Artwork stating 'Education Destroys Barriers', 'We Demand Treatment', and 'I Need A Chance'

Search Results

You searched for: -

There are 22 results  for your search.  View and Refine Your Search Terms

  • This new data poisoning tool lets artists fight back against generative AI

    Nightshade is a new tool designed to fight against AI companies that use artists’ work to train their models without permission. Nightshade “poisons” the training data to essentially confuse the AI model and prevent it from copying an artist’s work. The purpose of Nightshade is to return the power to artists to protect their intellectual property and prevent large AI companies like Google and Meta from taking advantage of them.

    Read More

  • Cyber students help protect civic institutions vulnerable to hackers

    The Public Infrastructure Security Cyber Education System, or PISCES, pairs cybersecurity students from Metropolitan State University of Denver with civic institutions in need of cybersecurity help, such as fire departments, county governments, and school districts. So far, the program has provided services to 10 organizations while also allowing students to get real-world experience in their field.

    Read More

  • A Campus Community Is Empowering Students With Sustainable Blockchain Skills

    Blockchain UNN is a student organization and campus tech community that focuses on educating the next generation of blockchain leaders. Through both physical and online training and tutoring, the group teaches students valuable tech skills like web development, crypto trading and financial market analysis for free. Since forming in 2021, the organization has trained more than 3,000 students, helping them to secure good jobs in the tech sector.

    Read More

  • Election Tech Could End Voting Malpractices In Nigeria, But Not Yet

    In an attempt to address fraud and malpractice, Nigeria introduced the Bimodal Voter Accreditation System and the INEC Result Viewing Portal, which verify voters' identities using voter numbers, fingerprints, and facial recognition, and publicly shares election results in real-time. The technologies were successfully implemented in 76 percent of voting locations in one state in 2022, but voters and local officials say there are still issues with disenfranchisement and technical glitches.

    Read More

  • Teachers in Denmark are using apps to audit their students' moods

    The web-app Woof helps teachers keep an eye on the mental health and well-being of students by frequently surveying students on how they’re feeling to generate a “mood landscape,” which is intended to provide a comprehensive image of child welfare in a classroom over time. Teachers can then review the reports and provide interventions as needed. Woof launched in the fall of 2022 and has been implemented in more than 600 schools across the country.

    Read More

  • Yes, data centers use a lot of water. But a Utah company shows it doesn't have to be that way.

    Novva’s data center in West Jordan, Utah, uses recirculating pipes with refrigerant to cool its servers. This method uses significantly less water than the typical method, evaporative cooling.

    Read More

  • This teen tutor turns computer science into kids' stuff

    CS Remastered is a nonprofit that provides free individualized coding classes to students. The kind of one-on-one tutoring they might not get at school. The nonprofit was started by 17-year-old, Samvit Agarwal, who got the idea after he started tutoring kids from his neighborhood. “The entire idea is to make it as flexible or as adaptable to each student as possible,” Samvit says. Since its launch, the nonprofit has expanded to include 250 volunteers who service 300 students. “CS Remastered has opened four chapters in the U.S., one in India, and one in China.”

    Read More

  • Inside Democrats' efforts to fight election security threats

    The Democratic National Committee (DNC) built up its digital defenses, successfully protecting the 2018 midterm election from the cyber-hacking that occurred in 2016. The DNC now trains staff to spot cyber threats, conducts simulated phishing campaigns to test employees’ vigilance, and security staffers regularly meet with their House and Senate campaign counterparts to offer their security expertise. The DNC also requires protections, such as two-factor authentication, which requires a temporary code in addition to a user’s password and conducts regular “spot checks” of Democrats’ cybersecurity practices.

    Read More

  • Washington state's not new to voting by mail. Here's how we work to keep it safe

    Since Washington made voting by mail mandatory in 2011, nonpartisan election officials have refined ballot-security procedures to achieve a smoothly run system in which suspected cheating or interference represents a tiny fraction of the millions of votes cast in each election. Those procedures include signature verification, ballot-box integrity, securely blocking Internet access to vote tabulations and voter registration, and other safeguards against electronic or in-person tampering with votes or registrations.

    Read More

  • Towson University professor aims to bolster local election security at voting sites

    More than 1,930 Maryland poll workers were trained to protect ballot integrity from security threats based on research about where those threats may come from. The program, one of the few in the country focused on election security at polling places themselves, was developed by a researcher inspired by reports of Russian interference with the 2016 election. The research showed Maryland's greatest vulnerabilities were electronic poll data and voter registration, the network connection between election officials and local election boards, and access to ballot scanners at voting sites.

    Read More