Capturing IIoT metadata: A data deep dive Read more about Capturing IIoT metadata: A data deep diveLog in or register to post comments
Scoring vulnerable people: When tech turns against communities Read more about Scoring vulnerable people: When tech turns against communities Log in or register to post comments
Main character energy: The Age of Me Read more about Main character energy: The Age of MeLog in or register to post comments
Metaverse regulation: How to govern a virtual society? Read more about Metaverse regulation: How to govern a virtual society?Log in or register to post comments
Accessible public data: Democratizing access to global information Read more about Accessible public data: Democratizing access to global informationLog in or register to post comments
Deepfakes for fun: When deepfakes become entertainment Read more about Deepfakes for fun: When deepfakes become entertainmentLog in or register to post comments
Generative adversarial networks (GANs): The age of synthetic media Read more about Generative adversarial networks (GANs): The age of synthetic mediaLog in or register to post comments
Two-factor biometric authentication: Can biometrics really enhance security? Read more about Two-factor biometric authentication: Can biometrics really enhance security?Log in or register to post comments
Third-party verified identities: The one login credential you’ll ever need Read more about Third-party verified identities: The one login credential you’ll ever need Log in or register to post comments
Biometric scoring: Behavioral biometrics might verify identities more accurately Read more about Biometric scoring: Behavioral biometrics might verify identities more accuratelyLog in or register to post comments