Thanks to deepfakes, the internet is experiencing a new generation of counterfeits: they enable realistic video manipulation with little effort involved. This is due to pioneering technology. Machine learning and neural networks are able to portray people in situations that they’ve never actually been in e.g. in porn. This is how deepfakes on Reddit became so popular. In the future, these...Deepfakes: the next generation of counterfeits
‘I think therefore I am’ – René Descartes’ iconic saying, it seems, may only be half true. If you choose to believe neuroscientists like António Damásio and Joseph E. LeDoux, then cognitive and emotional processes play a part in every rational decision. Even clicking the purchase button in an online shop is a decision that has been unconsciously influenced by emotional information. Or at least...Neuromarketing – the way into the consumer’s brain?
Neural networks generate artificial intelligence. They ensure that Siri, Alexa and Google respond to us appropriately and help medical professionals recognize diseases earlier. The technology itself is not new, but it has seen rapid development in recent years. In the following, we will explain how neural networks function.Neural networks: what can artificial neural networks do?
A wide array of database models exists, each one with its own advantages and disadvantages. Key Value Stores, for example, provide lightning-quick results because they follow such a simple principle. A key is saved to each value. There are no more specifications. These Key Value Databases are used principally in website design.Key Value Store: How do Key Value Databases work?
The network protocol CalDAV allows you to synchronize calendar data such as appointments and meetings on your PC, smartphone or tablet. The events are then displayed presentably in iCalender format and managed in a WebDAV environment. We’ll explain what CalDAV is exactly and how you can use it yourself.CalDAV - What’s behind the network protocol?
Would you leave your window open at night if you knew there were intruders lurking about? Obviously the answer to this question is ‘no’. Many companies and individuals leave their virtual window open to cyber criminals by not adequately protecting their websites. Website security is an extremely important topic. Only by regularly carrying out security checks and following the proper precautions...Website security: how to protect your web presence
Choosing the right CMS for your small to medium-sized business isn’t easy, but you certainly can’t complain about a lack of choices. The problem is that this diversity can quickly lead to a system that is far too complex for your requirements and leaves you at a disadvantage. In this guide, we’ll give you tips on what to consider when looking for the perfect content management software for your...CMS for small websites – how to find the right software
Life without networks, especially the Internet, is unimaginable nowadays. Interconnected servers, PCs and mobile devices are virtually indispensable at home and at work. However, most of us know very little about the fundamentals of these networks. All the more reason to take a closer look at the Transmission Control Protocol (TCP), the central control component for data transmission.TCP (Transmission Control Protocol) – The transmission protocol explained
Websites and apps are subject to constant change. New features and functions often promise a higher-value, securer or better-performing web project, which is why their implementation is often a mere formality. Many browsers, however, clearly lag behind when it comes to supporting cutting-edge web technologies – a problem that you can counteract with so-called polyfills.Polyfills: code components for cutting-edge web features