Skip to main content

Home/ Digit_al Society/ Group items tagged working

Rss Feed Group items tagged

dr tech

Turkey coup plotters' use of 'amateur' app helped unveil their network | Technology | T... - 0 views

  •  
    "Security experts who looked at the app, known as ByLock, at the request of Reuters said it appeared to be the work of amateur software developers and had left important information about its users unencrypted."
dr tech

How Bitcoin's Blockchain Is Making the World More Secure - 0 views

  •  
    "But the blockchain looks set to change that. Right now, there are a number of startups that are working on tools to record ownership of a property (intellectual or physical) onto the blockchain, like Tieron, Monegraph, Colu, and Ascribe."
dr tech

Death by GPS: are satnavs changing our brains? | Technology | The Guardian - 0 views

  •  
    "Anyone who has driven a car through an unfamiliar place can attest to how easy it is to let GPS do all the work. That GPS can have a transformative effect on a society is undeniable. We have come to depend on a technology that, in theory, makes it impossible to get lost. But not only are we still getting lost, we may actually be losing a part of ourselves."
dr tech

AI can win at poker: but as computers get smarter, who keeps tabs on their ethics? | Te... - 0 views

  •  
    ""No-limit Texas Hold'em is a game of incomplete information where the AI must infer a human player's intentions and then act in ways that incorporate both the direct odds of winning and bluffing behaviour to try to fool the other player." The designers said their computer didn't "bluff" the human players. But by learning from its mistakes and practising its moves at night between games, the AI was working out how to defeat its human opponents."
dr tech

Study reveals bot-on-bot editing wars raging on Wikipedia's pages | Technology | The Gu... - 0 views

  •  
    ""The fights between bots can be far more persistent than the ones we see between people," said Taha Yasseri, who worked on the study at the Oxford Internet Institute. "Humans usually cool down after a few days, but the bots might continue for years.""
dr tech

PIN-punching $200 robot can brute force every Android numeric screen-password in 19 hou... - 0 views

  •  
    Justin Engler and Paul Vines will demo a robot called the Robotic Reconfigurable Button Basher (R2B2) at Defcon; it can work its way through every numeric screen-lock Android password in 19 hours.
dr tech

Silent Circle on secure electronic communications: 'You may wish to avoid email altoget... - 0 views

  •  
    "As examples, Kowolowski noted that companies wanting to protect their intellectual property or individuals sending tax returns may be happy to use traditional PGP/SMIME technology to encrypt the body of their messages, but that "a freedom fighter working on an oppressive country" would be just as concerned about the metadata."
dr tech

$10 Cellphones Bring Health Care to Developing World - 0 views

  •  
    "Each of these community health workers typically works with 100 families, and they used to hand-deliver patient updates to doctors by foot. But by equipping these individuals with $10 cellphones, Medic Mobile helped to create a hub-and-spoke model of health care that's revolutionized the way millions of people get well."
dr tech

London School of Economics: piracy isn't killing big content; government needs to be sk... - 0 views

  •  
    "Copyright and Creation, a policy brief from a collection of respected scholars at the rock-ribbed London School of Economics, argues that the evidence shows that piracy isn't causing any grave harm to the entertainment industry, and that anti-piracy measures like the three-strikes provision in Britain's Digital Economy Act don't work. They call on lawmakers to take an evidence-led approach to Internet and copyright law, and to consider the interests of the public and not just big entertainment companies looking for legal backstops to their profit-maximisation strategies. "
dr tech

The 'Fingerprinting' Tracking Tool That's Virtually Impossible to Block - 0 views

  •  
    "The type of tracking, called canvas fingerprinting, works by instructing the visitor's web browser to draw a hidden image, and was first documented in a upcoming paper by researchers at Princeton University and KU Leuven University in Belgium. Because each computer draws the image slightly differently, the images can be used to assign each user's device a number that uniquely identifies it."
dr tech

How do Optical and Quantum Computers work? - 0 views

  •  
    "…in about ten years or so, we will see the collapse of Moore's Law. In fact, already, we see a slowing down of Moore's Law. Computer power simply cannot maintain its rapid exponential rise using standard silicon technology. - Dr. Michio Kaku - 2012"
dr tech

This New Tool Is Changing the Way Visually Impaired People Use the Web | GOOD - 0 views

  •  
    "Last month, Parsley presented Depict, a crowd-sourced image description tool that could change the experience of the browsing the web for the blind and visually impaired. The tool works in two parts-a browser extension for blind users that provides user-created descriptions of images around the Internet, and a website for sighted users to provide those requested descriptions."
amenosolja

How to Use USB Security Keys with your Google Account - 0 views

  •  
    "The verification codes required for logging into a 2-step enabled account can be generated either using a mobile app - like Authy or Google Authenticator - or you can have them sent to your mobile phone via a text message or a voice call. The latter option however will not work if the mobile phone associated with your account is outside the coverage area"
dr tech

CryptoLocker Is The Nastiest Malware Ever - Here's What You Can Do - 0 views

  •  
    "Ransomware is an especially odious type of malware. The way it works is simple. Your computer will be infected with some malicious software. That software then renders your computer entirely unusable, sometimes purporting to be from local law enforcement and accusing you of committing a computer crime or viewing explicit pictures of children. It then demands monetary payment, either in the form of a ransom or a 'fine' before access to your computer is returned."
dr tech

Tesco's face scanning system: the key questions answered | Technology | theguardian.com - 0 views

  •  
    ""We don't do facial recognition, we do face detection," Ke Quang, chief operating officer of Quividi, told the Guardian on Monday. "It's software which works from the video feed coming off the camera. It can detect if it's seeing a face, but it never records the image or biomorphological information or traits."
dr tech

Doctors Faced With Rare or Difficult Cancers Can Just 'Google' Genetic Treatments | Sin... - 0 views

  •  
    "Sequencing cancer to find the breaks has become easy and cheap. But information on which drugs might or might not work on particular mutations remains buried in PDF files and scattered across medical journals."
dr tech

Why appeasing governments over encryption will never work | Comment is free | The Guardian - 0 views

  •  
    "In case you're wondering what could be wrong with entrusting secret keys to the government for use "in exceptional circumstances", just ponder this: a few months ago, hackers (suspected to be Chinese) stole the personnel records of 21.5 million US federal employees, including the records of every person given a government background check for the last 15 years."
dr tech

Bruce Schneier: Sure, Russia & China Probably Have The Snowden Docs... But Not Because ... - 0 views

  •  
    "First, the journalists working with the documents. I've handled some of the Snowden documents myself, and even though I'm a paranoid cryptographer, I know how difficult it is to maintain perfect security. It's been open season on the computers of the journalists Snowden shared documents with since this story broke in July 2013. And while they have been taking extraordinary pains to secure those computers, it's almost certainly not enough to keep out the world's intelligence services."
dr tech

Inept copyright bot sends 2600 a legal threat over ink blotches - Boing Boing - 0 views

  •  
    "That's right, they're coming after us literally for a few splotches of ink. What companies like this do is broker works of art on behalf of actual photographers, but then engage in copyright trolling by threatening anyone who uses even a small piece of them. Increased computing power and more sophisticated algorithms allow them to do this with improved speed and "efficiency.""
« First ‹ Previous 81 - 100 of 361 Next › Last »
Showing 20 items per page