Catégorie : Non classé (Page 116 of 626)

Un trajet sportif réalisé à partir du siège de la DGSE, dans le XXe arrondissement de Paris.

“Les informations, qui pouvaient être récupérées très facilement sur le site de Polar, sont très sensibles. Obtenir l’identité, voire l’adresse de résidence, d’un officier d’une agence de renseignement ou d’un militaire déployé à l’étranger en zone sensible peut être le prélude à des mesures de rétorsion contre lui-même ou sa famille. Les informations recueillies peuvent être exploitées par un service étranger, voire compromettre sa mission si elle est remplie sous une identité d’emprunt. Elles peuvent aussi trahir l’identité de certaines sources. Les identités réelles des officiers de renseignement et de leurs sources sont des informations protégées par la loi. En France, révéler l’identité d’un officier d’un service de renseignement ou de sa source peut être puni de cinq ans de prison et de 75 000 euros d’amende”.

Source : Des centaines d’espions et de militaires identifiables à cause d’une application sportive

Figure 1

“A daguerreotype image, the first commercialized photographic process, is composed of silver-mercury, and often silver-mercury-gold amalgam particles on the surface of a silver-coated copper plate. Specular and diffuse reflectance of light from these image particles produces the range of gray tones that typify these 19th century images. By mapping the mercury distribution with rapid-scanning, synchrotron-based micro-X-ray fluorescence (μ-XRF) imaging, full portraits, which to the naked eye are obscured entirely by extensive corrosion, can be retrieved in a non-invasive, non-contact, and non-destructive manner. This work furthers the chemical understanding regarding the production of these images and suggests that mercury is retained in the image particles despite surface degradation. Most importantly, μ-XRF imaging provides curators with an image recovery method for degraded daguerreotypes, even if the artifact’s condition is beyond traditional conservation treatments”.

Source : Recovery of Degraded-Beyond-Recognition 19 th Century Daguerreotypes with Rapid High Dynamic Range Elemental X-ray Fluorescence Imaging of Mercury L Emission | Scientific Reports

“Research at Netflix is aimed at improving various aspects of our business. Research applications span many areas including our personalization algorithms, content valuation, and streaming optimization. To maximize the impact of our research, we do not centralize research into a separate organization. Instead, we have many teams that pursue research in collaboration with business teams, engineering teams, and other researchers.
This allows for close partnerships between researchers and the business or engineering teams in each area. In addition, research that applies to the same methodological area or business area is shared and highlighted in discussion and debate forums to strengthen the work and its impact. These forums also serve to identify and motivate future research directions”.

Source : Netflix Research

Security Checkup shows all third-party apps that have access to you data

“Transparency and control have always been core data privacy principles, and we’re constantly working to ensure these principles are reflected in our products.Before a non-Google app is able to access your data, we show a permissions screen that clearly shows the types of data the app can access and how it can use that data.We strongly encourage you to review the permissions screen before granting access to any non-Google application”.

Source : Ensuring your security and privacy within Gmail

Two women outdoors looking at a mobile device using facial recognition technology.

“Microsoft announced Tuesday that it has updated its facial recognition technology with significant improvements in the system’s ability to recognize gender across skin tones. That improvement addresses recent concerns that commercially available facial recognition technologies more accurately recognized gender of people with lighter skin tones than darker skin tones, and that they performed best on males with lighter skin and worst on females with darker skin.
With the new improvements, Microsoft said it was able to reduce the error rates for men and women with darker skin by up to 20 times. For all women, the company said the error rates were reduced by nine times. Overall, the company said that, with these improvements, they were able to significantly reduce accuracy differences across the demographics”.

Source : Microsoft improves facial recognition to perform well across all skin tones, genders

Twitter va exiger des nouveaux inscrits qu’ils fournissent une adresse e-mail ou un numéro de téléphone valide.

“Selon la plate-forme, qui a testé en amont le procédé, cela permettrait d’empêcher la création de plus de 50 000 comptes par jour. Si un compte déjà créé est suspecté par Twitter d’être un « bot » malveillant après sa création, la plate-forme pourra également demander à son propriétaire un numéro de téléphone ou une adresse e-mail. Tant qu’il n’aura pas fourni ces éléments, le compte sera en quelque sorte invisibilisé. S’il est abonné à un autre utilisateur, il ne sera pas pris en compte dans le nombre d’abonnés de ce dernier. S’il a retweeté l’un de ses messages, même chose : le retweet ne sera pas comptabilisé. Pour Twitter, cela permettrait d’empêcher que des « bots » se suivent entre eux, faisant ainsi gonfler de manière artificielle leur nombre d’abonnés pour « booster leur crédibilité »”.

Source : Twitter veut rendre la création de « bots » malveillants plus complexe

“In October of 1958, Physicist William Higinbotham created Pong, which is thought to be the world’s first video game. Since then, video games have become part of mainstream culture, and every so often a transcendent game comes out, like Pac-Man or World of Warcraft, that brings in billions in revenue. Released in July of 2017, Fortnite may be on track to become that kind of game.
Fortnite, a cooperative survival game, ​has gone viral on a global scale in 2018. The game itself is free to download, which makes it particularly appealing, but it makes its money through in-game purchases that players have the option to buy. In fact, an April report by analytics firm Sensor Tower found that Fortnite was making an average of $1 million every single day from player spending”.

Source : The Finances of Fortnite | LendEDU

“Capabilities developed in some of the world’s most advanced spy agencies are being traded around the world by hundreds of these types of companies mostly comprised of ex-spooks. Obviously it’s good for them because they get to make money, but around the world we’ve seen surveillance supposed to be used to stop crime instead being targeted against people such as activists and journalists.
This is hardly surprising—authoritarians are on the rise everywhere, surveillance laws are widely inadequate and rule of law itself is being challenged globally.”

Source : The $5 Million Surveillance Car That Hacks iPhones From 500 Meters

“Our team of five neural networks, OpenAI Five, has started to defeat amateur human teams at Dota 2. While today we play with restrictions, we aim to beat a team of top professionals at The International in August subject only to a limited set of heroes. We may not succeed: Dota 2 is one of the most popular and complex esports games in the world, with creative and motivated professionals who train year-round to earn part of Dota’s annual $40M prize pool.
OpenAI Five plays 180 years worth of games against itself every day, learning via self-play. It trains using a scaled-up version of Proximal Policy Optimization running on 256 GPUs and 128,000 CPU cores — a larger-scale version of the system we built to play the much-simpler solo variant of the game last year. Using a separate LSTM for each hero and no human data, it learns recognizable strategies. This indicates that reinforcement learning can yield long-term planning with large but achievable scale — without fundamental advances, contrary to our own expectations upon starting the project”.

Source : OpenAI Five

“In order to create Firefox Monitor, we have partnered with HaveIBeenPwned.com (HIBP). HIBP is a valuable service, operated by Troy Hunt, one of the most renowned and respected security experts and bloggers in the world. Troy is best known for the HIBP service, which includes a database of email addresses that are known to have been compromised in data breaches. Through our partnership, Firefox is able to check your email address against the HIBP database in a private-by-design way. You can find Troy’s blog post on the partnership here”.

Source : Testing Firefox Monitor, a New Security Tool – Future Releases

« Older posts Newer posts »

© 2026 no-Flux

Theme by Anders NorenUp ↑