OpenAI’s new system, called GPT-2, is described as ‘chameleon-like,’ matching both subject and style A new text generator driven by artificial intelligence is apparently so good that its creators have decided not to make it publicly available. The tool was created by OpenAI,
Unethical Data When people think of unethical data, instances of knowingly tweaking information to make it show misleading conclusions often come to mind. Indeed, that’s one kind, but the coverage here relates to the information companies get through suspect means.
Are There Messages Hidden in Your DNA? Messages in the Human Genome: are they from God, or maybe aliens? It sounds Sci-fi but our knowledge of the DNA code is merging with our ability to write increasingly intelligent algorithms. We
What You Need Is Skilled Staff One of the most prestigious voices in the IT industry recently made an interesting proclamation: “The next big thing is dead.” So starts CompTIA’s IT Outlook 2019, which finds the next big thing is no
The Economics of Data Science There are several technology and business forces in-play that are going to derive and drive new sources of customer, product and operational value. As a set up for this blog on the Economic Value of Data
The U.S. government — along with a number of leading security companies — recently warned about a series of highly complex and widespread attacks that allowed suspected Iranian hackers to siphon huge volumes of email passwords and other sensitive data
It’s well understood that many network breaches begin with phishing emails designed to trick users into giving hackers their credentials. They don’t even have to work to find a vulnerability, they can just waltz in the front door. Elevate Security, a
WARSAW (Reuters) – Chinese tech giant Huawei is ready to face any extra security measures required to remain in the race to develop next-generation 5G networks in central and eastern Europe, Andy Purdy, Chief Security Officer at Huawei Technologies USA,
System Vulnerabilities Are an Issue for Everyone Over the past decade, we have seen a drastic increase in the number of companies relying on cloud services. Given the nature of the cloud as a shared-resource environment, threats that infiltrate the
Working with security researchers What do a 19-year-old researcher from Uruguay, a restaurant owner from Cluj, Romania and a Cambridge professor have in common? They’re all security researchers—a global community of professionals, academics, students and hobbyists who are essential to
A highly targeted, malware-laced phishing campaign landed in the inboxes of multiple credit unions last week. The missives are raising eyebrows because they were sent only to specific anti-money laundering contacts at credit unions, and many credit union sources say
BONN, Germany (Reuters) – Facebook has been ordered to curb its data collection practices in Germany after a landmark ruling on Thursday that the world’s largest social network abused its market dominance to gather information about users without their consent.