Search results for "internet"
showing 10 items of 2589 documents
Behind the scenes of artificial intelligence: a study of micro-work platforms in France
2019
Este artículo es una versión resumida del informe “Le Micro-travail en France. Derrière l’automatisation de nouvelles précarités au travail?» This article is a summarized version of the report "Le Micro-travail en France. Derrière l’automatisation de nouvelles précarités au travail?" .; International audience; Micro-work internet services allocate small, standardized tasks of data generation and annotation to crowds of providers. The outputs are mainly used to produce artificial intelligence solutions. It is an exemplary instance of the “platformization” of the economy, and of the transformations of labour that digital technologies bring about. To uncover the conditions under which micro-wo…
Studentu folklora Latvijas Universitātes Humanitāro zinātņu fakultātē
2015
Bakalaura darbs „Studentu folklora Latvijas Universitātes Humanitāro zinātņu fakultātē” veikts sociālo grupu pētniecības laukā. Pētījuma centrā – Latvijas Universitātes Humanitāro zinātņu fakultātes studentu vidū pastāvošā folklora un tradīcijas. Darba mērķis – ar anketēšanas metodi un padziļinātu studentu daiļrades izpēti sociālajos tīklos apzināt un salīdzinošā aspektā raksturot studentu folkloru Latvijas Universitātes Humanitāro zinātņu fakultātē, uzmanību vēršot uz dažādiem tās specifiku veidojošiem faktoriem, tradīcijām un studentu vidē funkcionējošajiem mutvārdu un rakstveida folkloras tekstiem. Darba pirmajā nodaļā studenti raksturoti socialo grupu pētniecības aspektā, uzmanību vēršo…
A pilot study of internet usage patterns in a group of italian university students.
2012
Attacking TrustZone on devices lacking memory protection
2021
AbstractARM TrustZone offers a Trusted Execution Environment (TEE) embedded into the processor cores. Some vendors offer ARM modules that do not fully comply with TrustZone specifications, which may lead to vulnerabilities in the system. In this paper, we present a DMA attack tutorial from the insecure world onto the secure world, and the design and implementation of this attack in a real insecure hardware.
Insecure Firmware and Wireless Technologies as “Achilles’ Heel” in Cybersecurity of Cyber-Physical Systems
2022
In this chapter, we analyze cybersecurity weaknesses in three use-cases of real-world cyber-physical systems: transportation (aviation), remote explosives and robotic weapons (fireworks pyrotechnics), and physical security (CCTV). The digitalization, interconnection, and IoT-nature of cyber-physical systems make them attractive targets. It is crucial to ensure that such systems are protected from cyber attacks, and therefore it is equally important to study and understand their major weaknesses. peerReviewed
IoT/Embedded vs. Security : Learn from the Past, Apply to the Present, Prepare for the Future
2018
It is expected there will be 50 billion IoT/embedded connected devices by 2020. At the same time, multiple recent studies revealed that IoT/embedded devices and their software/firmware is plagued with weaknesses and vulnerabilities. Moreover, various recent and prominent attacks, such as the Mirai botnet targeting Commercial Off-The-Shelf (COTS) IoT/embedded devices, and the ROCA attack targeting secure embedded hardware chips (in their many form-factors), clearly demonstrate the need to secure the many layers and components of the highly fragmented and heterogeneous ecosystem of IoT/embedded devices. In this paper we aim to explore, discuss and exemplify some research aspects and direction…
Tiny Machine Learning for Resource-Constrained Microcontrollers
2022
We use 250 billion microcontrollers daily in electronic devices that are capable of running machine learning models inside them. Unfortunately, most of these microcontrollers are highly constrained in terms of computational resources, such as memory usage or clock speed. These are exactly the same resources that play a key role in teaching and running a machine learning model with a basic computer. However, in a microcontroller environment, constrained resources make a critical difference. Therefore, a new paradigm known as tiny machine learning had to be created to meet the constrained requirements of the embedded devices. In this review, we discuss the resource optimization challenges of …
Redesign enterprise network by local Internet breakout : case study
2015
Nowadays, the popularity of cloud-based services around the web and SaaS applications are empowering customers to improve their business processes and increase user productivity while reducing the company’s IT operation costs. The local Internet breakout solution provides improved performance when accessing cloud-based applications along with a greater user experience. The reason behind this is not having data travel through the corporate WAN to access the Internet at a single point. This new network design solution not only improves user experience by lower latency when accessing the Internet, but also offloading the applications traffic from corporate WAN connections. The main theme of th…
Suomenkielisten IRC-keskustelujen piirteitä : kirjoittamalla välitettyä puhetta
1999
Teaching Knowledge Management by Combining Wikis and Screen Capture Videos
2011
PurposeThis paper aims to report on the design and creation of a knowledge management course aimed at facilitating student creation and use of social interactive learning tools for enhanced learning.Design/methodology/approachThe era of social media and web 2.0 has enabled a bottom‐up collaborative approach and new ways to publish work on the web, promoted by tools such as YouTube video service. In this spirit a knowledge management course was designed aiming to facilitate university students to compose videos on different difficult concepts in the theory part of the course by searching for explanations on the web and by creating a Windows Media Player video focusing on the self‐defined pro…