Aaveita koneessa: Automaattisen sisällönkuvailun arviointia Kirjastoverkkopäivillä 2019
Lehtinen M, Inkinen J & Suominen O (2019). Aaveita koneessa: Automaattisen sisällönkuvailun arviointia Kirjastoverkkopäivillä 2019. Tietolinja, 2019(2). Pysyvä osoite: http://urn.fi/URN:NBN:fi-fe2019120445612
[kirjasto-uutinen]
Tekoälyä sisällönkuvailuun: Annif julkaistu
Ryhmät Ajankohtaista kehittämisestä, Uutiset
Automaattinen sisällönkuvailu osaksi Finton palvelua
Finto laajenee automaattisen sisällönkuvailun palveluihin Finto AI -työkalun ja sen rajapintapalvelun myötä. Palvelu tukee suomen-, ruotsin- ja englanninkielisen tekstin automaattista sisällönkuvailua.
Finto AI on saatavilla osoitteessa ai.finto.fi, josta löytyvän lomakkeen avulla palvelua voi kokeilla ja käyttää. Automaattinen sisällönkuvailu toimii parhaiten opinnäytetyö- ja tietokirja-aineistoissa.
According to Adobe, after about 20 minutes of listening to a voice, users can make the voice say whatever they want just by typing it out. Comedian and director Jordan Peele hosted the event and Adobe tech Zeyu Jin demoed the process by editing an interview with Peele’s comedic partner Keegan-Michael Key. Jin took existing audio of Key, then used the software to make him talk about making out with Peele instead of his wife.
From the Future of Life-Institute
FLI catalyzes and supports research and initiatives for safeguarding life and developing optimistic visions of the future, including positive ways for humanity to steer its own course considering new technologies and challenges.
"You will meet us at more than 700 municipalities in the Nordic countries and at 70 public libraries in the UK" "We continue to research and develop chip technology, smart mobile agents and E-books together with our international partners." "Axiell Librar
Av Anders Lotsson, Computer Sweden, 19.12.2010. " Den goda nyheten är att det kanske inte är så svårt att bygga en kvantdator som vi trodde. Den dåliga nyheten är att kvantdatorer gör all kryptering på internet oduglig" "Det blir konstigare och konstigar
"We are a community of people crazy enough to build our own book scanners. We also write Free software for book scanning. We are the missing link between your bookshelf and your e-reader. Join us! Get involved by trying a simple scanner, or push the limits of scanning technology."
Safiirilasi, kehittynyt akku ja huipputehoa. Siinäpä joitakin Canonicalin Ubuntu Edge -puhelimen ominaisuuksia. Mutta Linux-luuria ei tule, jos netin joukkorahoittajat eivät lähde mukaan. I t-viikko 23.7.2013 14:43
Norwegian Center for Technology in Music and the Arts - a project where the goal is to make a collection of impulse responses from various acoustic spaces in the Oslo region.
We live in a software culture - that is, a culture where the production, distribution, and reception of most content - and increasingly, experiences - is mediated by software. And yet, most creative professionals do not know anything about the intellectual history of software they use daily - be it Photoshop, GIMP, Final Cut, After Effects, Blender, Flash, Maya, or MAX.
New Technologies in Emergencies and Conflicts: The Role of Information and Social Networks -- looks at innovation in the use of technology along the timeline of crisis response, from emergency preparedness and alerts to recovery and rebuilding.
It profiles organizations whose work is advancing the frontlines of innovation, offers an overview of international efforts to increase sophistication in the use of IT and social networks during emergencies, and provides recommendations for how governments, aid groups, and international organizations can leverage this innovation to improve community resilience.
We invite you to join a global online discussion about the key themes addressed in this publication. Submit questions for our panel of experts via Twitter (using the tag #Tech4Dev) or the UN Foundation’s Facebook page.
RFDump is a backend GPL tool to directly interoperate with any RFID ISO-Reader to make the contents stored on RFID tags accessible. This makes the following types of audits possible:
* Test robustness of data-structures on the reader and the backend-application
* Proof-of-concept manipulations of RFID tag contents
* Clone / copy & paste User-Data stored on RFID tags
* Audit tag-security features
J. Kietzmann, and H. Tsang. Proceedings of the 15th Western Canadian Conference on Computing Education, page 14:1--14:5. New York, NY, USA, ACM, (2010)
T. Schummer, S. Lukosch, and R. Slagter. Groupware: Design, Implementation, and Use, 11th International Workshop, CRIWG 2005, Lecture Notes in Computer Sciecne 3706, page 73-88. Berlin Heidelberg, Springer-Verlag, (2005)