1-20 of 96 Search Results for

computers

Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Article
World Policy Journal (2016) 33 (4): 111–117.
Published: 01 December 2016
... are. Copyright © 2016 World Policy Institute 2016 racism sexism coding programming computers algorithms algorithmic bias NYUHUHUU NYUHUHUU Tay’s first words in March of this year were “hellooooooo world!!!” (the “o” in “world” was a planet earth emoji for added whimsy...
FIGURES
Journal Article
World Policy Journal (2016) 33 (1): 105–111.
Published: 01 March 2016
... when the author of the standard textbook on artificial intelligence (AI), Stuart Russell, professor of computer science at the University of California, Berkeley, warns that the development of an artificial intelligence system vastly more powerful than the human intellect is possible...
FIGURES
Journal Article
World Policy Journal (2014) 31 (2): 71–80.
Published: 01 June 2014
... rates, and even lower levels of computer knowledge. And who is best placed to do this? Humanitarian organizations—often large, sclerotic bureaucracies designed half a century ago to provide food, shelter, and medicine on meager budgets and goodwill—may seem ill-suited to provide these new tools...
FIGURES
Journal Article
World Policy Journal (2012) 29 (2): 25–34.
Published: 01 June 2012
... era, because you can play it online. You can follow the game’s great players, and you can analyze it through computer engines, which is very helpful for amateurs. To some extent, there is no longer a cloak of secrecy covering the game. You may have two of the world’s greatest players competing...
FIGURES
Journal Article
World Policy Journal (2015) 32 (4): 75–82.
Published: 01 December 2015
... availability of hacking and cyber tools. The digital criminal does not need to be a master hacker since cyber exploits can themselves be bought through hidden websites on the Dark Net. The increasing commoditization of computer malware such as viruses and worms makes it likely that in the future we will see...
Journal Article
World Policy Journal (2011) 28 (3): 11–16.
Published: 01 September 2011
.... Marshall Hopkins Still, I worry that our inability to match the achievements of the 1960s space program might be symptomatic of a general failure of our society to get big things done. My parents and grandparents witnessed the creation of the airplane, the automobile, nuclear energy, and the computer...
Journal Article
World Policy Journal (2013) 30 (3): 14–19.
Published: 01 September 2013
... of information. Computer hardware and software, advanced aircraft materials, and imaging technologies such as high-resolution video cameras are all benefiting from lower costs and higher performance. For some applications, what used to take a $1 million drone can now be accomplished with a drone that costs less...
FIGURES
Journal Article
World Policy Journal (2011) 28 (3): 3–7.
Published: 01 September 2011
... will be packed into a very small space. In the future, historians may see the most important innovation of the previous decade as the migration of artificial intelligence from research labs to everyday life. Think “cleaning robots” or even more recently, Watson, the computer champion on Jeopardy! While...
Journal Article
World Policy Journal (2013) 30 (3): 23–30.
Published: 01 September 2013
... substantial offline consequences as well. Institutions providing public access to the Internet—schools, libraries, Internet cafés, and even post offices—have been targeted for law enforcement inspections to check for computers containing software that might allow access to banned websites. This problem took...
FIGURES
Journal Article
World Policy Journal (2012) 29 (2): 89–96.
Published: 01 June 2012
.... For that, he needed the best talent, so he put ads in the major papers. But he felt that was the wrong way to reach the people who spent all their time on computers. “I built a site to post my own vacancies,” he explains. Venture capital is not just a financial transaction. It is, as its name suggests...
FIGURES
Journal Article
World Policy Journal (2018) 35 (1): 108–113.
Published: 01 March 2018
... was on a level playing field,” former Estonian President Toomas Hendrik Ilves recalled in an interview with The Economist . In the 1990s, as telecommunication was booming across the world, Estonia built an e-government service and brought computers into classrooms. (Schoolchildren do learn to code in first...
FIGURES
Journal Article
World Policy Journal (2015) 32 (2): 40–52.
Published: 01 June 2015
... there may be a snag in his plan. Some pictures might have come from Shanshan’s computer or her husband’s. But not so with the scenes from the surveillance cameras, which had been installed there by the police or Internal Security. So Kang and his people must have had the contents in their possession. Should...
Journal Article
World Policy Journal (2011) 28 (3): 45–51.
Published: 01 September 2011
... as having to do with networked computers, and cyberspace as an information-space created by networked computers. “Cyberspace” is a manmade construct, which itself sits within the environment of the electromagnetic spectrum. This environment is just another medium of delivery. It is similar in some ways...
Journal Article
World Policy Journal (2011) 28 (3): 22–34.
Published: 01 September 2011
... M’s. The first is Method—Aalto is one of the world’s top universities in the methodological sciences (from computational modeling to the methods behind art and creativity). The university’s strength in Media, such as information and communication technology and audiovisual expression, builds...
Journal Article
World Policy Journal (2012) 29 (4): 3–7.
Published: 01 December 2012
... create a new generation of innovators. Such a system in Africa must emphasize critical thinking, technical skills, computer programming, and entrepreneurship, not rote learning. Second is to build incubators that encourage innovators to focus on demand-driven applications that can be turned into viable...
FIGURES
Journal Article
World Policy Journal (2013) 30 (3): 57–64.
Published: 01 September 2013
... to the office, there is nothing on Zalamea’s walls, no photos on his desk, no computer, not even a notepad. But he expresses the same passion for his work as was apparent at the office of his adversary, the public defender. As to whether Ecuador will transition fully and successfully to an adversarial system...
FIGURES
Journal Article
World Policy Journal (2013) 30 (2): 108–117.
Published: 01 June 2013
... nationality. Both are relatively mindless endeavors whose carefully circumscribed parameters are designed to discover those individuals most likely to overstay their visas and become illegal immigrants. A carefully designed computer program could probably be equally efficient, but would result...
FIGURES
Journal Article
World Policy Journal (2001) 18 (2): 89–92.
Published: 01 June 2001
... specify.” Graft comes in all sizes. This American passenger on a bus originating in Turkey had to pay three U.S. dollars as a “computer fee” at a frontier post lacking a visible computer. It is a commonplace that corruption has cultural roots. As remarked by David Usu- pashili, a U.S. educated...
Journal Article
World Policy Journal (2001) 18 (1): 31–38.
Published: 01 March 2001
... in arms control need to mobi­ the basis for national and global security ac­ lize to take advantage of the divisions in companied development of the atomic and the Bush administration between the hawks, hydrogen bombs, missile technology, and led by Rumsfeld, and the more moderate the computer...
Journal Article
World Policy Journal (2012) 29 (1): 72–81.
Published: 01 March 2012
... that the numbers that have been our staples are increasingly meaningless to everyday people. Newspapers, radio, and television routinely spout headlines about key statistics on GDP, inflation, and employment—astonishingly influential indicators computed in the United States by the government’s Bureau of Labor...
FIGURES