Methods and systems for automated identification of celebrity face images are provided that generate a name list of prominent celebrities, obtain a set of images and corresponding feature vectors for each name, detect faces within the set of images, and remove non-face images. An analysis of the images is performed using an intra-model analysis, an inter-model analysis, and a spectral analysis to return highly accurate biometric models for each of the individuals present in the name list. Recognition is then performed based on precision and recall to identify the face images as belonging to a celebrity or indicate that the face is unknown.
University of Pennsylvania teaches their PR2 to be able to read in the wild. Video shows the PR2 roaming the hallways reading from various items sitting around and signs on the wall.
Doctors can now make a stroke diagnosis using an iPhone/Android app with close to the same accuracy as a diagnosis at a medical computer workstation, researchers from the University of Calgary's Faculty of Medicine have shown in a new study.
The Resolution MD Mobile app lets physicians view and manipulate remote medical images in high-resolution 3-D on the iPhone or Android phone, allowing for a quick diagnosis for the treatment of stroke, cardiac arrest, or other emergencies.
In what is believed to be the first operation of its kind, a patient voluntarily agrees to amputation of his hand so it could be replaced with a bionic replacement. "Patrick is already testing a new hand, which its makers say will give him much greater movement. The hand has six sensors fitted over nerves within the lower arm, rather than the two on his current prosthesis." Embedded video shows him doing daily routines with his new hand.
All third-party applications that you allow to access your Twitter account go through a permissions process. Today we're announcing an update to help you make more informed choices about the way third-party apps integrate with your Twitter account:
Facebook post bout how to enable a form of two factor authentication via SMS. This system requires you to have your phone with you if you are accessing facebook from a new machine.
While some organizations are still considering a basic social media facelift for their intranet, perhaps incorporating some blogs for corporate communication or a wiki area for some shared content authoring, it's almost certain that this is too little and too late for many companies. Over the last three years, the world has undergone a social media revolution that has changed the behaviors of most of the developed world that have gone on to be validated as beneficial for the workplace.
At Google IO today, Google announced the availability of the Android Open Accessory Development Kit, a new way to extend the Android platform so that other devices can be controlled via phones or tablets. Similar to the SDK, the ADK will allow hardware developers to take advantage of Android so that the OS can control or monitor external devices.
A review of two recent studies (Gallup and Aberdeen Group) summarizes some of the key findings of the value of internal social networks.
18% boost in employee engagement
streamlined operations
better, faster innovation
failing to engage employees costs $300B in wasted productivity
Before May 1st, not even the smartest of machine learning algorithms could have predicted Keith Urbahn's online relevancy score, or his potential to spark an incredibly viral information flow. While politicos "in the know" certainly knew him or of him, his previous interactions and size and nature of his social graph did little to reflect his potential to generate thousands of people's willingness to trust within a matter of minutes.
While connections, authority, trust and persuasiveness play a key role in influencing others, they are only part of a complex set of dynamics that affect people's perception of a person, a piece of information or a product. Timing, initiating a network effect at the right time, and frankly, a dash of pure luck matter equally.