Search results for "internet"

showing 10 items of 2589 documents

Behind the scenes of artificial intelligence: a study of micro-work platforms in France

2019

Este artículo es una versión resumida del informe “Le Micro-travail en France. Derrière l’automatisation de nouvelles précarités au travail?» This article is a summarized version of the report "Le Micro-travail en France. Derrière l’automatisation de nouvelles précarités au travail?" .; International audience; Micro-work internet services allocate small, standardized tasks of data generation and annotation to crowds of providers. The outputs are mainly used to produce artificial intelligence solutions. It is an exemplary instance of the “platformization” of the economy, and of the transformations of labour that digital technologies bring about. To uncover the conditions under which micro-wo…

standardized tasks of data generation and annotation to crowds of providers. The outputs are mainly used to produce artificial intelligence solutions. It is an exemplary instance of the ?platformization? of the economyinteligencia artificialwithout adequate protection and with only limited opportunities to voice issues or seek advice. Especially as the current boom of artificial intelligence raises demand for their servicesPaolawe use the data collected to present the socio-economic backgrounds of the people who engage in micro-workmicro-workClémentand the general public. This article is a summarized version of the report ?Le Micro-travail en France. Derrière l?automatisation de nouvelles précarités au travail?» trabajo digitaltrabajo digitaltheir motivations and needsUNESCO::SOCIOLOGÍAwhile the micro-working population is very diverseand its broader societal implicationsLe Ludecwe conducted an extensive empirical study in France. In this paperand of the transformations of labour that digital technologies bring about. To uncover the conditions under which micro-work is performedmicro-trabajoElinor Micro-work internet services allocate small[SHS.SOCIO]Humanities and Social Sciences/SociologyWahal1137-7038 8537 Arxius de sociologia 558787 2019 41 7605683 En la trastienda de la inteligencia artificial. Una investigación sobre las plataformas de micro-trabajo en francia Casillia significant portion (including working women with children and with higher education degrees) face pressing financial needs and rely on this activity to make ends meet. Micro-workers are also exposed to distinctive psycho-social risksTubaro:SOCIOLOGÍA [UNESCO]artificial intelligenceand their everyday practices. We show thatartificial intelligence 87 107unionseconomía de plataformasdigital labourtheir working conditions call for attention from policy-makersAntonio A.platform economy
researchProduct

Studentu folklora Latvijas Universitātes Humanitāro zinātņu fakultātē

2015

Bakalaura darbs „Studentu folklora Latvijas Universitātes Humanitāro zinātņu fakultātē” veikts sociālo grupu pētniecības laukā. Pētījuma centrā – Latvijas Universitātes Humanitāro zinātņu fakultātes studentu vidū pastāvošā folklora un tradīcijas. Darba mērķis – ar anketēšanas metodi un padziļinātu studentu daiļrades izpēti sociālajos tīklos apzināt un salīdzinošā aspektā raksturot studentu folkloru Latvijas Universitātes Humanitāro zinātņu fakultātē, uzmanību vēršot uz dažādiem tās specifiku veidojošiem faktoriem, tradīcijām un studentu vidē funkcionējošajiem mutvārdu un rakstveida folkloras tekstiem. Darba pirmajā nodaļā studenti raksturoti socialo grupu pētniecības aspektā, uzmanību vēršo…

studentiinternetssociāla grupaFiloloģijafolkloratradīcijas
researchProduct

A pilot study of internet usage patterns in a group of italian university students.

2012

students-internet- patternsSettore MED/42 - Igiene Generale E Applicata
researchProduct

Attacking TrustZone on devices lacking memory protection

2021

AbstractARM TrustZone offers a Trusted Execution Environment (TEE) embedded into the processor cores. Some vendors offer ARM modules that do not fully comply with TrustZone specifications, which may lead to vulnerabilities in the system. In this paper, we present a DMA attack tutorial from the insecure world onto the secure world, and the design and implementation of this attack in a real insecure hardware.

sulautettu tietotekniikkaComputational Theory and MathematicsHardware and ArchitectureComputer Science (miscellaneous)esineiden internetTrustZonesecuritytietoturvaverkkohyökkäyksetSoftwarehaavoittuvuus
researchProduct

Insecure Firmware and Wireless Technologies as “Achilles’ Heel” in Cybersecurity of Cyber-Physical Systems

2022

In this chapter, we analyze cybersecurity weaknesses in three use-cases of real-world cyber-physical systems: transportation (aviation), remote explosives and robotic weapons (fireworks pyrotechnics), and physical security (CCTV). The digitalization, interconnection, and IoT-nature of cyber-physical systems make them attractive targets. It is crucial to ensure that such systems are protected from cyber attacks, and therefore it is equally important to study and understand their major weaknesses. peerReviewed

sulautettu tietotekniikkacybersecurityprotocolsasejärjestelmätilmailucyber-physical systemsfirmwaretakaisinmallinnusvideo surveillanceesineiden internetCCTVkyberturvallisuushaavoittuvuusvulnerabilitieswireless pyrotechnicsremote firing systemsexploitsvalvontajärjestelmätreverse engineeringZigbeeprotokollatcritical infrastructureaviationRFinfrastruktuuritbinareADS-B
researchProduct

IoT/Embedded vs. Security : Learn from the Past, Apply to the Present, Prepare for the Future

2018

It is expected there will be 50 billion IoT/embedded connected devices by 2020. At the same time, multiple recent studies revealed that IoT/embedded devices and their software/firmware is plagued with weaknesses and vulnerabilities. Moreover, various recent and prominent attacks, such as the Mirai botnet targeting Commercial Off-The-Shelf (COTS) IoT/embedded devices, and the ROCA attack targeting secure embedded hardware chips (in their many form-factors), clearly demonstrate the need to secure the many layers and components of the highly fragmented and heterogeneous ecosystem of IoT/embedded devices. In this paper we aim to explore, discuss and exemplify some research aspects and direction…

sulautettu tietotekniikkaesineiden internetsecuritytietoturva
researchProduct

Tiny Machine Learning for Resource-Constrained Microcontrollers

2022

We use 250 billion microcontrollers daily in electronic devices that are capable of running machine learning models inside them. Unfortunately, most of these microcontrollers are highly constrained in terms of computational resources, such as memory usage or clock speed. These are exactly the same resources that play a key role in teaching and running a machine learning model with a basic computer. However, in a microcontroller environment, constrained resources make a critical difference. Therefore, a new paradigm known as tiny machine learning had to be created to meet the constrained requirements of the embedded devices. In this review, we discuss the resource optimization challenges of …

sulautettu tietotekniikkakoneoppiminenreunalaskentaesineiden internetresurssit
researchProduct

Redesign enterprise network by local Internet breakout : case study

2015

Nowadays, the popularity of cloud-based services around the web and SaaS applications are empowering customers to improve their business processes and increase user productivity while reducing the company’s IT operation costs. The local Internet breakout solution provides improved performance when accessing cloud-based applications along with a greater user experience. The reason behind this is not having data travel through the corporate WAN to access the Internet at a single point. This new network design solution not only improves user experience by lower latency when accessing the Internet, but also offloading the applications traffic from corporate WAN connections. The main theme of th…

suorituskykyWide Area NetworkNetwork performanceInternet breakouttietoliikenneverkotalueverkotyritykset
researchProduct

Suomenkielisten IRC-keskustelujen piirteitä : kirjoittamalla välitettyä puhetta

1999

sähköpostitkeskustelukielimuodotverkkokieliIRCverkkokeskustelutekstilajitsynkroninen keskusteluInternet Relay Chatpuhekieli
researchProduct

Teaching Knowledge Management by Combining Wikis and Screen Capture Videos

2011

PurposeThis paper aims to report on the design and creation of a knowledge management course aimed at facilitating student creation and use of social interactive learning tools for enhanced learning.Design/methodology/approachThe era of social media and web 2.0 has enabled a bottom‐up collaborative approach and new ways to publish work on the web, promoted by tools such as YouTube video service. In this spirit a knowledge management course was designed aiming to facilitate university students to compose videos on different difficult concepts in the theory part of the course by searching for explanations on the web and by creating a Windows Media Player video focusing on the self‐defined pro…

ta113Collaborative writingKnowledge managementMultimediaComputer Networks and Communicationsbusiness.industryComputer scienceWindows MediaLibrary and Information Sciencescomputer.software_genreInteractive LearningWorld Wide WebProblem-based learningConstructivism (philosophy of education)The InternetSocial mediabusinessSocial constructivismcomputer
researchProduct