Skip to main content

Home/ Digit_al Society/ Group items tagged Why

Rss Feed Group items tagged

dr tech

Exclusive: fully AI employees are a year away, Anthropic warns - 0 views

  •  
    "Anthropic expects AI-powered virtual employees to begin roaming corporate networks in the next year, the company's top security leader told Axios in an interview this week. Why it matters: Managing those AI identities will require companies to reassess their cybersecurity strategies or risk exposing their networks to major security breaches."
dr tech

Why There Are No AI Masterpieces - by Alberto Romero - 0 views

  •  
    "I believe the answer has a lot to do with the fact that few things created by humans with artsy aspirations are worth anything in isolation. Their worth comes from what surrounds them, from the human context that birthed them and the human lives that were impacted by them. That's how masterpieces are judged as such."
dr tech

A neuroscientist explains why it's impossible for AI to 'understand' language - 0 views

  •  
    "From this fact about language development, Chomsky posited an (abstract) innate module for language learning - not processing. From a neurobiological standpoint, the brain has to be ready to understand language from birth. While there are plenty of examples of language specialization in infants, the precise neural mechanisms are still unknown, but not unknowable. But objects of study become unknowable when scientific terms are misused or misapplied. And this is precisely the danger: conflating AI with human understanding can lead to dangerous consequences."
dr tech

Why the internet of things is the new magic ingredient for cyber criminals | John Naugh... - 0 views

  •  
    "The significance of the attack on Krebs is that it looks as though many of the attacks on him came from large numbers of enslaved devices - routers, cameras, networked TVs and the like. "Someone has a botnet with capabilities we haven't seen before," says Martin McKeay, Akamai's senior security expert. The DDoS arms race has just moved up a gear."
dr tech

Why it's dangerous to outsource our critical thinking to computers | Technology | The G... - 1 views

  •  
    "And now, 10 years later, the impact of reckless, subjective and inflammatory misinformation served up on the web is being felt like never before in the digital era."
dr tech

6 Reasons Why Biometrics Are NOT the Way of the Future - 0 views

  •  
    "While biometrics may not be the long term alternative to passwords, they are safer to use. Rather than seeing them as separate methods to identify that you are who you say you are, they should instead be viewed as complementary methods that can be used together to verify an individual."
dr tech

Rich and poor teenagers use the web differently - here's what this is doing to inequali... - 0 views

  •  
    ""Equal access does imply equal opportunities," says the report, which goes on to point out that while anyone can use the internet to learn about the world, improve their skills or apply for a well-paid job, disadvantaged students are less likely to be aware of the opportunities that digital technology offers. "They may not have the knowledge or skills required to turn online opportunities into real opportunities," the report says."
dr tech

Google Maps Palestine row: why neutrality in tech is an impossible dream | Leigh Alexan... - 0 views

  •  
    "Imagine if it would have more of an impact for Palestine to be recognised as a sovereign country by Google than by the UN. It's a suggestion that's caught fire - a five-month-old online petition demanding Palestine be labeled and bordered in Google Maps has gained more than 250,000 signatures just over the past few days."
dr tech

Why the FBI's NGI Biometrics Database Should Worry You - 0 views

  •  
    "Citizens would no longer have the right to get information about their records. The Privacy Act states that anyone can request their record from a government database so it can be reviewed and any errors corrected. That right would be eliminated if the database were exempted, meaning no one would ever know what information the FBI had on them."
dr tech

Why big data has made your privacy a thing of the past | Technology | The Observer - 0 views

  •  
    "The reason is that routine big-data analytical techniques can now effectively manufacture personal data that is not protected by any of the measures we've used up to now. A well-known illustration of this is the way Target, an American retail chain, creatively collated scattered pieces of data about individuals' changes in shopping habits to predict the delivery date of pregnant shoppers - so that they could then be targeted with relevant advertisements."
dr tech

What Is Net Neutrality & Why Should I Care? - 0 views

  •  
    "This effectively ensured that all South Koreans are forced to use Internet Explorer. To this day, OS X and Linux hasn't seen the same degree of adoption in Korea as it has in Europe, China and the United States. It also means that 75% of South Korean netizens use some variety of IE because… Well? They have to. It also means that many South Korean websites are fundamentally less advanced, less user friendly and much less secure than their Western counterparts. The cruel irony is that this government intervention effectively hamstrung an entire industry"
dr tech

Why the BBC is wrong to republish 'right to be forgotten' links | Technology | The Guar... - 0 views

  •  
    "They are a modest correction against failures in algorithmic prioritisation on the indelible web. Before the requests go to the BBC, individuals must prove to Google - which has every interest in rejecting their claim - that the links contain personal information that is inaccurate, irrelevant or out of date, and holds no public interest."
dr tech

The 'Athens Affair' shows why we need encryption without backdoors | Trevor Timm | Comm... - 0 views

  •  
    "One of the biggest arguments against mandating backdoors in encryption is the fact that, even if you trust the United States government never to abuse that power (and who does?), other criminal hackers and foreign governments will be able to exploit the backdoor to use it themselves. A backdoor is an inherent vulnerability that other actors will attempt to find and try to use it for their own nefarious purposes as soon as they know it exists, putting all of our cybersecurity at risk. "
« First ‹ Previous 121 - 140 of 187 Next › Last »
Showing 20 items per page