• Публикаций

  • Зарегистрирован

    7 марта
  • Посещение

  1. Биометрическая система VOCORD FaceControl авторства российской компании «Вокорд» второй раз признана лучшим решением для дистанционного распознавания лиц во влиятельном глобальном рейтинге MegaFace. По данным рейтинга MegaFace, обновленного в мае 2017 г., точность распознавания алгоритма «Вокорд» достигла рекордных 92,8%. У ближайшего конкурента данный показатель составил почти на 10% меньше (83,3%). Высокого результата удалось добиться за счет дальнейшего совершенствования собственного нейросетевого алгоритма компании. О компании NTechLab Российский стартап NTechLab, запущенный в 2015 г., специализируется на разработке технологии распознавания лиц. В мае 2017 г. года NTechLab привлекла $1,5 млн инвестиций от фонда Impulse VC и группы частных инвесторов, включающей первого заместителя гендиректора Tele2 Александра Провоторова. Исходный алгоритм компании – FaceN, стал основой сервиса по поиску профилей в социальной сети «ВКонтакте» на основе фото FindFace и уже дважды возглавлял мировой конкурс MegaFace. Победивший в рейтинге NIST алгоритм является основой платного коммерческого пакета для разработчиков – платформы FindFace Enterprise Server SDK 2.0. Версия алгоритма 2.0 позволяет распознавать 7 базовых и 50 составных эмоций, определять пол и возраст человека с погрешностью до трех лет, а также производить поиск по базе из порядка 1 млрд фотографий менее чем за полсекунды. Платформа также может управлять системой распознавания лиц через Android-приложение. Подробнее: P/S Их система выиграла тендер и будет установленна на ряде гос учреждений США...Скорость обработк просто шокирует...да еще и из видеопотока выделяет...
  2. братан, майнить уже не выгодно...не трать время и деньги. Сложность растет постоянно, соотв. видеокарты будут приносить меньше денег. И к концу срока окупаемости итоговый результат будет выглядеть хуже по сравнению с вложениями в другие направления. Если конечно ты не собираешься инвестировать 1кк. А судя по виду карт которые хочешь исопльзовать не собираешься. Эти карты УЖЕ к сожалению устарели....
  3. интересуют отзывы на омерте. работаете?
  4. Accounts Skype free. With reference to СС

    Ask in a private message Fromat kryskarnage:chance1027 |Balance: 0 Balance is Active |Pay: Visa ****4367 | |Number: None |Country: United States brksndunngirl:102011at |Balance: 0 Balance is Active |Pay: Visa ****6459 | |Number: None |Country: United States
  5. Image Source: South China Morning Post Chinese authorities have announced the arrest of around 22 distributors working as Apple distributors as part of a $7 million operation, who stole customers’ personal information from an internal Apple database and illegally sold it to Chinese black market vendors. According to a report from Chinese media, this underground network reportedly consisted of employees working in direct Apple suppliers, and other outsource firms in the Zhejiang, a province in eastern China. These employees had access to Apple databases along with other tools containing sensitive information about its customers. They allegedly used their company's internal computer system to gather data includes usernames, email addresses, phone numbers, and Apple IDs, and then sold it in the underground market for between 10 yuan ($1.47) and 80 yuan ($11.78) per data point. So far, the network has made a total of 50 million yuan (around $7.36 million). However, it is unclear if the data sold by the suspects belonged to only Chinese Apple users or users elsewhere as well. Much details about the arrest have not been revealed by the Chinese authorities at this moment, though the police statement suggests the Chinese authorities across four provinces, including Guangdong, Jiangsu, Zhejiang, and Fujian, arrested 22 suspects over the weekend, following a few months of investigation. The authorities dismantled their online network and seized all "criminal tools," and announced Thursday that the suspects have been "detained on suspicion of infringing individuals’ privacy and illegally obtaining their digital personal information." Wondering how this spamming operation can affect you? As I mentioned above, your personal data is profitable both for marketing companies to deliver targeted advertisements to you, and for hackers to carry out malicious hacking campaigns, including phishing attacks and other email scams. Police are trying to capture and destroy the scammers' network, but users are advised to be vigilant while opening attachments in emails, clicking links in messages from unknown numbers and giving out any details on phone calls. News provided GREENDUMPS24.COM
  6. A new Android-rooting malware with an ability to disable device’ security settings in an effort to perform malicious tasks in the background has been detected on the official Play Store. What's interesting? The app was smart enough to fool Google security mechanism by first pretending itself to be a clean app and then temporarily replacing it with a malicious version. Security researchers at Kaspersky Lab discovered a new piece of Android rooting malware that was being distributed as gaming apps on the Google Play Store, hiding behind puzzle game "colourblock," which was being downloaded at least 50,000 times prior to its removal. Dubbed Dvmap, the Android rooting malware disables device's security settings to install another malicious app from a third-party source and also injects malicious code into the device system runtime libraries to gain root access and stay persistent. "To bypass Google Play Store security checks, the malware creators used a very interesting method: they uploaded a clean app to the store at the end of March, 2017, and would then update it with a malicious version for short period of time," the researchers said. "Usually they would upload a clean version back on Google Play the very same day. They did this at least 5 times between 18 April and 15 May." Here's How Dvmap Malware Works Dvmap Trojan works on both 32-bit and 64-bit versions of Android, which once installed, attempts to gain root access on the device and tries to install several modules on the system including a few written in Chinese, along with a malicious app called "com.qualcmm.timeservices." To make sure the malicious module gets executed with system rights, the malware overwrites system's runtime libraries depending on which Android version the device is running. To complete the installation of the above-mentioned malicious app, the Trojan with system rights turns off "Verify Apps," feature and modify system setting to allow app installation from 3rd party app stores. "Furthermore, it can grant the "com.qualcmm.timeservices" app Device Administrator rights without any interaction with the user, just by running commands. It is a very unusual way to get Device Administrator rights," the researchers said. This malicious 3rd party app is responsible for connecting the infected device to the attacker's command-and-control server, giving out full control of the device into the hands of attackers. However, the researchers said, they haven't noticed any commands received by the infected Android devices so far, so it's unclear "what kind of files will be executed, but they could be malicious or advertising files." How to Protect Yourself Against Dvmap Malware Researchers are still testing the Dvmap malware, but meanwhile, advise users who installed the puzzle game in question to back up their device's data and perform a full factory data reset in an effort to mitigate the malware. To prevent yourself from being targeted by such apps, always beware of fishy apps, even when downloading from Google Play Store, and try to stick to the trusted brands only. Moreover, always look at the comments left by other users. Always verify app permissions before installing any app and grant only those permissions which have relevant context for the app's purpose. Last but not the least, always keep a good antivirus app on your device that can detect and block such malware before it can infect your device and keep it up-to-date. News provided GREENDUMPS24.COM