Online technology – Amity Source http://amitysource.com/ Wed, 23 Nov 2022 05:15:57 +0000 en-US hourly 1 https://wordpress.org/?v=5.9.3 https://amitysource.com/wp-content/uploads/2021/07/icon.png Online technology – Amity Source http://amitysource.com/ 32 32 Jharkhand to Train 1,000 Cybersecurity Professionals to Fight Jamtara Cybercriminals https://amitysource.com/jharkhand-to-train-1000-cybersecurity-professionals-to-fight-jamtara-cybercriminals/ Wed, 23 Nov 2022 04:17:13 +0000 https://amitysource.com/jharkhand-to-train-1000-cybersecurity-professionals-to-fight-jamtara-cybercriminals/ Jharkhand will train a lakh of cyber security professionals to thwart Jamtra cybercriminal gangs, the government of Jharkhand has announced. During a workshop at Jharkhand Technical University, it was announced that the Department of Higher and Technical Education, in partnership with Jharkhand Technical University and Cyber ​​Vidyapeeth Foundation, plans to train more one million cyber […]]]>
Jharkhand will train a lakh of cyber security professionals to thwart Jamtra cybercriminal gangs, the government of Jharkhand has announced. During a workshop at Jharkhand Technical University, it was announced that the Department of Higher and Technical Education, in partnership with Jharkhand Technical University and Cyber ​​Vidyapeeth Foundation, plans to train more one million cyber fighters over the next 5 years.

“Cyber ​​Vidyapeeth” online was launched with the aim of developing the state as a cyber defense corridor. It was announced that cyber fighters would be the most important part of the corridor.

To achieve this goal, cyber security skills courses have been launched at the state’s Vinoba Bhave University and Cyber ​​Vidyapeeth Foundation.

Shashank S. Garudayar, President of the Cyber ​​Vidyapeeth Foundation, said that excellent career prospects would be available for young people trained in the cyber protection course.

He added that the sector lacked talent with a need for 3.1 million e-trainers and 60 million e-professionals globally.

Jharkhand’s initiative is a step in that direction, Garudyar said.

He raised the possibility of the area being developed into a cyber defense business hub.

Jharkhand is a “priority state” in the field of cyber security, as the Jamtara module remains a challenge for the whole country.
]]>
How to Avoid Online Scams on Black Friday and Cyber ​​Monday https://amitysource.com/how-to-avoid-online-scams-on-black-friday-and-cyber-monday/ Thu, 17 Nov 2022 19:30:00 +0000 https://amitysource.com/how-to-avoid-online-scams-on-black-friday-and-cyber-monday/ As Thanksgiving approaches, so does Black Friday and Cyber ​​Monday. Courtesy of ZeroFox Last year, the National Retail Federation reported nearly 180 million unique shoppers during the five-day period between Thanksgiving Day and Cyber ​​​​Monday, which exceeded estimates of more than 21 million. According to data from NRF, 104.9 million of these shoppers visited stores […]]]>

As Thanksgiving approaches, so does Black Friday and Cyber ​​Monday.


Courtesy of ZeroFox

Last year, the National Retail Federation reported nearly 180 million unique shoppers during the five-day period between Thanksgiving Day and Cyber ​​​​Monday, which exceeded estimates of more than 21 million. According to data from NRF, 104.9 million of these shoppers visited stores and 127.8 million made their purchases online (some bought both in-store and online).

Sure, “Cyber ​​Week” drives big revenue: The 2021 sales stretch drove nearly $40 billion in online spending, per Adobe.

But the onslaught of online deals isn’t just attracting eager buyers – it’s also giving cybercriminals a great opportunity to cheat people with their money.

“Cyber ​​Monday and Black Friday open the door for adversaries to make offers,” said AJ Nash, vice president of intelligence at ZeroFox. “Maybe if it was a Wednesday in July you’d go, Man, it sounds too good to be true. But come Cyber ​​Monday, you go, Oh, maybe it’s a door knock. Maybe someone is really giving away this amazing thing for next to nothing.”

Nash spent nearly two decades in the intelligence community, describing himself as a “traditional intelligence guy”, before being recruited for a cyber-focused contract and then into the private sector.

Entrepreneur sat down with Nash to discuss how cyber scams have become more sophisticated over the years and how you can protect yourself from even the most cunning cybercriminals.

Related: Cyber ​​Fraudsters Raise $2.3 Billion From Email Wire Transfer Scams

“Technologies have made it easier to do a better job of imitation.”

Phishing, the process by which an attacker sends a fraudulent message to trick someone into sharing sensitive information or introducing malware, is one of the oldest tricks in the cybercrime book.

But the “spray and pray” approach, where cybercriminals try to maximize the volume of their scam to get the biggest returns, has been updated over the years, Nash says.

“Technologies have made it easier to improve identity theft,” he explains. “It costs very little to buy a domain that looks very similar to the real thing. It’s a misspelling, or they use a lowercase ‘L’ to replace a capital ‘I’.” There are a lot of different ways to set this up.”

From bogus websites to texting systems, cyber crooks are adept at weaving websites that look legitimate. A link sent by SMS can redirect to an authentic-looking site, for example.

“The further you go down those paths, if the opponents are tying things together and overlapping them, the more confidence that creates,” Nash says. “If you believed the first thing, then everything else is going to reinforce that as a potential victim.”

And the schemes themselves also run the gamut, though non-delivery scams, where shoppers are tricked into buying something that never arrives, and gift card hoaxes, where people are tricked into paying with practically unobtainable gift cards or buying them remain some of the most common.

Another rich arena for scammers? Social media.

“Social media is a huge opportunity,” says Nash, “to build social media accounts and attract people, especially if you’re dealing with social media platforms that don’t do a particularly good job of regulating what is a valid account versus what is not.”

And if you fall for a scam posting, all it takes is one click and disaster strikes. Click that link promising the deal of a lifetime to the first 500 customers, and you risk having your personal information stolen or your device compromised.

Related: How to avoid getting scammed by influencers with fake followings

How to avoid online scams on Black Friday and Cyber ​​Monday

So how can you stay safe when shopping for some of the (legit) best deals of the year?

First, never forget that if a good deal seems too good to be true, it probably is, says Nash.

Once you suspect you might be a target, do your own investigation. For example, if you receive an amazing offer with a link attached, don’t click on it.

Instead, take a look at that web address, suggests Nash, looking for any changes to a genuine retailer’s URL, whether it’s one of those misspellings or capitalization exchanges. Copying the address into a Word document and changing the font can make it easier to spot the discrepancies.

You should also pay close attention to the message itself. Poor English and grammatical errors are red flags, says Nash.

Another simple tactic? Type the offer in your browser to see if it appears elsewhere.

“If you start googling it and you’re kind of the only person who seems to know where this thing is, chances are it doesn’t exist,” Nash says. “You’re not that special. None of us are.”

It is also recommended to avoid divulging sensitive information as much as possible, even when websites appear legitimate. Consider using a separate credit card for online orders; some financial institutions even offer virtual credit cards. Both options can prevent cybercriminals from moving “sideways into the rest of your finances,” says Nash.

Related: 11 Ways to Protect Your Business From Cybercriminals

Along the same lines, it’s important to make sure that you use different usernames and passwords for all of your accounts.

“If they cheat you on the website and you leak your information, [for a] a lot of people it means you’re giving it your all because you didn’t just give that Visa or MasterCard,” says Nash. “Turns out that’s the only username and password used for everything. Now more than ever is the time of year to remember to randomize passwords and use password management and two-factor authentication.”

If you make a purchase and have doubts afterwards, it may not be too late to protect yourself. Start by seeing if you received a confirmation email with tracking information – if you haven’t, that’s a bad sign.

“It happened to me maybe 10 years ago,” Nash says. “I got a laptop – it was a little too good to be true, but not crazy. And I got a tracking number that didn’t match; the post office couldn’t figure it out, et cetera. Well, lo and behold, this laptop never made it to my house.”

But depending on your payment method and associated insurance terms (which you should check before shopping), you may be able to get that money back, Nash notes.

Keep These Strategies in Mind for Success and safe cyber week this year.

]]>
How digital signage and kiosks can help stores match the online experience https://amitysource.com/how-digital-signage-and-kiosks-can-help-stores-match-the-online-experience/ Tue, 15 Nov 2022 07:29:23 +0000 https://amitysource.com/how-digital-signage-and-kiosks-can-help-stores-match-the-online-experience/ After embracing digital shopping channels during the pandemic, Australian consumers have grown accustomed to the personalization and bespoke content offered online. So how can physical retail stores replicate the experience and provide an equally personalized interface to customers? “The only way to do that is through digital media,” says Neal French, Chrome Enterprise JAPAC sales […]]]>

After embracing digital shopping channels during the pandemic, Australian consumers have grown accustomed to the personalization and bespoke content offered online. So how can physical retail stores replicate the experience and provide an equally personalized interface to customers?

“The only way to do that is through digital media,” says Neal French, Chrome Enterprise JAPAC sales manager at Google. “Retailers need to mirror the tailored and personalized experience online, but in-store.”

This means adopting next-generation technologies such as digital signage, powered by a robust operating system, enabling remote management, customization and interactivity with in-store signage.

“As retail evolves, market-leading brands understand that consumers do not separate their online shopping experience from their physical shopping experience and shoppers expect a seamless experience in both. “, says Cameron Hanns, director of Entwined, a digital signage and kiosk solution. vendor.

Research from Google, published in the company’s Spring/Summer Shopping Behaviors 2021 study, found that 50% of consumers now report shopping both in-store and online. This is driving a growing expectation for exceptional in-store customer experiences, Hanns says, including demand for services such as click-and-collect and endless aisles.

“Satisfying and surprising customers during an in-store customer journey, encouraging them to buy, is one thing, but customers want to save time and access solutions that allow them to order ‘out of stock’ or ‘premium limited series’ products too.”

He says it’s critical that retailers take an omnichannel approach, so that online and offline don’t compete but work in a hybrid approach that complements each other and drives customer engagement.

A prime example of an inspiring digital in-store solution can be found in Rebel’s new flagship at Adelaide’s Rundle Mall: a product customization service previously available only for online shopping.

“Understanding their customers’ desire to make their activewear unique in a creative way takes the customer experience to a whole new level,” says Hanns. “Entwined promoted this service in-store with an LED ticker above the counter so customers could locate it easily and using directional content via screens located throughout the three-level store.”

French says the purpose of digital signage is different for each brand and vertical. “For youth brands like City Beach, the company is positioning its latest apparel branding and offering to attract customers to its stores, while brands like Caltex are using digital signage solutions to promote food and promotional offers to entice customers to buy on impulse and consume immediately, eliciting a purely emotional response.

“Digital signage offers flexibility and the ability to change the message in real time, which can significantly impact sales and increase basket size,” he said.

The Power Behind Delivery

Both Hanns and French stress the importance of a robust technology platform behind in-store signage, having seen first-hand a host of issues faced by stores using various legacy systems.

“Traditional operating systems can’t keep pace with process, cost, or implementation,” says Hanns. “Legacy systems used to run kiosks and signage space often crash, require regular OS updates, and patches or applications can become corrupted and not work. IT management style of 20 years ago: you have to send technicians on site, connect to on-site servers, update files or applications and exchange parts, for example. revenue opportunities from broken, offline kiosks and digital signs while you wait potentially days for the system to reboot.

Not anymore these days, says Hanns. “We work alongside marketers and store improvement teams, from developing the vision for in-store digital signage to rolling it out.” This process includes ensuring unity between the stories displayed and creating thoughtful and helpful digital endpoints that demonstrate stores are using simple and innovative technology to drive this customer engagement.

“We give them a kind of digital canvas: retailers have their own strategy and we give them the digital medium to execute in their stores.”

Entwined has partnered with Google Enterprise to deploy cloud-based ChromeOS on physical hardware to power digital in-store executions: ChromeOS makes it simple and scalable, bringing flexibility and agility to in-store solutions, all in real time and without the crashes and failures of legacy systems.

Using ChromeOS, Google offers strategic and analytical support to drive sales growth to make the most of the flexibility and instant implementation that the operating system offers.

“The simplicity and ease of deployment of these devices means that once the displays are connected there is never a manual update and whether your fleet contains 100 or 100,000 devices, you will remotely manage and deploy updates. product updates or campaign activations in seconds,” says Hanns.

Personalization is the key to engagement

He says many of the brands Entwined works with see personalization as a key part of their loyalty program and local connection strategy.

“Rebel, for example, uses its RCX experiential stores as part of its digital strategy to create a destination environment and connect with the local community. It does not require complex content and tedious maintenance. Collaboration in design and implementation between Rebel and Entwined means that smart “markup” rules allow content to be published and that the correct content ends up in the correctly labeled places in the right stores.

Hanns says further personalization can happen around loyalty and rewards programs, especially in retail categories such as QSR chains and fashion retailers. “When a customer identifies themselves through a loyalty/membership program by using an app to check in or scanning a membership card at a kiosk, in-store digital signage may recognize that customer and attempt to create a connecting with the brand, even suggesting trade ups based on past purchase history, or promoting promotions before a customer goes to checkout.

Hanns says this strategy has been proven to improve customer experience and in-store engagement, increase brand loyalty and increase basket size.

Touchscreen kiosks are an obvious extension to enabling these results, allowing people to easily and easily check in and alerting staff to their profile or past buying behavior who can then be better prepared to engage.

Kiosks can also enhance product sales through endless aisle models, integrating in-store and online inventory to ensure customers can purchase the size and style of products they want. “Thanks to the terminals, merchants can offer a customer their entire range via their web catalog even if the item is not in store, and allow the customer to finalize his sale in store and have the product delivered. product.”

Kiosks are at the heart of the QSR growth strategy

Kiosks are also an “incredibly important part” of the QSR strategy going forward, he says. “As space becomes harder to come by and it’s increasingly important to make the best use of it, kiosks help open doors to productivity that weren’t there before.”

Collins Food Group, Australia’s largest KFC franchise, was looking for a new space in Brisbane’s Queen St Mall. The company found a great location, but with a not-so-great layout – a small mall entrance and a large area downstairs, which meant the main service area and kitchen were downstairs, out of sight of mall traffic. Collins Foods solved the problem by using digital menu boards upstairs to encourage customer engagement and provide direct exposure to mall foot traffic, with self-service ordering and payment kiosks located below. The menus.

Improving in-store efficiency and convenience, customers order in the mall area and then descend into a sprawling, hip dining area. Their order is already being put together with the status displayed on other digital billboards and while they wait, the brand engages them with a series of brand messages encouraging them to “take five and enjoy their meal”.

Research by Tillster published in 2019 as the Self-Service Kiosk Index shows that 30% of customers would prefer to order from a self-service kiosk if queues were equal, and over 50% if the line exceeded four people.

Further research – the 2022 Kiosk Market Census – shows that businesses can increase the average check size by 15-20% if they replace in-person counter service with kiosks, simply by optimizing technology to attract customers and sell to them.

Whether through kiosks or signage, digital in-store engagement is key to helping successful retailers deliver in-store experiences and convenience that match consumers’ expectations of online shopping.
If you want to learn more about digital signage and kiosk solutions and how you can integrate them into your in-store customer experience strategy, register for the Future of Retail in-person event being held at Google headquarters in Melbourne in November. 22, at 3 p.m. Register here.

]]>
Study shows benefits of learning Mandarin https://amitysource.com/study-shows-benefits-of-learning-mandarin/ Sat, 12 Nov 2022 16:00:00 +0000 https://amitysource.com/study-shows-benefits-of-learning-mandarin/ By Liu Tzu-hsuan / Editor, with CNA More than 90 percent of Taiwanese consider learning Mandarin to be useful for work and interpersonal relationships, according to a survey released by the Chinese Language and Technology Center at National Taiwan Normal University (NTNU). The survey, conducted Tuesday and Wednesday, collected 1,092 valid samples from Taiwanese between […]]]>
  • By Liu Tzu-hsuan / Editor, with CNA

More than 90 percent of Taiwanese consider learning Mandarin to be useful for work and interpersonal relationships, according to a survey released by the Chinese Language and Technology Center at National Taiwan Normal University (NTNU).

The survey, conducted Tuesday and Wednesday, collected 1,092 valid samples from Taiwanese between the ages of 21 and 60, the center said Thursday.

The study also used reports on classical Chinese education published on Professional Technology Temple (PTT), the country’s largest online bulletin board system, he added.

Photo: ANC

The survey was made public after the university’s admissions committee announced last month that subjects from the general academic aptitude test were to be included in the admission requirements of each university department.

The test includes six subjects: Mandarin, English, Grade A Math, Grade B Math, Social Studies, and Science.

However, some universities – including a number of engineering departments at National Taiwan University – have decided to exclude applicants’ marks for Mandarin when reviewing their qualifications.

The project’s lead researcher, Chung Chung-hsien (鍾宗憲), who is also a professor in NTNU’s Chinese department, said Thursday that the topic of Mandarin has sparked a lot of discussion.

Mandarin classes are often criticized as conservative, especially since electronic devices have changed the function of language and the way people interact, he said, adding that opinions for and against Mandarin classes Mandarin exist.

The survey found that 76% of respondents rated the Mandarin lessons as “very good” or “good”; while 82.7% of respondents thought the Mandarin teachers were “very good” or “good”, he said.

In addition, 91.7 percent, 88.5 percent and 91.8 percent of respondents believe that Mandarin lessons have a good influence on career, life planning and interpersonal relationships, respectively, he said. declared.

One of the main goals of Mandarin lessons is to facilitate communication by teaching the essence of the language, he said.

Respondents over the age of 30 strongly supported the Mandarin lessons, indicating that the teaching materials containing a large proportion of Classical Chinese, familiar to people in the school curriculum of this age group, do not hinder the ability to learn and apply the language, he said.

His comment alluded to the decision of the Ministry of Education’s Curriculum Review Committee in 2017 to reduce the proportion of classical Chinese content in high schools to between 35% and 45%, down from 45% and 65%; the change took effect in 2019.

Chinese professor Hsu Kuo-neng’s NTNU department (徐國能) said departments can only consider four subject scores as admission criteria, so a compromise would be inevitable.

However, some departments initially decided to exclude Mandarin but later reinstated it in their assessment criteria, he said.

Language teaching is linked to adaptability, competitiveness and quality of life for students, and therefore needs to be reconsidered and adjusted, he said.

Comments will be moderated. Keep comments relevant to the article. Remarks containing abusive and obscene language, personal attacks of any kind or promotion will be removed and the user banned. The final decision will be at the discretion of The Taipei Times.

]]>
How to Avoid Misinformation Online https://amitysource.com/how-to-avoid-misinformation-online/ Wed, 09 Nov 2022 12:08:18 +0000 https://amitysource.com/how-to-avoid-misinformation-online/ Comment this story Comment Anyone with an internet connection can watch breaking news unfold in real time, or at least a version of it. On social media, posts can fly faster than most fact-checkers and moderators can, and they’re often an unpredictable mix of true, false, out-of-context, and even propaganda. This type of misinformation is […]]]>

Comment

Anyone with an internet connection can watch breaking news unfold in real time, or at least a version of it. On social media, posts can fly faster than most fact-checkers and moderators can, and they’re often an unpredictable mix of true, false, out-of-context, and even propaganda.

This type of misinformation is skyrocketing before, during and after the election, including this week’s midterms. Watch out for confusing stories about everything from how to vote to who actually won specific races.

How do you know what to trust, what not to share, and what to report to tech companies? Here are some basic tools everyone should use when consuming breaking news online.

Election days are rife with misinformation. Here’s what to watch out for.

Know what to watch out for

Consider who would benefit from the dissemination of confusing information during a news event and revise the specific narratives circulating. During midterm elections, for example, experts say to watch out for conflicting reports and baseless accusations about election observers and officials and unfounded concerns about voter fraud. After election night, be on the lookout for premature declarations of victory and misinformation about the vote count. Learn more about expected election misinformation in our Technology 202 newsletter.

Don’t press that share button. Social media is designed for things to go viral, so users can quickly retweet before they’ve even finished reading the words they’re amplifying. No matter how devastating, illuminating, or rabid a TikTok, tweet, or YouTube video is, you should wait before forwarding it to your own network. Assume everything is suspicious until you confirm its authenticity.

Look who is sharing the information. If they are friends or family members, do not trust the messages unless they are personally in the field or are a proven expert. If it’s a stranger or an organization, remember that a verified checkmark or being well-known doesn’t make an account trustworthy. There are plenty of high-profile political pundits and internet figures posting inaccurate information right now, and it’s up to you to approach each post with skepticism.

If the account post is not the source of the words or images, find out where it came from by digging to find the original Facebook, YouTube, or Twitter account that first shared it. If you can’t determine the origin of something, that’s a red flag. Beware of screenshots, which can be even harder to trace, or anything that elicits a particularly strong emotional reaction. Misinformation can exploit this type of response to spread.

You are probably spreading false information. Here’s how to stop.

When selecting individual accounts, look at the date it was created, which should be listed in the profile. Beware of anything that is extremely new (say, it started within the last few months) or with very few followers. For a website, you can see what year it was launched on Google. Find the site name, then click the three vertical dots next to the URL in the results to see when it was first indexed by the search engine. Again, avoid anything too new. And don’t skip the basics: do a Google search on the name of the person or organization.

Make a collection of reliable sources

Doing mini-background checks on every random Twitter account takes an awful lot of time, especially with new content coming in from so many places simultaneously. Trust the professionals instead. Legitimate mainstream news outlets are designed to verify these things for you, and often reports on the same videos or photos taken by real people after confirming their origin.

Use a dedicated news tool such as Apple News, Google News, or Yahoo News, which choose established sources and have built-in moderation. On social media, create or find lists of selected experts and outlets to follow specifically for information on the topic you follow. If you consume breaking news on Twitter, be especially careful to follow senior reporters from trusted outlets who are on the ground. New changes to Twitter’s verification system could make this more difficult.

Many news events will include information from the field, such as smartphone videos and first-person accounts. Even if you only see real messages, it can still be confusing or misleading. Try adding unique clips or stories with broader context about what’s going on. They may be the most compelling pieces of a puzzle, but they’re not the whole picture. Mix information from recognized experts on the subject, be it foreign policy, cyber warfare, history or politics. You can also turn to online or TV outlets that add that context for most stories.

If you want to dig deeper into unverified reports, start with this comprehensive guide on how to filter videos. Find several odd edits and cuts, listen carefully to the audio and run it through a third-party tool like InVid, which helps verify the authenticity of the videos. This can be more difficult on livestreamed videos, like what’s happening on Twitch or any other live social media option.

To verify images, place them in Google’s image search by grabbing a screenshot and dragging it into the search field. If it’s an old image that’s been around before, you may see some telling results.

Use fact-checking sites and tools

Social media sites have some of their own fact-checking tools and warning labels, and many have added special sections to promote official election results. However, given the sheer volume of posts they face, a problematic video or post can still be seen by millions of people before being reported.

Keep an eye out for content warnings on social media sites for individual posts, which may appear as labels under links or as a warning before posting something that might be misleading. Look for individual stories or images on fact-checking sites such as The Washington Post’s Fact Checker, Snopes, and PolitiFact.

Geoffrey A. Fowler contributed to this report.

]]>
Black Adam with Dwayne ‘The Rock’ Johnson leaked online https://amitysource.com/black-adam-with-dwayne-the-rock-johnson-leaked-online/ Thu, 03 Nov 2022 12:50:52 +0000 https://amitysource.com/black-adam-with-dwayne-the-rock-johnson-leaked-online/ Black Adam, the latest DC superhero movie from Warner Bros has leaked online. The superhero movie which was released recently has now made its way illegally on various online websites. Black Adam, the latest DC superhero movie from Warner Bros has leaked online. The superhero movie which was released recently has now made its way […]]]>

Black Adam, the latest DC superhero movie from Warner Bros has leaked online. The superhero movie which was released recently has now made its way illegally on various online websites.

Black Adam, the latest DC superhero movie from Warner Bros has leaked online. The superhero movie which was released recently has now made its way illegally on various online websites.

Although accessing websites hosting pirated content is illegal in India and such websites are generally blocked, piracy can be a huge problem for the studio and the creators of the film. It is important to note that privacy is illegal in India and users should stay away from such websites.

It’s not the first big movie to be hit by online piracy. Previously, many Hollywood movies and also web series fell prey to online piracy. According to reports, Black Adam will soon be released on HBO Max.

For the uninitiated, Black Adam is a superhero movie based on the DC Comics character of the same name. The film stars Dwayne Johnson (who also served as a producer) as the title character alongside Aldis Hodge, Noah Centineo, Sarah Shahi, Marwan Kenzari, Pierce Brosnan and more. Black Adam was released theatrically in the United States on October 21, 2022 by Warner Bros. Pictures.

]]>
Online age verification system could create a ‘honeypot’ of personal data and pornography viewing habits, warn privacy groups | Technology https://amitysource.com/online-age-verification-system-could-create-a-honeypot-of-personal-data-and-pornography-viewing-habits-warn-privacy-groups-technology/ Sun, 30 Oct 2022 21:19:00 +0000 https://amitysource.com/online-age-verification-system-could-create-a-honeypot-of-personal-data-and-pornography-viewing-habits-warn-privacy-groups-technology/ Following Optus and Medibank data breaches, digital rights groups are urging the federal government to rule out requiring identification documents as part of any online age verification system, warning that it could create a honeypot of personal information and porn viewing habits. . eSafety Commissioner Julie Inman Grant develops an online safety ‘roadmap’, outlining a […]]]>

Following Optus and Medibank data breaches, digital rights groups are urging the federal government to rule out requiring identification documents as part of any online age verification system, warning that it could create a honeypot of personal information and porn viewing habits. .

eSafety Commissioner Julie Inman Grant develops an online safety ‘roadmap’, outlining a way to prevent minors from accessing adult content online by ensuring host sites have verified age users.

The commissioner’s report was originally due to be delivered to the government in December, but the deadline has now been extended to March next year. Stakeholders were made aware of the delay in notification last week.

Various age verification options were proposed during the development of the roadmap, including the use of third-party companies, individual sites verifying age using ID documents or cards credit, and internet service providers or mobile phone operators used to verify the age of users. .

Digital rights groups say that almost all age verification approaches will carry some level of privacy and security risk.

“Following the Optus and Medibank breaches, millions of people are now acutely aware of the dangers of collecting and storing large amounts of our personal information,” said Samantha Floreani, program manager at Digital Rights Watch.

“Age verification is a terrible combination of being invasive and risky, while being ineffective for its purported purpose.

“Less privacy-invasive methods are easily circumvented by tech-savvy children, and those more likely to work to restrict access to pornography create massive and disproportionate risks to privacy and digital security. “

There was potential for a new honeypot of identities and porn viewing habits if these systems were continued, Floreani said.

“The consequences of breaching such a system would be devastating,” she said.

Electronic Frontiers Australia chairman Justin Warren said the EFA had long warned of the privacy and security risks of such a policy.

“A government that claims to be interested in evidence-based policy would listen and act on our advice. Failure to do so suggests that the motivations for increased surveillance and control are ideological,” he said.

A spokeswoman for Communications Minister Michelle Rowland said the Albanian government “supports preventing Australian children from viewing pornography online”, but said questions about the roadmap were best directed at the electronic security commissioner.

“The eSafety Commissioner is advancing a complex body of work with a wide range of differing stakeholder views and issues, including privacy and security,” the spokesperson said.

The Office of the eSafety Commissioner has been approached for comment.

Other groups have called for an effective ban on online pornography. Anti-porn group Collective Shout has called for all pornography to be treated under the same classification as child sexual abuse material or terrorism material, which should be removed or blocked in Australia.

Some companies have already started implementing age verification procedures. Google, for example, has been estimating a person’s age since March using information collected from that account, such as their search history. If the company ultimately needs to see identity documents, Google said it deletes those documents after verification.

]]>
Pinterest soars as revenue pace stands out amid social media gloom https://amitysource.com/pinterest-soars-as-revenue-pace-stands-out-amid-social-media-gloom/ Thu, 27 Oct 2022 23:46:00 +0000 https://amitysource.com/pinterest-soars-as-revenue-pace-stands-out-amid-social-media-gloom/ Oct 27 (Reuters) – Pinterest Inc (PINS.N) beat quarterly revenue estimates on Thursday, marking a rare bright spot in an otherwise pessimistic social media industry and sending shares of the platform higher by 15% image sharing in after-hours exchanges. A decline in advertising budgets due to decades-long high inflation has rattled online gamer revenues from […]]]>

Oct 27 (Reuters) – Pinterest Inc (PINS.N) beat quarterly revenue estimates on Thursday, marking a rare bright spot in an otherwise pessimistic social media industry and sending shares of the platform higher by 15% image sharing in after-hours exchanges.

A decline in advertising budgets due to decades-long high inflation has rattled online gamer revenues from Alphabet Inc (GOOGL.O) to Meta Platforms Inc (META.O) and Snap Inc. Read more

But Pinterest’s results show that its advertising business remained resilient amid the general industry downturn and that people continued to engage with its image-sharing platform for inspiration to undertake activities such as home improvement and recipe-based cooking.

Pinterest returned to user growth in the July-September period after three consecutive quarters of decline, with a 2.8% sequential increase in its global monthly active users to 445 million, above Factset estimates of 437.4 million.

Some of the growth was fueled by an iOS 16 update from Apple Inc in September, chief financial officer Todd Morgenfeld said in a call with analysts.

He added that ad sales’ resilience was due to the fact that a large portion of Pinterest’s ad sales came from e-commerce and consumer goods.

“What hurt Pinterest before (during the pandemic) is helping them now,” said DA Davidson analyst Thomas Forte, referring to the company’s focus on retail and consumer goods.

“The biggest opportunity going forward is finding a way to drive incremental engagement on the platform and grow monthly active users again and improve monetization as growth slows.”

Pinterest’s third-quarter revenue rose 8% to $684.6 million. While the pace of growth was the slowest in nearly two years, the figure is well above the average analyst estimate of $666.7 million, according to Refinitiv.

The company’s global average revenue per user jumped 11% to $1.56. It earned adjusted earnings of $0.11 per share, beating analysts’ estimates of $0.06 per share.

Reporting by Vansh Agarwal, Shreyaa Narayanan and Eva Matthwes in Bengaluru; Editing by Anil D’Silva and Shinjini Ganguli

Our standards: The Thomson Reuters Trust Principles.

]]>
Dominica’s agricultural systems will benefit from a 12-week training program in the use of drone technology https://amitysource.com/dominicas-agricultural-systems-will-benefit-from-a-12-week-training-program-in-the-use-of-drone-technology/ Sun, 23 Oct 2022 15:58:00 +0000 https://amitysource.com/dominicas-agricultural-systems-will-benefit-from-a-12-week-training-program-in-the-use-of-drone-technology/ (l) Dr Renata Clarke, FAO Sub-Regional Coordinator for the Caribbean Region, drone used for training The Food and Agriculture Organization of the United Nations (FAO) recently held a 12-week training program on the use of drone technology as part of its ongoing efforts to transform agricultural systems in the region. Dominica. The training was completed […]]]>
(l) Dr Renata Clarke, FAO Sub-Regional Coordinator for the Caribbean Region, drone used for training

The Food and Agriculture Organization of the United Nations (FAO) recently held a 12-week training program on the use of drone technology as part of its ongoing efforts to transform agricultural systems in the region. Dominica.

The training was completed by extension staff from the Division of Agriculture (DOA) over a period of three months.

During the drone handover ceremony held in the Agriculture Division conference room, FAO’s Sub-Regional Coordinator for the Wider Caribbean, Dr Renata Clarke, said in her remarks As the world lives in the digital age, trainings such as these are needed because there are expectations of what these digital capabilities can do to revolutionize agriculture and transform food and agricultural systems.

She said trainings in various related fields were conducted between the months of April and July.

“Between April and July this year, the FAO team engaged in training a group of ministry employees on drone flying techniques to carry out surveillance, agricultural surveys, and on the analysis and use of data collected by drones,” Clark noted.

Due to COVID travel restrictions, the sub-regional coordinator said much of the training had to be done remotely with well-planned lectures, demonstrations and assignments.

“The last phase of the training was face-to-face with practical applications of these technologies. We do a lot of training because it’s always a partnership because we bring expertise and the trainees must bring interest and a desire to learn.

Clarke said the partnership has worked “wonderfully” and will transform Dominica’s agriculture.

She further stated that over the past decade, the accessibility and ease of use of such geospatial tools such as drones and free satellite data has increased significantly.

“We know that using drones with other complementary tools such as smart agricultural sensors, such as internet-connected and digital soil temperature and moisture sensors, can transform the way we understand risk and other challenges to effectively and efficiently manage agriculture and empower ministry officials. and producers to make more timely and better decisions,” she added.

Dr Clarke went on to say that it was also recognized that these tools can attract young people to farming, however noted that these tools and gadgets were not enough.

“We need to make sure we’re delivering systems that make farming profitable and sustainable,” Clarke said.

She said FAO stands ready to further support the institutionalization of these technologies and take their use to the next level.

“We have new projects that will build on your skills in using drone technology and while you can bring direct benefit to the planning, you will also build your knowledge and become better experts,” said notice the FAO official.

FAO is excited to see how these innovations can serve as models for other countries in the region, in line with Dominica’s goal of being a global center for agricultural resilience.

]]>
Health system reveals breach linked to online data tracker | Technology https://amitysource.com/health-system-reveals-breach-linked-to-online-data-tracker-technology/ Thu, 20 Oct 2022 20:31:38 +0000 https://amitysource.com/health-system-reveals-breach-linked-to-online-data-tracker-technology/ CHICAGO (AP) — The personal health information of up to 3 million patients in Illinois and Wisconsin may have been exposed to outside companies through tracking technology used on the Electronic Health Records website. of a large hospital system. Attorney Aurora Health, which operates 27 hospitals, said in a statement that the breach may have […]]]>

CHICAGO (AP) — The personal health information of up to 3 million patients in Illinois and Wisconsin may have been exposed to outside companies through tracking technology used on the Electronic Health Records website. of a large hospital system.

Attorney Aurora Health, which operates 27 hospitals, said in a statement that the breach may have revealed information including the patients’ medical provider, type of medical appointment or procedure, dates and locations of scheduled appointments and IP addresses.

Copyright 2022 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed without permission.

]]>