Contact tracing is a technique used by public health authorities to measure and slow the spread of infectious diseases by identifying people who may have come into contact with an individual with an infectious disease, in this case COVID-19.
Now you might ask yourself “Is this 2010?” since we are talking about Jailbreaking and Rooting phones. The answer is no, but it could be increasing in popularity again for everyday users to begin opening up mobile devices to dangerous third-party stores and applications after by-passing manufacturer’s security settings.
When the Hubble telescope took its infamous Deep Field photo, no one expected to find much of anything. But instead of dark, empty space the Hubble returned one of the most astounding photos the world has ever seen and changed the way we look at the cosmos. However, after the eXtreme Deep Field was released astronomers found something even more profound…
If you attended my Introduction to Machine Learning class, or our March Madness Challenge (which we sadly won’t get to play out), you might have some ideas about how we can use AI to fight COVID-19. At a high level, machine learning is giving the computer many data samples so that it learns to identify something (training) then having the computer look at new data and identify it. My first thought was perhaps we could use lung imaging to diagnose the virus faster. We could train algorithms with CT scans of healthy lungs and scans of COVID-19 infected lungs. The algorithm should quickly be able to learn the differences and identify people with the virus at a high level of accuracy.
2020 is well upon us and marks some significant events for us across the nation. Not only is it an election year, but this year brings about the 24th National Census. This iteration of the Census is also significant, as it is the first to be conducted with the option to respond online as well as by phone or mail. The Census Bureau has been hard at work to ensure the protection of our personal information, but that does not stop scammers from attempting to take advantage of this opportunity. This event could be very lucrative for scammers using both technological and social engineering-based attacks.