Page 999«..1020..9989991,0001,001..1,0101,020..»

Generative AI is Pushing Human-Computer Interaction Closer to its … – MarketScale

Technological advancements in Generative AI (artificial intelligence) provide a significant opportunity to evolve human-computer interaction (HCI). Still, the path to get there is critical if theres to be success, not resistance.

WiMi Hologram Cloud is one company working on this evolution. Its Human-Computer Interaction (HCI) system that uses a hybrid vision model based on computer vision and mixed reality, enabling real-time, natural interaction between users and computers. This development mirrors the strides made by OpenAIs Chat GPT, an AI language model that is revolutionizing communication by providing personalized, human-like responses.

As these technologies evolve, they will transform various sectors, from gaming and education to customer support, making interactions more efficient and inclusive. However, as companies and industries embrace this transformative period in communication, the need for responsible AI usage becomes paramount, underscoring the importance of ethical considerations in developing and applying these advanced systems.

Tom Ongwere, Assistant Professor of Computer Science at The University of Dayton, doesnt see AI as a takeover for humans but as a powerful tool that can help transform the HCI dynamic.

When were talking about the future of AI in HCI, I look and think about human-centered generative AI and not human-like AI. AIs future in HCI is already here; were living it. But to better understand and respond to this question, I want to take us back to defining the goal of HCI.

Norman, in his work 1988, suggests that HCI should focus on developing functional systems that are usable, safe, and efficient for the end users. So, in other words, when were talking about efficiency, we need that users make a minimum effort to engage with these interfaces and have minimal errors in that process. AI is helping bring this goal to fruition.

So already, we see changes in how these interactive digital interfaces and technologies have been designed. We see the introduction of digital assistants or active actors in digital interfaces, to mention a few.

With that being said, I think that when were talking about the future of AI in HCI, I look and think about human-centered generative AI and not human-like AI. So, generative AI will help tackle a need to really understanding users behaviors, understanding their needs and preferences. And then, with that understanding, inform the design of interfaces and technologies and interactions that may engage human senses, such as vision, hearing, and touch, to bring about this enjoyable experience that every human would love when theyre using those technologies and when they are using any interactive digital interface that they may come by.

Article by James Kent

Read the original:

Generative AI is Pushing Human-Computer Interaction Closer to its ... - MarketScale

Read More..

Will a solar storm wreak havoc on the internet? – Yahoo News

The sun. NASA via Getty Images

You might have seen the rumors online, ironically enough.

Tales of an impending "internet apocalypse" have been circulating across social media in recent weeks, seemingly sparked by misleading reports of a NASA probe sent to allegedly prevent a wifi-devastating solar storm, as well as improper interpretations of an article published by the space agency itself. But the Parker Solar Probe was, in reality, launched to study the sun, not save our phones from it, and an internet apocalypse is at the moment no closer to devastating our online connections than Rihanna is to releasing another album. That said, some degree of celestial communication interference is a real possibility, and one that could technically arise as a result of a "strong solar storm hitting Earth" sometime in the future, per The Washington Post.

When solar material from the sun strikes the Earth's "magnetosphere," it has the potential to create so-called geomagnetic storms strong enough to cause blackouts and grid failures on the ground. In 1859, for example, an intense solar storm known as the Carrington Event sent global telegraph systems on the fritz, (literally) shocking operators who watched in awe as sparks allegedly flew out of their machines. Years later, in 1989, a similar solar disturbance caused a 12-hour electrical blackout in Quebec, Canada, prompting school and business closures.

Given the interconnected nature of our highly-digital world, a Carrington Event in 2023 "would have even more severe impacts," such as "widespread electrical disruptions, persistent blackouts and interruptions to global communications," NASA has said. The resulting "technological chaos could cripple economies and endanger the safety of livelihoods of people worldwide." According to estimates from internet watcher NetBlocks, one day of lost connectivity could cost the U.S. more than $11 billion.

"This is not taken into account in our infrastructure deployment today at all," computer science professor Sangeetha Abdu Jyothi, whose paper on how solar storms could affect the interwebs helped popularize the term "internet apocalypse," told the Post.

It is possible, yes. But experts say it's not very likely. For one thing, powerful solar storms like that of the Carrington Event are only expected once every 500 years.

Moreover, much of the recent attention on the matter arose as a result of an article NASA published in March, wherein the agency highlighted how it is using artificial intelligence to predict "dangerous space weather." The article does not mention the term "internet apocalypse," but it does mention both the Carrington Event and the Quebec blackouts, and notes the modern consequences if a similar phenomenon were to happen today. In employing AI, the space agency hopes it will be able to predict solar storms up to 30 minutes before they happen, giving power grid operators and telecommunication companies time to move their systems offline and prevent added damage.

According to Space.com(which is owned by Future plc, the same parent company as The Week), most of the online falsehoods regarding an impending "internet apocalypse" refer to this March article, as well as research from "earlier this year" suggesting the sun might reach its solar maximum or a peak in its 11-year activity cycle in 2024, a year earlier than expected. "While scientists do, in fact, expect major solar storms to occur after solar activity reaches its peak," wrote Space.com's Sharmila Kuthunur, "there is no evidence to support the viral rumors that the next major solar storm will cause the internet to go offline." Similar online panic appears tied to work done by NASA's Parker Solar Probe, which the Post said is intended to "research the physics of the sun" so as to better understand solar winds and storms "not to keep the WiFi from going out, as TikTok would have you think." Even Jyothi, the computer science professor, regrets using the phrase "internet apocalypse" in her paper, which she said "just got too much attention" and stirred up undue anxiety among the common folk. "Researchers have been talking for a long time about how this could affect the power grid," she told the Post, "but that doesn't scare people to the same extent for some reason."

Indeed, NASA has been warning of potential communications disruption resulting from solar storms and wind since at least 2009, said USA Today. So while yes, some degree of connectivity chaos is possible, the space agency has yet to officially declare doomsday imminent. What's more, "with this AI, it is now possible to make rapid and accurate global predictions and inform decisions in the event of a solar storm," per astronomer and physicist Vishal Upendran, "thereby minimizing or even preventing devastation to modern society."

Homepage

See the original post:

Will a solar storm wreak havoc on the internet? - Yahoo News

Read More..

Salesforce Executive Shares ‘Four Ways Coders Can Fight the … – Slashdot

Our research revealed that 75% of UX designers, software developers and IT operations managers want software to do less damage to the environment. Yet nearly one in two don't know how to take action. Half of these technologists admit to not knowing how to mitigate environmental harm in their work, leading to 34% acknowledging that they "rarely or never" consider carbon emissions while typing a new line of code... Earlier this year, Salesforce launched a sustainability guide for technology that provides practical recommendations for aligning climate goals with software development. In the article the Salesforce executive makes four recommendations, urging coders to design sites in ways that reduce the energy needed to display them. ("Even small changes to image size, color and type options can scale to large impacts.") They also recommend writing application code that uses less energy, which "can lead to significant emissions reductions, particularly when deployed at scale. Leaders can seek out apps that are coded to run natively in browsers which can lead to improvement in performance and a reduction in energy use."

Their article includes links to the energy-saving hackathon GreenHack and the non-profit Green Software Foundation. (Their site recently described how the IT company AVEVA used a Raspberry Pi in back of a hardware cluster as part of a system to measure software's energy consumption.)

But their first recommendation for fighting the climate crisis is "Adopt new technology like AI" to "make the software development cycle more energy efficient." ("At Salesforce, we're starting to see tremendous potential in using generative AI to optimize code and are excited to release this to customers in the future.")

View original post here:

Salesforce Executive Shares 'Four Ways Coders Can Fight the ... - Slashdot

Read More..

Decentralized Ethereum protocol Curve Finance exploited for more … – SiliconANGLE News

Curve Finance, a decentralized finance protocol on the Ethereum blockchain that is part of trading stablecoin cryptocurrency and other tokens, was exploited for more than $50 million on Sunday after vulnerabilities were found in a programming language used by its software.

Decentralized finance, or DeFi, allows for peer-to-peer transactions to be executed using blockchain technology without the need for middlemen such as banks with the use of self-executing software called smart contracts.

Curve Finance tweeted early Sunday that Vyper, a smart contract programming language, had a vulnerability in particular versions 0.2.15, 0.2.16 and 0.3.0 that would result in a malfunctioning reentrancy lock. The purpose of this lock is to prevent the same contract from being used multiple times to request funds.

The blockchain security firm PeckShield estimated, thus far, approximately $52 million in funds have been stolen from a number of different DeFi protocols including MetronomeDAO and Debridge Finance. Other analysis pinned their estimates even higher with numbers closer to $70 million.

According to the decentralized exchange Ellipsis, a small number of its stablepools, liquidity pools which store stablecoins for trading, had been using Vyper and been exploited. DeFi lending platform Alchemix lost approximately $13.6 million.

Decentralized finance security firm Dsecurity said that nonfungible token lending protocol JPGd lost about $11 million worth of cryptocurrency in the exploit.

There was an attack on the pETH-ETH curve pool, JPGd said on Twitter early Sunday. The vault contracts allowing to borrow against NFTs are safe and still running solidly. NFTs and the treasury funds are safe. Well keep everyone updated as soon as we know better what is happening.

Curve Finance is a decentralized exchange protocol that is optimized for stablecoin trading. Although it has been modified over time to cater to other cryptocurrencies it operates primarily as a way to assist with interchange between stablecoins and other currencies as a way to facilitate easy currency exchange, much in the way that people might when they fly to a different country and change their currency. Stablecoins are a useful form of exchange because they peg or maintain a one-to-one parity with another currency, such as the U.S. dollar so that one token is always $1.

As a result, stablecoins and Curve is widely used by numerous DeFi applications to allow users to exchange their native cryptocurrencies for stablecoins. An exploit of Curves liquidity pools could have a broad effect on the confidence in its current use.

More than $313 million in digital assets have been lost or stolen in crypto hacks and exploits in the second quarter of 2023, according to a report from blockchain security company CertiK. Compared with the second quarter of 2022, where hacks and exploits caused approximately $745 million in losses.

We are assessing the situation and will update the community as things develop, Curve said about the vulnerability. As to systems not using the exploitable Vyper versions Curve said, Other pools are safe.

Early this morning Curve reiterated that any DeFi application running on Vyper should immediately migrate to the most recent version, 0.3.7+. The team stressed that it has been refactored and audited, but noted that this is not a guarantee. However, it is better than being on contracts that are known to be vulnerable.

TheCUBEis an important partner to the industry. You guys really are a part of our events and we really appreciate you coming and I know people appreciate thecontent you create as well Andy Jassy

THANK YOU

Follow this link:

Decentralized Ethereum protocol Curve Finance exploited for more ... - SiliconANGLE News

Read More..

NFL Champion Justin Reid preps students for STEM careers at three … – Kansas City Pitch

Monday, July 10, kicked off the first day of a three week long computer science camp hosted by Chiefs football safety, Justin Reid.

In partnership with the University of Missouri-Kansas City, Tackling Tech Computer Science Camps goals include helping attendeesbuild problem-solving skills, forming mentorships, and having fun among peers while gaining familiarity with coding and various programs. These are all a part of Reids initiatives centered aroundtechnology, nutrition, and athletics.Here, students from grades 9-12 learn how to design mobile apps, create portfolio pieces, and more.

One of many programs being taught by instructors at the camp,Figma, is helping spearhead the programs app-building project. Thecollaborative web application for interface design gives users a platform to brainstorm designs and them translate them into a digital reality.

I am so excited about this camp, because its something I always wanted to do. I didnt have anything like this I could attend growing up. My first introduction to coding was when I attended Stanford, so I am excited to introduce these young kids to the computer science world. It doesnt matter what your career path is, technology will always set you apart, says Reid.

While students are on campus, tours are available as well as access to counselors. This gives the potential future college students the opportunity to discuss scholarships, degrees, and their careers.

The camp runs until July 28.

Originally posted here:

NFL Champion Justin Reid preps students for STEM careers at three ... - Kansas City Pitch

Read More..

AI on AI action: Googler uses GPT-4 chatbot to defeat image classifier’s guardian – The Register

Analysis A Google scientist has demonstrated that OpenAI's GPT-4 large language model (LLM), despite its widely cited capacity to err, can help smash at least some safeguards put around other machine learning models a capability that demonstrates the value of chatbots as research assistants.

In a paper titled, "A LLM Assisted Exploitation of AI-Guardian," Nicholas Carlini, a research scientist for Google's Deep Mind, explores how AI-Guardian, a defense against adversarial attacks on models, can be undone by directing the GPT-4 chatbot to devise an attack method and to author text explaining how the attack works.

Carlini's paper includes Python code suggested by GPT-4 for defeating AI-Guardian's efforts to block adversarial attacks. Specifically, GPT-4 emits scripts (and explanations) for tweaking images to fool a classifier for example, making it think a photo of someone holding a gun is a photo of someone holding a harmless apple without triggering AI-Guardian's suspicions. AI-Guardian is designed to detect when images have likely been manipulated to trick a classifier, and GPT-4 was tasked with evading that detection.

"Our attacks reduce the robustness of AI-Guardian from a claimed 98 percent to just 8 percent, under the threat model studied by the original [AI-Guardian] paper," wrote Carlini. "The authors of AI-Guardian acknowledge our break succeeds at fooling their defense."

AI-Guardian was developed by Hong Zhu, Shengzhi Zhang, and Kai Chen, and presented at the 2023 IEEE Symposium on Security and Privacy. It's unrelated to a similarly named system announced in 2021 by Intermedia Cloud Communications.

Machine learning models like those used for image recognition applications have long been known to be vulnerable to adversarial examples input that causes the model to misidentify the depicted object (Register passim).

The addition of extra graphic elements to a stop sign, for instance, is an adversarial example that can confuse self-driving cars. Adversarial examples also work against text-oriented models by tricking them into saying things they've been programmed not to say.

AI-Guardian attempts to prevent such scenarios by building a backdoor in a given machine learning model to identify and block adversarial input images with suspicious blemishes and other artifacts that you wouldn't expect to see in a normal picture.

Bypassing this protection involved trying to identify the mask used by AI-Guardian to spot adversarial examples by showing the model multiple images that differ only by a single pixel. This brute force technique described by Carlini and GPT-4 ultimately allows the backdoor trigger function to be identified so adversarial examples can then be constructed to avoid it.

"The idea of AI-Guardian is quite simple, using an injected backdoor to defeat adversarial attacks; the former suppresses the latter based on our findings," said Shengzhi Zhang, assistant professor of computer science at Boston University Metropolitan College, in an email to The Register.

"To demonstrate the idea, in our paper, we chose to implement a prototype using a patch-based backdoor trigger, which is simply a specific pattern attached to the inputs. Such a type of trigger is intuitive, and we believe it is sufficient to demonstrate the idea of AI-Guardian.

"[Carlini's] approach starts by recovering the mask of the patch-based trigger, which definitely is possible and smart since the 'key' space of the mask is limited, thus suffering from a simple brute force attack. That is where the approach begins to break our provided prototype in the paper."

Zhang said he and his co-authors worked with Carlini, providing him with their defense model and source code. And later, they helped verify the attack results and discussed possible defenses in the interest of helping the security community.

Zhang said Carlini's contention that the attack breaks AI-Guardian is true for the prototype system described in their paper, but that comes with several caveats and may not work in improved versions.

One potential issue is that Carlini's approach requires access to the confidence vector from the defense model in order to recover the mask data.

"In the real world, however, such confidence vector information is not always available, especially when the model deployers already considered using some defense like AI-Guardian," said Zhang. "They typically will just provide the output itself and not expose the confidence vector information to customers due to security concerns."

In other words, without this information, the attack might fail. And Zhang said he and his colleagues devised another prototype that relied on a more complex triggering mechanism that isn't vulnerable to Carlini's brute force approach.

Anyway, here's how GPT-4 described the proposed attack on AI-Guardian when prompted by Carlini to produce the explanatory text:

There's a lot more AI-produced text in the paper but the point is that GPT-4, in response to a fairly detailed prompt by Carlini, produced a quick, coherent description of the problem and the solution that did not require excessive human cleanup.

Carlini said he chose to attack AI-Guardian because the scheme outlined in the original paper was obviously insecure. His work, however, is intended more as a demonstration of the value of working with an LLM coding assistant than as an example of a novel attack technique.

Carlini, citing numerous past experiences defeating defenses against adversarial examples, said it would certainly have been faster to manually craft an attack algorithm to break AI-Guardian.

"However the fact that it is even possible to perform an attack like this by only communicating with a machine learning model over natural language is simultaneously surprising, exciting, and worrying," he said.

Carlini's assessment of the merits of GPT-4 as a co-author and collaborator echoes with the addition of with cautious enthusiasm the sentiment of actor Michael Biehn when warning actor Linda Hamilton about a persistent cyborg in a movie called The Terminator (1984): "The Terminator is out there. It can't be bargained with. It can't be reasoned with. It doesn't feel pity or remorse or fear. And it absolutely will not stop, ever, until you are dead."

Here's Carlini, writing in black text to indicate that he rather than GPT-4 penned these words the chatbot's quoted output is in dark blue in the paper:

"GPT-4 has read many published research papers, and already knows what every common attack algorithm does and how it works. Human authors need to be told what papers to read, need to take time to understand the papers, and only then can build experiments using these ideas.

"GPT-4 is much faster at writing code than humans once the prompt has been specified. Each of the prompts took under a minute to generate the corresponding code.

GPT-4 does not get distracted, does not get tired ... and is always available to perform

"GPT-4 does not get distracted, does not get tired, does not have other duties, and is always available to perform the users specified task."

Relying on GPT-4 does not completely relieve human collaborators of their responsibilities, however. As Carlini observes, the AI model still required someone with domain experience to present the right prompts and to fix bugs in the generated code. Its knowledge is fixed with its training data and it does not learn. It recognizes only common patterns, in contrast to human ability to make connections across topics. It doesn't ask for help and it makes the same errors repeatedly.

Despite the obvious limitations, Carlini says he looks forward to the possibilities as large language models improve.

"Just as the calculator altered the role of mathematicians significantly simplifying the task of performing mechanical calculations and giving time for tasks better suited to human thought todays language models (and those in the near future) similarly simplify the task of solving coding tasks, allowing computer scientists to spend more of their time developing interesting research questions," Carlini said.

Zhang said Carlini's work is really interesting, particularly in light of the way he used an LLM for assistance.

"We have seen LLMs used in a wide array of tasks, but this is the first time to see it assist ML security research in this way, almost totally taking over the implementation work," he said. "Meanwhile, we can also see that GPT-4 is not that 'intelligent' yet to break a security defense by itself.

"Right now, it serves as assistance, following human guidance to implement the ideas of humans. It is also reported that GPT-4 has been used to summarize and help understand research papers. So it is possible that we will see a research project in the near future, tuning GPT-4 or other kinds of LLMs to understand a security defense, identify vulnerabilities, and implement a proof-of-concept exploit, all by itself in an automated fashion.

"From a defenders point of view, however, we would like it to integrate the last step, fixing the vulnerability, and testing the fix as well, so we can just relax."

Here is the original post:

AI on AI action: Googler uses GPT-4 chatbot to defeat image classifier's guardian - The Register

Read More..

Smart Contract Supremacy: A Riveting Exploration of Polkadot … – Analytics Insight

Is DogeMiyagi the new titan of the smart contract revolution?

Ethereum, Polkadot, and DogeMiyagi. Each of these platforms brings unique capabilities to the table, revolutionizing the way we perceive and interact with digital finance. Ethereum, the pioneer of smart contracts, has opened up a world of possibilities, enabling a vast ecosystem of decentralized applications. Polkadot, with its unique approach to interoperability, is bridging the gap between multiple blockchains, enhancing efficiency and security.

Meanwhile, DogeMiyagi (MIYAGI), an Ethereum-based cryptocurrency, is blending entertainment, nostalgia, and financial opportunity, creating a vibrant, growing community. As we delve deeper into the capabilities of these platforms, we uncover the transformative power of smart contracts and their potential to revolutionize various industries. Read what top analysts say about Ethereum price prediction.

Ethereum, the trailblazer in the blockchain world, has been instrumental in introducing the concept of smart contracts. These self-executing contracts, with the terms of the agreement directly written into code, are stored on the Ethereum blockchain. They follow a logical if this, then that structure and behave exactly as programmed, eliminating the possibility of manipulation or change.

Ethereums smart contract capabilities have enabled the creation of a vast ecosystem of decentralized applications (dApps) and protocols. The potential impact of these smart contracts extends to various industries, including finance, where they can enhance transaction accountability, accuracy, and cost savings.

Polkadot, a multi-chain platform, is making its mark with its unique approach to smart contracts. Unlike Ethereum, Polkadots Relay Chain does not natively support smart contracts. However, its parachains, which are individual blockchains connected to Polkadot, are equipped with smart contract functionality.

Polkadots smart contracts can regulate a blockchain or a dApp, automating processes like real estate transactions, thereby enhancing efficiency, transparency, and security. The platforms ability to allow all connected chains to interoperate using Cross-Chain Message Passing (XCMP) further amplifies its potential impact across various industries.

DogeMiyagi, an Ethereum-based cryptocurrency, is not just another token in the crypto space. Its a community-centric project that offers a unique blend of entertainment, nostalgia, and financial opportunity. Inspired by the iconic Karate Kid series, DogeMiyagi brings a sense of familiarity and fun to the often complex world of digital finance.

For investors, this means being part of a vibrant, growing community that values participation and rewards engagement. The tokens referral program and potential for passive income make it an attractive proposition for those looking to diversify their crypto portfolio.

In terms of smart contract capabilities, DogeMiyagi leverages the power of Ethereums established infrastructure. This allows it to offer a secure and transparent environment for transactions, lending, and yield farming.

The potential impact of these features extends beyond finance, potentially revolutionizing industries like real estate, supply chain management, and healthcare by automating processes and improving transparency. As DogeMiyagi continues to evolve, its influence on various industries could be significant, demonstrating the transformative power of smart contracts in the blockchain ecosystem.

Investing in DogeMiyagis presale offers a unique opportunity to be part of a vibrant, community-centric project at its nascent stage. As an investor, youll not only gain early access to a promising token but also contribute to the growth of an ecosystem that blends entertainment, nostalgia, and financial opportunity.

The presale also allows you to leverage DogeMiyagis referral program and potential for passive income, enhancing your return on investment. With its smart contract capabilities built on Ethereums robust infrastructure, DogeMiyagi is poised to make a significant impact in the blockchain ecosystem, making the presale an opportunity worth considering.

The advent of smart contracts has revolutionized the blockchain landscape, and platforms like Ethereum, Polkadot, and DogeMiyagi are at the forefront of this revolution.

By facilitating diverse applications and impacting various industries, these platforms are not only enhancing the efficiency and security of transactions but are also opening up new avenues for innovation and growth in the blockchain ecosystem. As we continue to explore the potential of these platforms, one thing is clear the future of blockchain technology is bright, and smart contracts are leading the way.

Website: https://dogemiyagi.com

Twitter: https://twitter.com/_Dogemiyagi_

Telegram: https://t.me/dogemiyagi

More here:

Smart Contract Supremacy: A Riveting Exploration of Polkadot ... - Analytics Insight

Read More..

KU project to help women transition from incarceration with training … – EurekAlert

LAWRENCE For women who are incarcerated and lack access to the internet and other technologies, it can be difficult to navigate an increasingly online world when transitioning back to society. An interdisciplinary team at the University of Kansas has been awarded a grant from the National Science Foundation to expand their employment-related technology education program for women leaving incarceration and Train-the-Trainer program for peer mentors and library practitioners.

The three-year, $1.6 million grant will support Developing Sustainable Ecosystems that will Support Women Transitioning from Incarceration into Technology Careers. KUs Center for Digital Inclusion is leading the project training women leaving incarceration in Kansas and Missouri in digital skills for entry-level positions in the technology sector as well as general employment. The funding also allows the project team to offer workshops for digital navigators, or peer mentors, who have successfully taken part in previous iterations of the program to guide other women now making the switch. Researchers will also partner with public libraries, employment agencies, and jails and prisons in the two states to make the programs sustainable for the future.

We will be able to expand and improve our existing evidence-based technology education program to include a greater number of women, as well as professional organizations, public libraries and workforce centers, said Hyunjin Seo, Oscar Stauffer Professor of Journalism & Mass Communications and principal investigator for the project. These days, if you are not able to use digital technology, you are not able to utilize many services in society, whether cultural, social, civic or others. Women transitioning from incarceration face significant challenges in this area.

Research has shown that employment is a significant factor in reducing rates of recidivism. The project will help women transitioning from incarceration gain employment through a holistic approach. Participants will learn how to navigate online job applications, secure housing and develop job skills. The digital skills trainings will range from introductory to advanced levels and provide participants with skills from competence with office technologies to building websites, online security, coding and other technology career-specific skills. The education content and topics are determined by the project teams empirical research with women transitioning from incarceration as well as co-design sessions with the women and community partners. The project team includes professors, research staff, graduate students, undergraduate students and digital navigators.

The online security portion of this project builds onSeos participation in an interdisciplinary cybersecurity research team that receivedKUs Research Rising grant, as well as her past collaborations with Fengjun Li, KU associate professor of computer science and co-principal investigator.

Jodi Whitt, a digital navigator in the Center for Digital Inclusion, said her experience learning new skills when leaving incarceration inspired her to help women in a similar situation.

Helping other women in the program has given me a purpose in life that I never dreamed would be possible. I want to be an example to other women, that it is possible to learn new skills. I know how important it is to have someone who understands and believes in me. Having that connection and building those relationships is crucial to help empower and build confidence, Whitt said. From experience, I also know learning new skills can help reduce recidivism. There is not a lot of opportunities for job training or employment for formerly incarcerated women. This program helps them gain experience and develop confidence for better opportunities in the workforce.

Dozens of digital navigators, librarians and employment navigators will receive training on mentorship and teaching as well as advanced technology topics. The project team will begin its work with program participants shortly before they leave jail or prison. Another new feature is an ecosystem approach that is designed to build and strengthen capacity of local communities in supporting individuals with justice involvement. Tanesha Whitelaw, one of the programs digital navigators, said it is all too common to lose technical skills during incarceration.

This training is important to this population because you can easily adapt to an environment which doesnt offer any technical skills or employment skills and youre left behind when you are coming back into society, she said. Being able to communicate in todays society requires technical skills. The systemic mechanism of communicating is gravitating toward technology, so this will be imperative for to day-to-day functions.

During the grants three-year life cycle, the program aims to support up to 600 women leaving or recently released from jails or prisons in Kansas and Missouri. During that time, researchers will also conduct extensive research and evaluation of the program. They will conduct interviews and surveys before, during and after trainings to gauge their skill levels, how they have improved, employment rates among participants as well as recidivism rates.

Data will be combined with information gathered from focus groups with public libraries where trainings take place and with other partners to determine which aspects of the program are most effective and what is needed to enable community organizations to continue the trainings after the grant project.

The project, led by the Center for Digital Inclusion in the William Allen White School of Journalism & Mass Communications, willbuild on previous effortstohelp women transition from incarcerationby gaining new skills.KUs Institute for Policy & Social Research manages the grant.

Partners and members of the research team also include:

Disclaimer: AAAS and EurekAlert! are not responsible for the accuracy of news releases posted to EurekAlert! by contributing institutions or for the use of any information through the EurekAlert system.

Continue reading here:

KU project to help women transition from incarceration with training ... - EurekAlert

Read More..

The Rise of Quantum Computing: A Leap Towards Unprecedented … – Medium

In the realm of computer science, revolutionary technology has been steadily gaining momentum and capturing the imagination of scientists, researchers, and technology enthusiasts alike: Quantum Computing. Unlike traditional computers that process information in bits (either 0 or 1), quantum computers leverage the principles of quantum mechanics to operate with quantum bits, or qubits, which can exist in multiple states simultaneously. This unique property enables quantum computers to tackle complex problems that would take classical computers an impractical amount of time to solve. As quantum computing continues to advance, it promises to usher in an era of unprecedented technological advancements, transforming industries and reshaping the way we approach computing and problem-solving.

Quantum Mechanics in a Nutshell:

Before we delve into the fascinating world of quantum computing, lets briefly recap the principles of quantum mechanics. Quantum mechanics is a branch of physics that describes the behavior of particles at the atomic and subatomic levels. It introduces concepts such as superposition, entanglement, and uncertainty, which challenge our classical understanding of the world.

In classical computing, bits can represent either 0 or 1. In contrast, qubits can exist in a superposition of states, representing both 0 and 1 simultaneously until measured. This allows quantum computers to perform multiple calculations at once, drastically increasing processing power.

When qubits become entangled, their states become interdependent. Changing the state of one qubit instantly affects the state of its entangled partner, regardless of the distance between them. Entanglement plays a crucial role in quantum computing, enabling faster and more efficient communication between qubits.

In quantum mechanics, there is an inherent uncertainty at the quantum level. When measured, a qubits state collapses to either 0 or 1, with the outcome being probabilistic. This randomness has both practical and philosophical implications, leading to debates about the nature of reality itself.

Quantum Computing Applications:

While quantum computing is still in its infancy, its potential applications are mind-boggling. One of the most prominent applications lies in cryptography. Quantum computers can efficiently factor large numbers, threatening to break traditional cryptographic methods like RSA, which rely on the difficulty of factoring large semiprime numbers. To address this challenge, researchers are developing quantum-resistant cryptographic algorithms that can withstand attacks from quantum computers.

Moreover, quantum computing shows great promise in drug discovery, materials science, and optimization problems. Pharmaceutical companies can utilize quantum computers to simulate molecular interactions more accurately, expediting the process of drug development. Materials scientists can optimize new materials with properties far beyond what classical simulations can achieve. Additionally, quantum computing can significantly enhance logistical and scheduling optimization for industries like transportation, finance, and supply chain management.

Challenges and the Quantum Race:

Despite its potential, quantum computing faces significant challenges. Quantum systems are notoriously fragile, requiring advanced error correction techniques to maintain the integrity of computations. Furthermore, cooling the quantum hardware to near absolute zero is essential to minimize noise and maintain qubit stability.

The quantum race is fierce, with companies, research institutions, and governments vying for quantum supremacy the point at which a quantum computer outperforms the worlds most powerful classical supercomputers. Industry giants like IBM, Google, and Microsoft are investing heavily in quantum research and development. Meanwhile, startups and quantum-focused companies are entering the field, contributing to the vibrant ecosystem of quantum technologies.

Quantum computing has the potential to revolutionize computing as we know it, pushing the boundaries of human knowledge and opening up new avenues for innovation. While we are still in the early stages of this quantum revolution, the progress made so far is nothing short of awe-inspiring. As scientists and researchers continue to unlock the secrets of quantum mechanics and improve the stability and scalability of quantum computers, we can look forward to a future where complex problems are solved in a fraction of the time, transforming our lives in unimaginable ways. The era of quantum computing has arrived, and its set to be a thrilling journey toward the next frontier of technological advancement.

Read more:

The Rise of Quantum Computing: A Leap Towards Unprecedented ... - Medium

Read More..

An integrated approach to training data scientists – Stanford Report – Stanford University News

Every day, data scientists are analyzing vast amounts of information about the world, using computational methods to find new ways to understand a problem or phenomenon, and deciding what to do about it.

But its not enough to use data on its own it must be understood within its social and political context as well, according to Stanford political scientist Jeremy Weinstein. This year, Weinstein, along with Stanford statisticians Guenther Walther and Chiara Sabatti, has launched two new degrees: a Bachelor of Science in Data Science and a Bachelor of Arts in Data Science & Social Systems.

Jeremy Weinstein is the faculty director of the BA in Data Science and Social Systems and a professor of political science. Mallory Nobles, right, is the programs associate director. (Image credit: Andrew Brodhead)

Theres basically no new technological frontier that doesnt depend on or engage in some important way with human behavior or a political or social institution, explained Weinstein, a professor of political science in the School of Humanities and Sciences who serves as faculty director of the BA program in Data Science & Social Systems. For example, when staffing the tech industry of the future, you want people who can effortlessly move between the technical team, the policy team, and the trust and safety team. The Data Science and Social Systems program is designed to prepare professionals who can work at those intersections.

This past spring, over 90 students took the new gateway course for the major, DATASCI 154: Solving Social Problems with Data. Throughout the course, which Weinstein co-taught with Mallory Nobles, the programs associate director, students developed skills in quantitative analysis, modeling, and coding, but also honed their ability to frame problems, choose appropriate designs, and interpret data as it relates to its social and political environment.

The course brought two mindsets together: a social science approach, rooted in an understanding of causal inference, and an engineering approach, based in learning algorithmic design and optimization.

As Weinstein and Nobles emphasized to their students, these perspectives are interconnected.

When you ask and answer causal questions about a social problem, youre deepening your understanding of the underlying causes, which can give you clues about how you might go about solving it, and when you design an algorithmic solution, you then want to understand its effect when deployed in the world, which brings you back to causal inference, said Weinstein, who is also the faculty director of Stanford Impact Labs.

Students explored the value of these different approaches through modules designed with scholars from different fields at Stanford.

For example, Jennifer Pan in the Communication Department introduced students to the role of data science and causal inference techniques in studying the impact of social media on polarization and the spread of disinformation. Marshall Burke from the Department of Earth System Science engaged students in thinking through how machine learning approaches can help measure a changing climate, while social scientific methods are critical for understanding the impact of mitigation and adaptation policies. Ramesh Johari from the Department of Management Science and Engineering, along with David Scheinker from the School of Medicine, exposed students to the challenge of delivering equitable access to healthcare and how algorithmic approaches can improve delivery of patient care through the lens of their work on diabetes at Stanford Medicine.

Students learned how they too can be at ease shifting their perspective between engineering and social sciences. Class assignments emphasized statistics, computer science, and math in tandem with topics in the social and behavioral sciences, like psychology, sociology, economics, and political science. Their final project was to write a research proposal to tackle a social problem of their choosing.

As Josh Orszag learned, getting the data is the easy part. Data cant get you very far unless you have a meaningful research question.

Josh Orszag is a Data Science and Social Systems major who took Solving Social Problems with Data this past spring. (Image credit: Andrew Brodhead)

If you dont have the right research question, youre not going to get anywhere, said Orszag, a Data Science and Social Systems major interested in issues related to democracy and governance. The challenge is figuring out what problem or predicament you want your data to answer.

Orszag teamed up with Ava Kerkorian, a prospective Data Science and Social Systems major, to think about how to build trust in the election process.

Throughout their research design process, Kerkorian said she and Orszag went back and forth with each other as they figured out how such a complex issue could be tackled in a way that was specific, scalable, and also actionable.

So many times during this project, we had to take a pause and ask ourselves, how do we measure trust? What would success look like? What is confidence? Are we even sure this is something we want? Kerkorian said.

What they ended up proposing was studying whether a nudge a concept from behavioral economics that sways behavior through small suggestions or positive reinforcement explaining how redistricting works from an Independent Redistricting Commission could influence peoples attitudes about the fairness of an election.

The course made Serena Lee, also a data science and social systems major, think critically about what it means to be a responsible data scientist.

Serena Lee, who took Solving Social Problems with Data, presented her final project at a poster presentation at the end of the quarter.

This class taught me that the work starts with how to collect data because that has a lot of value-laden decisions, from whom to involve in the dataset to what questions to ask, what wording to use, and how far in the past to look at the data, Lee said. For her final project with Annie Zhu, they wanted to explore the influence of video-based misinformation in comparison to text-based misinformation. Specifically, they proposed studying different ways platforms could flag potentially harmful posts.

Eva Gorenburg, who also took the class this quarter, said learning the ins and outs of research design has changed how she now sees data.

I think its really easy to take numbers as objective fact, but what we learned is even in studies that seem super quantitative and objective, there are tons of choices in the study design that impact results, Gorenburg said.

Students also learned that what they choose to measure and not measure and how they use their data all have social consequences.

If you just rely on observational study, observation or opinion, therere so many essential experiences that youre leaving out, said Emily Winn, an environmental systems engineering major. Solving social problems with data allows us to see things on a much broader scale than previously before.

Winn and Gorenburg worked together for their final project, which was a proposal to study the social impacts of arsenic poisoning on women in Rural Bangladesh, where little data on its effects exists. Specifically, they wanted to know whether arsenicosis would lower a womans likelihood of marriage, which is essential for the economic and social security of women living in the region.

Understanding social problems is not the same as solving them.

Social problems exist for complex reasons, said Weinstein. Solving problems involves significant stakeholder consultation and understanding what the pathway is from a new insight or a new tool to actual change in the world.

Esha Thapa was one of over 90 students who took Solving Social Problems with Data this past spring. (Image credit: Andrew Brodhead)

For Esha Thapa, a Data Science and Social Systems major, the class marks the beginning of an interesting journey examining these dynamics in greater depth.

Its definitely not a process that ends with the quarter ending, said Thapa. Its something that we need to take with us for the rest of our careers and this is a great gateway course in that respect.

Following Solving Social Problems with Data, students in the major will continue to take a range of core classes in data science, ethics, and social sciences. In their senior year, students will take a capstone practicum where they will apply computational and statistical methods to address a social issue in a real-life setting.

Data Science majors can pursue one of two tracks: either a Bachelor of Science being overseen by Walther and Sabatti, or a Bachelor of Arts, which Weinstein and Nobles direct.

More:

An integrated approach to training data scientists - Stanford Report - Stanford University News

Read More..