Coding has become more popular in recent years with everyone from entrepreneurs, hobbyists, children and professionals. And with many different kits now available, it’s easier than ever to try your hand at coding.
If you’re unsure what coding is or where to begin, read on to discover more and find out the benefits of learning this new skill.
What is coding and what is it used for?
In a nutshell, coding is writing a set of instructions in a language understood by machines to enable a computer to follow to carry out a task. It’s used daily across the world in multiple applications from appliances to traffic systems and the motor industry.
With more of the world relying heavily on digital systems, there is an increased need for those who know how to code. But it’s not just for professionals. Anyone can now try their hand at coding and it’s increasingly popular amongst hobbyists who are creating exciting projects during their spare time.
A good place to start when thinking about coding as a hobby is by using a Raspberry Pi kit. Starter kits are great for beginners and allow you to develop your coding skills with everything you need in one package.
Benefits of learning to code
Whilst some benefits of learning to code such as future career options might be obvious, there are other advantages to this skill:
- You could become smarter – Coding can utilise the logical part of your brain which is useful for other tasks, not just the coding process. It can also be very creative if you use your coding skills to work on different projects.
- It increases your employability – and not just in the computer software industry. Skills learnt from coding are transferrable and the kind of qualities employers across many industries will be looking for.
- It helps you understand technology – By getting to grips with computer languages, you’ll learn how technology works at a base level – knowledge that will filter through to everyday life as well as in your career.
- Enhance problem solving skills – By learning to code you’ll learn how to address problems and, in turn, become skilled at solving them. Tools that will be transferred to other aspects of life.
- Enhances STEM learning for kids – Using coding tools as educational play will develop a child’s skills around science and technology – industries which are only going to increase in the near future.
- Coding is a universal language – so there are endless opportunities to learning this skill.
Whatever knowledge you have of coding, why not give it a go? You could be creating the next big robotics project, having fun playing games with your kids or even developing a new software programme in no time.
Triumph of Simulacra – How Deepfakes Aim to Rule Our Minds
Deepfakes are famous for fake pornography and YouTube videos with dancing politicians. But how can else they challenge our society?
According to Antispoofing Wiki The deepfake technology can be traced back to 1997 when the first digital face manipulation tool Video Rewrite was presented by the Interval Research Corporation. Funnily, the first deepfake in history was political — it made JFK lip-sync to a “I never met Forrest Gump” phrase.
In 2017 deepfake videos have turned into a mainstream threat as their production tools became widely available to the common users. Someone, under the alias “deepfake” posted on Reddit a few pornographic videos. In them, faces of a few Hollywood actresses — Gal Gadot being one of them — were glued to the real adult genre divas with the dark wizardry of generative deep learning. This is how the deepfake era began.
Currently, deepfakes are considered as the gravest threat coming from AI and machine learning technologies. Crime Science reports that deepfakes are capable of producing devastating societal harm: from political slender and fake news to petty money thefts via realistic impersonations.
The study also mentions that deepfake technology proliferation is simple to orchestrate: it can be quickly shared, sold, and copied by the perpetrators. (Unlike physical crime tools like guns — these require covert logistics.)
So, why are deepfakes so dangerous?
Falsified media can cause unpredictable results. For example, deepfake allegations nearly sparked an upheaval in Gabon. The military top ranks accused the president’s administration of using a synthesized video of the country’s leader Bongo Ondimba who, supposedly, died from a heart attack sometime earlier in 2019.
Allegedly, to avoid losing power, the corrupt officials quickly whipped up a New Year’s deepfake address that would soothe the suspicious public and help them win some time.
The fabricated rumors were used by the national guards as a pretext to seize the central radio station — they pleaded for the citizens to stop whatever they were doing and flood the streets in righteous anger. However, the coup d’état failed.
Audio deepfakes seem to be an equally serious threat. In the UAE a massive heist was orchestrated with the help of a voice-cloning tool. Fraudsters mimicked a company director’s voice and successfully requested a $35 million transfer from a Hong Kong bank.
The pressing issue of deepfakes spurred regional and international alarm. For instance, the European Parliament published a study Tackling Deepfakes in European Policy. The document lists among all other risk categories brought by the technology: bullying, extortion, identity theft, election and stock-price manipulations, etc.
However, one of the most destructive properties of deepfakes are the liar’s dividend and truth apathy. While some are paranoid that one day they will be targeted by the odious technology and jeopardized beyond any belief, others can rejoice. Deepfakes will finally allow them to refute any compromising materials.
Liar’s dividend can produce a scarily damaging impact on our society. The paradigm don’t believe what you see can actually help some unscrupulous politicians and public figures wiggle out of a scandal.
Even though the legitimacy of a video or audio can be confirmed with technical means — like double compression analysis — regular observers are often distrustful of the expert verdict. It’s always easy to discard something you don’t really comprehend.
If the liar’s dividend is Phobos, then reality apathy is Deimos in this duet. Not being able to trust their own senses, people may ignore actually important materials. As long as there’s no reliable, trustworthy and universally available way to tell a fake from bona fide media, deception will prevail over common sense.
Deepfake isn’t alone: it has a sibling called “cheapfake”. Cheapfakes are a type of falsified media that are easy, cheap and quick to produce. Con artists don’t even need to operate neural networks to make them.
They can churn out cheapfakes in gargantuan amounts with simple editing tools: Movie Maker, Adobe Premiere/Audition and of course Photoshop. The famous “drunken Pelosi hoax” is a textbook cheapfake. It was produced by simply slowing down the speed of the original video, making the target appear intoxicated.
Yes, cheapfakes wouldn’t get their moniker for nothing. They are cheap indeed. And quite easy to spot too, like in the Pelosi hoax case. However, in certain areas where technological literacy leaves a lot to be desired, cheapfakes can lead to tragic events.
In 2018 a series of cheapfakes began circulating in the Indian WhatsApp group chats. It showed motorcycle riders “kidnapping” children for organ harvesting. It was accompanied by some really gruesome footage of dead kids “killed by the harvesters”.
It promptly stirred a panic and paranoia in the villages of Karnataka, Maharashtra and other Indian states. Villagers assembled in lynching mobs and attacked random outsiders, tourists and bikers — at least 20 random people got killed in light of this hoax.
In reality, the cheapfake used a recontextualization technique presenting some irrelevant footage in a completely different light. For instance, the images of the dead children were captured a few years prior to the hysteria to document war casualties among kids. As for the “bike-riding kidnappers”, it was simply a clip withdrawn from a social advertising that warned parents of how easy it is to abduct a child.
Experts indicate that lack of awareness and technological illiteracy are the two main factors that sparked mass lynching in India. Another vital factor is that social media and messenger apps are ideal channels for the deepfakes and cheapfakes to proliferate. It makes them similar to a viral disease.
Right now, there are just a handful of methods to neutralize false media. First, researchers recommend paying attention to visual clues: unnatural facial feature alignment, weird complexion, posture, gestures, lip movement/voice mismatches. Plus artifacts (such as distortion or blur) can be spotted in areas where one body part transitions into another: neck, elbows, wrists, etc.
Second, we should mention the Content Authenticity Initiative (CAI) proposed by Adobe. This initiative seeks to establish standards, as well as introduce a universal platform that will protect original media content from malicious tampering. This is achievable by inserting unerasable metadata — the special data that reveals who, where and when produced the content.
But of course these countermeasures won’t work solo. They need strong support from educators around the world. Starting in schools and finishing in communities living in the less developed regions. Ignorance is a breeding ground for many negative phenomena. And deepfakes are one of them.
Implications of remote conformity assessment for developing countries
The United Nations Industrial Development Organization (UNIDO) is pleased to announce the launch of a publication titled “Remote conformity assessment in a digital world: Opportunities, challenges and implications for developing countries”.
The publication provides a high-level overview of how remote assessment/audit techniques have developed in recent years and applied in different conformity assessment contexts. It also highlights the associated benefits of such techniques along with the challenges and implications for the future.
Quality Infrastructure is the combination of initiatives, institutions, organizations, activities, and people that help ensure products and services meet customers’ requirements. Conformity assessment is a central part of this important work as it links regulation, industry, and markets. Evidence shows that establishing a Quality Infrastructure can assist a nation in pursuing a development track in line with the Sustainable Development Goals.
Remote assessments/audits play a crucial role in the context of digital transformation of Quality Infrastructures around the world, with the global disruptions arising from the COVID-19 pandemic having accelerated this process and injected urgency into the adoption of new technologies. where the use of remote assessment techniques to ensure the continuity of conformity assessment and confidence in its outcomes became a strategic imperative.
The need to stay abreast of the latest developments to ensure that no country is left behind in the increasingly digitalized world of conformity assessment makes this publication relevant for developing countries and a wider audience. Pragmatic steps that can be taken to address this need are presented accordingly.
UNIDO remains committed to continuing its support to developing countries, assisting them in overcoming the challenges and making the most of the opportunities posed by the growing use of remote assessment techniques.
Privacy vs Security in the online world
New technological developments and the rise of the internet allowed many people access to the digital world by making it possible to do so from anywhere and anytime. But, with all its benefits, this has significantly increased the amount of data we have on the internet. From cookies to the browser and device fingerprinting, we leave data behind every time we visit a website. How private or secure is your data online?
Some people use these terms interchangeably, but there is a difference between them. Privacy is related to your right to control your personal information and how that information is used, while security determines how that personal information is protected.
For example, you can choose to share your data on a social media platform, which is a matter of privacy, while how that platform protects that data is a matter of security. The same applies to signing on the eCommerce site. You are choosing to disclose your data to them to use their services, but it is up to them to keep your data safe, maintaining your privacy and security. If they sell or release your information to a third party, your privacy would be compromised, but not necessarily security. In a successful cyberattack, both your security and privacy have been compromised.
Compromised privacy doesn’t necessarily threaten your online safety, but it remains an essential aspect of it.
With our growing online presence, more and more of our personal data ends up online. This data is in danger of being compromised by companies selling or sharing it with unauthorized 3rd parties to be used for advertising, political manipulation, or other nefarious purposes. The risk gets even higher on social media, where people reveal various details about them that malicious parties can use. Luckily, they are starting to realize the importance of data privacy. According to the research, 81% of people are more concerned about their social privacy than last year.
The loss of privacy is real, but how does this impact our security? The truth is it leaves us vulnerable to various types of cyberattacks and fraud attempts, such as data breaches and identity fraud. The threat from cybercriminals, hackers, and fraudsters keeps growing with our rising dependence on the internet. While the cyber attacks are nothing new, the truth is that the development of technology has allowed them to step up with their malicious attacks, making them harder to trace and able to affect more people than ever. According to the Telegraph, cyber fraud is currently the fastest-growing category of crime, and it shows no signs of slowing down. But does that mean you have to stop using the internet to remain safe from these threats? Of course not; you just need to take the proper steps to minimize the risk while enjoying your online life.
With our digital footprints growing constantly, it is time to start taking necessary actions to protect ourselves.
- The first step you need to do is install Antivirus and Firewall programs to protect yourself from various cyber threats. Just remember to keep them up to date, and you will significantly reduce the danger.
- Practice good password hygiene. More than 80% of data breaches directly resulted from poor passwords, which is why you should never use easily guessable passwords such as your date of birth or even something simple like “123456”. You should also always choose unique and complex passwords for all of your accounts, making it harder for cybercriminals to gain access to different accounts.
- Reduce the risk of your account data being stolen and used for malicious purposes by not saving credit and debit cards in the system when making online purchases. The truth is that every website is vulnerable to attack. You don’t want to put yourself at unnecessary risk because you need to invest a few more seconds to type in your card details.
- Be mindful of what you share online and on social media. Most people are not aware of how public the data on social media actually is, and they keep oversharing. This can allow cyber criminals and fraudsters to discover important personal information and use it for their malicious actions. Review your privacy settings on social media sites and think twice before posting something personal.
Cybercriminals and fraudsters keep evolving their methods to exploit as many people as they can reach. Learn how to protect yourself and stay safe online.
Nations must ‘act together, urgently and with solidarity’ to end crisis of food insecurity
Hunger levels around the world are at “a new high”, the UN chief said on Wednesday, in a call to...
Americas: Rising COVID-19 caseload should be a ‘wake-up call’
COVID-19 rates are on the rise in the Americas, where new infections and fatalities have been steadily increasing over the...
Musings of a journalist – Part 3
The entire idea of writing this is that as journalists we find ourselves finding and scratching other people’s truths. However,...
Saudi religious moderation: the world’s foremost publisher of Qur’ans has yet to get the message
When the religious affairs minister of Guinea-Conakry visited Jeddah last week, his Saudi counterpart gifted him 50,000 Qur’ans. Saudi Islamic...
The Secret U.S. & UK War Against Europe
The secret U.S.-and-UK war against Europe is well documented but little known, and some conceptual and historical background is pre-requisite...
Triumph of Simulacra – How Deepfakes Aim to Rule Our Minds
Deepfakes are famous for fake pornography and YouTube videos with dancing politicians. But how can else they challenge our society?...
How 4chan Radicalizes Youth and Grooms Them Towards Terrorism
The image board was started in 2003 to discuss anime and various other topics but festered into a safe space...
Southeast Asia4 days ago
Vietnam-US relations and the US-ASEAN Summit
Middle East3 days ago
Iran Gives Russia Two and a Half Cheers
East Asia4 days ago
U.S. Interests and Priorities: Why Ukraine & Taiwan are Similar Yet Different Geopolitical Situations
Americas3 days ago
A U.S.-ASEAN summit—a face or a farce
Middle East4 days ago
Ignoring the Middle East at one’s peril: Turkey plays games in NATO
South Asia3 days ago
Sri Lankan economic crisis and the China factor
Intelligence2 days ago
New ISIS Strategy and the Resurgence of Islamic State Khorasan
Economy3 days ago
Possible Impacts of the Russia-Ukraine War on Global Food Trade