Skip to main content

Home/ Digit_al Society/ Group items tagged how

Rss Feed Group items tagged

dr tech

Search me: online reputation management | Technology | The Guardian - 0 views

  •  
    "Past scandals, bad photos, critical comments: the internet has a long memory. As the EU considers the 'right to be forgotten', we investigate the growing business of online reputation management - and learn how you can airbrush your own past"
dr tech

'Boundless Informant' Is a Secret NSA Tool to Data-Mine the World - 0 views

  •  
    "The NSA has a tool that records and analyzes all the flow of data that the spy agency collects around the world. Think of it as a global data-mining software that details exactly how much intelligence, and of what type, has been collected from every country in the world. It's aptly called "Boundless Informant." "
dr tech

Online privacy: nothing to fear | Jean-Louis Gassée | Technology | guardian.c... - 0 views

  •  
    "If there is nowhere to hide, how can disagreements safely ferment in political life, at work, in relationships? By definition, change disturbs something or annoys someone. And, moving to paranoia, or full awareness, the age-old question arises: who will guard us from the guardians?"
dr tech

Google using romance novels to train its artificial intelligence to write fiction - 0 views

  •  
    "Google is using romance novels to teach its artificial intelligence (AI) system to better understand how people communicate. Researchers at Google Brain, the company's AI-focused deep learning project, presented a paper earlier this month that detailed techniques they used to teach its AI to write fiction - and the results were unexpectedly haunting."
dr tech

Uber knows you're more likely to pay surge prices when your phone is dying - 0 views

  •  
    "Uber knows when your phone battery is running low because its app collects that information in order to switch into power-saving mode. But Chen swears Uber would never use that knowledge to gouge you out of more money. "We absolutely don't use that to kind of like push you a higher surge price, but it's an interesting kind of psychological fact of human behavior," Chen said. Uber's surge pricing uses a proprietary algorithm that accounts for how many users are hailing rides in an area at a given time. Customers are apparently less willing to believe that when the multiplier is a round number like 2.0 or 3.0, which seems more like it could have been arbitrarily made up by a human."
dr tech

Elon Musk and Sam Altman's OpenAI and Pennsylvania State University made a tool to prot... - 0 views

  •  
    "To thwart such hackers, Elon Musk's OpenAI and Pennsylvania State University released a new tool this week called "cleverhans," that lets artificial intelligence researchers test how vulnerable their AI is to adversarial examples, or purposefully malicious data meant to confuse the algorithms. Once the vulnerability has been found, a defense to the attack can automatically be applied."
dr tech

Blue Feed, Red Feed - WSJ.com - 0 views

  •  
    "To demonstrate how reality may differ for different Facebook users, The Wall Street Journal created two feeds, one "blue" and the other "red." If a source appears in the red feed, a majority of the articles shared from the source were classified as "very conservatively aligned" in a large 2015 Facebook study. For the blue feed, a majority of each source's articles aligned "very liberal." These aren't intended to resemble actual individual news feeds. Instead, they are rare side-by-side looks at real conversations from different perspectives. "
dr tech

Google, democracy and the truth about internet search | Technology | The Guardian - 0 views

  •  
    "Are Jews evil? How do you want that question answered? This is our internet. Not Google's. Not Facebook's. Not rightwing propagandists. And we're the only ones who can reclaim it."
dr tech

Top 10 AI failures of 2016 - TechRepublic - 0 views

  •  
    "But with all of the successes of AI, it's also important to pay attention to when, and how, it can go wrong, in order to prevent future errors. A recent paper by Roman Yampolskiy, director of the Cybersecurity Lab at the University of Louisville, outlines a history of AI failures which are "directly related to the mistakes produced by the intelligence such systems are designed to exhibit." According to Yampolskiy, these types of failures can be attributed to mistakes during the learning phase or mistakes in the performance phase of the AI system."
dr tech

How do you deal with a problem like "fake news?" - 0 views

  •  
    "Facebook will rely on users to report fake news despite evidence that suggests users have a difficult time assessing or identifying fake news. Teens seem to be especially vulnerable to fake news. A recent study by researchers at Stanford found that middle and high school students have a difficult time detecting fake news from real news, or detecting bias in tweets and Facebook statuses."
dr tech

The Great A.I. Awakening - NYTimes.com - 0 views

  •  
    "Everybody wondered: How had Google Translate become so uncannily artful?"
dr tech

US nuclear arsenal controlled by 1970s computers with 8in floppy disks | Technology | T... - 0 views

  •  
    "The US military's nuclear arsenal is controlled by computers built in the 1970s that still use 8in floppy disks. A report into the state of the US government, released by congressional investigators, has revealed that the country is spending around $60bn (£40.8bn) to maintain museum-ready computers, which many do not even know how to operate any more, as their creators retire."
dr tech

How Technology Hijacks People's Minds - from a Magician and Google's Design Ethicist - ... - 0 views

  •  
    "By shaping the menus we pick from, technology hijacks the way we perceive our choices and replaces them with new ones. But the closer we pay attention to the options we're given, the more we'll notice when they don't actually align with our true needs."
dr tech

'Dalek' commands can hijack smartphones - BBC News - 0 views

  •  
    "Researchers have demonstrated how garbled speech commands hidden in radio or video broadcasts could be used to control a smartphone. The clips, which sound like the Daleks from Doctor Who, can be difficult for humans to understand but still trigger a phone's voice control functionality. The commands could make a smartphone share its location data, make calls and access compromised websites."
dr tech

Researchers hack Samsung SmartThings, exposing vulnerabilities - 0 views

  •  
    "Security Analysis of Emerging Smart Home Applications demonstrates how Samsung's SmartThings platform may be especially vulnerable to hackers. "
« First ‹ Previous 81 - 100 of 582 Next › Last »
Showing 20 items per page