Articles - QESP
By Georgia Institute of Technology
- Thursday, November 30th, 2017
Until now, assessing the extent and impact of network or computer system attacks has been largely a time-consuming manual process. A new software system being developed by cybersecurity researchers will largely automate that process, allowing investigators to quickly and accurately pinpoint how intruders entered the network, what data they took and which computer systems were compromised.
By University of Illinois College of Engineering
- Wednesday, November 29th, 2017
Designing apps for maximum utility is mostly a hit or miss process, according to researchers. There are only limited guides to what works and what doesn’t. Scientists would like to change that, and they believe it is possible with the recent release of Rico, a huge database of mobile app designs.
By Ted Smillie
- Monday, November 27th, 2017
Our August 2017 issue had a reprint of a 17/08/2017 article in The Mandarin by NSW Department of Education, titled AI, automation & 21st century skills needs: what do they mean for education? That article concluded “There is little doubt that for today’s kindergarten students to succeed in tomorrow’s more complex world they will need […]
Tags: 21st century skills, Communication skills, Digital age, Digital disruption, Digital literacy, Employability, Employment, Stem, STEM jobs
By David Donaldson
- Monday, November 13th, 2017
Australia is vulnerable to emerging methods of interference by foreign states such as economic blackmail and the type of cyber attacks Russia has used against other countries, warns a new paper published by the Committee for the Economic Development of Australia.
While asylum seekers coming by boat, terrorism and a naval attack by China are the three most commonly named security problems named by members of the Australian public, they “are not the main security threats to national wellbeing that Australia and its regional partners now face,” writes Professor Greg Austin in a chapter on cyber security.
Tags: Cyber Crime, IT Security, Security
By Purdue University
- Monday, October 23rd, 2017
Researchers have demonstrated how to decode what the human brain is seeing by using artificial intelligence to interpret fMRI scans from people watching videos, representing a sort of mind-reading technology.
By University College London
- Thursday, October 19th, 2017
Slow internet speeds and the Internet ‘rush hour’ — the peak time when data speeds drop by up to 30 percent — could be history with new hardware that provides consistently high-speed broadband connectivity.
By David Glance, Director of UWA Centre for Software Practice, University of Western Australia
- Tuesday, October 17th, 2017
A security researcher has revealed serious flaws in the way that most contemporary Wi-Fi networks are secured.
Tags: IT Security, WIFI
Discovered by Mathy Vanhoef from the University of Leuven, the vulnerability affects the protocol “Wi-Fi Protected Access 2”. Otherwise known as WPA2, this encrypts the connection between a computer or mobile phone and a Wi-Fi access point to keep your browsing safe.
By Jason Pallant, Lecturer of Marketing, Swinburne University of Technology
- Monday, October 16th, 2017
Marketers are using your data to make predictions about what you’ll want, when. Shutterstock
You may have heard that algorithms will take over the world. But how are they operating right now? We take a look in our series on Algorithms at Work.
Have you ever you looked for a product online and then been recommended the exact thing you need to complement it? Or have you been thinking about a particular purchase, only to receive an email with that product on sale?
Tags: Algorithms at Work, Ecommerce, Marketing
By Ted Smillie
- Monday, September 25th, 2017
British economist John Maynard Keynes predicted in an essay, Economic Possibilities for our Grandchildren (1930), that by 2030 our grandchildren would be working a 15 hour week, due to the power of compound interest and to technological advances. Keynsian economics gradually gained acceptance during the 1930s, then revolutionized global government economic policy in the aftermath […]
Tags: 15 hour week, ABC Fact check, Australia Institute Centre for Future Work, Australian Bureau of Statistics, Australian Hospitals and Healthcare Association, Brexit, CHOICE, Consumers Health Forum of Australia, Global Financial Crisis (GFC), John Maynard Keynes, Keynsian economics, Monetarism, National Rural Health Alliance., neoliberalism, Productivity Commission, Public Health Association of Australia, Trump
By American Associates, Ben-Gurion University of the Negev
- Tuesday, September 19th, 2017
Researchers have demonstrated that security cameras infected with malware can receive covert signals and leak sensitive information from the very same surveillance devices used to protect facilities.