Thu. 06/23 – What If My Voice Was Your Alexa?

Thu. 06/23 – What If My Voice Was Your Alexa?

Up next

SpaceX Acquires xAI

As SpaceX acquires xAI, all of Elon’s companies under one umbrella is pretty much an inevitability isn’t it? What is with this weird game of chicken that Nvidia and OpenAI and now Oracle are all engaging in all of the sudden. And self-driving cars are about to be ubiquitous, indi ...  Show more

Is Jensen Worried About OpenAI?

Is Nvidia going through with their massive OpenAI investment or not? Does Apple have what it takes to win in the AI era or not? Is Elon the only one who can make datacenters in space happen or not? And a roundup of the continued fascination with Moltbook. The $100 Billion Megadea ...  Show more

Recommended Episodes

Episode 294 Alexa's New AI Voice
Echo Tips

It looks like a version of the new AI Voice, for Alexa is here. Back in the September Amazon Event, we were told and even got to hear a small segment of what the new Alexa Voice would sound like, join us as we dive into the Alexa Beta and test out the new voice. Its hard to te ...

  Show more

The high stakes for AI Alexa
The Vergecast

AI will fix everything, right? In this episode, friend of The Verge (and Waveform co-host) David Imel joins Nilay and David to talk all about Alexa Plus, and the AI-powered voice assistant Amazon thinks can do everything from turn on your lights to order your friend an Uber. The ...  Show more

Facebook Wants to Put a Camera In Your Living Room
Rich On Tech

Facebook unveils new Portal video chat devices, including a model for your TV; A look at the Nintendo Switch Lite; Alexa gets smart about the election; the popular Pocket Casts podcast app goes free; new features in iOS 13; a cool new Roku feature that lets you search by movie qu ...  Show more

Study Reveals Vulnerabilities in Alexa, Siri, and Google Assistant to Malicious Commands
Open AI

In this episode, we explore a recent study that uncovers how popular voice assistants like Alexa, Siri, and Google Assistant are susceptible to malicious commands. We discuss the potential risks and what users can do to protect their devices.



Get ...

  Show more