Thu. 06/23 – What If My Voice Was Your Alexa?

Thu. 06/23 – What If My Voice Was Your Alexa?

Up next

Social Media’s “Big Tobacco” Moment?

The big ruling from that big social media trial is in and it could have big implications for big tech going forward. Wikipedia bans the use of AI for creating Wikipedia entries. GitHub is about to train AI on what you do on GitHub. And the idea of lossless compression might sound ...  Show more

Sora Sinks

OpenAI is abandoning Sora to do the big refocus they’ve been signaling. Meta is starting to rack up the losses in court. Is China going to block the Manus acquisition by Meta from going through? They’re not even letting the founders leave the country. And interesting raises from ...  Show more

Recommended Episodes

Episode 294 Alexa's New AI Voice
Echo Tips

It looks like a version of the new AI Voice, for Alexa is here. Back in the September Amazon Event, we were told and even got to hear a small segment of what the new Alexa Voice would sound like, join us as we dive into the Alexa Beta and test out the new voice. Its hard to te ...

  Show more

The high stakes for AI Alexa
The Vergecast

AI will fix everything, right? In this episode, friend of The Verge (and Waveform co-host) David Imel joins Nilay and David to talk all about Alexa Plus, and the AI-powered voice assistant Amazon thinks can do everything from turn on your lights to order your friend an Uber. The ...  Show more

Facebook Wants to Put a Camera In Your Living Room
Rich On Tech

Facebook unveils new Portal video chat devices, including a model for your TV; A look at the Nintendo Switch Lite; Alexa gets smart about the election; the popular Pocket Casts podcast app goes free; new features in iOS 13; a cool new Roku feature that lets you search by movie qu ...  Show more

Study Reveals Vulnerabilities in Alexa, Siri, and Google Assistant to Malicious Commands
Open AI

In this episode, we explore a recent study that uncovers how popular voice assistants like Alexa, Siri, and Google Assistant are susceptible to malicious commands. We discuss the potential risks and what users can do to protect their devices.



Get ...

  Show more