article thumbnail

Social engineering, deception becomes increasingly sophisticated

Security Affairs

The word deepfake, which originates from a combination of the terms “deep learning” and “fake,” refers to digital audio/video products created through artificial intelligence (AI) that could allow one to impersonate an individual with likeness and voice during a video conversation.

article thumbnail

For Digital Transformation, You Need Content AI

AIIM

Of course, we've been digitizing content and delivering electronically -- and wrestling with metadata, search, information governance, and compliance -- for decades. New Training Course from AIIM: Practical AI for the Information Professional. I'll point AIIM readers to my deck and retrace key points in this article.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Terahertz Millimeter-Wave Scanners

Schneier on Security

The heart of the device is a block of electronics about the size of a 1990s tower personal computer. Most images that might be mistaken for a weapon­ -- backpacks or a big patch of sweat on the back of a person's shirt­ -- are easily evaluated by observing the terahertz image alongside an unaltered video picture of the passenger.

article thumbnail

5 things to know: IBM Cloud’s mission to accelerate innovation for clients

IBM Big Data Hub

IBM also recently unveiled watsonx , our next-generation AI and data platform to help enterprises train, validate and deploy AI models. These capabilities are especially critical for machine learning , artificial intelligence , simulation and other high-performance computing (HPC) workloads.

article thumbnail

Capturing Paper Documents - Best Practices and Common Questions

AIIM

To a greater or lesser degree, most significant information management initiatives will involve a scanning capability to capture hard copy paper documents as electronic images. New areas of recognition innovation are improving the capture and text extraction from videos, voice recordings, and even photography. This is more cost?effective

Paper 90
article thumbnail

Information Management in the Not-So-Distant Future of Health Care

AIIM

Today, if you have a computer, you have a doctor – videoconference doctor visits routinely complement in-person ones. Electronic Health Record. Almost all hospitals have adopted the Electronic Health Record (EHR). VR videos of an operation? Insurers are about profit; doctors are about delivering the best care.

article thumbnail

Fund Managers Targeted in Sophisticated Cyberattacks

Data Matters

Impersonation of key senior personnel to remit fraudulent payment instructions via telephone and video. For remote access to emails, trading systems and other electronic data containing confidential information, the authentication mechanism should utilize at least two of the following factors: what a person knows (e.g., biometrics).