...... 17 Important Characteristics of Scientific Method ...................................................................... 17 1. Empirical......................................................................................................................... 17 2. Verifiable ........................................................................................................................ 18 3. Cumulative ..................................................................................................................... 18 4. Deterministic.................................................................................................................. 18 5. Ethical and Ideological Neutrality ............................................................

Words: 85920 - Pages: 344

Premium Essay

Network Administration

...impacts on our lives. What were once esoteric tools used only by scientists and engineers are becoming more widely used in schools, libraries, and businesses. At the same time, researchers are working to develop even more capable networks that promise to change fundamentally the way we communicate. This background paper analyzes technologies for tomorrow’s information superhighways. Advanced networks will first be used to support scientists in their work, linking researchers to supercomputers, databases, and scientific instruments. As the new networks are deployed more widely, they will be used by a broader range of users for business, entertainment, health care, and education applications. The background paper also describes six test networks that are being funded as part of the High Performance Computing and Communications Program. These test networks are a collaboration of government, industry, and academia, and allow researchers to try new approaches to network design and to attack a variety of research questions, Significant progress has been made in the development of technologies that will help achieve the goals of the HighPerformance Computing Act of 1991. This is the third publication from OTA’s assessment on information technology and research, which was requested by the House Committee on Science, Space, and Technology and the Senate Committee on Commerce, Science, and...

Words: 37290 - Pages: 150

Free Essay

Momentum Effect

...or later, it hits you in the face. Imagine you are meeting up with a senior analyst whose opinion counts with some of your company’s biggest investors. You think you’re on safe ground—after all, your company is doing better than the competition. But the analyst is in full gimlet-eyed, illusion-killing mode. “That’s nothing to crow about,” she says. “Yeah, you’ve got reasonable growth, but it’s nothing exceptional. You’re a safe bet, nothing more. Okay, I might tell my mom to buy, but 3 The Momentum Effect then she’s happy with inflation plus one. The way we see it, you’re really grinding it out. We reckon the strain’s getting harder, too. There’s no impetus—no momentum.” Words like that can really take the gloss off a day. The next time you gather your team, you don’t congratulate them on beating their targets—you want more. Sure, our results are up, you say, but that’s not enough—where’s the impetus? When are we going to do something exceptional? With all the resources at your disposal, when are you going to start building some momentum? The team members look at their papers. Then Paul, an anxious member of your team, looks up and says: “Okay. Got any ideas about how?” What are you going to say?...

Words: 104474 - Pages: 418

Free Essay

Train Your Brain

...winning the World Memory Championships eight times, he was named the Brain Trust of Great Britain’s Brain of the Year in 1994 and Grandmaster of Memory in 1995. He has made numerous appearances on TV and radio and holds a host of world records, including one for memorizing 2,385 random binary digits in 30 minutes. In 2005 he was given a lifetime achievement award by the World Memory Championships International in recognition of his work to promote the art of memory all over the world; and in 2010 he became the General Manager of the World Memory Sports Council. By the same author (all published by Duncan Baird Publishers) How to Develop a Brilliant Memory: Week by Week How to Pass Exams Learn to Remember Never Forget: A Name or Face Never Forget: A Number or Date This edition published in the UK in 2011 by Watkins Publishing, Sixth Floor, Castle House, 75–76 Wells Street, London W1T 3QH Copyright © Watkins Publishing 2011 Text copyright © Dominic O’Brien 2011 Illustrations copyright © Watkins Publishing 2011 Dominic O’Brien has asserted his moral right under the Copyright, Designs and Patents Act 1988 to be identified as the author of this work. Mind Maps® is a registered trade mark of Tony Buzan in the UK and USA. For further information visit www.thinkbuzan.com. All rights reserved. No part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, without prior permission in writing from the Publishers...

Words: 51768 - Pages: 208