Auteur/autrice : noflux (Page 90 of 621)

“La plate-forme Node.js est passée du statut d’OVNI à celui d’incontournable. En 2018, elle fait fonctionner des applications web, de l’outillage front-end, de la distribution de fichiers pair-à-pair, des objets connectés et la NASA l’utilise même pour analyser les données télémétriques de ses sondes spatiales.
L’intention de cet ouvrage est d’être votre base de départ pour comprendre ce qu’il se passe dans cet écosystème en perpétuel mouvement. Il devrait vous permettre de faire des choix techniques durables et de vous rendre opérationnel·le sur LA plate-forme JavaScript, le langage le plus populaire du monde selon GitHub.”

Source : Node.js • Apprendre par la pratique • Thomas Parisot

Your Apps Know Where You Were Last Night, and They’re Not Keeping It Secret

Location data

“Only one person makes that trip: Lisa Magrin, a 46-year-old math teacher. Her smartphone goes with her. An app on the device gathered her location information, which was then sold without her knowledge. It recorded her whereabouts as often as every two seconds, according to a database of more than a million phones in the New York area that was reviewed by The New York Times. While Ms. Magrin’s identity was not disclosed in those records, The Times was able to easily connect her to that dot.”

Source : Your Apps Know Where You Were Last Night, and They’re Not Keeping It Secret – The New York Times

Navy aircraft carrier USS Ronald Reagan conducting an exercise in the South China Sea in August.

“Chinese hackers are breaching Navy contractors to steal everything from ship-maintenance data to missile plans, officials and experts said, triggering a top-to-bottom review of cyber vulnerabilities. A series of incidents in the past 18 months has pointed out the service’s weaknesses, highlighting what some officials have described as some of the most debilitating cyber campaigns linked to Beijing. Cyberattacks affect all branches of the armed forces but contractors for the Navy and the Air Force are viewed as choice targets for hackers seeking advanced military technology, officials said.”

Source : Chinese Hackers Breach U.S. Navy Contractors – WSJ

“We propose an alternative generator architecture for generative adversarial networks, borrowing from style transfer literature. The new architecture leads to an automatically learned, unsupervised separation of high-level attributes (e.g., pose and identity when trained on human faces) and stochastic variation in the generated images (e.g., freckles, hair), and it enables intuitive, scale-specific control of the synthesis. The new generator improves the state-of-the-art in terms of traditional distribution quality metrics, leads to demonstrably better interpolation properties, and also better disentangles the latent factors of variation. To quantify interpolation quality and disentanglement, we propose two new, automated methods that are applicable to any generator architecture. Finally, we introduce a new, highly varied and high-quality dataset of human faces.”

via Tero Karras FI (YouTube)

“Deux établissements français, le lycée Ampère de Marseille et Les Eucalyptus à Nice, vont accueillir un dispositif expérimental de reconnaissance faciale pour l’accès à leur établissement. Annoncé officiellement en 2018, le projet sera mis en place début 2019. Beaucoup s’inquiètent des dérives sécuritaires, même dans le cadre limité de cette expérience.”

Source : Portique de reconnaissance faciale pour des élèves de PACA : comment cela va-t-il se passer ? – Politique – Numerama

Illustration by Taylor Callery

“Taylor Swift fans mesmerized by rehearsal clips on a kiosk at her May 18th Rose Bowl show were unaware of one crucial detail: A facial-recognition camera inside the display was taking their photos. The images were being transferred to a Nashville “command post,” where they were cross-referenced with a database of hundreds of the pop star’s known stalkers”

Source : The Future of Entertainment – Rolling Stone

« Older posts Newer posts »

© 2025 no-Flux

Theme by Anders NorenUp ↑