Thứ Ba, 27 tháng 3, 2018

Auto news on Youtube Mar 27 2018

Hello everyone, welcome to another video from my channel!

I'm Thiago Marques, Lara's father, Mirella's Husband and amateur artist

Today's drawing was made over the outline made by my brother Samuel Marques

As usual, the links are in the description Everything you see here has been done.

with using a first-generation Pro iPad 12.9" an apple pencil and the procreate version app

4.0.8.

I'm not sponsored, but the links are in the description.

Okay, now before we can go any further, give that thumbs up, subscribe to give me a solid

and let's get this going.

Well guys, that's it for today.

Did you Like it?

Then give me the thumbs up and leave a comment for me to know.

For more videos, do not forget to subscribe, like and share the channel.

Got any questions or have compliments and suggestions to improve the channel?

So leave a comment down below and I'm going to be more than happy to read and to answer the best

way possible, of course.

And if you're looking for me on the internet, the links are also in the description.

Thanks again and see you next week!

For more infomation >> MANGA ELF - DIGITAL ART WITH PROCREATE #19 - Duration: 2:18.

-------------------------------------------

Edición Digital Houston - Duration: 34:14.

For more infomation >> Edición Digital Houston - Duration: 34:14.

-------------------------------------------

News 8 Digital Update - Duration: 1:09.

For more infomation >> News 8 Digital Update - Duration: 1:09.

-------------------------------------------

Lester Holt Tribute NBC News - Radio Television Digital News Association - Duration: 3:49.

>> We first met Lester in 1979, in San Francisco. The News Director came in and

told us that he had this young kid he was hiring from Sacramento. Next day,

Lester Holt walks in the room, is a twenty-year-old kid and by the end of

that first day he convinced us all that he'd be a great reporter.

>> From Kennedy Airport Lester Holt, Channel 2 News.

>> I first started working with Lester back

in the late 1980s early 1990s at WBBM. He was unflappable in breaking news situations.

He was tireless, would work any shift that you want him to any time.

We sent him to El Salvador, Haiti, Somalia. Even back then the same qualities that

the network saw in him years later we saw at the local level.

>> Lester was the Anchor on Dayside MSNBC, whenever there was breaking news. He was the

reliable solid news presence on MSNBC.

>> And welcome to our ongoing coverage of

the unforgettable Decision 2000, I'm Lester Holt.

>> In the year 2000, that was the year

with the Gore/Bush recount. It went on forever, the election never ended and it

was Lester who was our lead person anchoring all of that breaking news of

that landmark election.

>> This is our big debut weekend, we're now the official Weekend Today Anchors.

>> He became a part of the Today Show family when he started to host the

weekend show. We watched him on the air and you knew right off the bat that this

was a guy who was going to make a mark.

>> I'd always been a big fan. I watched him

for years and I just really respected him a lot as a journalist. The minute I

set foot in Studio 1A, Lester made me feel so comfortable and immediately made

me feel like I was a part of that team.

>> The worst thing about Lester is the best

thing about Lester. He always says yes. He does his morning program on the weekends,

he does Dateline which is mixture of mysteries and investigative stuff, and he

does straight hard breaking news on the newscast.

>> We joke a lot that Lester is

the hardest working man in news. Truth be told it's not a joke. He wears so many

different hats but he wears them all well and I think that's just a sign of

his many strengths.

>> If I had to describe Lester as a journalist it would be

genuine. A big story happens and he wants to go. He wants to experience what's going on.

>> This crowd is realizing that one day what they are experiencing now, is in fact a taste of freedom.

>> He's an excellent journalist. He likes to be there and tell the story firsthand.

Boots on the ground, that's how he works and I really admire that.

>> I remember arriving in Haiti on the tarmac and it was tumultuous to say the least.

And there was Lester anchoring the network's coverage.

>> With as many as 200,000 people fear dead. The United Nations today, call this disaster historic.

>> In the middle of this chaos, he is just flawless.

>> Lester is truly passionate about the men and women that serve overseas.

He has spent a lot of time in Afghanistan.

>> Their 100% Americans.

>> Wherever there is a great story to be told,

he wants to be the person telling it.

>> It's been a pleasure, a lot of fun watching Lester's career over the years.

He's obviously is a pro in every endeavor.

>> If you want to talk about Lester Holt, the first thing have to say

is he is a journalist, and you almost put a period right there.

>> He doesn't wait for someone to bring him the story. He goes there so

he can bring it to you. That's a journalist in my book.

>> His breadth of work is phenomenal, he can do anything.

>> Lester it's my understanding that this award each year goes to someone who has

distinguished himself or herself in this field and so my only comment to the people

giving you this award is. What took you so long? You should have gotten it long ago.

For more infomation >> Lester Holt Tribute NBC News - Radio Television Digital News Association - Duration: 3:49.

-------------------------------------------

[Digital Live Studio]ออดิชั่น รุ่นที่ 2 27/3/2018 Group 1 - Duration: 49:02.

For more infomation >> [Digital Live Studio]ออดิชั่น รุ่นที่ 2 27/3/2018 Group 1 - Duration: 49:02.

-------------------------------------------

'Surrealism Tattoos' The Art of Ink (Season 2) Digital Exclusive | Paramount Network - Duration: 6:07.

(upbeat music)

- [David] I just let my subconscious speak for me.

Try to lead your viewer into an adventure

by creating an image that may take a second to see,

but a lifetime to understand.

- [John] The strange and absurd stuff,

it's just an appreciation for things

that are out of the norm.

- [Joey] A lot of it comes from a dream-like state,

where you are creating things

that are just coming from inside of you.

- [Jesse] The whole purpose of art is

to make you feel something, how the universe works,

why we're all here, what we're all made of,

kinda breaking away and showing the subconscious within.

- I started gravitating towards realism in high school,

seeing works by Dolly and M. C. Escher,

taking the realistic elements and putting them

in situations where maybe they wouldn't normally exist.

So, I bought a tattoo kit, started tattooing friends

in the basement and it kinda grew from there.

- I mean my background was carpentry and construction

and doing whatever I had to do in order to

help my habit of wanting to make art.

I just like making weird things

that look like they're out of dreams.

- I was about 19, and I was in graphic design college.

I just decided to learn about surrealism tattooing.

It's the non-conformity of it,

it's the fact that I can incorporate elements

that are not part of our reality that we can perceive.

It's really a way of making people look at an object

in a second way,

making people see their realities differently.

- Well, I just like surrealist tattoos,

you know, they're very playful.

You can get way more loose

and you can add different aspects to it,

just to see if people would get it.

- The word surrealism itself is like something that people

talk about today when they can't really describe something.

Like, "That was a moment that was surreal."

What is surrealism?

It's just the idea of mixing together odd components,

things that are gonna make a dream-like reality.

- Surrealism started post-World War I.

It was a movement to kind of link

the subconscious with the conscious world.

So trying to use writings and imagery to represent that.

- People were like, "We should just try new things.

"Try to blend things that are not supposed to be together.

"Let's take an apple,

"and make it levitate in front of a man."

which became this very famous painting,

The Son of Man from Magritte.

It's just taking things

and bringing them to another perspective.

Dali would take a clock, and why would it be melting?

Have you ever seen a melting clock?

But the reason why he came up with it,

was probably 'cause he was not thinking too much,

he was just going with the flow.

Letting the ideas just flow down

and probably just paint with the brush

and come up with things on the spot.

- The kind of symbols that are usually

associated with surrealism, it would be:

hands, faces,

screaming faces,

bricks, brick patterns,

televisions,

these are things that you can kind of put a twist on.

Everyone wants a girl head for a tattoo.

They make great tattoos,

but to make it surrealist,

maybe I use two girl heads inside of itself.

(upbeat music)

- With the tattoos I'm creating,

I'm trying to represent that mindset when you enter,

you know, into like a REM sleep, or that dream-like state.

Those walls start to break down

and your subconscious comes to the forefront.

- I definitely hope that people relate to my tattoos,

'cause I'm creating these out of my imagination.

What they mean, I don't really know,

but usually there's someone

somewhere that can say, "Oh, I love that image!"

and then, there's a communication there,

so now you're communicating through images.

- We don't really think when we create.

It's just this part of the brain that creates right away.

I just let my subconscious speak for me,

like, "What would happen if gravity changes right now?

"What would I be doing?

"What if I put it into art,

"maybe it'll be a way of people taking

"a different perspective on classic object."

(upbeat music)

- I think that color use in surrealist tattooing

is important because with colors,

you can evoke different feelings in people,

but with the colors, that's when you don't necessarily

get a psychedelic look, would you get more of a dreamy look,

would you get more of these different realms of thought

that people go into, because color always evokes thought.

- Instead of just putting colors everywhere,

I wanna have like small, little contained areas,

where there's a lot of really bright color,

almost in like a rainbow spectrum

and then I'll kind of frame it out with heavy black.

- What I want to bring with my colors is sort of a feeling,

so I would use a lot of purples and teals together.

Purple is spooky, teal is more like of a calm color,

so what if I blend the two of them,

it gives sort of a feeling to the viewer,

and then you add a lot of black to it.

The display of those two colors tells a story.

I tattoo some people and they start crying after the tattoo

because they've rarely seen those colors work together.

(upbeat music)

- Think that surrealist tattoos are gonna continue

to evolve and go places and be popular

because people's acceptance of what a tattoo is,

is becoming way more broad.

You know, people wanna see different things and as artists

are creating more tattoo flash that look different,

more people want to try that out and get that tattoo.

- [Jesse] Think the reaction I'm hoping for

when people look at my tattoos is the initial wow factor,

and then maybe have some memories

of being somewhere that brings them to that place.

- In terms of my own art,

I just kind of want it to keep evolving.

I want the style to keep solidifying,

and that's what gets me up every morning.

Like, "I have five ideas that have to get done right now."

- Surrealism tattooing is such a new thing,

people tend to bash on it a lot, people tend to say,

"Okay, it's not the proper way of doing things

"because you guys should put outlines everywhere,

"you guys should put this and do this and that."

and we've been told what to do our all lives,

and we just don't want to be part of a movement,

we want to be the movement.

We wanna be our own selves and just be able to create

something without really having to be told what to do.

(upbeat music)

For more infomation >> 'Surrealism Tattoos' The Art of Ink (Season 2) Digital Exclusive | Paramount Network - Duration: 6:07.

-------------------------------------------

Khudgarz drama last Episode 24 promo | ARY Digital | - Duration: 2:14.

Friends you are watching Pakistani drama today. Please subscribe us and don't forget to turn on the notification bell

Khudgarz is an interesting family drama. Selfishness of a father and his son has been shown in this drama that how they humiliated relationships just for achieving their desires.

In the last episode we shall be watching that Ayera doesn't have any relationship with Munawar after the death of Junaid she intends to move from there, but Hassan does not let her go.

He asks his father to let Ayera and her baby here. Munawar says that she can live here only at one condition that you marry with her.

Ayera does not accept this decision but she has to accept it after convincing of Abeer.

Hassan assures her that I'll try keep you happy always and compensate my previous slipups.

This is how they start new journey of life.

Did you like the ending? Share your opinion in the comments.

and please don't forget to subscribe us.

For more infomation >> Khudgarz drama last Episode 24 promo | ARY Digital | - Duration: 2:14.

-------------------------------------------

Chris Philp - Westminister Hall - Getting digital companies to pay a fair amount of tax - Duration: 9:15.

Chris Philp Well thank you Dame Cheryl for that very carefully considered

selection I'm glad I was the least worst alternative. [INAUDIBLE] I'm sorry that more

attractive alternative didn't present itself but it is of course an enormous

pleasure to serve under your chairmanship and I would like to add my

congratulations to the Honourable Member for Harborough for securing this debate

well Dame Cheryl I must confess. I'm not sure I ought to confess this in public but I will, I must confess when

this document corporate tax and the digital economy position paper update

arrived in my inbox in March of this year this month I quivered with

excitement because this is such an important topic and I'm delighted to

see the government and in particular the financial secretary to the Treasury who

I gather has been upgraded to be the paymaster general as well to both

there we are, he's a man of many talents I was delighted to see the financial secretary

taking the initiative in this very important area it is worth saying that

significant progress has been made in the last eight years some colleagues

have mentioned that already the tax gap of course in this country at just 6% has

gone down from the 8% it was in 2010 and it's the lowest amongst OECD countries

so that's a very good thing and the amount of corporation tax we've

collected has gone up from around about 35 billion to around about 55 billion in

the last eight years despite the fact the rate at which the tax is levied as

my honourable friend the member for Northeast Hampshire has mentioned has in

fact gone down so that is all extremely welcome and the government is to be

warmly commended for that progress however I think it is also true and this

is a view that commands widespread support that a number of companies

typically large multinational companies often providing digital services like

Google and Facebook have succeeded in organising their affairs fully in

conformity with the current international tax laws such that they

are managing to argue that the substance of their economic activity takes place

in very low tax jurisdictions often in the Caribbean which they have selected I

suspect not for their clement climate and that strikes me as fundamentally

unfair and unreasonable now the government has already taken a lead in

this area via the base erosion and profit shifting initiative, things

like limiting the deductibility of interest expense to 30% of Ebitda

is something that the UK government LED on and is to be strongly congratulated

for but I think there is scope to go significantly further it just doesn't

seem right or fair that a company like Google that has revenues in relation to

UK customers in the order of 4 billion pounds pays virtually no tax by

successfully arguing that the substance of their economic activity lies

elsewhere and that is why I was so excited Dame Cheryl by this

position paper update published a few weeks ago. Now the approach laid out in

that excellent position paper which by the way I fully support, to take a

multilateral approach trying to define or redefine on an international basis

economic activity to account for the value created by users I think is

exactly the right thing to do and I hope we're successful in doing that but of

course as with any multilateral enterprise it is going to take a certain

amount of time I expect to get agreement with many other countries particularly

when some of these companies we're talking about will use their influence

to try and slow things down and stymie progress so while the multilateral

approach to changing the way we define economic activity it's certainly the

right thing to do I think it's also important we have a plan B that can be

implemented much more quickly and this paper does that admirably it talks about

attacks on sales and as honorable members have said already that is

something the European Union are looking at I fully support that

and the sort of threshold we talked about to exclude small and even

medium-sized companies is the right thing to do the number I heard mentioned

3% of sales seems like a reasonable number I would

simply make one point and this is more for the 27 European countries rather

than for us I would take care to make sure that the European Union doesn't use

this as a pretext for retaining those those tax receipts itself and to sort of

develop for the first time a European Union Treasury function that is not

something which I think will concern us but it may concern the other 27 members

now if the European Union don't move quickly enough in this area if they

don't implement the sales tax in a timely fashion by timely I would hope

the next sort of 12 to 24 months I would advocate the UK taking unilateral action

in this area now my Right Honourable friend the member for Northeast Hampshire

raised a cautionary point about not making the UK uncompetitive but of

course this wouldn't be a tax based on where a company is domiciled it would be

a tax based on where its sales occur and where its users are so it wouldn't be

any disincentive to locating in the United Kingdom in terms of permanent

establishment or in terms of locus of incorporation so I think a sales tax or

indeed a user tax which I'll come on to wouldn't violate the principle of

competitiveness which the Honourable Member for North East Hampshire quite

rightly referred to we are generally speaking the second largest market in

the world for these companies behind the United States of America and we're

significantly larger than Germany because our economy tends to be

rather more intensively digital so I don't think if you were to unilaturally

take action in this area I don't think you'd find Google or

Facebook would suddenly say we refuse to do business in the United Kingdom

because if they did they would be pulling out of their second largest

global market now in relation to unilateral action while we're

members of the European Union and I would suspect also during the transition

period that is to say up to December 2020 I would suspect unilateral action

on a sales tax would fall foul of European

laws it would probably get classed as VAT or sufficiently similar to VAT

that it would fall foul of those regulations so if we do have to consider

unilateral action which I would advocate and support prior to our exit from

European Union or prior to the end of the transition period something other

than a sales tax would have to be considered and I think one area that we

might consider which would not fall foul of European Union regulation around

sales taxes and VATs would be a tax based on users you might

for example set a user based tax a certain pound amount per active user

again only apply to the very largest companies perhaps with the UK turnover

in excess of 100 million pounds and that would be a way of making sure they did

make some reasonable contribution before we managed to come up with a

multilateral solution either at the global level or a sales tax at the

European level that would I think be a be a good move it wouldn't undermine our

competitiveness and it would ensure these companies are seen to make a fair

contribution and I think the proceeds generated from such a tax could be

usefully applied in the area of business rates which a number of colleagues have

referred to I'm sure small businesses in our

constituencies have all raised the issue of business rates with us

of course these digital companies like Google or Facebook even Amazon because

they operate from very large warehouses in sort of remote locations that don't

have a very high rateable value all of these companies pay very little in by

way of business rates we know they pay very little by way of corporation tax

they do of course pay payroll taxes they pay their full full share of payroll

taxes but they don't pay much more of corporation tax or business rates and it

is rather inherently unfair and that our local high street businesses do pay

their full share of business rates and corporation taxes so some of the money

raised via this digital tax in whatever form it takes could be applied to offer

business rate relief excuse me particularly to smaller

businesses perhaps below twenty eight thousand pounds per year of ratable

value well Dame Cheryl I've laid out one or two ideas I'd be interested

to hear the Financial Secretary's response to those but really I want to

put on record my extremely strong and enthusiastic support for the course that

the financial secretary has laid out here and it's a great pleasure to come

here and support it this afternoon

For more infomation >> Chris Philp - Westminister Hall - Getting digital companies to pay a fair amount of tax - Duration: 9:15.

-------------------------------------------

Morning Star - Extra Large - Infrared + Convection Countertop Digital Toaster Oven, Stainless Steel - Duration: 0:45.

Morning Star - Extra Large - Infrared (No Preheat Needed) + Convection Countertop Digital Toaster Oven, Stainless Steel, XL 21"x13"x13.5" exterior, 12-slice

Coverage for product breakdowns and malfunctions. Free shipping on all repairs with no deductibles or hidden fees. Fully transferable with gifts. Cancel anytime, full refund in the first 30 days.

If you purchase this service plan and eligible product for this service plan, you acknowledge that Amazon may send the service plan seller relevant product and price information for the purpose of administering the plan.

For more infomation >> Morning Star - Extra Large - Infrared + Convection Countertop Digital Toaster Oven, Stainless Steel - Duration: 0:45.

-------------------------------------------

Bhaskar Chakravorti on Digital Trust - Duration: 33:40.

To give you a sense of how we as digital citizens of this planet are evolving

from a physical path to a digital future. And how are those evolution pathways

different when you go from an India to a China to an Indonesia to an Estonia to a

Canada. And what do those patterns say about where the future lies and

what are some of the issues that we should be excited about and what are

some of the issues we could be worried about. So, what we did was we created a

digital evolution index and the idea was to take this very complicated reality

that we are all a part of and reduce it to something really simple and create an

index. An index is literally a score it's a crude way of creating an

apples-to-apples comparison across a whole bunch of you know countries and

markets. So, we picked 60 countries and we created an index to rank these countries

and the weight, this you know sausage making machine, work was we took an

enormous amount of data about a 170 different variables and we

organize them into supply side indicators, demand side indicators

institutional indicators and innovation indicators. And you know kind of pulled

it together and this is for 60 countries and managed to get a score for every

country and you know after a lot of analytical gymnastics a graph appears

now I know that this graph is very difficult to read so I let me unpack it

for you by just giving you the broad patterns of what is here. So what is on

this graph are those 60 countries mapped according to two dimensions. The vertical

dimension the, north-south dimension, is how the country fared on the digital

evolution score. So the further the further to the north you are the more

digitally evolved the country is. The further to the south, the less digital evolved.

And then there is a horizontal, left-to-right dimension, the further to

the right you are, the more momentum you have, so,

one is the state of digital evolution, the other is the rate of digital

evolution. The rate basically kind of cells how quickly you're moving and the

reason why both these measures are important is say for instance if I'm

trying to compare India with Sweden, it doesn't make any sense.

Why would I compare India with Sweden. Sweden isn't a very different you know

socioeconomic phase than India is. But perhaps a different way to look at India

is how quickly is India moving, relative to Sweden, and that gives me a different

read of what is happening in terms of the digital activity. And so this is how

this map is organized and we can mark out four major clusters of where

countries lie. So there is a cluster called the standout cluster, these are

countries that are rock stars, they are both high in state and high in

rate and examples of such countries are countries like Singapore, New Zealand,

Estonia, Israel, the UAE and then there are what I call the stall out

countries. These are the countries primarily what Donald Rumsfeld once

called old Europe - so you can see most of France and Germany and the Scandinavian

countries up there. You know they're like you know more mature people where the

knees have got arthritis so they can't really move very fast and so they've got

they become developed digital arthritis. So they have a very high level of

evolution but their rate is not that high. So they are what we call the stall

out countries and then they're the watch out countries that are sort of

struggling on all fronts and then the break out countries which in many ways

are the most exciting corner of this map and these break out countries are the

ones that attract investor attention, entrepreneurial attention and an

enormous amount of kind of arbitrage attention and so these are countries

that haven't achieved their potential, plenty of headroom and enormous amount

of momentum and you can see the countries that are there are many

countries right in our neighborhood here in Asia, Southeast Asia, India included

and in some in Latin America and the other important part of this mapping is

if I were to now layer population on top of this, in each of these countries if I

were to put a bubble there with the size of the bubble representing the

population, most of the big bubbles are going to be in the bottom right. So now

put on your investor hat. Where would you go?

Momentum times mass means investment opportunity. The mass is the population,

the momentum is what is here and the bottom right is where money is going to

flow. And if you start tracking private equity and venture dollars that's where

they were. So there are a lot of conversations I can have just by

stopping on this page alone, but I could do that but maybe just let me share a

few other ideas and we can come back to some of the implications of what is here.

So I just wanted to situate India for you, it is in that nice break out zone

but you know it's not at the front of the pack in terms of momentum, it's

certainly you know kind of middling of the pack in terms of the the developing

nations and now to actually break it down by individual categories in terms

of demand momentum, India is actually very strong. That star that was

circling around there and so it's kind of on the far right. Now, when I look at

supply you can see that it's actually doing us surprisingly you know quite

nicely in terms of the change in supply infrastructure is being reflected over

here. But now when you look at the institutional environment in India

that's where it is kind of right at that median. So if we are to think about where

we need to do some major investing in change it's in the institutional

environment and what I would call the innovation environment which is also

right in the middle. So if I want to accelerate the momentum for India, those

are the two places that actually need a lot more transformation than we

currently have. Now, another way to look at this picture is by looking at the

digital evolution scores. Visa-a-vis some benchmarks.

So this diamond here is one way of doing that where you look at the four

categories of demand, supply, innovation and institutions and the diamond

represents where a country is in terms of how far evolved you are and so the

fatter the diamond, the more filled out the diamond, the better it is, right? So

you're further along in all these dimensions and so the benchmarks I've

sort of created here is Singapore, which of course is not a right

comparison for India, but Singapore always comes up in practically every

conversation about Asian and African countries. So I thought you know why not

Singapore you can see Singapore is a nice healthy diamond so it's a good

place to start. But then another natural comparison point quite often in India is

China. So China is that red diamond which is in a more shrunken than Singapore but

still you know a pretty reasonable sized ones and then what I call perhaps the

closest benchmark for India which is the ASEAN five.

So these are the ASEAN countries excluding Singapore and that's the

average of the ASEAN five. And now the question is where does India stand?

Relative to these so that's India or try and go back in time but I will not risk

it, so the orange curve, there that's India. So you can see the biggest gap

that India needs to close at an absolute level is the demand gap relative to

these benchmarks but then it is behind on the other parameters as well and just

for kicks I also sort of added our South Asian neighbors Pakistan and Bangladesh

which sort of hug India but India does you know better than them marginally on

kind of all fronts another way to do this comparison is against the so-called

BRICS countries, which frankly I don't find a particularly interesting basket

of comparisons, but you know what India constantly keeps getting compared so

there you go those are the BRICS and India is inside the other BRICS. So

suggests that we have some way to go.

Now, as we were reflecting on the digital planet in my start, you know the opening

of this discussion, I kind of mentioned that as we evolved from a physical

password digital future we're constantly questioning where all the fault lines

are and whether we can actually trust this this evolution. So, it's interesting

to ask the question can I actually analytically understand and evaluate the

state of digital trust around the world? And trust is one of those things that

each one of us kind of knows it when we see it, it's very hard to just define it.

Sir, what's your definition of trust? It's a very difficult to dislike it's a

feeling and it's very abstract of a concept, so you actually

don't define trust you actually know when it's there, like you said. Yeah, just

like pornography, I think that's the other thing, you know it when you see it.

But you know trust, as you said, you know that do I

trust somebody then I'm doing a transaction with or not really hard to

define and so quite often you know pointy-headed analysts they kind of say

well we need to actually get data on trust, so what do they do they go

out and do a survey, so they ask this room, Vikram, do you trust Mark

Zuckerberg? You know on a scale of 0 to 10 and Vikram will give a score, he'll

say 5, he's a gentleman he's always right there in the middle and then somebody

else who's a much meaner person will give some other score and and so on.

And then you can ask okay do you trust the technology? Do you trust Silicon

Valley? Do you trust you know all that kind of stuff, right? So you can ask

people all kinds of things and many people will say oh I don't trust these

companies at all you know they're big they collect all our data who knows what

they're gonna do with it? And then I ask them can you give me your phone? Can I

keep it for 15 minutes? No I don't want to be rid of my phone. Sure, you can say

that well what you say is not comparable to what you do. Because people are on

their phones all the time, even though they don't seem to trust it. So, there's a

different measure of trust which is, are you actually willing to do without it?

And do your behaviors reflect a different form of trust? Then there's a

third way to measure trust, which is how trustworthy is the environment

in which you operate? How much friction is there? You know when I try to make a

phone call is the sound jittery? Or does the phone call just hang up?

Which it does a lot of the time. Or I'm trying to make a transaction and before

I finish the transaction it says we have sent you a three digit

code on your mobile phone, you know enter the three digit code and then we'll go

through the next steps. So that slows things down. So, is that building trust or

taking away from trust? Unclear. Because on the one hand it seems like it's

building trust because you know somehow this verification process is meant to

keep me safe but it's taking away from trust because it's adding more time. I

just want to get this transaction done with. So, it's testing my

tolerance. So, there are many different ways to measure trust and what we did

was we actually said let's use all those measures and we collected data on

attitudes on behaviors on environment and the experience and different parts

of the world came out in different places in terms of trust and I will

spare you from kind of squinting your eyes at this very hard to read picture

but really that star that just came up is India right here

and on the vertical axis it shows behavior, so the further to the North you

are the more trusting your behavior is and the further to the right you are the

more trustworthy your environment is. So, there are a whole bunch of countries

here that are highly trusting but in untrustworthy environments. A complete

paradox and when I look at the countries, it's countries like China, Vietnam, Chile,

Philippines, Malaysia, Colombia, Indonesia, India, Thailand and at the other end of

the paradox are countries like South Korea, France, Australia, Germany,

Netherlands, very trustworthy environments but people don't trust

things at all. Extremely suspicious of the digital

system. In South Korea, if it takes more than like half a second to complete a

transaction, or a website to load, the user is already gone. They've moved

on to the next site. And this is what the data is telling us. So then it makes us

think what is going on in terms of why are these behaviors why are our

attitudes towards trust so widely different and so paradoxical. Now, I'm

sure we can have a robust conversation about what could be going on here - my

interpretation of what this data is saying is that when you look at

countries like India, Malaysia, Philippines, Vietnam and so on, for us

this technology is actually something quite new, so we're still coming up this curve

and discovering the magic of this thing which is for many people it has

just completely transformational. I mean I grew up in an India where you could

not get a phone line you know for the life of you know for the love of God but

today you know you can just you know buy a mobile phone in an airport and you

are in business. So that transformational effect, you know people

say I don't really care about this privacy stuff, I just want to have my

phone and and do stuff with it. Whereas if you're in the Netherlands you never

had that phone for a long time or you've had access to technology for a long time

maybe not on the phone it was on a laptop or on a desktop. So now I have

become more you know atuned to what this technology can do and some of the

challenges and the traps, so I'm much more skeptical about the about

the technology. Now, the reason why these distinctions matter is if you are Mark

Zuckerberg, I'm sure many of us would have liked to be Mark Zuckerberg at some

point, maybe not today, and you've gone up and made this massive public

apology and said oh you know we're sorry, didn't mean it, we'll fix it. Right? Not

too much details because actually poor guy doesn't have any details to offer.

And how's he gonna fix the many messes that I've sort of blown up in his face

and the first thing that he has to do when he goes back into the bunker with

all the geniuses who are sitting there in the Facebook headquarters.

How are you gonna fix this stuff? So now those guys they don't know what to do. I mean

there's all these fake news headlines being churned out by Macedonian

teenagers and how do I stop them? Do I put a star against them? Do I

block them? You know, what's my role? Am I an editor of a newspaper or am i you

know supposed to just be a an open marketplace for ideas? So what Mark

Zuckerberg you know basically has to do has to pick and choose he has to look at

the world and he said where can I afford to let those fake headlines come through

and where can I not afford to have that happen. So, for instance if I lose the

South Korean consumer, I'm screwed. Those guys bring in a ton of revenue for

me. But the people in Myanmar? Yeah you know they are a future revenue source,

but right now I can let it slide a little bit. That's why the poor Rohingyas

are continuing to be persecuted. And we can see that what's going to happen is

when a Zuckerberg converts his apologies into action, a lot of the

investment is going to happen in the bottom right corner. Where it really

matters. So that's why a lot of this fairly complex graphs also translate

into a little bit of a crystal ball in terms of where digital trust is going to

go as the Zuckerbergs, as the Eric Schmidt's and the Google boys and our

own Indian boy was along with them you know as they continue to re-engineer

what they have engineered and you know I wouldn't call it a monster yet but you

know this creation this Frankenstein's a creation that they have put together so

I'm just gonna kind of fast forward a lot of this. I just want to give you one

quick image here you can see the revolving star there is India at the

bottom of this chart and this chart captures two, what I consider two essential

measures of friction in a system and the reason by friction is important is it

tests our tolerance and then it tests our trust. So one a point of friction is

bandwidth. So when I make a phone call you know I'm speaking to the person and

suddenly drops and it happens more frequently in India than it does in

Sweden. Now, that's why India is down here. Now the other friction is what I would

call a car-to-conversion; which means if I go on Flipkart or

go on Amazon and I filled up my shopping cart and after that from that point on

when I get a confirmation email which says done, you know stuff is about to be

shipped to your home, how much time does it take to complete that transaction?

Again India fairs very poorly relative to you know Estonia or Slovenia or Peru

or France. So if you are making decisions in a policy setting or in a text setting

or you're an entrepreneur or you're looking to invest some money and you

want to make a difference to digital India, trust is at the heart of this and

digital evolution is at the heart of it. These are the issues, these are the

challenges. If you can help overcome them you can actually transform the country

in profound ways. So one question that we decided to explore is how long does it

take for India to play catch-up? As you saw what I showed before there are many

places where India is behind some of the relevant benchmarks whether they are

the ASEAN benchmarks, or the Singapore benchmark, or the Chinese

benchmark. So the natural question to ask is how far behind are we and what do we

need to do to close the gap? And that could help us as policymakers, decision-

makers or even an institution like Brookings can bring together the

right stakeholders around the table and say look if we can collectively

coordinate to fix the problem then we can make this kind of a difference. So

what I'll share with you is some analysis which personally I find

absolutely exciting and I think could be critical to the way we engage in policy

dialogue. Now question that I asked was how long will it take and what will it

take for India to catch up with those benchmarks I showed you before? With

China, with the ASEAN five and also I wanted to outline some of the critical

levers of intervention, such as physical infrastructure, government facilitation

of ICT, digital access, use of digital payments, gender inclusion. This

is a big thing. How many women are involved in participating in the digital

planet? India is of completely lopsided picture

here. Research and development, mobile internet and so on so forth. Many

different levers and these levers actually have differential impact. The

size of those bubbles reflect how much of an impact each of those levers would

have in moving your digital evolution score from where it is today to where

you would want it to be. Now, if India were to pick up the Chinese momentum.

Remember China in my previous graph was actually the fastest growing of the

digitally evolving countries. If India were to pick up that momentum it would

get to where China is today in 2029, roughly about ten years from now. It

would get to Malaysia today by 2038. It could get to Singapore by 2054. I

could try a variety of permutation combinations of this little science

experiment. If India were to grow at 3% across all those levers I mentioned, it

could get to China by 2022. if you grew by 5%, it could get to China

in two years. And of course that is a virtually impossible feat but you know,

I'm just saying. So now what does this mean for you as a policy maker? I could

come up with a scenario. I can ask the question what does it take to

get to China by 2024? And I can reverse engineer how much growth I need in

individual parameters. So specifically 18% annual growth,

in our measure of digital inclusion, 3% annual growth and physical

infrastructure 3 percent annual growth in R&D and you know a modicum of growth

in digital access you get to China in 2024 maybe that's not the policy goal is

a different one this is one scenario, you can come up with different combinations.

So essentially it's a way to use that same analytical engine to set an end

game for this chess game that we are playing and work out the moves that

get you there. Now I don't want to overwhelm you with PowerPoint but I want

to share a couple of other points of analysis that I think would be relevant

if you were to take this even further. So, so far we've been talking about these

questions almost at a you know it's like Neil Armstrong a picture I showed you he

was on the moon he was looking down and of course that time there was no digital

the computer that took him to the moon was one millionth the power of the

computer that you exchanged with your neighbor did he get it back the crew did

you get your smartphone back from this young man? Oh you never exchanged in the

first place never give it to him okay. Yeah who knows what he's gonna do

on it. Ruin your reputation forever. So instead of instead of that

top-down view, actually go down to a country level and ask the question if

you are a policymaker, if you are Mr Modi or if you're a Amitabh Kant, if

you're in any of the people who are in those positions of you know being able

to pull together the right elements, what do we need to do to enable a society

using technology? So the first question I would ask then is well technology is

kind of nice, you know all of us seem to like our smartphones. But technology is

not the end in itself. From a policymakers perspective there are

outcomes I want to achieve and those outcomes have to do with the well-being

of my people, the robustness of my economy and functioning of institutions.

Ultimately that's what policymakers are supposed to want. Of course they want

other things as well. They want to get re-elected or they want to either have

their own pet projects, you know, but in theory that's the goal of

public service. And now what we can do is we can create a framework for

identifying policy goals and we can also break those goals down into

individual pillars organized by people, institutions and economy and what I've

got here is 12 major pillars but underneath the 12

are many many indicators, there are a total of about 242 different indicators within

this spiderweb that I'm about to create and we also created a global

benchmark of a smart society and the way we came up with a global benchmark for a

smart society is we asked the question which countries in the world are the

digitally most advanced, represent the digitally most advanced governments and

it turned out there is a group called the D5. How many of you have heard of the

D5? Good! That makes me feel good! Sir, what's the D5?

The D5, virtually in any room I've talked to I just get blank stares and I

didn't know about the D5 was. The d5 is like the G20 or the G7, it is a club of the

digitally most advanced governments in the world and are these the most

powerful governments in the world? No, because they could include countries

like Estonia not a terribly powerful government. Israel which you know has

power in many ways but not a big one. New Zealand? Most people didn't even

know where New Zealand is. It's like Pluto you know it kind of I don't even

know I don't you remember that it says it's part of this planet and then there is

South Korea, which you know any of you who've been to South Korea know it's a

digitally advanced country and the United Kingdom people roll their eyes.

United Kingdom? C'mon! That doesn't seem like a digitally advanced

country. It turns out these five are the digitally most advanced countries in the

world. So they actually are very useful in setting a global benchmark. If I can

somehow create the best of these five. So, what we did was off those 242 different

indicators we picked the best performing indicator from each of the governments

and we created a mythical government. It's kind of like Lord of the Rings. We

created our own version of the Lord of the Rings' land and the best of the 242

drawn from each of the countries you know constitutes that outer polygon.

So inside this I will I can map any country so this is Estonia and it turns

out Estonia has captured the imagination of governments around the world because

nobody had even heard of Estonia and it turns out they're a digital rockstar and

this is how Estonia compares against that mythical country. So Estonia, the

size of its cobweb represents how much you have advanced in creating a

digital society, a smart society and the gap between you and where you are and

this outer edge is the gap that you need to close and the dimensions along which

you need to close it. So that footprint for each country can tell you where the

country is. Israel, New Zealand South Korea and those of you who were

doubting the United Kingdom, that's the United Kingdom. Now when I showed this in

a meeting in London people literally jumped out of their seats because this

has huge implications for the Brexit discussions, because with the United

Kingdom separating the EU which has been struggling you know remember Donald

Rumsfeld, old Europe, the stall out countries they are going to get even

more stalled as they lose a very powerful player in the UK. But I'm straying for my

point, what we are doing now is we're actually putting India on this map as

well. So we are in the process of creating so this is like a dashboard for

every country so this is an example for New Zealand, that's the footprint of New

Zealand and for every major indicator where the countries rank and what gaps

it needs to close and currently we're doing this study for India, Mexico

Nigeria, Philippines, Poland and Ireland. So these are all countries roughly in

that same neighborhood of the digital evolution index and they are the ones

that I consider to be among the kind of breakout countries, the most interesting

wants to watch, they're very different in many ways but they provide a very

interesting set of comparison points. Over the last couple of days I've now

had conversations with several agencies here in Delhi and you know the

observation that we jointly had or was India is obviously not a country it's a

collection of countries and so if I were to do a similar analysis for Andhra

Pradesh, it's going to look very different for you know analysis for

Bihar or analysis for Haryana, so we can actually do a similar thing we're

changing the unit of analysis and even the National Capital Region itself could

be a unit of analysis and I could compare it to New Zealand and frankly

New Zealand is smaller than the National Capital Region, I think in many ways.

So that's where we are going and once we understand that, it

gives us a better sense of where the gaps are, what the footprint is, how do

you close those gaps and what role technology can play in closing those

gaps. So I have really taken up much more of the time that you know speaking

from up here then engaging in a discussion but I

thought I don't want to kind of just leave you with you know an

image of a dark digital planet with of course Vladimir Putin riding on

horseback into the future but also not overwhelm you with data but hopefully

giving you a few different facets, few different ways to kind of look at

this picture. But it's also interesting to ask the question where are we going?

Because digital ultimately is all about the future.

So if we ask where are we going, you know you can't really get a good answer in a

think-tank like environment like this. I'm sorry you are an incredible group,

very thoughtful group, but you're not the people I would ask. I would actually ask

my students because their average age is closer to the ground of what is

happening in the digital system. So I ask them you know where where are things

going? And as we know the digital path that we've been on has taken us you know

a good 25 plus years and we're constantly moving along and the natural

question to ask is what's the next big story that is gonna show up on the cover

of The Economist magazine in 2030 and ask my students to create Economist

covers and they come up with I've got they know hundreds of them here. Some of

them are dark covers, some of them are perhaps a little bit more

uplifting or maybe slightly scary. So I just want to close with a story of

one of our students, his name is Patrick Meier, he was a PhD student and a few

years back he was doing what most PhD students do, either hanging

around the library or looking for free food in the corridor and we heard

about the Haiti earthquake and it turned out that his girlfriend at that

time she was in Haiti and she was basically trapped and he mobilized a

piece of software which eventually became a movement called Ushahidi. How

many of you have heard of Ushahidi? So it's a crisis mapping, so this gentleman,

Bournvita quiz contest my friend, Ushahidi is a way to map crises as

they're happening. So whether it's civil war or it's a tsunami or it's an

earthquake and people are trapped and all they have is Twitter or some other

form of social media and they're sending on messages saying I'm here, I'm here! And

you can direct public safety to where the greatest points of danger are. So

he actually used the piece of software to find his girlfriend and now

he's one of the world's leading digital humanitarians. He flies into places where

there are tsunamis and earthquakes and helps use digital technology to help

people. So I started with a picture of landing all the you know the chill that

goes down the back of our spine when we even recall landing men on the moon,

and today this digital technology that's why I leave with a note of optimism;

that despite all the concerns and the fault lines this digital technology by

some of the most creative people, many of them in this room and others that I've

met over the last you know several years, are using this technology to land men

right here on earth, where they're needed. And in ways that we could never have

imagined before. In ways that we could never have imagined before. So I think my

friend Sunil and I so needle I were asking this question, do you trust the digital planet?

And I won't reveal Sunil's answer he asked me do you trust a digital planet?

I sort of hemmed and hawed and part of the reason why I hemmed and hawed is

actually I am pretty optimistic about where things are going because of

stories like this and I'll just leave on one more note Patrick married his

girlfriend and now they have a little baby and they're doing fine. So, with that

thank you so much and happy to take questions.

For more infomation >> Bhaskar Chakravorti on Digital Trust - Duration: 33:40.

-------------------------------------------

MeRIT Webinar: Digital Self Defense - Tips, Tools, and Best Practices to Stay Safe Online - Duration: 53:03.

>> CINDY SOBIERAJ: Today's webinar is titled: Digital Self Defense: Tips, Tools, and Best

Practices to Stay Safe Online. Our presenter is Ben Woelk, president and manager of the

security management at RIT, where he developed a leading security awareness program.

Ben is a member and former co-chair of the EDUCAUSE security awareness and training working

group of the higher education information security council. He's also former director

and community affairs I'm sorry. Former director and community affairs committee chair for

the society for technical communication and a current scholarship committee chair.

Ben is a certified information systems security professional. A certified professional technical

communicator accredited trainer and an iTIL, Version 3 certified.

He holds degrees from the University of Florida, Trinity International University and the University

of Rochester and an enhanced certificate in technical information design from RIT.

Ben is also adjunct faculty at RIT, teaching classroom and online courses computing security

fundamentals and technical communication. Prior to joining RIT, Ben provided technical

communication and change management consulting to number of area Fortune 500 companies. His

current interests include working with other security awareness practitioners to develop

effective security awareness programs and providing mentoring and coaching to new and

aspiring introverted leaders and speaking of presenting workshops on introverted leadership

creating security awareness programs and technical communication.

Thank you for joining us today, Ben. This is your second time back with us, and we're

thrilled to have. Let's get going. >> BEN: Okay, thanks, Cindy, and thanks everybody

for joining us today. It's a rather daunting introduction but we'll move past that.

Today we're going to talk about digital self defense and digital self defense is what we

branded our security awareness program here at RIT, and this is a slight variation to

in person class we provide to staff five or 6 times a year. We'll save the questions at

this time end but we'll have a couple of times of interactivity through the presentation.

So we're going to start with a cartoon, I'll read it for you but it has data security as

the announcement of what the event is. And in this corner, we have firewalls encryption,

antivirus software, et cetera, and in the corner, we have Dave.

I apologize to the Daves that may be on the call.

In general, what this cartoon is telling us that it doesn't really seem to what technical

concerns we have in PlayStation or what we do to protect other people or even ourselves

'cause we always manage to make a mistake at some point or another, and we're also faced

typical human adversaries and they are very creative and they will find new ways to attack

us as well. So I'm going to postulate that you are all

are targets, every single one of us. When you take a minute to enter your ideas into

the chat about why you think you personally might be a target and we'll share some of

those ideas. >> BEN: So we're getting a good variety of

responses. A lot of it, honestly, just comes down to the fact that we're online and we're

vulnerable and that we do a lot of shopping and other types of things where we where it

may put our identity on the risk. This is a word cloud. It's not one I put together.

So when people ask me about specific things in there, like "bogies," I don't really

have what they meant by that but the idea here is to give you an idea of all the possibilities

why you might be attacked and why, again again, why you're a target again.

So basically it doesn't matter if you have a million dollars in your bank account it

doesn't if you have $1,000 or less in your bank account you're still going to be targeted

by online scams of some kind or other because they have good return on their investment.

So another thing to enter in the chat here this is prefacing a little bit of research

I'll have that going to share in one slide and it's not a bunch of research but Google

did some research a couple of years ago they published, I think, in the summer of 2015

they interviewed security experts who had ideas of what people should do to stay on

safe online, but they also interviewed normal people and for the we'll is normal and the

question I have for you all, what would you tell someone to do to Stay Safe Online? What

are the biggest things they need to do. And, again, you can enter your recommendations

into the chat on that as well. >> BEN: And there are really no wrong answers

with this but again I haven't seen what y'all have been putting in the chat yet.

>> BEN: So it looks like most of what we've got up here so far has to do with passwords

and what they call authentication. However, the lasting one keeping your operating system

and B I/OS up to date and this is the second time I've presented in the last 3 years since

that research essence come out where anybody has actually come up with that answer so congratulations

on that from the security expert's view that's the thing you need to do. To install your

software updates. My computer security says never give that

as one of the things you should Stay Safe Online so given the if you plan to be experts

on this and normal people don't normally answer this question this way tells us there's a

real gap in communicating what people really need to do to Stay Safe Online.

Now, the reason that it's so important to install software updates is because what will

typically happen is that someone will discover a vulnerability or a way to exploit or break

into a program I mean, they're all building millions of lines of code and all it takes

is a little error or something that when the excuse me, when the program was developed

wasn't a problem that could be now. So what happens with the software updates is the vendors,

whether it's Adobe or Microsoft or something else, they release these patches or software

updates and this addresses those holes or vulnerabilities or weaknesses, and they said

that's really the most important thing to do.

Now, looking at the rest of the list you can see on the nonexperts top online safety practices

which we're assuming here. You think intestine software virus is on the list and other things

primarily about a couple of them are about passwords. There's about one only visiting

websites they know that makes for a very small internet and maybe safe but I think it kind

of ruins the experience, and to not share personal information which makes perfect sense.

(Coughing.) >> BEN: On the right side, the security experts

top online security practices most of those are around passwords or around passwords of

some type and we'll talk about these things and the other is install software updates

but what's interesting is that the using antivirus software is not on that list of the top 5

things that the experts think you should do, and we still have a requirement for doing

that at RIT and you should still have it, but I think part of the issue here is that

people may assume that having antivirus software protects them completely, while on a typical

day it might recognize maybe 65% or 85% of the different threats out there so it doesn't

really provide the level of protection that we might expect.

There was a really interesting survey and the results came in kind of surprisingly.

So in terms of protecting your computer and information the links on this slide are are

two resources here at RIT and what the information security office has provided. And we're going

to cover a couple of these things during this presentation today but a good part we're not

going to do but this is more information about things that you need to think about. Policy

and standards are things that you will probably run into in your workplace where you have

requirements about what you need to do in terms of using whatever the computing structure

that you have there. I have another cartoon, and some of you have

probably seen this but we're going to take a minute on this one and give you all time

to read through it. It's pretty dense. I think you can probably read it unless you're viewing

off a mobile device. But let's take a minute and then we're going to talk about what this

cartoon means. >> BEN: Like I said, a very long cartoon.

It gets a little confusing because they talk of bits of entropy, and that gets into complexity

and I'll talk about that in a minute but it's not something that you really need to be aware

of that part of that. What they're showing it here is the way security

experts have told people they need to construct passwords in the last 15 or 20 years is wrong.

They told us they need to be very complex now, troubadour and 3 is not completely because

the idea is they made us put together passwords so they're hard for humans to remember. And

because of that, we end up using the same password over and over again and make a slight

variation maybe it would be Troub4dor & 3 & 4, and people will save it on their desktops

and an Excel file and what happens you got a very limited amount of the passwords our

using something to remember those passwords by which isn't secure.

What's interesting correct horse battery staple which are four common English words -- if

you make it together, it makes a really strong password. I wouldn't use correct horse battery

staple because it's been out for a while and I'll tell you why it's really good news that

this cartoon is talking about. There's a password staple but what this kind

of does kind of measure how strong is to break based on its complexity. Now, it's a little

confusing because you could put in the word password and it would say it would take how

many things to break it something very simple so it's really only looking at things in terms

of complex not use of common passwords so if you look at the screen you can see it's

got this brute force search space analysis and you'll see that change as we go through

the example, but down at the bottom you're going to see time required to exhaustively

search this password space and that means how long to break the password and they've

got a couple of scenarios whether it's one computer online attacking you or it's somebody

has actually gotten access to your computer directly and then they've got this massive

crack erase and massive computers and they have a botnet all trying to break that password.

So let's see this haSAK.com shows us here. So 6 letter passwords, very basic password.

It's all lower case. Now, if you look at it, you'll see in that search space analysis it

says it has 6 characters and the search space is 26 because there's 26 different characters

in our alphabet. But the more important thing is when you go and look how long it takes

to break the thing if you look especially at the second tubing I think they're probably

more relevant your offline fast attacks scenario is.00321 seconds. So much faster than I was

even able to talk about it. So that's with 6 letters. So what we're going to do now we're

going to increase the complexity a little bit. And we're going to do that by adding

a number on substituting a number for the 0 because I want to keep it the same lengths

right now. So what you see the search space depth you've got 26 letters and 10 different

numerical characters to be removed and there's a lot of things for cracking tool to search

through and we've updated it to .0224 seconds so we're like 7 times more secure than we

were the first one but, obviously, not very helpful. At all. So what else could we do

to make this password stronger? You can see that we've got the lower case is checked,

the digit is checked and we'll add a symbol and make one of the letters upper case and

let's see what it does. Changing one letter to upper case all of a sudden, we're at .577

seconds. Still not good but much, much stronger than we were before. And if I make one of

these letters a symbol, all of a sudden, we're at 7.43 seconds. So it's far more far stronger

than the password was that we talked about initially. It's still not going to do it.

Obviously, you know, a 6 character password if they've got access to your computer it's

going to take 7 seconds, roughly, to break it. And hardly any time at all they've got

multiple computers that are trying to break into it.

So we're going to talk about what we can do to make it stronger. I've done all the complexity

things. We've got the upper case and the lower case and the digits and the symbols but what

I want to start doing now I want to make it a little bit longer. So right now it's at

6 so we're going to go to 8. And let's move that to 18.62 hours for the offline fast attack

or 1 minute with a massive cracking erase scenario which sounds really exciting in theory.

We're going to go to 10 characters. Now, it's gone to 19.24 years for the offline fast attack

and a week on the massive crack erase scenario. Let's go to 12 characters and see what has?

So by the time you get to 12 characters even in this massive cracking erase scenario they're

at 1.74 centuries to break that password so not something we have to worry about and 1.74,000

centuries in terms of the offline fast attack scenario where somebody has got access to

your computer. So what this really tells us in I'll talk about it in a little bit more

is that complexity was really important but where we saw the biggest games and a strong

password was by making it longer. Now, if I tell people oh, you're going to be perfectly

safe which I'll never say but if you'll be safer using a 201character password you got

to be out of your mind I'm not doing every 20 character password I know I'm supposed

to have a different one for each one but that's just way too much trouble so let's talk about

some of the options here. Let's talk about something called a pass phrase. Now, the text

I have it was a dark and stormy night which should be familiar to many of. That comes

from a couple of places. One if you're a peanuts fan there's a cartoon Snoopy's on top of the

dog house, typing out: It was a dark and stormy night. It's actually Bluwer Lytton fiction.

It's by a late Eighteenth Century Englishman named Bluwer Lytton, and he put together a

one sentence introduction to a novel, which I'm not reproducing here but it went on and

on and on, and it's really regarded as the worse introduction to a novel in British history.

So, of course, what they did they made a contest and every year they have a contest where someone

submits the worse possible opening to a novel and they kind of rate it and score it and

whoever wins the trophy has got the worse introduction fun fact but, obviously, not

critical to what we're doing. So I'm going to use it with a dark and stormy

night for my pass phrase and I'm going to turn it into something that's actually useable

and would work for us in the computer age here. I need to increase the complexity. We've

got one upper case and all lower case letters so I'm going to change it to it was a dark215&StormyNight

and it gives us special characters and it gives us all of those different elements that

we need. Now, what's interesting is that as you've

seen looking at the previous example with the haystack thing that length is really far

more important than complexity when you're constructing passwords.

So looking at this pass phrase in that calculator, even with a magnification cracking scenario

it's at 89.14 trillion, trillion centuries to break that password. So I think we aren't

going to worry about that one too much. So that's great. Now all you have to do is have

a 25-character pass phrase for every account how hard is that going to be. That's not going

to a very good thing. So we're going to talk about something called

a password manager, and I'm going to jump because I've got a poll question here basically

ask do you use a password manager? And I would like you to complete the poll while I'm talking

about it here, but what a password manager does it manages your passwords so the examples

we have up there KeePass, Password Gorilla, LastPass are all examples of different password

management tools, and the way they work and I used LastPass about 10 years now. The way

they work is you construct this really good pass phrase kind of as your key to your Vault

where you're saving all these other passwords and it will save all the passwords for you

for all the websites that you go to. It will create complex passwords which are going to

be long passwords which have all the complexity that we know that we're supposed to have and

we'll basically provide a way for you to have a password manager on your desktop or with

your browser and be able to have a different password for pretty much every single account

you have online which is the ideal thing because you don't want to use your banking password

for your social media account because if somebody breaks it or tricks you into giving it up,

they're going to have access to your bank account.

So how did we do on the poll here? Do we have any responses yet?

>> CINDY: I'm opening it now. >> BEN: It looks like we've got a very small

percentage of users that are currently using the password managers and nobody said not

sure which is probably a good answer. (Laugh.)

>> BEN: But it's something that I haven't seen a lot of people do somebody told me about

it. They said it's really going to revolutionize the way you use the internet because now you

can have all of these different passwords. And, of course, the big question that comes

up how do I know my passwords are safe doing something like this? Because, obviously, if

you use something like LastPass -- it's a vault that's online and

it's storing millions and millions of different passwords so it's going to be a big target

so what happens with this is that the passwords are stored in an encrypted format. It's a

strong encryption and, yes, there's always a risk with information security. I will never

tell somebody you're going to be 100% secure. We just can't ever say that, but what the

tradeoff has been that I've seen is this helps you use more passwords, which we know is strong

which we know is a good practice. It's stronger to do and you've got some risk in terms of

passwords being exposed but it hasn't happened so far. I mean, lots of people are trying

to get into it and it's the kind of thing if it does happen, you're going to get a notification

and you'll have to change some passwords but again in terms of your working life it's a

lot easier to do this. So I have no stake in these password manager companies but I

do recommend one that you take one of them at least.

And the next thing I want to talk about is something called Multi Factor Authentication.

Now, I think the Google search might have called this two factor authentication. I don't

know, but Multi Factor Authentication. And some of you may recognize some of the pictures

on the slide. But Multi Factor Authentication is normally when you go online you have to

indicate who you are and something that indicates your secret passwords so that you can get

in. So that's they only call it one factor and only using one thing to prove who you

are. With Multi Factor you have something else so you have this password you know and

you have something else which is used to log in.

Now, with things like the Google Authenticator, which is the G in Duo, these are online these

are actually apps for your smart phone and mobile device and they work in conjunction

with the site that you're trying to log into so make sure when you log in to a specific

website and for RIT we've protected our Oracle information or my info site for those of you

who have been at RIT and to log into that now you have to have your user name and your

password and you have to interact with Duo and it's very simple because you basically

on the screen you're logging in and it says Duo, send me a push or Duo call my L.A.N.

line and you've got a smart phone and it buzzes and you say, yes, and you get to log right

in. Some of the other examples in here there's a YubiKey, which is a way of storing passwords

credentials that you use to log into a cower there's an RSASecurID and I had one 20 years

ago when I was doing consulting and that number would change every minute and you would have

to enter that number every time you logged in.

The other thing on the slide, Turn It On, that gives instructions for about 100 different

websites in terms of turning on two factor authentication, and it's probably the best

way to protect yourself. Again, security usually makes things a little

harder to do but it's always that tradeoff between your protection and things being a

bit harder. So my next question take a minute here into

the chat, what do you think the most common way is of getting a password. What are your

ideas on that? I'm going to answer Christina's question right now because we're in the space

right now. In terms of passwords, personally I use last

price and that has troubled in price over the last year. It's $24 a year for using it

on your computer and unlimited mobile devices so you're talking $2 a month for the protection.

There's an open source one called KeePass, which I know people who have used it for years.

I'm not really fond of it because it's open source and open source to me means that the

documentation is terrible because it's put together by a group of programmers and they

understand it. But KeePass LastPass, Password Gorilla. There's another one out there that

I'm not remembering right now, but I typically, what I would do I would search Ghoul for password

recommendations and get past the paid ads and look for the ones that may actually do

some review on it, but the important thing is you use one.

So what did we have in terms of common ways of getting passwords? What did people enter

in the chat? You're just asking for it, spoofing spoofing in the sense of pretending that you're

somebody else. Asking for it, address, pet's name or kids' name. Absolutely, people love

to use your pet's name as passwords and they also you have to post pictures of their pet

so it's not real hard to figure out but in general the and the other question that came

up here and I'm trying to read the chat one and talking which is a mistake but the dash

link the one I can't remember the name of it was, and I personally have not looked into

that very much, but the key things you're talking that I'm seeing in here so far they're

trying to fool people into giving up their passwords and that's the far most effective

way to do it there's very little risk to the attacker they want have to be clever or buy

tools to figure it out or break a password like we showed earlier. The easiest thing

is just asking for that password. Now, the nice thing about the Multi Factor

Authentication is that even if you give up that password, because it's requiring that

other piece of information, they don't have actions to it. So your account is still protected.

So that's the really that's why we think it's such an important thing in terms of protecting

account credentials. And the other trick, of course, is people

said spoofing and I'm going to use phisching in terms of people fooling you into giving

up your password. The tricky part is finding out if it's a issue if fishing account, and

if you don't have a PayPal account and you get an email from PayPal, it's obvious it's

not yours. For years it was easy to tell because the grammar would absolutely be terrible and

as long as you're not in too much of a hurry you could tell something was wrong with the

request that had come in. But essentially those kind of problems have been taken care

of because attackers can now buy kits online to do phisching attacks and it takes care

of these nice templates making it easier for you to fool with. So the rule of thumb we

have and I've got the slide out of order. Don't give up your password. No one legitimate

is going to ask you a password send you an email to ask for it. They don't need it to

reset it so just don't do it, so that he gets this slide I have up here the one on fraud

scams and malware gets into the other types of social engineering types of attacks where

they try to trick you into doing things there's been a lot of talk, you know we've all seen

lots of things about the elections lately about Russia attempting to do social engineering

and that has been their practice for many, many years. It's like we've finally woken

up this time. But the big deal is to trick people into doing things or get people to

do things they wouldn't normally do. So the kind of things we see in fraud, scams

and malware malware is malicious software which usually would be an attachment or something.

But we see requests like they came from the president's office asking for a copy of everybody's

W2 Forms. Or can you transfer the $500,000 amount and do a wire transfer quickly. We're

behind we need to get this thing paid and it looks like it's come from the chief financial

officer requesting somebody do that, and it's all where they try to trick people and it's

all different types of attacks. Say I'm a small nonprofit locally we've seen a steady

stream of fake invoices trying to trick our treasurer looking like it comes from the president

and tricking the treasurer into paying something. This is not just directed against long groups,

it's pretty much directed at all of us. The rule of thumb you don't want to take the bait

and don't give up your password and this section we're going to talk now of protecting your

identity and your online safety when you're doing social media and things like that.

So the newer threat we've seen that started probably about 2 years ago and we're seeing

more and more of is something called Ransomware and you can see this is a screen shot and

I think it says you have to pay $300 or 250 or something like that to get your files back.

But the way Ransomware works is that they trick you into installing a piece of software,

malicious software and that software goes and encrypts all the data on your computer,

and the better ones, air quotes around that, if you're connected to a network share or

a portable hard drive, it will also go in and encrypt that information as well. So the

problem is that once it's done it's too late to do anything about it and if you're lucky

maybe you're antivirus detected it before it started maybe you've unplugged your computer

really quickly and it didn't get very far into it. And you still have to figure out

what happened after you plug it back in but the key once you've been attacked it's too

late and you want to see things about the last year or two about the police departments

had their data encrypted and having to pay a large amount of the money. A large health

care system was attacked in the United Kingdom years and I believe to pay a lot of pounds

to get their data unlocked again. So the real issue is how do you protect against something

like this? You have to protect against it ahead of time. You have to back up your data

and we're all Leah about this sort of thing and it's like oh, we know we'll be okay and

we know our hardware might crash sometime but, of course, we're going to get some kind

of warning that it's going to happen which, of course, doesn't happen, and even online

accounts like Dropbox and things like that some of this Ransomware is sophisticated to

reach up into those accounts and encrypt it also. Best rule of thumb with protecting yourself

against Ransomware making sure you have a copy of your data and that means regular backups

and it means not just having a portable hard drive connected to your computer where you

copy files over. You actually need use some kind of a program for it. But so Ransomware

is probably or one of the scariest things come down the line last year.

Now, this point in time I usually pop up this slide and some of my audience I'm sure is

old enough to remember this, but these are the old duck and cover drills where everybody

hid under our seats to protect themselves from atomic bombs which, obviously, wasn't

going to do any good but it made us feel like we were doing something and I got a lot of

people in the audience who look like deer in the headlights and I want to talk about

some of the things you can protect yourself rather than telling you all the bad things

that can happen. Again, the Number 1 thing don't get hooked.

Never respond to email requests or phone calls or text messages or anything health that are

asking for your password. That's an easy one. If we just did that we'd be in great shape.

The other question I've got as we launch into this is I'm assuming most of you have mobile

devices, smart phones or tablets of some kind or other. The question I have for you we have

a question, yes. Is do you have a mobile security app on your phone? If you do, please it's

a poll so please answer the poll. I'm interested to see what the responses are here. 'Cause

I know how it goes when I'm doing this as a live in person.

>> BEN: It's not looking too good for the yes but someone it has. 2 people. So here's

part of the issue we have and all of you know this. Especially if you're an iPhone users

and I don't want to bash Apple on this but Apple has never made but they made things

easier for users and they've given a nice interface. They don't talk about security

very much and iPhones can be attacked and androids can be attacked and pretty much any

of the operating systems that are out there on smart phones and tablets and the things

like that. The list here is kind of a short list like the things like find my iPhone but

some things are actually apps that you can add from your marketplace or your Google Play

Store depending what you're using and they provide additional security. They'll scam

the applications that you're trying to install. They'll make sure they're okay and they'll

tell you if you've got weird permissions you're asking for if they're able to do things more

often than not. Again, I encourage you to research various, you know just do your Google

search of mobile security apps for whatever kind of device you have and see what the recommendations

are. You'll find that will secure things and the reason why this is so important I think

most of us are aware that over the last several years there have been far more smart phones

and iPad things and tablets stolen than regular computers and what it means for the cybercriminal

who's out there trying to trick us and get our money they're going to go after those

mobile devices. That's where people are and that's where they're going to invest their

money. And they're not as easy to protect. One of the questions I typically ask in the

class is how do you tell where a link goes to on a mobile device? And we're not going

to ask it as a question now but what happens is you can't hover your cursor over it like

you would over a computer. You can't really hover your finger over it either, and if you

just touch the link it takes you there. If you find out where it goes you actually have

to push down on the link with your finger and hold it down until it shows you where

it goes. And that is not a good design. Obviously, if you let up on your finger too soon it's

taking you to that link. So this is one of the reasons, I think, that mobile devices

are attacked so much 'cause they're just harder for us to think about defending.

Now, what's interesting is that Google question that came up really easy where the most important

thing to do was to install software updates we do that on our phones. We know we need

to do that on our phones. We get them daily for all these different apps so it's the same

thing with your computers you want to make sure things are kept up to date.

So I'm going to talk about a few other things here about protecting your information. Great

drawing created by a student who worked in our office at one point in time and it's very

it's a good illustration what's out there because something may appear to be a sheep

but it's really a wolf in the background and you cannot tell by what you see online. You

cannot tell. Friend requests hey, great. But who knows what they're really like. It's not

saying criminals can't look great either for that matter.

So my Number 1 rule of thumb we can never assume on privacy whatever we share online

we have to assume at some point it's got to be revealed. We had no control over what happened

with Equifax with them revealing all of those passwords or Yahoo! I think they revealed

2 billion passwords. They had 2 billion passwords. They revealed every account password they've

had and we have very little control but we do have control over the types of information

we share and that really comes into social media. A lot of times you'll sign up for Facebook

or some other social media account and it may ask for your birthday or hometown or ask

you where you went to school. You can provide that information but you need to think about

the types of information it's asking for and makes sure you're comfortable with providing.

But again, even if it says it's secure and private you've got to assume at some point

it will be revealed. The next screen which is probably not readable

is privacy settings that's actually from my Facebook account and what was interesting

about this is when I went down and I looked at who can look me up and the second thing

on there said who can look you up using the phone number you provided and it said everyone.

I never remembered giving Facebook permission to do that. So that must have been a default

setting, and what I recommend is that every few months go into your privacy settings in

these different social media accounts, make sure that nothing has changed and make sure

that they're all settings that you're comfortable with and change them now if they're if you're

not comfortable with them. Do what you can to protect your information.

Now, something they also provide that are good are log in alerts which you can sign

up on the various social media accounts. I was speaking in a conference in New England

in the fall and while I was there I got 6 or 7 messages from Facebook that somebody

was trying to log into my account. And they knew actually, I think they were coming from

Australia of all places, but it alerted me that was happening which was a little discomforting

but also told me I didn't need to change the password but the good news is when you log

into Facebook and let's say you log from out of town you'll get these alerts because you're

not the internet the IP address that you are connecting from and it will let you know.

A couple other tips here use something called Google alert that you can set up. You can

monitor used of your name and put in your email address and anytime that appears online

in this place Google indexes it will give you a report on that. And you can aggregate

it so you can get it maybe once a day and you can use this alert to follow various subjects,

sports teams, all sorts of things like that as well. So it's got some things it's got

some play value also. Google also has my account dashboard -- if

you're a Gmail user, which is probably 90% of the world, at least at this point, one

thing you can do is go to is go to my account dashboard and it will allow you to do a security

checkup and privacy checkup and I encourage you to do that again just so you know what

you're sharing. You can see below privacy checkpoint it will show you the activity which

has been associated with your account and if there's things on there that you haven't

done then that account has been hacked at some point.

Another nice trick which somebody told me about is doing something a Google reverse

search. I don't know how many of you have used LinkedIn and I will connect with anybody

and it looks pretty bizarre. There's fake accounts on LinkedIn and like fake accounts

on Facebook and others, and it will allow you to select the imagine depends on if you've

got Chrome and it will show you all the places that image is used. I've got a connection

request from probably one of these people right here on the right here but that same

picture was used with at least 4 different LinkedIn accounts so it's so it's a generic

picture so maybe it's one of those people but it's a good way to check to see it's the

image that's commonly used on the internet and they're using it for a fake account and

they want you a fake account because they want to get you over to your connections.

So another issue and again, it's not typically an issue with faulty or staff or audience.

You want to protect your your only image is what they see about you online. This example

here is from a poster from the University of Wisconsin and would you hire this guy and

somebody's told me at one point they think it would be milk. I'm not buying it. But the

idea again is that understanding whatever you do online people are going to make decisions

about you and make judgments about. So that is the presentation and I'm going

to pop up my next which is my website, while we're talking here, but what questions do

you all have? And thank you for the opportunity. >> CINDY: Thanks, Ben.

There are a couple coming in. So if you have additional questions, folks, please send them

in through the chat box. A couple of things that have come up what if you do not put your

portable hardware drive online. Will the Ransomware still attack it?

>> BEN: As long as the portable hardware drive is connected to your computer, yes. Depending

on the strain of Ransomware, it will go into everything you're connected to. So the idea

if I was using a portable drive for backups, I would back up and then I would unplug it

and I would plug it back in when I'm going to use it, you know, back up to it again.

Typically, my experience we use those as additional space and not backup space. We really need

to think of it as an opportunity to back it up and again, back it up and just disconnect

it and it's not going to jump into it if it's not connected.

>> CINDY: Okay, a question from Pete. What's an example of a mobile security app?

>> BEN: Well, depending on your phone and depending on how old it is, you will kind

of dictate what you really need. So one example of a mobile security app is something called

LastPass and not LastPass I've got that wrong. Lookout. It's called Lookout. Lookout what

it does you stall it from your app store and it scans all the applications that you install

to make sure there's nothing malicious in them or whether they're asking for weird permissions

like why do they need access to your computer and that sort of thing. Lookout also has the

built in thing that iPhone users have enjoyed where you can find your phone through Lookout

and what you can do is you can bring up a map and it will show you where your phone

is within 75 feet, I think, it is. And you can also get it have your phone emit a high

pitch squeal noise, and that will help in terms of trying to find it.

The main thing it does is it looks at your applications and make sure none of those are

malicious and they do sneak out occasionally where they are bad. I used a program by Sophos

for my smart phone, and it was very aggressive in terms of what it would warn me about and

it would start talking about low reputation application and it told me Google Play was

a low reputation application and a bunch of other things and it was probably a little

bit too hypersensitive so I had to kind of turn those notifications down some. But the

idea it's a third party application that you would add to your smart phone or other mobile

device. A very long answer to a short question. >> CINDY: That's okay. Thank you.

Adam has a question. What is the best way to implement a safe home network where my

spouse and I can count on safe robust backups that can be automated by software and then

what software might that be? >> BEN: Yeah, I think this is probably a question

is a little bit beyond the scope of what I was prepared to talk about. But in general

you want to use a router and some of the I'm trying to remember whether our router does

this or not I've got what they call a Cloud drive which essentially allows me to back

up to it in the house. I've got the system set up to back up to it and then it will back

up that data to the Cloud and I don't do not remember what the cost is per gigabyte or

whatever or storage but storage prices are going down and down. But ideally what you

do to protect your data is you make you get a copy of it and you have that copy somewhere

besides where the computer is located because there should be a break in or fire or anything

else, you don't want to have lost every bit of digital information you have. We've become

too dependent on it. >> CINDY: All right, um, question on that

came in from I don't know who did that come from? Jim? Is there value to use the traditional

antivirus software that works on a mobile device?

>> BEN: Yeah, so when I'm talking about a mobile security app, they will have antivirus

built in. Cybercriminals are still crafting malicious software to attack phones. A banking

Trojan a couple of years ago, which was still out there and I'm drawing a blank on the name

of it, but what the Trojan means it's like the Trojan house it looked like something

else and there was a banking Trojan and what it did it captured all your banking activity

online. It didn't worry about anything else you were doing but anytime you went to a bank

it would capture that information and send it out to somebody. The antivirus I think

what you'll find I'm not sure you can get strictly an antivirus for your phone at this

point. They'll all be more robust security suites of software.

And the good news is most of them are free. Or at least have free versions, and the reason

for that is it is it helps all of us to get this security software out in the marketplace

because it reduces the amount of the attacks that go on.

>> CINDY: Thank you. Another question came in from Adam. Do you

know if Mint.com is a good third party app for a bank security?

>> BEN: It's not anything I have used but my rule of them point of view I want to get

a good idea how many people are using it. I'm not aware of any breaches which is what

they would call the releases with Mint.com, but they be associated with Intuit which has

Turbo Tax and there have been occasional problems, but I'm a Turbo Tax user myself and I haven't

worried about that. The biggest issue is people asking for passwords and people giving them

up. In terms of Verizon security and privacy app,

I'm not familiar with it. I tend not to use I have Verizon but I tend not to use their

built in stuff. I don't like it. It takes up room that I would rather use for something

else. But in general I'm going to give you the same response. Do a Google search and

look for reviews and see what they have to say about it, and, unfortunately, it's going

to be pretty much my responses to any specific security app or software questions today because

it changes. It changes monthly depending on which one is more effective.

>> CINDY: So if I've got malware on my device, what do I do?

>> BEN: Take it to somebody to look at. If you're associated and I can't tell you exactly

who to take it to look at. If you're around here around RIT in the community I think you'd

probably go to the digital den and ask them for their recommendations on it. Worse case

you just reset the device and wipe and return it to factory specs and that should take care

of any malware that's on the device. >> CINDY: Okay. Here's a question that came

in about looking for advice for parents to communicate to young adults and students about

not sharing their personal online ID, if they're uncomfortable doing it. Any thoughts for frustrated

parents out there? >> BEN: Yeah, a couple of things. Parents

don't tend to use the same applications they're kids do and I think that's deliberate on the

part of the kids. But they'll use things like Snapchat which is supposed to be this very

brief period of time a picture is available or something like that. But people can take

a screen shot of it. They can take a picture of the device that the picture came in on.

There's also been cases where it's like oops, somebody broke into the Snapchat servers and

they found all this information that was really supposed to be ephemeral.

The best place I would tell you to look is go to a website called Stay Safe Online, and

it's a Government website that's set up and it has a whole section on parents and teens

and preteens and what kind of information to share with them. I think that will be your

best option to Stay Safe Online. >> CINDY: Okay, thank you.

Are there any additional questions? If not, we're putting that website for Stay Safe Online

into the chat box. So I guess if there are no additional questions

we will wrap up. So thanks to Ben for coming back and being

a presenter for this second time. If you do have a digital question, you can email at

to lumbar RIT.EDU_alumni with the hash tag meRIT with the webinars, and we'll try to

get you some information for the panelists today.

As a reminder all of you will receive an email from us in the next few days with a link to

today's webinar recording. Ben I can't think you enough for being our

presenter today and thanks to all of you out there for participating in today's webinar.

Our next webinar is Thursday, March 8th, called Build a Better Brand from the Office of Career

Services with Kris Stehler. Look for your special invitation and your email coming shortly.

Again, thanks to everyone for joining. You can exit this webinar by simply closing the

WebEx window and has do let us know what you thought of the webinar with by taking the

brief survey which pops up when you exit the webinar. Thanks. And have a great day.

For more infomation >> MeRIT Webinar: Digital Self Defense - Tips, Tools, and Best Practices to Stay Safe Online - Duration: 53:03.

-------------------------------------------

Scientists Use EEG Machine to Create Digital Images From Brain Activity - Duration: 2:58.

THE MIND'S EYE Neuroscientists at the University of Toronto

in Scarborough have established a new method of recreating images perceived by the human

brain based on electroencephalography (EEG) readings.

"When we see something, our brain creates a mental percept, which is essentially a mental

impression of that thing," said Dan Nemrodov, the postdoctoral fellow that developed the

technique, in a press release.

"We were able to capture this percept using EEG to get a direct illustration of what's

happening in the brain during this process."

Test subjects were hooked up to an EEG machine and presented with images of faces.

The image was then recreated digitally as it was perceived in the individual's mind

using machine learning techniques to match their brain activity to particular types of

facial features.

Previously, this has been accomplished using functional magnetic resonance imaging (fMRI)

data, but there are practical advantages to being able to use EEG to perform the same

operation.

For one, EEG machines are fairly common, portable, and less expensive than fMRI scanners.

They also have a better temporal resolution: while an FMRI can capture images over seconds,

EEGs can track how the image develops in the brain in milliseconds.

While some have expressed doubt about the suitability of EEGs for such applications,

Nemrodov is confident the results prove otherwise.

The next step will be for researchers to expand the process beyond images of faces.

While it might drum up some potentially frightening applications, the "mind reading" technique

could be life-changing for many people, giving those who are unable to speak or use sign

language a way to communicate.

It could also provide law enforcement with the ability to render a clear picture of what

a witness remembers about a particular event.

Being able to see what the person saw, without the inconsistencies introduced by testimonies

made after the fact, or verbal descriptions of a person's appearance to a sketch artist,

which would completely change how we investigate a crime.

For more infomation >> Scientists Use EEG Machine to Create Digital Images From Brain Activity - Duration: 2:58.

-------------------------------------------

ATTN: uses Tubular as the Measurement Standard for Digital Video - Duration: 1:02.

Our primary ways of distributing content is on Facebook.

We get about 500M video views per month.

We talk about a range of topics - everything from gender inequality to politics to racial

injustice.

What we try to do is compartmentalize issues that are complex into digestible short-form

video formats.

We have a goal of having really engaging original premium quality content and we use engagements

per video metrics, views per video metrics, shares per video metrics, comments per video

metrics to assess how good of a job we are doing at creating premium engaging video content

and Tubular helps us do that.

Pre-Tubular it's like the dark ages.

The way I describe Tubular is a platform where you get competitive intelligence on

the media landscape outside your data set.

In TV the standard for understanding the landscape is Nielsen. And I think for digital media it's Tubular.

For more infomation >> ATTN: uses Tubular as the Measurement Standard for Digital Video - Duration: 1:02.

-------------------------------------------

BIGBANG's "Flower Road" Tops Billboard's World Digital Song Sales Chart - Duration: 1:00.

For more infomation >> BIGBANG's "Flower Road" Tops Billboard's World Digital Song Sales Chart - Duration: 1:00.

-------------------------------------------

DeLonghi EO241150M Livenza Stainless Steel Digital Convection Oven - Duration: 0:34.

DeLonghi EO241150M Livenza Stainless Steel Digital Convection Oven

Coverage for product breakdowns and malfunctions. Free shipping on all repairs with no deductibles or hidden fees. Fully transferable with gifts. Cancel anytime, full refund in the first 30 days.

If you purchase this service plan and eligible product for this service plan, you acknowledge that Amazon may send the service plan seller relevant product and price information for the purpose of administering the plan.

For more infomation >> DeLonghi EO241150M Livenza Stainless Steel Digital Convection Oven - Duration: 0:34.

-------------------------------------------

Gender Diversity Matters - DWP Digital and Department of Health event - Duration: 2:18.

For more infomation >> Gender Diversity Matters - DWP Digital and Department of Health event - Duration: 2:18.

-------------------------------------------

#EIFAsks on how to provide a digital economy and society - Duration: 2:29.

For more infomation >> #EIFAsks on how to provide a digital economy and society - Duration: 2:29.

-------------------------------------------

ACC presents: Digital Playground with NNIT and the Aspire Finals - Thomas Schjødt - Duration: 0:38.

Hello you all!

My name is Thomas Schjødt and I'm from NNIT

and the Moderator of our Digital Playground on Thursday afternoon.

We are really looking forward to being the Digitalization Partner

of Aarhus Case Competition again this year.

At The Playground you will get the opportunity to meet some of my colleagues,

to play around with cool stuff and to perhaps have some food and drinks.

And not least come and listen to some keynote speakers

that will have their own videos in the days to come.

Thank you!

For more infomation >> ACC presents: Digital Playground with NNIT and the Aspire Finals - Thomas Schjødt - Duration: 0:38.

-------------------------------------------

Steamfast SF-680 Digital Steam Press with Multiple Fabric Settings and Steam Burst Function - Duration: 0:47.

Steamfast SF-680 Digital Steam Press with Multiple Fabric Settings and Steam Burst Function

Covers mechanical and electrical breakdowns. No deductibles or hidden fees. Free shipping on all repairs.

Easy claims process online or by phone 24/7. If we cant fix it, we will send you an Amazon e-Card for full replacement value. Coverage begins at the end of the manufacturers warranty. Plan is fully refunded if canceled within 30 days.

Plan contract will be emailed from Asurion within 48 hours of purchase. This will not ship with your product.

Không có nhận xét nào:

Đăng nhận xét