Skip to main content

Posts

The Review of Paper "Computer vision in Security" Author: Fothul Karim Forhan The paper is the overview on a technology that helps us recognize different patterns and proceed it in a specific format. The focus is set on security field where CV helps to prevent attacks and massive resource looses. The introduction covers a bit of history as well as points to goals of the research. The main part is divided into: Types of CV technologies applied in security matters, security matters that require CV and other safety matters. For me the most fascinating part is CV in financial field. In the given example cv could identify fraudsters by emotional state, the way a fraudster behaves. After the thief is identified, the alarm is enabled automatically and the transaction is terminated. This is a direct example of how cv saves a companies' money. The only thing that missing is lack of illustrations. It'd be great to see face-recognition algorithms visualization. Overall
Recent posts
Rule Utilitarianism. Big data The Utilitarianism theory defines what is write and what is wrong by assessing outcomes. No matter what bad consequences take place, the most ethical choice is always the one that has the greatest good. Big data falls under this theory just fine. While it's hard to give any precise guidelines, the example can be considered in the abstract. On the one hand it brings us economy boost by providing more specific information, on another hand it affects on the privacy of consumers. Examples of The Good Big data cuts business costs Help government to track citizens and prevent unwanted events Using big data improves company's pricing policy Allow competition with bigger companies Suggests to user more interest-related content  Examples of The Bad Ruins people's privacy Add an advantage to those who have been shown as a more trustable person by doing nothing personal online Uses tons of computational resources and not necessarily
Refreshable braille display In the era of technologies everyone should be provided with access to computer. One of the most challenging innovation is providing access to blind people by transmitting information from the screen to an adaptive device. Braille display is a peripheral device that allows blind or visually impaired people to interact with a computer. A braille monitor uses the braille system that blind people use to read. Raised dots spell out text that the user traces a finger over to read In 1995 Handy Tech Braille display in combination with a screen reader makes Microsoft Windows accessible for blind users. Later in 2005 Easy Braille, a super compact Braille display as well as Sophie, the reading system with a natural sounding voice, and Sophie Pro an extended Version of the Sophie, were introduced. Software The content of a page is taken from the OS, after it proceeds to be converted into braille characters and sends it to the display. Most of displays are co
Linux Mint vs. MX-Linux Mint Linux Mint - Linux distribution based on Ubuntu. It gives full out-of-the-box multimedia support in pair with proprietary software. Origin 1.0 beta version came out in 2006. Linux Mint has been following the same release cycle as Ubuntu since 2008. Starting with Linux Mint 6 'Felicia', each version was based on a corresponded Ubuntu release, built directly from it. On 20th of February, 2016, the Linux Mint web page was hacked, and download links for a version of Linux Mint were replaced with a modified version that contained malware. MX MX-Linux - OS based on Debian. This distro is a cooperative project between the antiX and former MEPIS communities. MX-linux has additional software that comes from MX community. Origin November 2, 2016 - first public beta release of MX-16. December 20, 2018 - MX-18 with a new kernel, enabled whole disk encryption. Comparison Both OS are going head to head in most of ranking lists and it's h
The Hacker Culture In The Modern World The community of computer specialists has been changing the world since the creation of first computational device. The way development goes depends not only on technical skills of hackers, their ideals and views also take essential part of progress. There were several generations of hackers and each of them promoted different ideas. The hacker ethic of early days focused specifically on their interests and there were no such needs as communicative skills. The main ideology was "all information should be free" and I strongly disagree with this statement. Non-profit everything stops the progress and leaves no motivation to support "boring" software. In 90's next generation of the culture has started acknowledging a demand for well-supported communication in hackers groups. It led to more healthy relationships and lifestyle within the culture. Eric S. Raymond put attention to necessity of skills which set development as
Internet Censorship and Privacy. What is going on? Privacy policy has been changing since the mass usage of internet became a part of our life. Nobody wants their private information to be leaked. The size of internet community and "internet is a forever archive" terrifies people and make them concern. Facebook–Cambridge Analytica data scandal. This data gathering was a major scandal in early 2018 where Cambridge Analytica harvested the personal data of millions of people's Facebook profiles without their consent and used it for political advertising. It has been described as a watershed moment in the public understanding of personal data and precipitated a 17% fall in Facebook's share price and calls for tighter regulation of tech companies' use of personal data Data scientist, Aleksandr Kogan developed an app called "This Is Your Digital Life". He provided the app to Cambridge Analytica, and they arranged an informed consent process for rese