Skip to main content

Home/ Digit_al Society/ Group items tagged notes

Rss Feed Group items tagged

dr tech

AP and IB Programs Disagree Over Whether to Allow ChatGPT - 0 views

  •  
    "The debate is whether the ideas noted in an essay or paper come from the student, while the tool can only take credit for the grammar and mechanics of the writing but not the critical thinking. The College Board, which administers Advance Placement (AP) courses, prohibits the use of ChatGPT under any circumstances. On its website, the agency notes, "Like educators across the country, AP teachers are confronting the implications of ChatGPT and other tools.""
dr tech

7-Eleven Thailand adopts facial recognition tech | WARC - 0 views

  • KanKan’s capabilities include gathering data on in-store traffic, such as how long a customer lingers at a specific shelf, monitors stock levels and staff activity, and even takes note of the emotions of shoppers as they walk around a store.
  •  
    "KanKan's capabilities include gathering data on in-store traffic, such as how long a customer lingers at a specific shelf, monitors stock levels and staff activity, and even takes note of the emotions of shoppers as they walk around a store."
dr tech

Taught by the web: tomorrow's doctors are being educated online | Education | theguardi... - 0 views

  •  
    "Sophie Bishton, a junior doctor, was "fed up with traditional learning and being talked at all the time" and so founded the Twitter finals revision group (known as twitfrg) in October 2012. Users are invited to participate in a scenario in real time. Prior to the event, revision notes related to the case are made available online. At a prearranged time, a tweet is sent marking the beginning of the scenario. "
dr tech

Self-Driving Cars Proposed as Solution to U.S. Highway Woes, Saving Money and Lives | S... - 0 views

  •  
    "In terms of safety, a 2013 Navigant Research report noted "the potential for greatly reduced accident rates." Such potential rests on the basic logic of driving: Good driving relies on physics calculations; bad driving happens thanks to human physical limitations like intoxication and sleepiness."
dr tech

Security Expert Bruce Schneier On Passwords, Privacy and Trust - 0 views

  •  
    "They aren't limited by human notions of attention; they can watch everyone at the same time. So while it may be true that using encryption is something the NSA takes special note of, not using it doesn't mean you'll be noticed less. The best defense is to use secure services, even if it might be a red flag. Think of it this way: you're providing cover for those who need encryption to stay alive."
dr tech

Silent Circle on secure electronic communications: 'You may wish to avoid email altoget... - 0 views

  •  
    "As examples, Kowolowski noted that companies wanting to protect their intellectual property or individuals sending tax returns may be happy to use traditional PGP/SMIME technology to encrypt the body of their messages, but that "a freedom fighter working on an oppressive country" would be just as concerned about the metadata."
dr tech

Snapchat Hacked: 'The Snappening' - Business Insider - 0 views

  •  
    "A giant database of intercepted Snapchat photos and videos has been released by hackers who have been collecting the files for years. Shocked users of the notorious chat forum 4chan are referring to the hack as "The Snappening," noting that this is far bigger than the iCloud hacks that recently targeted celebrities."
dr tech

Wikimedia's free photo database of artworks violates copyright, court rules | World new... - 0 views

  •  
    ""The Supreme Court's decision shows that we have a copyright law that is behind the times and insufficient faced with the digital reality we all live in," it said in a statement. It noted that tourists who take selfies of themselves at famous landmarks and spread them on the Internet could be deemed in violation of copyright laws."
dr tech

Petya ransomware encryption system cracked - BBC News - 0 views

  •  
    "Petya ransomware victims can now unlock infected computers without paying. An unidentified programmer has produced a tool that exploits shortfalls in the way the malware encrypts a file that allows Windows to start up. In notes put on code-sharing site Github, he said he had produced the key generator to help his father-in-law unlock his Petya-encrypted computer."
dr tech

Computer Science Cheating Scandals Infect Prestigious Colleges - 0 views

  •  
    "It's also important to note that codes are intentionally accessible online. Looking up codes is a typical for programmers, and isn't considered foul play. However, there's a difference between using a publicly available code as assistance in solving a problem and using it as the solution to a problem."
dr tech

Chinese schools are testing AI that grades papers almost as well as teachers | VentureBeat - 0 views

  •  
    "It is also self-improving. The 10-year-old grading software leverages deep learning algorithms to "compare notes" with human teachers' scores, suggestions, and comments. An engineer involved in the project compared its capabilities to those of AlphaGo, the record-breaking AI Go player developed by Google subsidiary DeepMind."
dr tech

Harvard student gets into US after entry denied over friends' social media posts - CNET - 0 views

  •  
    "That was apparently the result of the US government's probing of visa applicants' social media profiles. After the search, an officer questioned the 17-year-old, who got a scholarship to study in the US, about his friends' social media activity and told him she'd found some "posting political points of view that oppose the US," the student paper noted. Despite Ajjawi's protests, the officer denied the student's entry and let him call his parents."
dr tech

E-mail Is Making Us Miserable | The New Yorker - 0 views

  •  
    " "The longer one spends on email in [a given] hour the higher is one's stress for that hour," the authors noted. In another study, researchers placed thermal cameras below each subject's computer monitor, allowing them to measure the tell-tale "heat blooms" on a person's face that indicate psychological distress. "
dr tech

AI as Scientist, AI as Artist | 3 Quarks Daily - 0 views

  •  
    "Consider abstract art. We've noted that machine learning, in aiming to make an accurate prediction, constructs a high-dimensional feature space that contorts and reconfigures the data representing features of the natural world. Likewise, artists "mash and rip" features of visual reality to create a system of forms, texture, and color that richly represent features of visual experience in an alien way. The subject of representation is abstracted but represented none-the-less. "
dr tech

John Oliver on exploitable voting machines: 'We must fix this' | Culture | The Guardian - 0 views

  •  
    "Oliver also pointed to a Finnish man who once found "one of the most severe security flaws ever discovered in a voting system" in US machines and alerted their manufacturers, who released a patch to fix the problem in 2006. The state of Georgia, however, never installed it, and the Senate report noted their machines hadn't been updated since at least 2005. "They'd essentially been hitting the 'remind me tomorrow' button on a critical security update for over a decade," Oliver explained, "meaning Georgia's election systems operate on the same level of technical proficiency as Every Dad"."
dr tech

Iran 'revenge' could come in the form of cyber-attacks, experts warn | World news | The... - 0 views

  •  
    "Hultquist noted that cyberwarfare evens the battlefield between Iran and the US. "That's why they choose an asymmetric battleground," he said. "We might have this massive advantage with a very sophisticated ability, but we also have this very sophisticated society that makes us very vulnerable to computer attacks.""
dr tech

Stop confusing facial recognition with facial authentication - 0 views

  •  
    "Before we go deeper, it's important to note that there are two approaches to facial - or any biometric - authentication: "match on server" and "match on device." The former approach shares some of the risky aspects of facial recognition technology because it stores the details of one's most personal features-your face or your fingerprint-on a server, which is inherently insecure. There are some well-publicized examples of biometric databases being hacked, which is why so many companies are committing to only do on-device biometrics."
dr tech

Algorithm finds hidden connections between paintings at the Met | MIT CSAIL - 0 views

  •  
    "What Hamilton and his colleagues found surprising was that this approach could also be applied to helping find problems with existing deep networks, related to the surge of "deepfakes" that have recently cropped up. They applied this data structure to find areas where probabilistic models, such as the generative adversarial networks (GANs) that are often used to create deepfakes, break down. They coined these problematic areas "blind spots," and note that they give us insight into how GANs can be biased. Such blind spots further show that GANs struggle to represent particular areas of a dataset, even if most of their fakes can fool a human. "
1 - 20 of 41 Next › Last »
Showing 20 items per page