«Ich will meiner Tochter zeigen, warum die allgegenwärtigen Models mit der Realität nichts zu tun haben», sagt eine Mutter. In knapp 40 Sekunden zeigt dieses Video, wie ein normaler Frauenkörper mit Photoshop in ein unrealistisches, nicht existierendes Schönheits-Vorbild verwandelt wird. *Source: Infosperber
ANN ARBOR — Funneling a steady stream of diversions straight to your pocket, smartphones are often cast as the ultimate distractors. But a University of Michigan engineering professor sees potential for them to be something quite the opposite.
What if they could act as mentors in mindfulness, helping users stay attentive in order to achieve particular goals? (more…)
Mit der holländischen Suchmaschine Ixquick kann man bei Google anonym suchen. Ein Tipp des Datenschützers Thür.
Der Schweizer Datenschutz-Beauftragte Hanspeter Thür empfiehlt die niederländische Meta-Suchmaschine Ixquick. Sie liefert Suchresultate von Google unter absoluter Wahrung der Privatsphäre – ohne Google Ihre IP-Adresse und Identität zu verraten. (more…)
In creating an entirely new way to compress data, a team of researchers from the UCLA Henry Samueli School of Engineering and Applied Science has drawn inspiration from physics and the arts. The result is a new data compression method that outperforms existing techniques, such as JPEG for images, and that could eventually be adopted for medical, scientific and video streaming applications.
In data communication, scientific research and medicine, an increasing number of today’s applications require the capture and analysis of massive amounts of data in real time. (more…)
Most parents will by now wonder how they can protect their children and direct them to child-safe websites. Fortunately a non-profit site, Quib.ly offers a forum where concerned parents, teachers and care-givers can seek out the advice of experts in the field of cyber technology as well as child development psychology. If you visit this site you may well find that your particular concern is shared by others. Experts in their respective fields will be able to steer you in the direction of child-safe websites and you will have the opportunity to share knowledge gained by parents in your position. (more…)
UD Consumer Analytics and Industry Applications conference discusses big data
In the era of big data come big questions about how to use it. These questions and more were the backdrop of the recent Consumer Analytics and Industry Applications conference, put on by the University of Delaware’s Institute for Financial Services Analytics (IFSA).
Patented cryptography invention enables unlimited analysis of encrypted data
ARMONK, N.Y. – 23 Dec 2013: IBM inventors have received a patent for a breakthrough data encryption technique that is expected to further data privacy and strengthen cloud computing security.
The patented breakthrough, called “fully homomorphic encryption,” could enable deep and unrestricted analysis of encrypted information —intentionally scrambled data — without surrendering confidentiality. IBM’s solution has the potential to advance cloud computing privacy and security by enabling vendors to perform computations on client data, such as analyzing sales patterns, without exposing or revealing the original data. (more…)
Average smartphone users are willing to pay up to $5 extra for a typical application—or “app”—that won’t monitor their locations, contact lists and other personal information, a study conducted by two economists at the University of Colorado Boulder has found.
The researchers believe theirs is the first economic study to gauge the monetary value smartphone users place on privacy. That value is measured in consumers’ “willingness to pay” for five different kinds of digital anonymity. (more…)