Logo
    Search

    #95 – Dawn Song: Adversarial Machine Learning and Computer Security

    enMay 12, 2020

    Podcast Summary

    • Advancements in formal verification and program analysis for secure codingWhile formal verification and program analysis are significant steps towards secure coding, they don't provide a silver bullet against all types of attacks. A holistic approach to security is necessary.

      While it's challenging to write completely secure code due to the ever-evolving nature of vulnerabilities and attacks, advancements in formal verification and program analysis techniques are making it possible to create formally verified systems with proven security properties. However, it's essential to recognize that these systems may still be vulnerable to other types of attacks, and the importance of security goes beyond just code analysis. In the conversation with Professor Dawn Song, she highlighted the broad spectrum of attacks, including memory safety vulnerabilities and side channels, and the importance of providing as many security guarantees as possible. Formal verification, which involves mathematically proving the correctness of a program, is a significant step forward in creating secure systems, but it's not a silver bullet. It's crucial to continue making progress in the field and to recognize the importance of a holistic approach to security.

    • Humans are the weakest link in cybersecurityWhile we focus on securing software systems, humans remain a significant vulnerability due to social engineering attacks and lack of ability to patch or upgrade themselves.

      While we strive to create more secure software systems, it's important to recognize that humans remain a significant vulnerability in cybersecurity. Traditional program verification techniques focus on static analysis, as they cannot fully account for the diverse and evolving nature of attacks. The tension between nations and groups in the cybersecurity realm only adds to the concern, as the future of conflicts may lie in this domain. Security is a complex issue, as we aim to prove a statement of no vulnerabilities, an impossible feat given the ever-changing landscape of attacks. Humans are the weakest link in cybersecurity, and attacks are increasingly targeting them through social engineering and deep fake technologies. As machines and systems can be patched and upgraded, humans lack this capability. Social engineering attacks, such as phishing, have already led to significant breaches at reputable organizations. In the future, these attacks are expected to become even more sophisticated and effective. To help mitigate this issue, projects are being developed that use AI and machine learning to assist humans in defending against these attacks. For instance, NLP and chatbot techniques can be employed to observe conversations between users and potential attackers, helping to identify and prevent social engineering attacks. This is a crucial step in addressing the human vulnerability in cybersecurity.

    • Chatbots and NLP enhance online security against social engineering attacksChatbots and advanced NLP techniques can detect and respond to phishing scams and social engineering attacks, acting as a user's personal security representative across all online platforms. However, privacy and control considerations are important as a powerful chatbot would need access to personal information.

      Chatbots and advanced NLP techniques have the potential to significantly enhance online security by detecting and responding to social engineering attacks. For instance, in phishing scams, chatbots can recognize suspicious patterns and even engage in challenge and response interactions to verify the correspondent's identity. As NLP and chatbot technologies continue to advance, they could become a user's personal security representative across all online platforms. However, there are important considerations regarding privacy and control, as a powerful chatbot would need access to a significant amount of personal information to effectively protect the user. Another intriguing area of research is adversarial machine learning, where attackers manipulate machine learning systems to produce incorrect or misleading results. These attacks can occur at both the inference and training stages. For instance, at the inference stage, attackers can add subtle perturbations to inputs to cause the machine learning system to give a completely wrong output. At the training stage, attackers can provide poisoned data sets to manipulate the model's learning. These attacks can have serious consequences, including incorrect predictions or decisions that benefit the attacker. Understanding and addressing these adversarial attacks is crucial for maintaining the accuracy and reliability of machine learning systems.

    • Manipulating machine learning systems with poisoned dataAttackers can introduce small numbers of poisoned data points during training to manipulate machine learning systems, leading to incorrect classifications and potential security risks.

      Attackers can manipulate machine learning systems by introducing small numbers of poisoned data points during the training phase, leading to the learning system making incorrect classifications, especially in specific situations known only to the attacker. This type of attack is stealthy and difficult to detect, even for humans visually reviewing the training data sets. For instance, using facial recognition as an example, attackers only need to insert a few poisoned data points to fool the learning system into learning the wrong model, potentially allowing unauthorized access or impersonation. The learning system learns patterns and associates them with certain labels, making it possible to manipulate it by providing training data with specific objects or characteristics, such as glasses, even if they are not visible to humans. The implications of this research are significant, as it highlights the vulnerability of machine learning systems to targeted attacks and the need for more robust security measures.

    • Physical Adversarial Attacks on Machine Learning SystemsPhysical adversarial attacks can manipulate machine learning systems by altering inputs in the physical world, posing unique challenges due to physical constraints, and can have severe consequences in applications like autonomous driving.

      Attacks on machine learning systems can occur both at the training stage by manipulating data and at the inference stage by altering inputs in both the digital and physical worlds. The physical world poses unique challenges as creating adversarial examples requires considering physical constraints, such as the location of perturbations and the need for perceptible changes after the camera captures the image. For instance, in the context of autonomous driving, an attacker could create a maliciously perturbed stop sign that can cause a learning system to misclassify it into a speed limit sign, potentially leading to severe consequences. These physical adversarial examples can remain effective despite changes in viewing distances, angles, and conditions. Understanding and addressing these attacks is crucial for ensuring the safety and reliability of machine learning systems in real-world applications.

    • Understanding the limitations of current deep learning modelsDespite advancements, deep learning models are still vulnerable to adversarial examples, highlighting the need for richer representations to build more resilient learning systems.

      While deep learning models have made significant advancements, the creation of adversarial examples in both the digital and physical worlds reveals that we are still in the early stages of developing robust and generalizable machine learning methods. The scientific process of generating adversarial examples involves understanding the constraints and limitations of the physical world and optimizing for them, but it also highlights that our current models may not be learning the right representations or a rich enough representation of the world. Although there have been numerous papers on defense mechanisms, their effectiveness is limited. To build more resilient learning systems, we need to learn richer representations that can better understand and interpret the nuances of the world, just as humans do.

    • Using Spatial Consistency as a Constraint in Segmentation SystemsResearchers explore using spatial consistency as a constraint in segmentation systems to defend against adversarial examples, making it harder for attackers to satisfy both the segmentation task and spatial consistency, resulting in an effective defense mechanism.

      To make machine learning models more robust and able to represent information richly, we need to make them less sensitive to noise and avoid learning spurious correlations. One example of richer information representation is semantic segmentation in image processing, where humans can identify more information than what an image classification system can. However, segmentation systems are also easily fooled by adversarial examples. To defend against this, researchers have explored using spatial consistency as a constraint in segmentation systems. Spatial consistency means that if two patches of an image have an intersection, the segmentation results at the intersection should be consistent. In experiments, this holds true for normal images but poses a challenge for adversarial examples, making it difficult for attackers to satisfy both the segmentation task and spatial consistency, resulting in an effective defense mechanism. This also aligns with the idea of having learning systems learn from multiple modalities or ways to check their predictions.

    • Adversarial attacks can be effective in various domainsResearchers and organizations must stay informed about the latest attack methods and invest in robust defense mechanisms against adversarial attacks in vision, audio, and natural language domains.

      While spatial and temporal consistency checks have shown promise in detecting adversarial examples in research settings, the attackers have the upper hand in the current literature. Adversarial attacks can be effective not only in vision but also in audio and natural language domains. Real-world systems, including Google Translate and cloud vision APIs, have already been successfully attacked using black-box methods. The ease of creating imitation models and generating adversarial examples is a significant concern. Regarding autonomous driving, the feasibility of attacks is a concern, with research already demonstrating the potential for manipulating Tesla's Autopilot system using stickers. However, the question remains whether such attacks can be executed in the actual physical world, such as on a highway. While the feasibility of the attack is a certainty, the intention and execution of such attacks are separate concerns. The current state of the literature shows that attackers have a significant advantage, with various attack methods and techniques being developed. The hope is that real-world systems will be more difficult to attack, but recent research has shown that this may not be the case. It is crucial for researchers and organizations to stay informed about the latest attack methods and invest in robust defense mechanisms.

    • Recognizing the limitations of autonomous vehicles and implementing robust defensesAutonomous vehicles are not infallible and can make wrong decisions even without attacks. Defenses against vulnerabilities include multi-modal, multi-sensor approaches to increase system integrity and confidentiality, and recognizing the importance of protecting privacy in machine learning settings.

      While the feasibility of sensory-based attacks on autonomous vehicles is a concern, it's important to remember that even without attacks, these systems can make wrong decisions. Moreover, natural settings have shown that learning systems don't always generalize well, leading to misbehavior. However, there are ways to defend against these vulnerabilities. One approach is to use a smart and model-based defense, with consistent checks and multiple sensors. This multi-modal, multi-sensor approach makes it harder for attackers to compromise the system's integrity or confidentiality. In terms of privacy, the main vulnerabilities lie in the confidentiality of the system, with attackers potentially gaining sensitive information. Integrity and confidentiality are two essential properties in security, and protecting privacy in the machine learning setting requires addressing these vulnerabilities. Overall, the key is to recognize that these systems are not infallible and to implement robust defenses to mitigate potential risks.

    • Protecting sensitive data during machine learning trainingMachine learning models can remember sensitive info from training data, leading to potential privacy attacks. Differential privacy adds noise to protect privacy, and data ownership is crucial to consider.

      During the training of machine learning models, protecting the privacy and confidentiality of the sensitive training data is of utmost importance. This is because machine learning models, especially those with high capacity like neural networks, can remember a significant amount of information from the training data. An attacker, whether through white box attacks, where they have access to the model parameters, or query attacks, where they only have access to the model to query, can potentially infer sensitive information about the original training data. For instance, an attacker can extract sensitive personally identifiable information like social security numbers and credit card numbers from a language model trained on email datasets. To protect against these attacks, there are mechanisms like differential privacy that add noise during the training process to ensure that the presence of a particular person in the data cannot be determined. Differential privacy enhances privacy protection by making the learned model private, making attacks less effective. Another related concept is data ownership, which is an interesting idea in the context of using online services for seemingly free. It's essential to consider who owns the data generated or collected during the use of these services and how it is being used. Ultimately, it's crucial to be aware of the potential risks and take appropriate measures to protect sensitive information.

    • Personal data ownership and control in the digital age compared to property rightsEstablishing clear ownership of personal data and allowing individuals control over its use is crucial for privacy, control, and economic growth.

      The ownership and control of personal data is a crucial aspect of economic growth and individual privacy in the digital age. The comparison can be drawn to property rights, which have been a significant driver for economic growth throughout history. Currently, internet companies largely own and control the data generated by individuals, leading to targeted advertising and potential privacy concerns. Establishing clear ownership of personal data and allowing individuals to define how it is used is essential to prevent manipulation and ensure privacy. This not only benefits individuals but also promotes economic growth. The recognition and enforcement of these rights are vital, as seen in the historical development of property rights and their impact on economic growth. The digital world, where more and more information and assets are moving, necessitates a shift in focus towards data ownership and control. This is a complex issue that requires careful consideration and action to ensure that individuals have the power to decide how their data is used, promoting privacy, control, and economic growth.

    • Balancing User Privacy and Company UtilityA nuanced dialogue is needed to balance user privacy and company utility, involving technical solutions and regulatory frameworks to ensure responsible data usage

      The ownership and control of data on the internet is a complex issue with both positive and negative implications. On one hand, it can lead to long-term economic growth and free services for users. On the other hand, it could potentially change the way the internet looks and reduce the value of seemingly free services if users are hesitant to hand over their data. However, the solution is not a simple fight between user privacy and company utility. Instead, a more nuanced dialogue is needed to establish a balance between the two. This dialogue should involve understanding the technical challenges and developing privacy-preserving technologies, as well as providing regulatory frameworks to help both sides willingly engage in data trade. Ultimately, the goal is to ensure that data is utilized responsibly and in a way that benefits all parties involved.

    • Impacts of Facebook and Blockchain on our Digital WorldFacebook shapes digital identity while blockchain ensures security and immutability; ongoing dialogue and solutions are necessary for addressing challenges in identity, privacy, and security.

      Both Facebook and emerging technologies like blockchain have significant impacts on our digital world, bringing about new possibilities and challenges, particularly in the areas of identity, privacy, and security. Facebook's role in creating a digital identity is undeniable, allowing people to be themselves online using their real names and pictures. However, it's crucial to have ongoing dialogue about the negative aspects and work towards constructive solutions. Similarly, blockchain, a decentralized and distributed digital ledger, offers security and immutability, essential for transactions and digital currency. Understanding the importance of security and privacy in these contexts is vital as we navigate the digital landscape.

    • Decentralized systems ensure security but face challenges with integrity and privacyDecentralized systems offer security through consensus mechanisms but struggle with ensuring transaction confidentiality. Solutions include secure computing and confidential smart contracts.

      While decentralized systems like cryptocurrencies offer security through distributed consensus mechanisms, they also come with challenges related to integrity and privacy. The security of these systems depends on the consensus mechanism and the resources required to compromise them. For instance, Bitcoin's proof-of-work mechanism has required significant electricity usage, making it more secure. However, the public nature of these ledgers means that transactions are not confidential. To address this, confidentiality can be ensured through additional mechanisms like secure computing and confidential smart contracts. Oasis Labs is an example of a startup working on such solutions. Program synthesis, another intriguing area in computer science, involves teaching computers to write code. While neural networks can help learn aspects of program synthesis, it remains a complex problem. For the speaker, shifting from security to AI and machine learning led them to explore program synthesis and adversarial machine learning.

    • Exploring the Challenges and Progress in Program SynthesisProgram synthesis is a critical area of AI research, pushing machine intelligence to generate complex programs and achieve AGI. Despite challenges, progress is being made, particularly in limited domains, and the potential for advancements is significant.

      Program synthesis is an essential area of research in the field of artificial intelligence and machine learning, serving as a "perfect playground" for building intelligent machines and achieving artificial general intelligence. It represents the ultimate test of machine intelligence, as it involves generating programs that can express complex ideas, reason through them, and convert them into algorithms. While we have made significant progress in this field, particularly in limited domains such as natural language translation, there are still challenges to be addressed, including increasing the complexity of the programs we can synthesize and measuring progress effectively. The community of researchers in this area is growing, and we are seeing real-world applications in limited domains. The ability to learn in the space of programs is an exciting prospect, despite the challenges, and the potential for advancements in this field is significant. The metrics for measuring progress in program synthesis include the complexity of the task to be synthesized and the complexity of the synthesizer programs themselves. The field is still small but growing, and its researchers are making strides towards synthesizing increasingly complex programs. Program synthesis is a crucial step towards building intelligent machines and achieving artificial general intelligence.

    • From physics to computer science: Insights from an interdisciplinary backgroundAdvancements in programming synthesis require focus on complexity, generalization, and adaptation to create versatile and adaptive tools. Interdisciplinary backgrounds, like physics and computer science, offer unique insights in this field.

      Advancements in programming synthesis and machine learning, specifically in the areas of complexity, generalization, and adaptation, hold great potential for creating tools that can learn and solve new problems. The journey from physics to computer science for the speaker involved a transition from studying the natural world to designing and creating it, and this interdisciplinary background has informed their research in programming synthesis. Complexity in programming synthesis has evolved from simple if-then-that programs to more complex SQL queries and recursive programs. Generalization is another crucial aspect, allowing learn programs to synthesize solutions for a wide range of inputs and tasks. Adaptation, which goes beyond programming synthesis, involves learning from past experiences to solve new tasks, much like how humans learn. The speaker emphasizes the importance of focusing on these areas to create more versatile and adaptive tools. Their unique background in physics and computer science has provided valuable insights in this field. The differences between cultures, such as China and the United States, have also influenced their perspective, with the emphasis on theoretical foundations in physics and the practical applications in computer science. Overall, the potential for programming synthesis to learn and adapt to new problems, combined with the speaker's interdisciplinary background, presents an exciting opportunity for future advancements in this field.

    • From Physics to Computer Science: A Journey of DiscoveryThe speaker's background in physics influenced their approach to computer science, appreciating the elegance of deriving complex concepts from simple laws, while recognizing the importance of understanding historical context and design choices in computer systems, and reflecting on their experience transitioning from China to the US.

      The speaker's background in physics deeply influenced their approach to machine learning and computer science. The speaker was initially drawn to physics due to its elegance and ability to derive complex concepts from simple laws. However, during their graduate studies, they found that the research process in physics was more complex and time-consuming than they anticipated. In contrast, they found computer science to be more straightforward, as ideas could be quickly brought to life through coding. The speaker also noted that while physics provides a solid foundation for problem-solving and critical thinking, the artificial nature of computer systems requires an understanding of historical context and design choices. Lastly, the speaker discussed their experience transitioning from China to the United States and how it shaped their perspective, highlighting how times have changed with increased globalization and access to technology.

    • Collaboration in AI between US and ChinaCultural differences and geographical distances do not hinder scientific progress in AI as ideas and advancements are shared globally.

      Despite cultural differences and geographical distances, collaboration in fields like AI between the US and China is possible due to the borderless nature of science and academic research. This openness allows for the sharing of ideas and advancements, leading to progress for the whole world. A transformative moment for the speaker in falling in love with computer science was the realization that they could bring their ideas to life through programming. As for the meaning of life, the speaker believes that each individual should define their own purpose and fulfillment, rather than relying on external sources. This belief was not influenced by a mortality experience, but rather a personal introspection.

    • Discovering the Meaning of LifeEach person must define their own meaning of life, offering freedom and responsibility to shape a fulfilling existence. Reflection on personal beliefs and values can provide valuable insights.

      The meaning of life is a deeply personal and subjective concept that each individual must define for themselves. While some may seek guidance from external factors or voices, ultimately, it is the individual who holds the power to define their own purpose and meaning in life. This can be a daunting responsibility, but it also offers the freedom to shape one's life in a way that brings joy, fulfillment, and growth. Some people may find meaning through creation, experience, or growth, while others may discover it through different means. The question of the meaning of life may never have a definitive answer, but the act of asking it and reflecting on one's own beliefs and values can be a valuable and enriching experience.

    • The search for meaning is a personal journeyFocusing on a specific goal or passion can lead to fulfillment and success, it's a personal journey to define what gives life purpose and value.

      While the question of the meaning of life is a profound and important one, it may not lead to happiness or definitive answers. However, having a clear sense of purpose can be liberating and help focus one's efforts. It's a question that humans are naturally drawn to, but it's important not to get lost in it. Instead, focusing on a specific goal or passion can lead to fulfillment and success. Don's personal experience of shifting his focus from security to AI and machine learning serves as an example of this. Ultimately, the search for meaning is a personal journey, and it's up to each individual to define what gives their life purpose and value.

    Recent Episodes from Lex Fridman Podcast

    #436 – Ivanka Trump: Politics, Family, Real Estate, Fashion, Music, and Life

    #436 – Ivanka Trump: Politics, Family, Real Estate, Fashion, Music, and Life
    Ivanka Trump is a businesswoman, real estate developer, and former senior advisor to the President of the United States. Please support this podcast by checking out our sponsors: - Cloaked: https://cloaked.com/lex and use code LexPod to get 25% off - Shopify: https://shopify.com/lex to get $1 per month trial - NetSuite: http://netsuite.com/lex to get free product tour - Eight Sleep: https://eightsleep.com/lex to get $350 off - ExpressVPN: https://expressvpn.com/lexpod to get 3 months free Transcript: https://lexfridman.com/ivanka-trump-transcript EPISODE LINKS: Ivanka's Instagram: https://instagram.com/ivankatrump Ivanka's X: https://x.com/IvankaTrump Ivanka's Facebook: https://facebook.com/IvankaTrump Ivanka's books: Women Who Work: https://amzn.to/45yHAgj The Trump Card: https://amzn.to/3xB22jS PODCAST INFO: Podcast website: https://lexfridman.com/podcast Apple Podcasts: https://apple.co/2lwqZIr Spotify: https://spoti.fi/2nEwCF8 RSS: https://lexfridman.com/feed/podcast/ YouTube Full Episodes: https://youtube.com/lexfridman YouTube Clips: https://youtube.com/lexclips SUPPORT & CONNECT: - Check out the sponsors above, it's the best way to support this podcast - Support on Patreon: https://www.patreon.com/lexfridman - Twitter: https://twitter.com/lexfridman - Instagram: https://www.instagram.com/lexfridman - LinkedIn: https://www.linkedin.com/in/lexfridman - Facebook: https://www.facebook.com/lexfridman - Medium: https://medium.com/@lexfridman OUTLINE: Here's the timestamps for the episode. On some podcast players you should be able to click the timestamp to jump to that time. (00:00) - Introduction (10:17) - Architecture (22:32) - Modern architecture (30:05) - Philosophy of design (38:21) - Lessons from mother (1:01:27) - Lessons from father (1:09:59) - Fashion (1:20:54) - Hotel design (1:32:04) - Self-doubt (1:34:27) - Intuition (1:37:37) - The Apprentice (1:42:11) - Michael Jackson (1:43:46) - Nature (1:48:40) - Surfing (1:50:51) - Donald Trump (2:05:13) - Politics (2:21:25) - Work-life balance (2:27:53) - Parenting (2:42:59) - 2024 presidential campaign (2:46:37) - Dolly Parton (2:48:22) - Adele (2:48:51) - Alice Johnson (2:54:16) - Stevie Ray Vaughan (2:57:01) - Aretha Franklin (2:58:11) - Freddie Mercury (2:59:16) - Jiu jitsu (3:06:21) - Bucket list (3:10:50) - Hope
    Lex Fridman Podcast
    enJuly 02, 2024

    #435 – Andrew Huberman: Focus, Controversy, Politics, and Relationships

    #435 – Andrew Huberman: Focus, Controversy, Politics, and Relationships
    Andrew Huberman is a neuroscientist at Stanford and host of the Huberman Lab Podcast. Please support this podcast by checking out our sponsors: - Eight Sleep: https://eightsleep.com/lex to get $350 off - LMNT: https://drinkLMNT.com/lex to get free sample pack - AG1: https://drinkag1.com/lex to get 1 month supply of fish oil - Shopify: https://shopify.com/lex to get $1 per month trial - NetSuite: http://netsuite.com/lex to get free product tour - BetterHelp: https://betterhelp.com/lex to get 10% off Transcript: https://lexfridman.com/andrew-huberman-5-transcript EPISODE LINKS: Andrew's YouTube: https://youtube.com/AndrewHubermanLab Andrew's Instagram: https://instagram.com/hubermanlab Andrew's Website: https://hubermanlab.com Andrew's X: https://x.com/hubermanlab Andrew's book on Amazon: https://amzn.to/3RNSIQN Andrew's book: https://hubermanlab.com/protocols-book PODCAST INFO: Podcast website: https://lexfridman.com/podcast Apple Podcasts: https://apple.co/2lwqZIr Spotify: https://spoti.fi/2nEwCF8 RSS: https://lexfridman.com/feed/podcast/ YouTube Full Episodes: https://youtube.com/lexfridman YouTube Clips: https://youtube.com/lexclips SUPPORT & CONNECT: - Check out the sponsors above, it's the best way to support this podcast - Support on Patreon: https://www.patreon.com/lexfridman - Twitter: https://twitter.com/lexfridman - Instagram: https://www.instagram.com/lexfridman - LinkedIn: https://www.linkedin.com/in/lexfridman - Facebook: https://www.facebook.com/lexfridman - Medium: https://medium.com/@lexfridman OUTLINE: Here's the timestamps for the episode. On some podcast players you should be able to click the timestamp to jump to that time. (00:00) - Introduction (10:24) - Quitting and evolving (17:22) - How to focus and think deeply (19:56) - Cannabis drama (30:08) - Jungian shadow (40:35) - Supplements (43:38) - Nicotine (48:01) - Caffeine (49:48) - Math gaffe (1:06:50) - 2024 presidential elections (1:13:47) - Great white sharks (1:22:32) - Ayahuasca & psychedelics (1:37:33) - Relationships (1:45:08) - Productivity (1:53:58) - Friendship
    Lex Fridman Podcast
    enJune 28, 2024

    #434 – Aravind Srinivas: Perplexity CEO on Future of AI, Search & the Internet

    #434 – Aravind Srinivas: Perplexity CEO on Future of AI, Search & the Internet
    Arvind Srinivas is CEO of Perplexity, a company that aims to revolutionize how we humans find answers to questions on the Internet. Please support this podcast by checking out our sponsors: - Cloaked: https://cloaked.com/lex and use code LexPod to get 25% off - ShipStation: https://shipstation.com/lex and use code LEX to get 60-day free trial - NetSuite: http://netsuite.com/lex to get free product tour - LMNT: https://drinkLMNT.com/lex to get free sample pack - Shopify: https://shopify.com/lex to get $1 per month trial - BetterHelp: https://betterhelp.com/lex to get 10% off Transcript: https://lexfridman.com/aravind-srinivas-transcript EPISODE LINKS: Aravind's X: https://x.com/AravSrinivas Perplexity: https://perplexity.ai/ Perplexity's X: https://x.com/perplexity_ai PODCAST INFO: Podcast website: https://lexfridman.com/podcast Apple Podcasts: https://apple.co/2lwqZIr Spotify: https://spoti.fi/2nEwCF8 RSS: https://lexfridman.com/feed/podcast/ YouTube Full Episodes: https://youtube.com/lexfridman YouTube Clips: https://youtube.com/lexclips SUPPORT & CONNECT: - Check out the sponsors above, it's the best way to support this podcast - Support on Patreon: https://www.patreon.com/lexfridman - Twitter: https://twitter.com/lexfridman - Instagram: https://www.instagram.com/lexfridman - LinkedIn: https://www.linkedin.com/in/lexfridman - Facebook: https://www.facebook.com/lexfridman - Medium: https://medium.com/@lexfridman OUTLINE: Here's the timestamps for the episode. On some podcast players you should be able to click the timestamp to jump to that time. (00:00) - Introduction (10:52) - How Perplexity works (18:48) - How Google works (41:16) - Larry Page and Sergey Brin (55:50) - Jeff Bezos (59:18) - Elon Musk (1:01:36) - Jensen Huang (1:04:53) - Mark Zuckerberg (1:06:21) - Yann LeCun (1:13:07) - Breakthroughs in AI (1:29:05) - Curiosity (1:35:22) - $1 trillion dollar question (1:50:13) - Perplexity origin story (2:05:25) - RAG (2:27:43) - 1 million H100 GPUs (2:30:15) - Advice for startups (2:42:52) - Future of search (3:00:29) - Future of AI
    Lex Fridman Podcast
    enJune 19, 2024

    #433 – Sara Walker: Physics of Life, Time, Complexity, and Aliens

    #433 – Sara Walker: Physics of Life, Time, Complexity, and Aliens
    Sara Walker is an astrobiologist and theoretical physicist. She is the author of a new book titled "Life as No One Knows It: The Physics of Life's Emergence". Please support this podcast by checking out our sponsors: - Notion: https://notion.com/lex - Motific: https://motific.ai - Shopify: https://shopify.com/lex to get $1 per month trial - BetterHelp: https://betterhelp.com/lex to get 10% off - AG1: https://drinkag1.com/lex to get 1 month supply of fish oil Transcript: https://lexfridman.com/sara-walker-3-transcript EPISODE LINKS: Sara's Book - Life as No One Knows It: https://amzn.to/3wVmOe1 Sara's X: https://x.com/Sara_Imari Sara's Instagram: https://instagram.com/alien_matter PODCAST INFO: Podcast website: https://lexfridman.com/podcast Apple Podcasts: https://apple.co/2lwqZIr Spotify: https://spoti.fi/2nEwCF8 RSS: https://lexfridman.com/feed/podcast/ YouTube Full Episodes: https://youtube.com/lexfridman YouTube Clips: https://youtube.com/lexclips SUPPORT & CONNECT: - Check out the sponsors above, it's the best way to support this podcast - Support on Patreon: https://www.patreon.com/lexfridman - Twitter: https://twitter.com/lexfridman - Instagram: https://www.instagram.com/lexfridman - LinkedIn: https://www.linkedin.com/in/lexfridman - Facebook: https://www.facebook.com/lexfridman - Medium: https://medium.com/@lexfridman OUTLINE: Here's the timestamps for the episode. On some podcast players you should be able to click the timestamp to jump to that time. (00:00) - Introduction (10:40) - Definition of life (31:18) - Time and space (42:00) - Technosphere (46:25) - Theory of everything (55:06) - Origin of life (1:16:44) - Assembly theory (1:32:58) - Aliens (1:44:48) - Great Perceptual Filter (1:48:45) - Fashion (1:52:47) - Beauty (1:59:08) - Language (2:05:50) - Computation (2:15:37) - Consciousness (2:24:28) - Artificial life (2:48:21) - Free will (2:55:05) - Why anything exists
    Lex Fridman Podcast
    enJune 13, 2024

    #432 – Kevin Spacey: Power, Controversy, Betrayal, Truth & Love in Film and Life

    #432 – Kevin Spacey: Power, Controversy, Betrayal, Truth & Love in Film and Life
    Kevin Spacey is a two-time Oscar-winning actor, who starred in Se7en, the Usual Suspects, American Beauty, and House of Cards, creating haunting performances of characters who often embody the dark side of human nature. Please support this podcast by checking out our sponsors: - ExpressVPN: https://expressvpn.com/lexpod to get 3 months free - Eight Sleep: https://eightsleep.com/lex to get $350 off - BetterHelp: https://betterhelp.com/lex to get 10% off - Shopify: https://shopify.com/lex to get $1 per month trial - AG1: https://drinkag1.com/lex to get 1 month supply of fish oil EPISODE LINKS: Kevin's X: https://x.com/KevinSpacey Kevin's Instagram: https://www.instagram.com/kevinspacey Kevin's YouTube: https://youtube.com/kevinspacey Kevin's Website: https://kevinspacey.com/ PODCAST INFO: Podcast website: https://lexfridman.com/podcast Apple Podcasts: https://apple.co/2lwqZIr Spotify: https://spoti.fi/2nEwCF8 RSS: https://lexfridman.com/feed/podcast/ YouTube Full Episodes: https://youtube.com/lexfridman YouTube Clips: https://youtube.com/lexclips SUPPORT & CONNECT: - Check out the sponsors above, it's the best way to support this podcast - Support on Patreon: https://www.patreon.com/lexfridman - Twitter: https://twitter.com/lexfridman - Instagram: https://www.instagram.com/lexfridman - LinkedIn: https://www.linkedin.com/in/lexfridman - Facebook: https://www.facebook.com/lexfridman - Medium: https://medium.com/@lexfridman OUTLINE: Here's the timestamps for the episode. On some podcast players you should be able to click the timestamp to jump to that time. (00:00) - Introduction (10:14) - Seven (13:54) - David Fincher (21:46) - Brad Pitt and Morgan Freeman (27:15) - Acting (35:40) - Improve (44:24) - Al Pacino (48:07) - Jack Lemmon (57:25) - American Beauty (1:17:34) - Mortality (1:20:22) - Allegations (1:38:19) - House of Cards (1:56:55) - Jack Nicholson (1:59:57) - Mike Nichols (2:05:30) - Christopher Walken (2:12:38) - Father (2:21:30) - Future
    Lex Fridman Podcast
    enJune 05, 2024

    #431 – Roman Yampolskiy: Dangers of Superintelligent AI

    #431 – Roman Yampolskiy: Dangers of Superintelligent AI
    Roman Yampolskiy is an AI safety researcher and author of a new book titled AI: Unexplainable, Unpredictable, Uncontrollable. Please support this podcast by checking out our sponsors: - Yahoo Finance: https://yahoofinance.com - MasterClass: https://masterclass.com/lexpod to get 15% off - NetSuite: http://netsuite.com/lex to get free product tour - LMNT: https://drinkLMNT.com/lex to get free sample pack - Eight Sleep: https://eightsleep.com/lex to get $350 off EPISODE LINKS: Roman's X: https://twitter.com/romanyam Roman's Website: http://cecs.louisville.edu/ry Roman's AI book: https://amzn.to/4aFZuPb PODCAST INFO: Podcast website: https://lexfridman.com/podcast Apple Podcasts: https://apple.co/2lwqZIr Spotify: https://spoti.fi/2nEwCF8 RSS: https://lexfridman.com/feed/podcast/ YouTube Full Episodes: https://youtube.com/lexfridman YouTube Clips: https://youtube.com/lexclips SUPPORT & CONNECT: - Check out the sponsors above, it's the best way to support this podcast - Support on Patreon: https://www.patreon.com/lexfridman - Twitter: https://twitter.com/lexfridman - Instagram: https://www.instagram.com/lexfridman - LinkedIn: https://www.linkedin.com/in/lexfridman - Facebook: https://www.facebook.com/lexfridman - Medium: https://medium.com/@lexfridman OUTLINE: Here's the timestamps for the episode. On some podcast players you should be able to click the timestamp to jump to that time. (00:00) - Introduction (09:12) - Existential risk of AGI (15:25) - Ikigai risk (23:37) - Suffering risk (27:12) - Timeline to AGI (31:44) - AGI turing test (37:06) - Yann LeCun and open source AI (49:58) - AI control (52:26) - Social engineering (54:59) - Fearmongering (1:04:49) - AI deception (1:11:23) - Verification (1:18:22) - Self-improving AI (1:30:34) - Pausing AI development (1:36:51) - AI Safety (1:46:35) - Current AI (1:51:58) - Simulation (1:59:16) - Aliens (2:00:50) - Human mind (2:07:10) - Neuralink (2:16:15) - Hope for the future (2:20:11) - Meaning of life
    Lex Fridman Podcast
    enJune 02, 2024

    #430 – Charan Ranganath: Human Memory, Imagination, Deja Vu, and False Memories

    #430 – Charan Ranganath: Human Memory, Imagination, Deja Vu, and False Memories
    Charan Ranganath is a psychologist and neuroscientist at UC Davis, specializing in human memory. He is the author of a new book titled Why We Remember. Please support this podcast by checking out our sponsors: - Riverside: https://creators.riverside.fm/LEX and use code LEX to get 30% off - ZipRecruiter: https://ziprecruiter.com/lex - Notion: https://notion.com/lex - MasterClass: https://masterclass.com/lexpod to get 15% off - Shopify: https://shopify.com/lex to get $1 per month trial - LMNT: https://drinkLMNT.com/lex to get free sample pack Transcript: https://lexfridman.com/charan-ranganath-transcript EPISODE LINKS: Charan's X: https://x.com/CharanRanganath Charan's Instagram: https://instagram.com/thememorydoc Charan's Website: https://charanranganath.com Why We Remember (book): https://amzn.to/3WzUF6x Charan's Google Scholar: https://scholar.google.com/citations?user=ptWkt1wAAAAJ Dynamic Memory Lab: https://dml.ucdavis.edu/ PODCAST INFO: Podcast website: https://lexfridman.com/podcast Apple Podcasts: https://apple.co/2lwqZIr Spotify: https://spoti.fi/2nEwCF8 RSS: https://lexfridman.com/feed/podcast/ YouTube Full Episodes: https://youtube.com/lexfridman YouTube Clips: https://youtube.com/lexclips SUPPORT & CONNECT: - Check out the sponsors above, it's the best way to support this podcast - Support on Patreon: https://www.patreon.com/lexfridman - Twitter: https://twitter.com/lexfridman - Instagram: https://www.instagram.com/lexfridman - LinkedIn: https://www.linkedin.com/in/lexfridman - Facebook: https://www.facebook.com/lexfridman - Medium: https://medium.com/@lexfridman OUTLINE: Here's the timestamps for the episode. On some podcast players you should be able to click the timestamp to jump to that time. (00:00) - Introduction (10:18) - Experiencing self vs remembering self (23:59) - Creating memories (33:31) - Why we forget (41:08) - Training memory (51:37) - Memory hacks (1:03:26) - Imagination vs memory (1:12:44) - Memory competitions (1:22:33) - Science of memory (1:37:48) - Discoveries (1:48:52) - Deja vu (1:54:09) - False memories (2:14:14) - False confessions (2:18:00) - Heartbreak (2:25:34) - Nature of time (2:33:15) - Brain–computer interface (BCI) (2:47:19) - AI and memory (2:57:33) - ADHD (3:04:30) - Music (3:14:15) - Human mind
    Lex Fridman Podcast
    enMay 25, 2024

    #429 – Paul Rosolie: Jungle, Apex Predators, Aliens, Uncontacted Tribes, and God

    #429 – Paul Rosolie: Jungle, Apex Predators, Aliens, Uncontacted Tribes, and God
    Paul Rosolie is a naturalist, explorer, author, and founder of Junglekeepers, dedicating his life to protecting the Amazon rainforest. Support his efforts at https://junglekeepers.org Please support this podcast by checking out our sponsors: - ShipStation: https://shipstation.com/lex and use code LEX to get 60-day free trial - Yahoo Finance: https://yahoofinance.com - BetterHelp: https://betterhelp.com/lex to get 10% off - NetSuite: http://netsuite.com/lex to get free product tour - Eight Sleep: https://eightsleep.com/lex to get $350 off - Shopify: https://shopify.com/lex to get $1 per month trial Transcript: https://lexfridman.com/paul-rosolie-2-transcript EPISODE LINKS: Paul's Instagram: https://instagram.com/paulrosolie Junglekeepers: https://junglekeepers.org Paul's Website: https://paulrosolie.com Mother of God (book): https://amzn.to/3ww2ob1 PODCAST INFO: Podcast website: https://lexfridman.com/podcast Apple Podcasts: https://apple.co/2lwqZIr Spotify: https://spoti.fi/2nEwCF8 RSS: https://lexfridman.com/feed/podcast/ YouTube Full Episodes: https://youtube.com/lexfridman YouTube Clips: https://youtube.com/lexclips SUPPORT & CONNECT: - Check out the sponsors above, it's the best way to support this podcast - Support on Patreon: https://www.patreon.com/lexfridman - Twitter: https://twitter.com/lexfridman - Instagram: https://www.instagram.com/lexfridman - LinkedIn: https://www.linkedin.com/in/lexfridman - Facebook: https://www.facebook.com/lexfridman - Medium: https://medium.com/@lexfridman OUTLINE: Here's the timestamps for the episode. On some podcast players you should be able to click the timestamp to jump to that time. (00:00) - Introduction (12:29) - Amazon jungle (14:47) - Bushmaster snakes (26:13) - Black caiman (44:33) - Rhinos (47:47) - Anacondas (1:18:04) - Mammals (1:30:10) - Piranhas (1:41:00) - Aliens (1:58:45) - Elephants (2:10:02) - Origin of life (2:23:21) - Explorers (2:36:38) - Ayahuasca (2:45:03) - Deep jungle expedition (2:59:09) - Jane Goodall (3:01:41) - Theodore Roosevelt (3:12:36) - Alone show (3:22:23) - Protecting the rainforest (3:38:36) - Snake makes appearance (3:46:47) - Uncontacted tribes (4:00:11) - Mortality (4:01:39) - Steve Irwin (4:09:18) - God
    Lex Fridman Podcast
    enMay 15, 2024

    #428 – Sean Carroll: General Relativity, Quantum Mechanics, Black Holes & Aliens

    #428 – Sean Carroll: General Relativity, Quantum Mechanics, Black Holes & Aliens
    Sean Carroll is a theoretical physicist, author, and host of Mindscape podcast. Please support this podcast by checking out our sponsors: - HiddenLayer: https://hiddenlayer.com/lex - Cloaked: https://cloaked.com/lex and use code LexPod to get 25% off - Notion: https://notion.com/lex - Shopify: https://shopify.com/lex to get $1 per month trial - NetSuite: http://netsuite.com/lex to get free product tour Transcript: https://lexfridman.com/sean-carroll-3-transcript EPISODE LINKS: Sean's Website: https://preposterousuniverse.com Mindscape Podcast: https://www.preposterousuniverse.com/podcast/ Sean's YouTube: https://youtube.com/@seancarroll Sean's Patreon: https://www.patreon.com/seanmcarroll Sean's Twitter: https://twitter.com/seanmcarroll Sean's Instagram: https://instagram.com/seanmcarroll Sean's Papers: https://scholar.google.com/citations?user=Lfifrv8AAAAJ Sean's Books: https://amzn.to/3W7yT9N PODCAST INFO: Podcast website: https://lexfridman.com/podcast Apple Podcasts: https://apple.co/2lwqZIr Spotify: https://spoti.fi/2nEwCF8 RSS: https://lexfridman.com/feed/podcast/ YouTube Full Episodes: https://youtube.com/lexfridman YouTube Clips: https://youtube.com/lexclips SUPPORT & CONNECT: - Check out the sponsors above, it's the best way to support this podcast - Support on Patreon: https://www.patreon.com/lexfridman - Twitter: https://twitter.com/lexfridman - Instagram: https://www.instagram.com/lexfridman - LinkedIn: https://www.linkedin.com/in/lexfridman - Facebook: https://www.facebook.com/lexfridman - Medium: https://medium.com/@lexfridman OUTLINE: Here's the timestamps for the episode. On some podcast players you should be able to click the timestamp to jump to that time. (00:00) - Introduction (11:03) - General relativity (23:22) - Black holes (28:11) - Hawking radiation (32:19) - Aliens (41:15) - Holographic principle (1:05:38) - Dark energy (1:11:38) - Dark matter (1:20:34) - Quantum mechanics (1:41:56) - Simulation (1:44:18) - AGI (1:58:42) - Complexity (2:11:25) - Consciousness (2:20:32) - Naturalism (2:24:49) - Limits of science (2:29:34) - Mindscape podcast (2:39:29) - Einstein

    #427 – Neil Adams: Judo, Olympics, Winning, Losing, and the Champion Mindset

    #427 – Neil Adams: Judo, Olympics, Winning, Losing, and the Champion Mindset
    Neil Adams is a judo world champion, 2-time Olympic silver medalist, 5-time European champion, and often referred to as the Voice of Judo. Please support this podcast by checking out our sponsors: - ZipRecruiter: https://ziprecruiter.com/lex - Eight Sleep: https://eightsleep.com/lex to get special savings - MasterClass: https://masterclass.com/lexpod to get 15% off - LMNT: https://drinkLMNT.com/lex to get free sample pack - NetSuite: http://netsuite.com/lex to get free product tour Transcript: https://lexfridman.com/neil-adams-transcript EPISODE LINKS: Neil's Instagram: https://instagram.com/naefighting Neil's YouTube: https://youtube.com/NAEffectiveFighting Neil's TikTok: https://tiktok.com/@neiladamsmbe Neil's Facebook: https://facebook.com/NeilAdamsJudo Neil's X: https://x.com/NeilAdamsJudo Neil's Website: https://naeffectivefighting.com Neil's Podcast: https://naeffectivefighting.com/podcasts/the-dojo-collective-podcast A Life in Judo (book): https://amzn.to/4d3DtfB A Game of Throws (audiobook): https://amzn.to/4aA2WeJ PODCAST INFO: Podcast website: https://lexfridman.com/podcast Apple Podcasts: https://apple.co/2lwqZIr Spotify: https://spoti.fi/2nEwCF8 RSS: https://lexfridman.com/feed/podcast/ YouTube Full Episodes: https://youtube.com/lexfridman YouTube Clips: https://youtube.com/lexclips SUPPORT & CONNECT: - Check out the sponsors above, it's the best way to support this podcast - Support on Patreon: https://www.patreon.com/lexfridman - Twitter: https://twitter.com/lexfridman - Instagram: https://www.instagram.com/lexfridman - LinkedIn: https://www.linkedin.com/in/lexfridman - Facebook: https://www.facebook.com/lexfridman - Medium: https://medium.com/@lexfridman OUTLINE: Here's the timestamps for the episode. On some podcast players you should be able to click the timestamp to jump to that time. (00:00) - Introduction (09:13) - 1980 Olympics (26:35) - Judo explained (34:40) - Winning (52:54) - 1984 Olympics (1:01:55) - Lessons from losing (1:17:37) - Teddy Riner (1:37:12) - Training in Japan (1:52:51) - Jiu jitsu (2:03:59) - Training (2:27:18) - Advice for beginners

    Related Episodes

    Rich and Paul on Security

    Rich and Paul on Security

    How does Postlight tackle security challenges? This week Paul and Rich begin the episode with takeaways from the Apple iPhone announcement (which they had not yet heard at the time of recording) before diving into a wide-ranging discussion on digital security, from personal worries to the Equifax breach to the steps they take as a company to ensure clients’ data safety. They then tell the story of the first $20 Postlight ever made—a tale about infidelity, large datasets, AshleyMadison.com, and a trio of guys who were definitely up to no good.

    See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

    #35 Datenchefs #26 mit Dr. Manuel J. A. Eugster | VP Data Intelligence Avira

    #35 Datenchefs #26 mit Dr. Manuel J. A. Eugster | VP Data Intelligence Avira
    500 Millionen Kunden und Unternehmen vertrauen auf Aviras Sicherheitsexpertise und die preisgekrönte Antivirensoftware. Unser Gast Manuel blickt auf eine langjährige erfolgreiche Karriere im Bereich Machine Learning zurück, von Forschung bis Industrie. Seit nunmehr 5 Jahren arbeitet er bei Avira als Data Scientist, zuletzt ist er als Vice President für das Thema Data Intelligence bei Avira verantwortlich. Überblick zu unseren Themen: Relevanz von Körpersignalen in Informationssystemen und Benutzeroberflächen. (ab 04:36) Was macht Avira? (ab 12:57) Wie wichtig sind heute Virenscanner? (ab 17:53) “Data Intelligence” bei Avira, wie viel davon circa zahlt auf die Business-Seite ein (Marketing, BI etc.), wie viel auf das/die Produkt/e? (ab 20:25) Vom datengetriebenen zum experimentgetrieben Unternehmen zum Unternehmen mit KI-Kultur. (ab 26:57) Beispiele für Datenwertschöpfung bei Avira. (ab 35:58) Tech-Stack der Data Intelligence Unit bei Avira. (ab 46:29) Mindset im Unternehmen und Buyin vom Top-Management sind die größten Herausforderungen für den Erfolg von Data Intelligence. (ab 48:54) Zur großen Bedeutung von Forschung bei Avira. (ab 51:46)

    Tech at the ACLU: In practice, and in theory

    Tech at the ACLU: In practice, and in theory

    The technologists defending the Constitution: this week Paul and Rich talk to two people with very different roles at the American Civil Liberties Union. Marco Carbone, Associate Director for Internet Technology, manages the ACLU’s website, while Daniel Kahn Gillmor, Senior Staff Technologist for the Speech, Privacy, and Technology Project, does policy-oriented work, especially on digital privacy rights. Topics covered include the recent influx of donations to the organization, poor security standards on our social media platforms, warrants, and more.

    See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

    SMACtalk 75: Exploring the Future of Artificial Intelligence with Dr. Rob F. Walker

    SMACtalk 75: Exploring the Future of Artificial Intelligence with Dr. Rob F. Walker

    In this week’s episode of SMACtalk, hosts Brian Fanzo and Daniel Newman had the opportunity to speak with PegaSystems VP, Rob Walker, an experienced executive in the machine learning and artificial intelligence (AI) that also happens to hold a PHD in the space.

    While the show has covered the gambit of technology topics, this was one of the very first SMACtalk episodes that focused on the future of artificial intelligence, so having someone of Rob’s experience was a terrific fit and opportunity to discuss some of the key trends in the space. In particular, the focus was on AI and its impact on enterprise software tools such as ERP, CRM and Business Intelligence.

    View full report: https://www.pega.com/AI-SurveyDuring this episode, Rob provided insights on the following questions:

    1. What are some of the biggest technology shifts that are impacting the future of CRM?
    2. AI and Automation are stirring up the Future of Work, but for CRM they are a powerful duo, can you share a little more?
    3. Salesforce made a big splash with Einstein, but AI inside of CRM is going to be the norm, right? 
    4. Can you share an example of how intelligence will transform workflows inside of companies? 
    5. What do you see as the next big changes in CRM in the next 12 months? 5 Years?

    Optimism for AI: Despite fear and knowledge gap, there is still optimism towards AI - nearly 70 percent (68) say they want more AI to help make their lives easier.

    *Download full report here

    Some highlights include Rob demystifying where AI is in its lifecycle and just how far it has come in the past 20 years. He also provides some wonderful insights as to the difference between real artificial intelligence and predictive programming that can often be misconstrued as AI.

    Throughout this episode, Rob continually answers the challenging questions that are thrown his way while providing useful insights for anyone interested in learning more about AI, even if you are a technology novice.

    Tune in, check it out and enjoy the episode!  Stay tuned for more episodes with Pega Systems thought leadership and SMACtalk Live from PegaWorld June 4-7, 2017.


    Disclaimer: This episode was sponsored in part by Pegasystems. To learn more about Pegaystems and download the full AI report mentioned in this episode of SMACtalk visit:  https://www.pega.com/AI-Survey

    AI demos! Microsoft’s Windows Copilot, ChatGPT multimodal, Meta’s AI chatbots | E1821

    AI demos! Microsoft’s Windows Copilot, ChatGPT multimodal, Meta’s AI chatbots | E1821

    This Week in Startups is brought to you by…

    Vanta. Compliance and security shouldn't be a deal-breaker for startups to win new business. Vanta makes it easy for companies to get a SOC 2 report fast. TWiST listeners can get $1,000 off for a limited time at https://vanta.com/twist

    LinkedIn Jobs. A business is only as strong as its people, and every hire matters. Go to https://LinkedIn.com/TWIST to post your first job for free. Terms and conditions apply.

    Fitbod. Tired of doing the same workouts at the gym? Fitbod will build you personalized workouts that help you progress with every set. Get 25% off your subscription or try out the app for FREE when you sign up now at [https://fitbod.me/TWIST.](http://fitbod.me/TWIST.)

    *

    Today’s show:

    Sunny joins Jason for more demos! Microsoft’s Windows 11 Copilot (2:42), ChatGPT’s multimodal features (28:37), and Meta’s new AI chatbots (1:04:34) are all covered!!

    *

    Time stamps:

    (0:00) Sunny Madra joins Jason

    (2:42) Sunny demos Windows 11 Copilot preview

    (9:48) Vanta - Get $1000 off your SOC 2 at https://vanta.com/twist

    (10:55) Windows 11 Copilot to desktop interaction and areas needing improvement

    (15:06) Consequences of recording desktop interactions for AI and the final grade for Windows 11 Copilot

    (27:17) LinkedIn Jobs - Post your first job for free at https://linkedin.com/twist

    (28:37) Sunny demos ChatGPT’s multimodal features

    (36:32) Fitbod - Get 25% off at https://fitbod.me/twist

    (38:01) Job destruction and AI’s effects on the workplace

    (43:57) The utilization of multiple AI agents

    (46:05) ChatGPT’s voice chat feature

    (52:24) Personalization and the path to AGI

    (1:02:09) Common Crawl and use of web crawl data

    (1:04:34) Meta’s new AI chatbots

    *

    Follow Sunny: https://twitter.com/sundeep

    Check out Definitive Intelligence: https://www.definitive.io/

    *

    Read LAUNCH Fund 4 Deal Memo: https://www.launch.co/four

    Apply for Funding: https://www.launch.co/apply

    Buy ANGEL: https://www.angelthebook.com

    Great recent interviews: Steve Huffman, Brian Chesky, Aaron Levie, Sophia Amoruso, Reid Hoffman, Frank Slootman, Billy McFarland, PrayingForExits, Jenny Lefcourt

    Check out Jason’s suite of newsletters: https://substack.com/@calacanis

    *

    Follow Jason:

    Twitter: https://twitter.com/jason

    Instagram: https://www.instagram.com/jason

    LinkedIn: https://www.linkedin.com/in/jasoncalacanis

    *

    Follow TWiST:

    Substack: https://twistartups.substack.com

    Twitter: https://twitter.com/TWiStartups

    YouTube: https://www.youtube.com/thisweekin

    *

    Subscribe to the Founder University Podcast: https://www.founder.university/podcast