The EU's plan for algorithmic copyright filters is looking more and more unlikely / Boi... - 0 views
-
"Under the proposal, online platforms would have to spend hundreds of millions of euros on algorithmic copyright filters that would compare everything users tried to post with a database of supposedly copyrighted works, which anyone could add anything to, and block any suspected matches. This would snuff out all the small EU competitors to America's Big Tech giants, and put all Europeans' communications under threat of arbitrary censorship by balky, unaccountable, easily abused algorithms."
Dutch surgeon wins landmark 'right to be forgotten' case | Technology | The Guardian - 0 views
-
"A Dutch surgeon formally disciplined for her medical negligence has won a legal action to remove Google search results about her case in a landmark "right to be forgotten" ruling. The doctor's registration on the register of healthcare professionals was initially suspended by a disciplinary panel because of her postoperative care of a patient. After an appeal, this was changed to a conditional suspension under which she was allowed to continue to practise."
Largest dump in history: 2.7 billion records; 773 million of them unique; 140 million n... - 0 views
-
"A dump called "Collection #1" has been released by parties unknown, containing email addresses and cracked passwords: in its raw form, it contains 2.7 billion records, which Troy "Have I Been Pwned" Hunt (previously) de-duplicated to come up with 773 million unique records -- of those 140,000,000 email addresses and 10,000,000 passwords have never been seen in the HaveIBeenPwned database before."
Tech Workers Now Want to Know: What Are We Building This For? - 0 views
-
"Across the technology industry, rank-and-file employees are demanding greater insight into how their companies are deploying the technology that they build. At Google, Amazon, Microsoft and Salesforce, as well as at tech startups, engineers and technologists are increasingly asking whether the products they are working on are being used for surveillance in places like China or for military projects in the United States or elsewhere."
To Measure Your Stress Level, Scientists Can Analyze Your Eyes - 0 views
-
How long before this is used without our knowledge in facial recognition systems? "Through the use of the data from this lab study and a formula Kim and Yang applied called "fractal dimension," Kim and Yang discovered a negative relationship between the fractal dimension of pupil dilation and a person's workload, showing that pupil dilation could be used to indicate the mental workload of a person in a multitasking environment."
Hoobox launches Wheelie 7, first wheelchair controlled by facial expressions - 0 views
-
"The Wheelie 7 kit equips a wheelchair with artificial intelligence to detect the user's expressions and process the data in real-time to direct the movement of the chair. Smiling, raising the eyebrows, wrinkling the nose or puckering the lips as if for a kiss are among the repertoire of 10 gestures recognised by the prototype Wheelie 7."
Generation AI: What happens when your child's friend is an AI toy that talks back? | Wo... - 0 views
-
"If that data is collected, does the child have a right to get it back? If that data is collected from very early childhood and does not belong to the child, does it make the child extra vulnerable because his or her choices and patterns of behaviour could be known to anyone who purchases the data, for example, companies or political campaigns. Depending on the privacy laws of the state in which the toys are being used, if the data is collected and kept, it breaches Article 16 of the Convention on the Rights of the Child - the right to privacy. (Though, of course, arguably this is something parents routinely do by posting pictures of their children on Facebook). "
Together we can thwart the big-tech data grab. Here's how | John Harris | Opinion | The... - 0 views
-
"Blockchain technology has also opened the way to new models whereby endless micropayments can be made in return for particular online services or content; and, if people voluntarily allow elements of their data to be used, rewards can flow the other way. Here perhaps lies the key to a system beyond the current, Google-led model, in which services appear to be free but the letting-go of personal data is the actual price."
How Much of the Internet Is Fake? - 0 views
-
"Studies generally suggest that, year after year, less than 60 percent of web traffic is human; some years, according to some researchers, a healthy majority of it is bot. For a period of time in 2013, the Times reported this year, a full half of YouTube traffic was "bots masquerading as people," a portion so high that employees feared an inflection point after which YouTube's systems for detecting fraudulent traffic would begin to regard bot traffic as real and human traffic as fake. They called this hypothetical event "the Inversion.""
How to Identify Almost Anyone in a Consumer Gene Database - Scientific American - 0 views
Open Rights Group Scotland - E-voting's Unsolvable Problem - 0 views
-
Ahhh ITGS group - a great discussion on the evoting problem would have been perfect for your Paper 2. "Remember: all of these principles of security, anonymity and verifiability have to be achieved in an understandable way. If they can't be then you get the opportunity for losers to claim fraud, and their supporters to believe them."
Are We Living in a Computer Simulation? That's a Heated Debate - 0 views
-
"Proponents say that it's more than just a matter of probability. The laws of physics don't seem that different from code in a program, according to some, and it's likely that with enough time, a sufficiently advanced civilization could crunch the numbers and produce a simulation that mimics the existence and behavior of every particle in our universe."
Vietnam criticised for 'totalitarian' law banning online criticism of government | Worl... - 1 views
-
"Vietnam has introduced a new cybersecurity law, which criminalises criticising the government online and forces internet providers to give authorities' user data when requested, sparking claims of a "totalitarian" crackdown on dissent. The law, which mirrors China's draconian internet rules, came into effect on 1 January and forces internet providers to censor content deemed "toxic" by the ruling communist government. Vietnam's ministry of public security said it will tackle "hostile and reactionary forces", but human rights groups said it was authorities' latest method of silencing free speech."
The Chinese government is putting tracking chips into school uniforms to watch every mo... - 0 views
-
"The uniforms allow school officials, teachers, and parents to keep track of the exact times that students leave or enter the school, Lin Zongwu, principal of the No. 11 School of Renhuai in Guizhou Province, told the state-run newspaper Global Times on Dec. 20. If students skip school without permission, an alarm will be triggered. If students try to game the system by swapping uniforms, an alarm also will sound, as facial-recognition equipment stationed at the school entrance can match a student's face with the chip embedded in the uniform."
« First
‹ Previous
1461 - 1480 of 3203
Next ›
Last »
Showing 20▼ items per page