Deepfakes originally started as cheap costing but believable video effects and have expanded into AI-generated content of every format. This session dove into the state of deepfakes and how the technology highlights an exciting but dangerous future.
Deepfakes: An Emerging Internet Threat and their DetectionSymeon Papadopoulos
Webinar talk in the context of the AI4EU Web Cafe. Recording of the talk available on: https://youtu.be/wY1rvseH1C8
Deepfakes have emerged for some time now as one of the largest Internet threats, and even though their primary use so far has been the creation of pornographic content, the risk of them being abused for disinformation purposes is growing by the day. Deepfake creation approaches and tools are continuously improving in terms of result quality and ease of use by non-experts, and accordingly the amount of deepfake content on the Internet is quickly growing. For that reason, approaches for deepfake detection are a valuable tool for media companies, social media platforms and ultimately citizens to help them tell authentic from deepfake generated content. In this presentation, I will be presenting a short overview of the developments in the field of deepfake detection, and present our lessons learned from working on the problem in the context of the Deepfake Detection Challenge and from developing a service for the H2020 WeVerify project.
deepfake
seminar
computer engineering
ppt on deepfake which uses ai and deep learning technology.with adavantages,disadvantages,intro,reference,conclusion
This document discusses deepfakes, which are synthetic media that uses artificial intelligence to replace a person's face or body with someone else's. It describes the origin of deepfakes from a Reddit community in 2017 and how applications now allow users to easily create and share manipulated videos. The document explains that deepfakes work using autoencoders and generative adversarial networks to learn from data and generate new realistic images and videos. It also covers methods for detecting deepfakes and discusses both the potential positive and negative applications of this emerging technology.
The “deepfake” phenomenon — using machine learning to generate synthetic video, audio and text content — is an ominous example of how quickly new technologies can be diverted from their original purposes. Month by month, it is becoming easier and cheaper to create fakes that are increasingly difficult to distinguish from genuine artefacts.
Deepfake detection models require clean training data to generalize well. The document discusses preprocessing training data by filtering out false detections from face extraction. This improved log loss error on evaluation datasets for models trained with the preprocessed data. However, deepfake detection remains challenging due to limited generalization, overfitting, and the broad scope of possible manipulations. The importance of preprocessing training data and methods to address challenges are discussed.
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...Symeon Papadopoulos
Slides accompanying an online webinar on DeepFake Detection and a hands-on demonstration of the MeVer DeepFake Detection service. The webinar is supported by the US-Paris Tech Challenge award for our work on the InVID-WeVerify plugin.
Although manipulations of visual and auditory media are as old as the media themselves, the recent entrance of deepfakes has marked a turning point in the creation of fake content. Powered by latest technological advances in AI and machine learning, they offer automated procedures to create fake content that is harder and harder to detect to human observers. The possibilities to deceive are endless, including manipulated pictures, videos and audio, that will have large societal impact. Because of this, organizations need to understand the inner workings of the underlying techniques, as well as their strengths and limitations. This article provides a working definition of deepfakes together with an overview of the underlying technology. We classify different deepfake types: photo (face- and body-swapping), audio (voice-swapping, text to speech), video (face-swapping, face-morphing, full body puppetry) and audio & video (lip-synching), and identify risks and opportunities to help organizations think about the future of deepfakes. Finally, we propose the R.E.A.L. framework to manage deepfake risks: Record original content to assure deniability, Expose deepfakes early, Advocate for legal protection and Leverage trust to counter credulity. Following these principles, we hope that our society can be more prepared to counter the deepfake tricks as we appreciate its treats.
The "Big Data Analytics and its Use by Apple" presentation provides an overview of how Apple harnesses big data analytics to gain insights, drive innovation, and enhance business performance. It explores Apple's strategic use of data analytics in areas such as product development, customer experience, and operational efficiency, showcasing the value of data-driven decision-making in one of the world's leading technology companies.
Deepfakes are synthetic media that uses artificial intelligence to realistically manipulate images and videos by replacing a person's face with another. The term is a combination of "deep learning" and "fake". While deepfake technology was initially developed for entertainment purposes like special effects, it can also be used to impersonate people, create realistic simulations for training, and generate fake content for social media. However, there are disadvantages like using deepfakes for blackmail, spreading misinformation, and lack of authenticity which is why regulation of this technology is important.
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)SSII
This document provides an overview of deepfake generation and detection. It begins with an introduction to the author and their background and research interests. The rest of the document is outlined as follows: definitions of deepfakes, various deepfake generation techniques including face synthesis, manipulation, reenactment and swapping, and an overview of deepfake detection methods including commonly used datasets, image-based and video-based detection approaches.
DEEPFAKE DETECTION TECHNIQUES: A REVIEWvivatechijri
Noteworthy advancements in the field of deep learning have led to the rise of highly realistic AI generated fake videos, these videos are commonly known as Deepfakes. They refer to manipulated videos, that are generated by sophisticated AI, that yield formed videos and tones that seem to be original. Although this technology has numerous beneficial applications, there are also significant concerns about the disadvantages of the same. So there is a need to develop a system that would detect and mitigate the negative impact of these AI generated videos on society. The videos that get transferred through social media are of low quality, so the detection of such videos becomes difficult. Many researchers in the past have done analysis on Deepfake detection which were based on Machine Learning, Support Vector Machine and Deep Learning based techniques such as Convolution Neural Network with or without LSTM .This paper analyses various techniques that are used by several researchers to detect Deepfake videos.
For the full video of this presentation, please visit:
https://www.embedded-vision.com/platinum-members/embedded-vision-alliance/embedded-vision-training/videos/pages/sep-2019-alliance-vitf-ucberkeley
For more information about embedded vision, please visit:
http://www.embedded-vision.com
Shruti Agarwal, Ph.D. Candidate at U.C. Berkeley, delivers the presentation "Creating, Weaponizing,and Detecting Deep Fakes" at the Embedded Vision Alliance's September 2019 Vision Industry and Technology Forum. Agarwal explains how to use computer vision to detect "deepfakes."
Dissecting the dangers of deepfakes and their impact on reputation Generative...CSIRO National AI Centre
At the recent Generative AI Conference - This talk defined deepfakes and the widespread damage misinformation can cause. In order to build awareness of the ethical implications of deepfakes. At the
National AI Centre, Responsible AI and Responsible AI Network
allows us to action a way to use AI that is aligned to Australia's AI ethics principles.
This document discusses Generative Adversarial Networks (GANs) and their applications. GANs use two neural networks, a generator and discriminator, that compete against each other in a game theoretic framework. The generator learns to generate new data instances to fool the discriminator, while the discriminator learns to assess examples as real or generated. GANs have been used to generate realistic images, videos and more. However, training GANs is challenging and they lack interpretability. The document provides an overview of GAN concepts and applications, with tips for building and training effective GAN models.
This document describes a deep learning algorithm to classify videos as deepfakes or authentic. It discusses deepfakes, how they are created, the system architecture including data preprocessing, a ResNext-50 model architecture with LSTM and training workflow. Results show models trained on different datasets and frame sequences achieving accuracies from 84% to 98%. The project uses PyTorch and Django with Google Cloud Platform for computing.
Deepfakes are artificially generated videos or images that manipulate real people into appearing to say or do something they did not. They can be created quickly using freely available software on a standard gaming PC by training generative adversarial networks on source images or video of a person's face and the target face to map and swap. Detection of faces and landmarks allows the AI to render convincing fakes without needing artistic talent. Future sessions will discuss the ethics of deepfakes and how to detect manipulated media.
This document summarizes a face recognition attendance system project. The project uses face recognition technology to take attendance by comparing captured images to stored student records. It has a completed status. The methodology follows a waterfall model. System diagrams include context, data flow, and architecture diagrams. The database stores student data like name, roll number, attendance, and captured images. The system allows for student registration by capturing images, training the model, and recognizing faces to mark attendance. Developing this project provided experience with real-world software development processes.
This document summarizes a seminar presentation on face recognition technology. It begins with an introduction to facial recognition systems and what biometrics are. It then discusses why facial recognition is chosen over other biometrics, the differences between facial recognition and face detection, and how facial recognition systems work. Application areas are identified, such as security, government ID, casinos. Advantages include convenience and cost-effectiveness, while disadvantages include issues with lighting, pose, and privacy concerns. The growth rate of the facial recognition market is projected to be nearly 14% annually through 2022.
Generative AI models, such as GANs and VAEs, have the potential to create realistic and diverse synthetic data for various applications, from image and speech synthesis to drug discovery and language modeling. However, training these models can be challenging due to the instability and mode collapse issues that often arise. In this workshop, we will explore how stable diffusion, a recent training method that combines diffusion models and Langevin dynamics, can address these challenges and improve the performance and stability of generative models. We will use a pre-configured development environment for machine learning, to run hands-on experiments and train stable diffusion models on different datasets. By the end of the session, attendees will have a better understanding of generative AI and stable diffusion, and how to build and deploy stable generative models for real-world use cases.
Essay On Community Service Benefits. Online assignment writing service.Nicole Charles
The document provides steps for requesting writing assistance from HelpWriting.net:
1. Create an account with a valid email address.
2. Complete a 10-minute order form providing instructions, sources, deadline and attaching a sample work.
3. Review bids from writers and choose one based on qualifications, history and feedback, then pay a deposit to start the assignment.
4. Review the completed paper and authorize full payment or request revisions until satisfied. HelpWriting.net offers free revisions.
Jonathan Catley and Koka Sexton presented a webinar on tactical social selling. They discussed 5 key steps: 1) Understanding social selling basics like how today's buyers use social media in their purchase process. 2) Using tools like InsideView, SproutSocial and Hootsuite for social listening, analytics and scheduling. 3) Prospecting through social by monitoring networks, hashtags and trigger events. 4) Nurturing prospects by engaging in conversations, answering questions and monitoring communities and trigger events. 5) The ROI of social selling through case studies of companies growing revenue through LinkedIn and Twitter engagement, and sales reps using social seeing higher quota attainment.
Software Development in a Funky Manner to meet client requirements bestPeter Horsten
Too often software development projects don't meet the client expectations.
What's causing this? How can we make that both the client (business side) and the developers communicate in such a way that both sides know what can be expected? Are new development practices the solution to realize top results?
See my blog post for more information: http://ow.ly/1rPaa
Intuition & Use-Cases of Embeddings in NLP & beyondC4Media
Video and slides synchronized, mp3 and slide download available at URL http://bit.ly/2LZgiKO.
Jay Alammar talks about the concept of word embeddings, how they're created, and looks at examples of how these concepts can be carried over to solve problems like content discovery and search ranking in marketplaces and media-consumption services (e.g. movie/music recommendations). Filmed at qconlondon.com.
Jay Alammar is VC and ML Explainer at STVcapital. He has helped tens of thousands of people wrap their heads around complex ML topics. He harnesses a visual, highly-intuitive presentation style to communicate concepts ranging from the most basic intros to data analysis, interactive intros to neural networks, to dissections of state-of-the-art models in Natural Language Processing.
The document discusses considerations for creating high-impact visuals when presenting. It outlines three main considerations: understanding your audience, using design theory principles, and designing visually. Some key principles discussed include the modality, redundancy, coherence and segmentation principles from multimedia learning theory. The document also provides examples of effective and ineffective visual design.
002 Example Of Descriptive Essay Essays Examples OApril Ford
The document discusses Olivia Mclain, who was born on Shetland Islands off the coast of Scotland. Her father Robin was the lord of the land, while her mother Katelyn was from England. Olivia faced difficulties growing up due to being different from others in her community. Her parents Robin and Katelyn had an arranged marriage not based on love. The document provides background on Olivia's family and homeland but does not go into detail about Olivia herself.
Delivered on 15th March 2012 at Rich Mix in London, The 7 Secrets of Socially Successful Businesses provides insights and actions for small businesses to become Socially Successful in 2012 ... #f7sm #smwldn
Rand Fishkin - The Invisible Giant that Mucks Up Our MarketingMarketing Festival
This document discusses how cultural biases influence marketing decisions and strategies. It argues that common beliefs around gender biases, work hours, startup investments, and marketing channels are influenced by cultural conditioning rather than objective data. The document advocates investing in hard-to-measure marketing channels like word-of-mouth, SEO, and content marketing. It also suggests that search rankings are influenced more by solving user queries than links and keywords. Marketers are advised to consider new ranking factors and search features beyond traditional SEO techniques.
This document provides tips and tools for creating and using visuals effectively in presentations. It discusses finding and using existing visuals such as photos, graphics and videos. It also provides tips for creating visuals using tools like online chart builders and photo editors. Guidelines are given for designing visuals with considerations for layout, color, font and keeping the visuals simple and clear. The document also discusses using visuals appropriately for different audiences and topics. Overall presentation tips are provided such as including an agenda, title slide and contact information.
Cybercrime and the Developer: How to Start Defending Against the Darker SideSteve Poole
In the world of DevOps and the cloud, most developers have to learn new technologies and methodologies. The focus tends to be on adding capabilities such as resilience and scaling to an application. One critical aspect consistently overlooked is security. In this session, learn about a few of the simple actions you can take (and some behaviours you must change) to create a more secure Java application for the cloud. The world of the cybercriminal is closer than you realize. Hear how at risk your application may be, see practical examples of how you can inadvertently leave the doors open, and understand what you can do to make your Java solution more secure.
Talk at a Data Journalism BootCamp organised by ICFJ, World Bank Group and African Media Initiative in New Delhi to a group of 60 journalists, coders and social sector folks. Other amazing sessions included those from Govind Ethiraj of IndiaSpend, Andrew from BBC, Parul from Google, Nasr from HacksHacker, Thej from DataMeet and David from Code for Africa. http://delhi.dbootcamp.org/
REALTOR on the Go: Taking Your Real Estate Business MobileMaura Neill
It’s no secret that today’s real estate world is fast-paced: buyers and sellers no longer want to wait to get information – they want it now. Agents need to have the right tools at their fingertips in order to meet the demands of our now technology-dependent industry. This course outlines the tools agents can use today to take their office mobile, to be as effective and efficient in the field as they are at their desks. Attendees will leave the class with the knowledge and tools necessary to take their business to the next level, to truly take their business mobile – whether they are solo agents, team members, or team leaders. From over 35 mobile applications that are free (or almost free) and can save not only money but also time to creating a “roaming office,” a comfortable and productive place to conduct business with your clients, in your car or wherever you are! The main goal: making your life less complicated and less stressful and making every transaction easier on you and your clients.
Artificial intelligence and conversational search are having their big moment right now, and it’s easy to see why. Its relevant to all of us. Its potential to enhance our daily lives is the foundation of its widespread adoption…but measuring our satisfaction correctly *in the moment* is the key to its ultimate success – or failure. The future of search lies in the ability of conversational UI to make human-to-computer interactions correct, relevant and useful. The satisfaction metric is the key to moving search ahead, making personal AI assistants essential sidekicks in everyday life. The more our personal AIs “get” us, the more we want to talk with them.
In this session, Ozlo’s Principal Engineering Lead Heidi Young, who has lived and breathed search for more than 10 years, will discuss how the success of AI-driven assistants – and their ability to enhance our lives – depends on a specific satisfaction metric. By breaking down human-to-computer interactions and focusing on immediate feedback loops (micro-level metrics) instead of solely on lagging indicators (macro-level metrics), satisfaction is more effectively measured. This type of engagement is a game-changer is measuring satisfaction and indicating happiness. It should be a top priority of AI architects, since users who have positively ending conversations come back. This is the key to the new personal AI assistant revolution.
GIDS-2023 A New Hope for 2023? What Developers Must Learn NextSteve Poole
This document discusses the evolving threats from cybercrime and importance of securing the software supply chain. It notes that cybercrime now costs over $6 trillion annually, similar to the global GDP of major countries. Attacks have become more sophisticated using techniques like supply chain compromises and exploiting vulnerabilities before they are publicly known. Developers are urged to carefully select open source components based on security practices like using SBOMs and rapid patching. The talk recommends following secure development principles and keeping educated on improving tools that can help harden applications and their supply chains.
The Future of Search: How Measuring Satisfaction Will Enhance Our Personal ...teamozlo
Ozlo VP of Engineering, Heidi Young, talks about "The Future of Search: How Measuring Satisfaction Will Enhance Our Personal AIs and Our Lives" at Seattle Interactive 2016
Heidi Young, Ozlo VP of Engineering, Seattle Interactive 2016teamozlo
Ozlo VP of Engineering, Heidi Young, talks about "The Future of Search: How Measuring Satisfaction Will Enhance Our Personal AIs and Our Lives" at Seattle Interactive 2016
This document discusses social media and social technology trends. Some key points covered include the concept of "groundswell" where people use technologies to get things from each other rather than institutions; defining social media as blogs, user-generated content, social networks, wikis, forums and more; discussing strategy, people, objectives and technology for social media efforts; and providing statistics on peer-to-peer fundraising growth over time in the United States.
Microblog-genre noise and its impact on semantic annotation accuracyLeon Derczynski
This document discusses challenges in applying natural language processing pipelines to microblog texts like tweets. Key challenges include non-standard language use, brevity, and lack of context. The document evaluates performance of typical NLP tasks on microblogs, like part-of-speech tagging and named entity recognition, and proposes approaches to address noise, such as customizing tools to the microblog genre and applying normalization techniques. It concludes that while performance is lower on microblogs, targeted approaches can provide gains and that leveraging additional context from metadata may further help analyze microblog language.
Cybercrime and the Developer: How to Start Defending Against the Darker Side...Steve Poole
JavaOne 2016 Talk
In the world of DevOps and the cloud, most developers have to learn new technologies and methodologies. The focus tends to be on adding capabilities such as resilience and scaling to an application. One critical aspect consistently overlooked is security. In this session, learn about a few of the simple actions you can take (and some behaviors you must change) to create a more secure Java application for the cloud. The world of the cybercriminal is closer than you realize. Hear how at risk your application may be, see practical examples of how you can inadvertently leave the doors open, and understand what you can do to make your Java solution more secure.
Similar to Deepfakes - How they work and what it means for the future (20)
AppSecCali - How Credential Stuffing is EvolvingJarrod Overson
This talk was given at AppSec California, January 2020.
Credential stuffing and other automated attacks are evolving passed every defense thrown in their way. CAPTCHAs don't work, Fingerprints don't work, Magical AI-whatevers don't work. The value is just too great.
How Credential Stuffing is Evolving - PasswordsCon 2019Jarrod Overson
Slides for talk given at PasswordsCon Sweden 2019. Credentials Stuffing is an automated attack that exploits users who reuse passwords by taking breached credentials and replaying them across sites.
JSconf JP - Analysis of an exploited npm package. Event-stream's role in a su...Jarrod Overson
This document summarizes an analysis of an exploited NPM package called event-stream. It describes how an attacker gained control of the package and added malicious code that was downloaded by thousands of projects whenever their dependencies were updated. The malicious code stole cryptocurrency from wallets containing large amounts. It highlights the risks of supply chain attacks and emphasizes the importance of auditing dependencies, locking versions, and thinking carefully before adding new dependencies to avoid compromising entire projects and their users.
Analysis of an OSS supply chain attack - How did 8 millions developers downlo...Jarrod Overson
Jarrod Overson presented on a supply chain attack that occurred in 2018 through the compromise of the event-stream Node.js package. An unauthorized developer gained commit access and introduced malicious code through new dependencies that was then installed by millions of users. The malware harvested cryptocurrency private keys from the Copay wallet app. While the community responded quickly, such attacks demonstrate vulnerabilities in open source software supply chains and dependency management that will continue to be exploited if not properly addressed through changes to practices and tooling.
The State of Credential Stuffing and the Future of Account Takeovers.Jarrod Overson
Jarrod Overson discusses the evolution of credential stuffing attacks and where they may go in the future. He summarizes that credential stuffing started as basic automated login attempts but has evolved through generations as defenses were put in place, such as CAPTCHAs and behavior analysis. The next generation involves more sophisticated imitation attacks that flawlessly emulate human behavior using real device fingerprints to blend in. Beyond credential stuffing, malware may start scraping user accounts and environments directly from infected machines. As defenses raise the cost of attacks, fraudsters will diversify methods to preserve the value of valid accounts and user data.
Workshop slides originally given at the WOPR Summit in Atlantic City. Use JavaScript parsers and generators like Shift combined with Puppeteer and Chrome to reverse engineer web applications
The life of breached data and the attack lifecycleJarrod Overson
OWASP RTP Presentation on Data breaches, credential spills, the lifespan of data, credential stuffing, the attack lifecycle, and what you can do to protect yourself or your users.
Shape Security analyzes 1.5 billion logins per week and protects 350 million user accounts. In 2016 alone, 1.6 billion credentials were leaked and sold or traded by criminals on dark web markets. Shape uses headless browsers like PhantomJS to automatically test leaked credentials on other sites, stopping over $1 billion in fraud losses in 2016. However, captchas intended to prevent automated attacks do not work and ruin the user experience.
Talk given at Mozilla's first View Source Conference in Portland, 2015. Details out the parallels between graphics and game developments compared to traditional web development.
This document discusses the dark side of web security, including automated threats from bots and attackers. It notes that traditional security like flossing is difficult to measure effectiveness. It outlines the OWASP top 10 vulnerabilities and automated threats attackers use. While captchas are meant to stop bots, services have made bypassing captchas easier. If a site has value like money, data, or content, there is value in exploiting it. Detection of attacks is difficult as attackers use many proxies and fingerprints to avoid detection. Patching is not enough, and spikes in traffic from many IPs could indicate an attack.
This was a talk given at HTML5DevConf SF in 2015.
Ever wanted to write your own Browserify or Babel? Maybe have an idea for something new? This talk will get you started understanding how to use a JavaScript AST to transform and generate new code.
This document discusses ECMAScript 2015 (ES2015), also known as ES6. It provides examples of new ES2015 features like arrow functions, template literals, classes, and modules. It also discusses how to set up a development environment to use ES2015, including transpiling code to ES5 using Babel, linting with Eslint, testing with Mocha, and generating coverage reports with Istanbul. The document emphasizes that while ES2015 is fun to explore, proper tooling like linting and testing is needed for serious development. It concludes by noting ES2015 marks a transition and thanks the audience.
The document discusses achieving maintainability in code through examining code quality with linters, generating visual reports on metrics like complexity and coverage, and automating processes like builds, linting, and testing through tools like Grunt and Gulp. It emphasizes setting limits on metrics like complexity, enforcing code style through automation, and treating documentation as important as code.
1) The document discusses achieving maintainability in code through analysis, automation, and enforcement of standards.
2) It recommends setting up linting, code coverage, and other analysis tools to examine code quality and automatically enforcing code style through build processes.
3) The key is to automate as many processes as possible like testing, linting, and documentation to make the code easy to work with and prevent issues from being introduced.
Riot on the web - Kenote @ QCon Sao Paulo 2014Jarrod Overson
Slides for the keynote given at QCon Sao Paulo 2014. Talk goes into the problems scaling Riot and how we've tried to solve them as well as what we've learned from the web and what lies in store next.
Managing JavaScript Complexity in Teams - FluentJarrod Overson
This document discusses managing complexity in JavaScript projects. It addresses coming to terms with the challenges of dynamic languages being messy, having an immature tooling ecosystem, and rapid evolution. It emphasizes respecting code style conventions, enforcing linting rules, documenting code, and using metrics like cyclomatic complexity to reduce testing difficulty. The overall message is that perseverance is needed to tame JavaScript's complexity through automation, visualization, honesty and acceptance of its challenges and opportunities.
The document discusses web components, which include HTML templates, custom elements, shadow DOM, and HTML imports. Web components allow the creation of reusable custom elements with their own styles and DOM structure. They provide encapsulation and help avoid issues with global namespaces. While browser support is still emerging for some features, polyfills exist and frameworks like Polymer make web components accessible today. Web components represent an important evolution of the web that will improve how code is structured and shared.
Measuring the Impact of Network Latency at TwitterScyllaDB
Widya Salim and Victor Ma will outline the causal impact analysis, framework, and key learnings used to quantify the impact of reducing Twitter's network latency.
An invited talk given by Mark Billinghurst on Research Directions for Cross Reality Interfaces. This was given on July 2nd 2024 as part of the 2024 Summer School on Cross Reality in Hagenberg, Austria (July 1st - 7th)
7 Most Powerful Solar Storms in the History of Earth.pdfEnterprise Wired
Solar Storms (Geo Magnetic Storms) are the motion of accelerated charged particles in the solar environment with high velocities due to the coronal mass ejection (CME).
How Social Media Hackers Help You to See Your Wife's Message.pdfHackersList
In the modern digital era, social media platforms have become integral to our daily lives. These platforms, including Facebook, Instagram, WhatsApp, and Snapchat, offer countless ways to connect, share, and communicate.
Details of description part II: Describing images in practice - Tech Forum 2024BookNet Canada
This presentation explores the practical application of image description techniques. Familiar guidelines will be demonstrated in practice, and descriptions will be developed “live”! If you have learned a lot about the theory of image description techniques but want to feel more confident putting them into practice, this is the presentation for you. There will be useful, actionable information for everyone, whether you are working with authors, colleagues, alone, or leveraging AI as a collaborator.
Link to presentation recording and transcript: https://bnctechforum.ca/sessions/details-of-description-part-ii-describing-images-in-practice/
Presented by BookNet Canada on June 25, 2024, with support from the Department of Canadian Heritage.
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionBert Blevins
Cybersecurity is a major concern in today's connected digital world. Threats to organizations are constantly evolving and have the potential to compromise sensitive information, disrupt operations, and lead to significant financial losses. Traditional cybersecurity techniques often fall short against modern attackers. Therefore, advanced techniques for cyber security analysis and anomaly detection are essential for protecting digital assets. This blog explores these cutting-edge methods, providing a comprehensive overview of their application and importance.
Are you interested in dipping your toes in the cloud native observability waters, but as an engineer you are not sure where to get started with tracing problems through your microservices and application landscapes on Kubernetes? Then this is the session for you, where we take you on your first steps in an active open-source project that offers a buffet of languages, challenges, and opportunities for getting started with telemetry data.
The project is called openTelemetry, but before diving into the specifics, we’ll start with de-mystifying key concepts and terms such as observability, telemetry, instrumentation, cardinality, percentile to lay a foundation. After understanding the nuts and bolts of observability and distributed traces, we’ll explore the openTelemetry community; its Special Interest Groups (SIGs), repositories, and how to become not only an end-user, but possibly a contributor.We will wrap up with an overview of the components in this project, such as the Collector, the OpenTelemetry protocol (OTLP), its APIs, and its SDKs.
Attendees will leave with an understanding of key observability concepts, become grounded in distributed tracing terminology, be aware of the components of openTelemetry, and know how to take their first steps to an open-source contribution!
Key Takeaways: Open source, vendor neutral instrumentation is an exciting new reality as the industry standardizes on openTelemetry for observability. OpenTelemetry is on a mission to enable effective observability by making high-quality, portable telemetry ubiquitous. The world of observability and monitoring today has a steep learning curve and in order to achieve ubiquity, the project would benefit from growing our contributor community.
Quantum Communications Q&A with Gemini LLM. These are based on Shannon's Noisy channel Theorem and offers how the classical theory applies to the quantum world.
Coordinate Systems in FME 101 - Webinar SlidesSafe Software
If you’ve ever had to analyze a map or GPS data, chances are you’ve encountered and even worked with coordinate systems. As historical data continually updates through GPS, understanding coordinate systems is increasingly crucial. However, not everyone knows why they exist or how to effectively use them for data-driven insights.
During this webinar, you’ll learn exactly what coordinate systems are and how you can use FME to maintain and transform your data’s coordinate systems in an easy-to-digest way, accurately representing the geographical space that it exists within. During this webinar, you will have the chance to:
- Enhance Your Understanding: Gain a clear overview of what coordinate systems are and their value
- Learn Practical Applications: Why we need datams and projections, plus units between coordinate systems
- Maximize with FME: Understand how FME handles coordinate systems, including a brief summary of the 3 main reprojectors
- Custom Coordinate Systems: Learn how to work with FME and coordinate systems beyond what is natively supported
- Look Ahead: Gain insights into where FME is headed with coordinate systems in the future
Don’t miss the opportunity to improve the value you receive from your coordinate system data, ultimately allowing you to streamline your data analysis and maximize your time. See you there!
The Rise of Supernetwork Data Intensive ComputingLarry Smarr
Invited Remote Lecture to SC21
The International Conference for High Performance Computing, Networking, Storage, and Analysis
St. Louis, Missouri
November 18, 2021
Support en anglais diffusé lors de l'événement 100% IA organisé dans les locaux parisiens d'Iguane Solutions, le mardi 2 juillet 2024 :
- Présentation de notre plateforme IA plug and play : ses fonctionnalités avancées, telles que son interface utilisateur intuitive, son copilot puissant et des outils de monitoring performants.
- REX client : Cyril Janssens, CTO d’ easybourse, partage son expérience d’utilisation de notre plateforme IA plug & play.
Comparison Table of DiskWarrior Alternatives.pdfAndrey Yasko
To help you choose the best DiskWarrior alternative, we've compiled a comparison table summarizing the features, pros, cons, and pricing of six alternatives.
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Chris Swan
Have you noticed the OpenSSF Scorecard badges on the official Dart and Flutter repos? It's Google's way of showing that they care about security. Practices such as pinning dependencies, branch protection, required reviews, continuous integration tests etc. are measured to provide a score and accompanying badge.
You can do the same for your projects, and this presentation will show you how, with an emphasis on the unique challenges that come up when working with Dart and Flutter.
The session will provide a walkthrough of the steps involved in securing a first repository, and then what it takes to repeat that process across an organization with multiple repos. It will also look at the ongoing maintenance involved once scorecards have been implemented, and how aspects of that maintenance can be better automated to minimize toil.
29. Generating images from text
• the flower shown has yellow anther red pistil
and bright red petals.
• this flower has petals that are yellow, white and
purple and has dark lines
• the petals on this flower are white with a yellow
center
• this flower has a lot of small round pink petals.
• this flower is orange in color, and has petals that
are ruffled and rounded.
• the flower has yellow petals and the center of it
is brown
• this flower has petals that are blue and white.
• these white flowers have petals that start white
in color and end in a white towards the tips.
https://github.com/zsdonghao/text-to-image
30. Voice recognition and transcription
Mozilla's Common Voice
https://voice.mozilla.org/en
31. Text to speech
Beyond voice fonts: TacoTron2 & Waveglow
https://devblogs.nvidia.com/generate-natural-sounding-speech-from-text-in-real-time/?linkId=100000007949356
49. 0 million
550 million
1,100 million
1,650 million
2,200 million
Q4 17 Q1 18 Q2 18 Q3 18 Q4 18 Q1 19
https://fbnewsroomus.files.wordpress.com/2019/05/cser-data-snapshot-052219-final-hires.png
Facebook banned 2.2 Billion fake accounts in Q1 of 2019 alone
52. 99.8%
of all fake Facebook accounts
were caught automatically.
43.8 million
accounts were not caught until
reported.
1
user is all it takes to spread
disinformation.
An internet scale problem.
61. Top 3 web retailer
91% fake
Top EU airline
79.5% fake
Major hotel chain
47% fake
63. BADASS is a nonprofit organization dedicated to providing support to
victims of revenge porn/image abuse.
If you find yourself victim of unauthorized photo sharing, deepfakes or
otherwise, contact https://badassarmy.org/