POPULARITY
When I reflect on all the exciting things happening with the podcast, not only am I incredibly grateful, but it's also really fun to look back at how it all started. So in this episode, I'm re-listening to my first handful of episodes and asking myself, “Do they still hold up?!” I thought before listening that I had a pretty good idea of what I said in these early episodes, but I actually kind of surprised myself sometimes! Listen in as I share the details on what has stood the test of time… and what I have a new way of thinking about. Here's a preview: Stood the test of time: 3 important things for your Instagram Email signature Directing people to a contact form on your website Getting a Google Business Profile Instagram caption ideas & social media schedulers Automation ideas & endorsement for 17hats CRM Profit First cash flow system I have a new way of thinking about: Some of the resources I created and mentioned in the early episodes Business email accounts Importance of styled shoots Watermarking photos I also share my episode plan for the year, in case you're curious! And in the UGlu Hotline, hear a tip for transporting framework in a personal vehicle. RESOURCES MENTIONED: Presenting sponsor: 17hats (get 50% off your 1st year) Other sponsors & resources: Havin' A Party Wholesale (save 5% with code BRIGHT) Courtney Lynette Creative Co 2025 Bright Balloon Business Planner UGlu by Pro Tapes (save 5% at Havin' A Party with code BRIGHT) Call into the UGlu Hotline to ask a question or leave advice! (262) 221-8514 Balloon Boss Mastermind & Summit - - - - Get bonus episodes 50 Ideas for Email Marketing | Join the Bright Balloon email list Freeform Freedom | More courses @thebrightballoon The Bright Balloon on YouTube
How fast is the AI race really going? What is the current state of Quantum Computing? What actually *is* the P vs NP problem? - former OpenAI researcher and theoretical computer scientist Scott Aaronson joins Liv and Igor to discuss everything quantum, AI and consciousness. We hear about his experience working on OpenAI's "superalignment team", whether quantum computers might break Bitcoin, the state of University Admissions, and even a proposal for a new religion! Strap in for a fascinating conversation that bridges deep theory with pressing real-world concerns about our technological future. Chapters: 1:30 - Working at OpenAI 4:23 - His Approaches to AI Alignment 6:23 - Watermarking & Detection of AI content 19:15 - P vs. NP 27:11 - The Current State of AI Safety 37:38 - Bad "Just-a-ism" Arguments around LLMs 48:25 - What Sets Human Creativity Apart from AI 55:30 - A Religion for AGI? 1:00:49 - More Moral Philosophy 1:05:24 - The AI Arms Race 1:11:08 - The Government Intervention Dilemma 1:23:28 - The Current State of Quantum Computing 1:36:25 - Will QC destroy Cryptography? 1:48:55 - Politics on College Campuses 2:03:11 - Scott's Childhood & Relationship with Competition 2:23:25 - Rapid-fire Predictions Links: ♾️ Scott's Blog: https://scottaaronson.blog/ ♾️ Scott's Book: https://www.amazon.com/Quantum-Computing-since-Democritus-Aaronson/dp/0521199565 ♾️ QIC at UTA: https://www.cs.utexas.edu/~qic/ Credits Credits: ♾️ Hosted by Liv Boeree and Igor Kurganov ♾️ Produced by Liv Boeree ♾️ Post-Production by Ryan Kessler The Win-Win Podcast: Poker champion Liv Boeree takes to the interview chair to tease apart the complexities of one of the most fundamental parts of human nature: competition. Liv is joined by top philosophers, gamers, artists, technologists, CEOs, scientists, athletes and more to understand how competition manifests in their world, and how to change seemingly win-lose games into Win-Wins. #WinWinPodcast #QuantumComputing #AISafety #LLM
Agents, agents, and more agents! In Episode 27 of Mixture of Experts, host Tim Hwang is joined by Volkmar Uhlig and Vyoma Gajjar. First, the experts chat about Mark Benioff's spicy tweet, and what this means for the future of AI agents. Next, how much energy is needed to power AI models, and should we be concerned? Then, the experts debrief Anthropic's release of computer use. Finally, Google is integrating SynthID-Text into Gemini to help watermark AI-generated text, do we need this feature? Learn more on today's Mixture of Experts.The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity.
NTD Good Morning—8/26/20241. US Works to Avert Escalation After Israel-Hezbollah Exchange2. Reuters Safety Adviser Killed in Missile Strike in Ukraine3. US Targets Russian, Chinese Firms for Aiding Russia4. Harris, Walz Head to Georgia5. Watermarking, Validation Needed to Combat AI Risk: Advocate6. Flash Flooding in Grand Canyon Claims Life of Hiker7. French Media: Telegram Co-Founder Detained8. Microsoft Plans Summit After Crowdstrike Outage9. Italy Begins Manslaughter Probe Into Yacht Sinking10. SpaceX Will Bring 2 NASA Astronauts Home11. How Will Kennedy Endorsement Affect Trump Campaign?12. Dr. Fauci Recovering From West Nile Virus13. Why Teens are so Drawn to Social Media14. How Travel Spending is Shifting15. NJ Transit Offering 'Fare Holiday' Next Week16. French Mark 80 Years of Paris Liberation From Nazis17. Paralympic Torch Crosses Channel and Begins French Journey18. Titanic Article Discovered in Wardrobe Auctioned Off19. Redheads Gather to Light up Dutch Festival20. Chef Defies Doctors With Device That Keeps Him Cooking21. The Resilient Academic: Barbara Gitenstein's Journey22. What's Next for the Democratic and Republican Parties?23. Hurricane Sales Tax Holiday Underway in Florida24. Mountains See Early Dusting of Snow in August25. 102-Year-Old Woman Becomes UK's Oldest Skydiver26. Why Inflation is Low But Prices Remain High27. Realtors Adapt to New Buyer Agent Rules
In episode 578, Kathy Berget teaches us what to do when our blog images have been used without our permission and how to get compensated for them. Kathy is the author, photographer, recipe developer, and writer at Beyond the Chicken Coop where she creates delicious home-cooked recipes utilizing what they grow and raise. Kathy is a former elementary school principal and has three grown kids; twin boys and one girl. Kathy and her husband live in the country on their own little farm. In this episode, you'll learn about copyright for images, ways in which you can respond and how to use image theft protection services like Pixsy to get compensated. Key points discussed: - Image theft is a common issue for food bloggers: Food blog images are often stolen or used without permission by various businesses, including restaurants, markets, and online retailers. - Copyright protection is automatic for blog images: Photographers automatically have copyright over their images, even without formal registration. - Services like Pixsy can help track and fight image theft: Pixsy is an online service that helps photographers find and fight unauthorized use of their images. - Responding to image theft requires a balanced approach: Do not obsess over every instance of image theft - selectively pursue cases that are worth the time and effort (especially if images are used for commercial purposes). - Watermarking images can increase their value if stolen: Removing or altering a watermark on an image can actually increase its value if used without permission. - Educating the public about image rights is an ongoing challenge: Many people may be unaware that using images found online without permission is considered theft. - Persistence and documentation are key when pursuing image theft cases: It's important to thoroughly document evidence and follow through with service providers like Pixsy. - Maintaining a positive attitude is important when dealing with image theft: Do no let image theft issues negatively impact your overall mindset and productivity. If You Loved This Episode… You'll love Episode 390 with Rob Finkelstein - Legal Issues Every Food Photographer Should Consider Connect with Kathy Berget Website | Instagram
CrowdStrike said Delta's woes aren't its fault after the massive IT outage, OpenAI confirms it's looking into text watermarking for ChatGPT that could expose cheating students, and Nat Geo's first Vision Pro immersive environment takes you to Iceland. It's Tuesday, August 6th and this is Engadget News. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Plus, Apple has finally started sending out payments from its butterfly keyboard settlement. Learn more about your ad choices. Visit podcastchoices.com/adchoices
#SecurityConfidential #DarkRhiinoSecurity Aaron is a Security Confidential Alumni, Entrepreneur, Author, former VP of Microsoft in China, and the CEO of Nametag Inc, the company that invented “Sign in with ID” as a more secure alternative to passwords. 00:00 Intro 00:57 Our Guest 01:46 Social Engineering trends 04:03 Deep fakes: how does it work? 09:18 Watermarking content 11:30 Deepfake Prevention: Injection attack 13:11: Deepfake prevention: Presentation attack 15:00 How do you verify behind a screen? 27:16 Hidden security in your phones 32:08 Social Engineering and MFA in Healthcare 41:18 How to maintain LOYAL Employees 46:15 China: Friend or Foe? 50:13 Connecting with Aaron ------------------------------------------------------------------ Watch our other episode with Aaron: https://youtu.be/m2PLow9cWSE ------------------------------------------------------------------ To learn more about Nametag visit https://getnametag.com/ To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com ----------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @Darkrhiinosecurity Facebook: @Dark-Rhiino-Security-Inc Twitter: @darkrhiinosec LinkedIn: @dark-rhiino-security Youtube: @DarkRhiinoSecurity ------------------------------------------------------------------ #darkrhiinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday
In this episode, we discuss Microsoft's investment in G42 and questions surrounding G42's ties to China (1:12), the latest reporting about the Israeli military's use of AI and policy implications advanced technologies in warfare (9:23), and Meta's new watermarking policy (23:01). aipolicypodcast@csis.org Wadhwani Center for AI and Advanced Technologies | CSIS The DARPA Perspective on AI and Autonomy at the DOD | CSIS Events Scaling AI-enabled Capabilities at the DOD: Government and Industry Perspectives: The State of DOD AI and Autonomy Policy:
Dive into the realm of innovation with Microsoft's revolutionary AI features and their strategy for implementing image watermarking. Explore how these advancements are poised to reshape the AI landscape and enhance content protection in the digital era. Get on the AI Box Waitlist: AIBox.aiJoin our ChatGPT Community: Facebook GroupFollow me on Twitter: Jaeden's Twitter
ChatGPT: OpenAI, Sam Altman, AI, Joe Rogan, Artificial Intelligence, Practical AI
Join us as we uncover Microsoft's next-gen AI features and their plans to introduce image watermarking. Delve into the potential of these advancements to drive innovation and safeguard digital content in an AI-powered world. Get on the AI Box Waitlist: AIBox.aiJoin our ChatGPT Community: Facebook GroupFollow me on Twitter: Jaeden's Twitter
Explore the forefront of AI innovation with Microsoft's cutting-edge announcements and their strategic approach to image watermarking. Join the conversation as we examine the potential impact of these advancements on digital content creation and protection. Get on the AI Box Waitlist: AIBox.aiJoin our ChatGPT Community: Facebook GroupFollow me on Twitter: Jaeden's Twitter
Explore the latest from Microsoft as they announce groundbreaking AI features and unveil plans for image watermarking. Delve into the potential of these advancements to revolutionize the AI landscape and enhance content security in the digital age. Get on the AI Box Waitlist: AIBox.aiJoin our ChatGPT Community: Facebook GroupFollow me on Twitter: Jaeden's Twitter
Join the revolution in visual security as DeepMind and Google Cloud unveil their invisible AI image watermarking solution. Delve into the collaborative efforts reshaping the landscape of image protection and authenticity. Get on the AI Box Waitlist: AIBox.ai Join our ChatGPT Community: Facebook Group Follow me on Twitter: Jaeden's Twitter
In this episode, we analyze Steg.AI's recent $5 million seed round, exploring the significance of their invisible watermarking technology and its potential applications in enhancing the security of images and documents. Invest in AI Box: https://Republic.com/ai-box Get on the AI Box Waitlist: https://AIBox.ai/ AI Facebook Community Learn About ChatGPT Learn About AI at Tesla
Embark on a journey into the realm of invisible safeguards as DeepMind and Google Cloud collaborate on AI image watermarking innovation. Explore the protective measures that redefine the security of visual content. Get on the AI Box Waitlist: AIBox.ai Join our ChatGPT Community: Facebook Group Follow me on Twitter: Jaeden's Twitter
ChatGPT: OpenAI, Sam Altman, AI, Joe Rogan, Artificial Intelligence, Practical AI
Explore the collaboration between DeepMind and Google Cloud as they become guardians of visual integrity through invisible AI image watermarking. Uncover the transformative impact on securing and preserving the authenticity of visual content. Get on the AI Box Waitlist: AIBox.ai Join our ChatGPT Community: Facebook Group Follow me on Twitter: Jaeden's Twitter
Step into the future of image protection with the invisible AI image watermarking partnership between DeepMind and Google Cloud. Explore the innovative collaboration that promises to revolutionize visual content security. Get on the AI Box Waitlist: AIBox.ai Join our ChatGPT Community: Facebook Group Follow me on Twitter: Jaeden's Twitter
Marvel at the technological prowess as Steg.AI raises $5M to perfect invisible watermarking on digital assets. Join this episode to explore the marvels, potential applications, and the transformative impact of Steg.AI's cutting-edge technology on the security of digital content.
In this episode, we explore the world of invisible signatures as I delve into the confluence between DeepMind and Google Cloud in the arena of AI image watermarking. Join me for a solo discussion, where we uncover the techniques, applications, and the transformative potential of this collaboration in safeguarding digital imagery. Invest in AI Box: https://Republic.com/ai-box Get on the AI Box Waitlist: https://AIBox.ai/ AI Facebook Community Learn About ChatGPT Learn About AI at Tesla
ChatGPT: OpenAI, Sam Altman, AI, Joe Rogan, Artificial Intelligence, Practical AI
Immerse yourself in the digital revolution as Steg.AI secures $5M in a seed round, shaping the future of watermarking technology. Join this episode for a deep dive into the financial backing, technological advancements, and the potential applications of Steg.AI's innovative approach to digital content protection.
Embark on a journey into the tech frontier as Steg.AI's $5M seed round sets new standards in watermarking technology. Join this episode to delve into the frontiers of technology, explore the challenges faced, and discuss the potential advancements in securing digital content.
Stay ahead of the curve as Steg.AI secures $5M in funding for its invisible watermarking innovation, setting the stage for the future of digital content protection. Join this episode to explore the financial backing, technological advancements, and the potential applications of Steg.AI's cutting-edge technology.
Join me in this episode as we discuss Microsoft's recent foray into AI advancements, including major features and the introduction of watermarking for AI-generated images. We explore the implications of these developments and how they position Microsoft at the forefront of AI innovation. Invest in AI Box: https://Republic.com/ai-box Get on the AI Box Waitlist: https://AIBox.ai/ AI Facebook Community Learn About ChatGPT Learn About AI at Tesla
In this episode, we uncover the groundbreaking collaboration between DeepMind and Google Cloud, revealing their trailblazing approach utilizing AI for imperceptible image watermarking, potentially revolutionizing digital asset protection. Invest in AI Box: https://Republic.com/ai-box Get on the AI Box Waitlist: https://AIBox.ai/ AI Facebook Community Learn more about AI in Video Learn more about Open AI
In this episode, we explore the strategic alliance formed by DeepMind and Google Cloud, focusing on their joint efforts to develop Invisible AI Image Watermarking and its potential significance in safeguarding digital content. Invest in AI Box: https://Republic.com/ai-box Get on the AI Box Waitlist: https://AIBox.ai/ AI Facebook Community Learn About ChatGPT Learn About AI at Tesla
In this episode, we unravel the hidden brilliance behind Steg.AI's $5 million seed funding, unlocking the potential for groundbreaking advancements in the realm of invisible watermarking for images and documents. Invest in AI Box: https://Republic.com/ai-box Get on the AI Box Waitlist: https://AIBox.ai/ AI Facebook Community Learn About ChatGPT Learn About AI at Tesla
On this episode of The AI Moment, we discuss an emerging Gen AI trend: Watermarking & other strategies for licensing AI training data & combating malicious AI generated content. As we move into year two of Generative AI, some themes have emerged in terms of the downsides to the technology. Two of the biggest downsides have been: Combating malicious or misleading AI-generated content, and Copyright/IP rights for both non AI generated and AI generated content Initiatives by Google, Fox-Polygon, the Content Authenticity Initiative and academic researchers focused primarily on digital watermarking are the latest and most prominent attempts to address these issues. What will the impact of this trend be to enabling or stifling gen AI be?
In this episode, we explore the latest strides made by Microsoft in the realm of artificial intelligence, covering the announcement of significant features and the introduction of watermarking for AI-generated images. Join me as we delve into the details of these advancements and their potential impact on the AI landscape. Invest in AI Box: https://Republic.com/ai-box Get on the AI Box Waitlist: https://AIBox.ai/ AI Facebook Community Learn About ChatGPT Learn About AI at Tesla
In this episode, we explore the groundbreaking collaboration between DeepMind and Google Cloud, diving into their innovative approach to invisible AI image watermarking and its implications. Invest in AI Box: https://Republic.com/ai-box Get on the AI Box Waitlist: https://AIBox.ai/ AI Facebook Community
Join me as we dissect the synergistic efforts of DeepMind and Google Cloud, delving into their pioneering strides in deploying invisible AI image watermarking technology. Invest in AI Box: https://Republic.com/ai-box Get on the AI Box Waitlist: https://AIBox.ai/ AI Facebook Community
In this episode, I unravel Steg.AI's revolutionary technology securing images and documents through invisible watermarking, diving into the significance of their recent $5M seed funding. Invest in AI Box: https://Republic.com/ai-box Get on the AI Box Waitlist: https://AIBox.ai/ AI Facebook Community
Discover in this episode the key highlights from Microsoft's latest AI announcements and dive deep into the concept of watermarking AI-generated images, exploring its implications and importance. Invest in AI Box: https://Republic.com/ai-box Get on the AI Box Waitlist: https://AIBox.ai/ AI Facebook Community Learn more about AI in Video Learn more about Open AI
In this episode, we delve into the implications of Steg.AI's $5 million investment in developing state-of-the-art invisible watermarking. We discuss the benefits for digital artists and the broader implications for content security. Invest in AI Box: https://Republic.com/ai-box Get on the AI Box Waitlist: https://AIBox.ai/ AI Facebook Community Learn more about AI in Video Learn more about Open AI
In this episode, explore Steg.AI's revolutionary strides with a $5M seed funding dedicated to advancing invisible watermarking technology for images and documents. Join me as I analyze the tech implications, applications, and the potential future of data security in this domain. Invest in AI Box: https://Republic.com/ai-box Get on the AI Box Waitlist: https://AIBox.ai/ AI Facebook Community Learn more about AI in Video Learn more about Open AI
2024 will be the biggest election year in world history. Forty countries will hold national elections, with over two billion voters heading to the polls. In this episode of Your Undivided Attention, two experts give us a situation report on how AI will increase the risks to our elections and our democracies. Correction: Tristan says two billion people from 70 countries will be undergoing democratic elections in 2024. The number expands to 70 when non-national elections are factored in.RECOMMENDED MEDIA White House AI Executive Order Takes On Complexity of Content Integrity IssuesRenee DiResta's piece in Tech Policy Press about content integrity within President Biden's AI executive orderThe Stanford Internet ObservatoryA cross-disciplinary program of research, teaching and policy engagement for the study of abuse in current information technologies, with a focus on social mediaDemosBritain's leading cross-party think tankInvisible Rulers: The People Who Turn Lies into Reality by Renee DiRestaPre-order Renee's upcoming book that's landing on shelves June 11, 2024RECOMMENDED YUA EPISODESThe Spin Doctors Are In with Renee DiRestaFrom Russia with Likes Part 1 with Renee DiRestaFrom Russia with Likes Part 2 with Renee DiRestaEsther Perel on Artificial IntimacyThe AI DilemmaA Conversation with Facebook Whistleblower Frances HaugenYour Undivided Attention is produced by the Center for Humane Technology. Follow us on Twitter: @HumaneTech_
Content authenticity and enforcing copyright in the age of AI are proving difficult problems to solve.
In this episode, we discuss the AI gold rush and its impact on businesses. According to a study by IDC, companies are reaping 3.5 times returns on their AI investments, with a return on investment within 14 months on average. The report also highlights how generative AI is driving increased interest and investment in the technology. Additionally, the Oxford Internet Institute conducted a study that found AI skills and knowledge can increase a worker's salary by up to 40%. The study examined over 1,000 skills in 25,000 workers, showing the positive impact of AI-related knowledge on potential salaries.Three things to know today00:00 The AI Gold Rush Pays: Companies Reap 3.5x Returns & Salaries Surge by 40%04:50 Federal AI Blueprint Draws Industry Eyeballs as OMB Solicits Public Wisdom07:58 Watermarking, the AI Apocalypse, & Adult Content Leveraging AIAdvertiser: https://movebot.io/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Support the show on Patreon: https://patreon.com/mspradio/Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.comFollow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftech
ChatGPT: News on Open AI, MidJourney, NVIDIA, Anthropic, Open Source LLMs, Machine Learning
Join us for an exciting episode as we delve into Microsoft's significant AI announcements, including the introduction of new features and the implementation of AI image watermarking. Explore the implications of these updates for a variety of applications and industries. Discover how Microsoft's innovations are reshaping the landscape of artificial intelligence in this must-listen podcast. Get on the AI Box Waitlist: https://AIBox.ai/Join our ChatGPT Community: https://www.facebook.com/groups/739308654562189/Follow me on Twitter: https://twitter.com/jaeden_ai
ChatGPT: News on Open AI, MidJourney, NVIDIA, Anthropic, Open Source LLMs, Machine Learning
DeepMind and Google Cloud join forces to revolutionize image watermarking with cutting-edge AI technology. Join us as we explore how this partnership is creating invisible watermarks to protect your digital images and artwork. Discover the potential impact on copyright protection and digital content security in this episode. Get on the AI Box Waitlist: https://AIBox.ai/Join our ChatGPT Community: https://www.facebook.com/groups/739308654562189/Follow me on Twitter: https://twitter.com/jaeden_ai
AI Applied: Covering AI News, Interviews and Tools - ChatGPT, Midjourney, Runway, Poe, Anthropic
In this episode, we delve into the groundbreaking $5 million seed funding round acquired by Steg.AI, a trailblazing company specializing in invisible watermarking for images and documents. Join us as we explore the implications of this significant investment and how Steg.AI is poised to transform the way we secure and protect digital content. Discover the innovative technology behind invisible watermarking and its potential applications in various industries. Get on the AI Box Waitlist: https://AIBox.ai/Join our ChatGPT Community: https://www.facebook.com/groups/739308654562189/Follow me on Twitter: https://twitter.com/jaeden_ai
ChatGPT: News on Open AI, MidJourney, NVIDIA, Anthropic, Open Source LLMs, Machine Learning
In this episode, we explore Steg.AI's impressive achievement of securing a $5 million seed round, propelling their mission to redefine image and document security through invisible watermarking technology. Join us as we uncover the potential applications of this cutting-edge solution across various industries and how it is set to reshape the way we protect and authenticate digital content. Dive into the innovative world of Steg.AI and their ambitious journey to enhance security in the digital age. Get on the AI Box Waitlist: https://AIBox.ai/Join our ChatGPT Community: https://www.facebook.com/groups/739308654562189/Follow me on Twitter: https://twitter.com/jaeden_ai
This episode is sponsored by Shopify. Shopify is a commerce platform that allows anyone to set up an online store and sell their products. Whether you're selling online, on social media, or in person, Shopify has you covered on every base. With Shopify you can sell physical and digital products. You can sell services, memberships, ticketed events, rentals and even classes and lessons. Sign up for a $1 per month trial period at http://shopify.com/eyeonai On episode #145 of Eye on AI, Craig Smith sits down with Riley McCormack, President and CEO of Digimarc, pioneers in digital watermarking and cloud-based product data. In this episode, we explore the critical role of digital watermarking in securing our digital assets, especially amidst the surging influence of AI. Riley guides us through the potential risks and benefits this technology brings to the forefront as AI continues to transform our digital world. We then navigate the intricate territories of NFTs and distributed ledger technology, understanding how digital watermarking is reshaping these fields by ensuring trust and authenticity. Our discussion also delves into the Digital Millennium Copyright Act of 1997, highlighting its relevance in upholding copyrights and fostering trust within the digital stratosphere. We conclude with a look at how digital watermarking impacts content creation and its role in shaping a secure and sustainable digital future, from collaborations with central banks to innovative products like Digimarc Recycle. Craig Smith Twitter: https://twitter.com/craigss Eye on A.I. Twitter: https://twitter.com/EyeOn_AI 00:00 Preview, Introduction and Shopify 03:05 Introduction to Digital Watermarking 07:01 Evolution of Digital Watermarking 14:21 Digimarc's Role in Digital Watermarking 21:13 Exploring the Protection Of Digital Content 28:56 Key Characteristics of Digital Watermarking 35:12 Application and Implementation of Digital Watermarking 42:46 Watermarking in Blockchain 49:11 What is Digimarc Validate? 01:03:01 Outro and Shopify
Hi folks!Things get a little wild as Cathi Bond looks at Cortical Labs, which is researching how to design computational systems from a mixture of stem cells and a silicon substrate (via New Atlas). We take a speculative look at a potential future of biological computing.Meanwhile, Nora Young looks at this Wired article on research into watermarking AI-generated images, and just how difficult that is turning out to be. How will we deal with the proliferation of deepfakes and similar forms of disinformation?
AI Hustle: News on Open AI, ChatGPT, Midjourney, NVIDIA, Anthropic, Open Source LLMs
Tune in to this episode as we uncover the latest developments from Microsoft, where they introduce major AI features and announce a game-changing move to watermark AI-generated images. Explore the exciting possibilities these advancements hold for various industries and how they'll impact the world of AI and image recognition. Stay informed about Microsoft's cutting-edge contributions to the ever-evolving landscape of artificial intelligence. Get on the AI Box Waitlist: https://AIBox.ai/Join our ChatGPT Community: https://www.facebook.com/groups/739308654562189/Follow me on Twitter: https://twitter.com/jaeden_ai
AI Hustle: News on Open AI, ChatGPT, Midjourney, NVIDIA, Anthropic, Open Source LLMs
In this episode, we delve into the groundbreaking collaboration between DeepMind and Google Cloud, unveiling their cutting-edge AI image watermarking technology that promises to revolutionize content protection and ownership. Join us as we explore how this invisible AI watermarking works and its potential implications for the future of digital content security. Tune in for an exclusive conversation with experts from both DeepMind and Google Cloud as they share insights into this game-changing innovation. Get on the AI Box Waitlist: https://AIBox.ai/Join our ChatGPT Community: https://www.facebook.com/groups/739308654562189/Follow me on Twitter: https://twitter.com/jaeden_ai
AI Hustle: News on Open AI, ChatGPT, Midjourney, NVIDIA, Anthropic, Open Source LLMs
Join us as we dive into the world of digital security and privacy with Steg.AI, a startup making waves with its innovative invisible watermarking technology. In this episode, we explore how Steg.AI's $5 million seed round is set to transform the way we protect digital assets, from images to documents. Discover the secrets behind their groundbreaking solution and the potential impact it could have on data security. Get on the AI Box Waitlist: https://AIBox.ai/Join our ChatGPT Community: https://www.facebook.com/groups/739308654562189/Follow me on Twitter: https://twitter.com/jaeden_ai
AI Chat: ChatGPT & AI News, Artificial Intelligence, OpenAI, Machine Learning
In this episode, we explore DeepMind's recent partnership with Google Cloud to implement watermarking on AI-generated images, aiming to increase transparency and address ethical concerns. We'll dive into the technology behind watermarking, how this move could impact the AI and digital art communities, and why this is a significant step toward responsible AI use. Get on the AI Box Waitlist: https://AIBox.ai/ Facebook Community: https://www.facebook.com/groups/739308654562189/ Discord Community: https://aibox.ai/discord Follow me on X: https://twitter.com/jaeden_ai
#stablediffusion #ai #watermark Watermarking the outputs of generative models is usually done as a post-processing step on the model outputs. Tree-Ring Watermarks are applied in the latent space at the beginning of a diffusion process, which makes them nearly undetectable, robust to strong distortions, and only recoverable by the model author. It is a very promising technique with applications potentially beyond watermarking itself. OUTLINE: 0:00 - Introduction & Overview 1:30 - Why Watermarking? 4:20 - Diffusion Models Recap 13:40 - Inverting Diffusion Models 17:05 - Tree-Ring Watermarking 26:15 - Effects of Tree-Ring Watermarks 30:00 - Experimental Results 32:40 - Limitations 34:40 - Conclusion Paper: https://arxiv.org/abs/2305.20030 Abstract: Watermarking the outputs of generative models is a crucial technique for tracing copyright and preventing potential harm from AI-generated content. In this paper, we introduce a novel technique called Tree-Ring Watermarking that robustly fingerprints diffusion model outputs. Unlike existing methods that perform post-hoc modifications to images after sampling, Tree-Ring Watermarking subtly influences the entire sampling process, resulting in a model fingerprint that is invisible to humans. The watermark embeds a pattern into the initial noise vector used for sampling. These patterns are structured in Fourier space so that they are invariant to convolutions, crops, dilations, flips, and rotations. After image generation, the watermark signal is detected by inverting the diffusion process to retrieve the noise vector, which is then checked for the embedded signal. We demonstrate that this technique can be easily applied to arbitrary diffusion models, including text-conditioned Stable Diffusion, as a plug-in with negligible loss in FID. Our watermark is semantically hidden in the image space and is far more robust than watermarking alternatives that are currently deployed. Code is available at this https URL. Authors: Yuxin Wen, John Kirchenbauer, Jonas Geiping, Tom Goldstein Links: Homepage: https://ykilcher.com Merch: https://ykilcher.com/merch YouTube: https://www.youtube.com/c/yannickilcher Twitter: https://twitter.com/ykilcher Discord: https://ykilcher.com/discord LinkedIn: https://www.linkedin.com/in/ykilcher If you want to support me, the best thing to do is to share out the content :) If you want to support me financially (completely optional and voluntary, but a lot of people have asked for this): SubscribeStar: https://www.subscribestar.com/yannickilcher Patreon: https://www.patreon.com/yannickilcher Bitcoin (BTC): bc1q49lsw3q325tr58ygf8sudx2dqfguclvngvy2cq Ethereum (ETH): 0x7ad3513E3B8f66799f507Aa7874b1B0eBC7F85e2 Litecoin (LTC): LQW2TRyKYetVC8WjFkhpPhtpbDM4Vw7r9m Monero (XMR): 4ACL8AGrEo5hAir8A9CeVrW8pEauWvnp1WnSDZxW7tziCDLhZAGsgzhRQABDnFy8yuM9fWJDviJPHKRjV4FWt19CJZN9D4n
AI Chat: ChatGPT & AI News, Artificial Intelligence, OpenAI, Machine Learning
In this episode, we delve into Steg.AI's recently secured $5M seed funding, focusing on their innovative technology for invisible watermarking on images and documents. We discuss the company's mission, the problem they're solving in digital security, and the potential impact of their unique solution in the era of rampant data breaches and intellectual property theft. Get on the AI Box Waitlist: https://AIBox.ai/ Investor Contact Email: jaeden@aibox.ai Facebook Community: https://www.facebook.com/groups/739308654562189/ Discord Community: https://aibox.ai/discord Download Selfpause: https://selfpause.com/Podcast Follow me on Twitter... er... X.com: https://twitter.com/jaeden_ai
Welcome to The Nonlinear Library, where we use Text-to-Speech software to convert the best writing from the Rationalist and EA communities into audio. This is: Watermarking considered overrated?, published by DanielFilan on July 31, 2023 on The AI Alignment Forum. Status: a slightly-edited copy-paste of a Twitter X thread I quickly dashed off a week or so ago. Here's a thought I'm playing with that I'd like feedback on: I think watermarking is probably overrated. Most of the time, I think what you want to know is "is this text endorsed by the person who purportedly authored it", which can be checked with digital signatures. Another big concern is that people are able to cheat on essays. This is sad. But what do we give up by having watermarking? Well, as far as I can tell, if you give people access to model internals - certainly weights, certainly logprobs, but maybe even last-layer activations if they have enough - they can bypass the watermarking scheme. This is even sadder - it means you have to strictly limit the set of people who are able to do certain kinds of research that could be pretty useful for safety. In my mind, that makes it not worth the benefit. What could I be missing here? Maybe we can make watermarking compatible with releasing model info, e.g. by baking it into the weights? Maybe the info I want to be available is inherently dangerous, by e.g. allowing people to fine-tune scary models? Maybe I'm missing some important reasons we care about watermarking, that make the cost-benefit analysis look better? E.g. avoiding a situations where AIs become really good at manipulation, so good that you don't want to inadvertently read AI-generated text, but we don't notice until too late? Anyway there's a good shot I don't know what I'm missing, so let me know if you know what it is. Postscript: Someone has pointed me to this paper that purports to bake a watermark into the weights. I can't figure out how it works (at least not at twitter-compatible speeds), but if it does, I think that would alleviate my concerns. Thanks for listening. To help us out with The Nonlinear Library or to learn more, please visit nonlinear.org.
Show Notes:00:10: The core SEO changes at Google I/O2:14: Health and finance topics will not be affected (so far)3:08: Watermarking for generative content creators4:51: New layouts in Google SERP6:12: New impact on affiliate website7:43: Query complexity and how it influences content choice8:30: Google's incentives for content and websites continues10:30: RLHF, “Reinforcement Learning from Human Feedback13:42: Visual design importance18:06: How to increase efficiency in SEO with AI21:02: Visual design importance, continued21:47: Why complex queries are the best defense22:22: How to stay on top of optimization as AI evolves24:57: Final tips, tactics, and tricksShow Links:The AI Takeover of Google Search by The Verge“Watermarking” and Content from Google I/O“Conversational Mode” from Google I/OFollow Drew on TwitterFollow Ross on TwitterSend Us an Email
How should we scientifically think about the impact of AI on human civilization, and whether or not it will doom us all? In this episode, I speak with Scott Aaronson about his views on how to make progress in AI alignment, as well as his work on watermarking the output of language models, and how he moved from a background in quantum complexity theory to working on AI. Note: this episode was recorded before this story emerged of a man committing suicide after discussions with a language-model-based chatbot, that included discussion of the possibility of him killing himself. Patreon: https://www.patreon.com/axrpodcast Store: https://store.axrp.net/ Ko-fi: https://ko-fi.com/axrpodcast Topics we discuss, and timestamps: 0:00:36 - 'Reform' AI alignment 0:01:52 - Epistemology of AI risk 0:20:08 - Immediate problems and existential risk 0:24:35 - Aligning deceitful AI 0:30:59 - Stories of AI doom 0:34:27 - Language models 0:43:08 - Democratic governance of AI 0:59:35 - What would change Scott's mind 1:14:45 - Watermarking language model outputs 1:41:41 - Watermark key secrecy and backdoor insertion 1:58:05 - Scott's transition to AI research 2:03:48 - Theoretical computer science and AI alignment 2:14:03 - AI alignment and formalizing philosophy 2:22:04 - How Scott finds AI research 2:24:53 - Following Scott's research The transcript Links to Scott's things: Personal website Book, Quantum Computing Since Democritus Blog, Shtetl-Optimized Writings we discuss: Reform AI Alignment Planting Undetectable Backdoors in Machine Learning Models
This Week in Machine Learning & Artificial Intelligence (AI) Podcast
Today we're joined by Tom Goldstein, an associate professor at the University of Maryland. Tom's research sits at the intersection of ML and optimization and has previously been featured in the New Yorker for his work on invisibility cloaks, clothing that can evade object detection. In our conversation, we focus on his more recent research on watermarking LLM output. We explore the motivations behind adding these watermarks, how they work, and different ways a watermark could be deployed, as well as political and economic incentive structures around the adoption of watermarking and future directions for that line of work. We also discuss Tom's research into data leakage, particularly in stable diffusion models, work that is analogous to recent guest Nicholas Carlini's research into LLM data extraction.
ChatGPT presents the potential problem of ChatGPT content being used and attributed to another source, such as a professional writer or a student. In this episode we discuss the idea of "watermarking" ChatGPT content, including stenography, randomness, entropy, and how to destroy the watermarks.
On this week's episode of the podcast I cover a lot of recent updates on OpenAI, news of a recent out-of-band patch from Microsoft, info on Java pricing changes and much more! Reference Links: https://www.rorymon.com/blog/password-managers-targeted-for-attacks-ai-is-so-hot-right-now-avd-watermarking/
Industry conferences were in full swing last month, and the topics in this title provide a sense of what Chris and I talked about. October travel took me to three continents, so our perspectives are broad, and we don't think you'll mind this being a longer-than-usual episode.
「HarmonicとNAGRA、スポーツのライブ配信向けの「Watermarking as a Service」発表」 Harmonic社およびNAGRAは、スポーツのライブ配信コンテンツの保護を強化する新しい「Watermarking as a Service」を提供するための協業を発表した。
In 2022, broadcasters are close to launching commercial applications of ATSC 3.0. Watermarking provides a technology for ATSC 3.0 TV broadcasters to encode data that can pass through set-top box and HDMI connections. With watermark capabilities on LG NEXTGEN TVs, cable networks and regional sports networks can join local TV stations and national networks in planning to bring interactive capabilities to the living room. The watermarks enable the broadcasters to provide the same interactive experiences for over-the-air and non-over-the-air viewers. As these two-way interactive capabilities of NEXTGEN TV expand to additional households, consumers will enjoy more customized and localized experiences resulting in personalized broadcast television.Rick Ducey, BIA's Managing Director, discusses this valuable tech for broadcasting with Richard Glosser, Head of Business Development at Verance Corporation. Mitch Oscar, Director of Advanced Advertising Strategies at USIM, also joins the discussion.
What's in a brand? Does it reflect your personality? In this episode we talk about how we present ourselves in public, private and on social media. We talk about how YOU are your brand. People will get to know your cookie style, cookie photos and attach an ideal to, or about you. How do you protect what you put 'out there'? Are you good at Watermarking every photo before you publish or share it? How do you decide if you will post about an issue on your social media that has nothing to do with cookies? Tune in and listen to our different perspectives on our brands and how we manage them.
Within the framework of the Holy Grail 2.0 project, major players across the value chain come together to improve packaging waste sorting accuracy through digital watermarking. We hear from Beiersdorf's Sabrina Stiegler and All4Labels' Michael Brocher about how the two companies collaborated to move digital watermarking from innovation to implementation.
If you want to understand why your OTT TV service needs DRM and watermarking implemented in the cloud to protect your content, this podcast is for you. The CEO of BuyDRM breaks down the why, how, and what of the tech you'll need. Listeners to this podcast can sign up for the Video Security Summit for free, where you will hear from BuyDRM and many other security experts.
In this episode of Cyber Security Inside, Tom and Camille dive into how content producers and distributors are keeping content secure in a world of piracy and streaming. What makes it possible for us to safely stream content directly into our homes? How do we know what we’re streaming isn’t pirated in some way? Avi Wachtfogel, Engineering Fellow and Senior Director of Security Strategy at Synamedia, is just the person to cover the evolution of media content security and share the latest threats and best strategies for keeping content secure. The conversation covers: • Macrovision • VHS + DVD • Torrenting and peer-to-peer sharing • BitTorrent • VOD • Over-the-top (OTT) • Hulu, YouTube, HBO Max, Netflix, etc. • Credential fraud • Deep fakes • Content protection and service protection • Watermarking • Take down notices ... and more Don’t miss it! Here are some key take-aways: • With video being distributed more broadly and going straight to streaming, protecting and securing media content has become even more challenging. • Hardware and software technologies have been used on the service protection side to solve the problem of bootleg cable and other content security concerns of the 90s and 2000s. • Over the top (OTT) refers to the distribution of video content over a high-speed Internet connection. This covers streaming services like Netflix, HBO Max, etc. • It’s relatively simple to start an OTT service, so it’s more important than ever to keep media content protected against piracy. If pirates get access to the content, they can re-stream/distribute it. • Pirates also create distribution chains, selling to other pirates who then sell to consumers. You see this often with live events. There are even salesmen who go door-to-door selling these IPTV services. Content consumers are often confused about whether the content they’re getting is legal or not. • Licensing agreements that limit when and where content can be consumed can actually drive consumers to seek out pirate streaming sites. • Credential fraud allows people to access content without legally subscribing to a streaming service. This is another way service providers lose money. • Using encryption to keep OTT video content secure is a tricky thing. You need to allow those with the device to access the content, but pirates may also be accessing the content legitimately. Protecting that content using encryption is not as straightforward as it is with protecting personal info against external attacks. • The line between content protection and service protection blurs once the content is distributed. • The phases of protection are Protect, Detect, and Disrupt. Protecting won’t always be possible, Detecting involves figuring out who’s distributing the content and where and how they’re distributing it, and Disrupting is taking action and putting a stop to that distribution. • A major challenge with the streaming industry is that everything is so fragmented, and this fragmentation actually encourages piracy. After all, if we’re already subscribed to dozens of services and then a new service creates content we want, where do we draw the line? When do we start seeking that content elsewhere? At some point, these services will have to work together. • If you find that your own content is being distributed on YouTube, Facebook, or on search engines illegally, you can approach the platform. They’re required to take down those illegal links. • The challenge of countering piracy requires technological means (like watermarking and tracking pirate services), as well as legal means (like Take Down notices), and a group effort to make it easier for legal content to be consumed than it is for illegal content to be consumed. Some interesting quotes from today’s episode: “Because the technologies are out there that make it easy to start a [OTT] service, pirates can do the same. And it's just a matter of having access to the content… If you have any device that outputs content -- that can be a set-top box, that can be a PC -- and that content is being output, it can be captured, whether through the HTMI port, or using the screen grabbing software, or even, an extreme case of just taking a camera and having it opposite the monitor. You can capture that content. And once you can capture that content, you can re-stream it.” “One pirate will take a stream, a live stream, say of a sports event, and then they will sell that on to other pirates. So, you have a whole distribution chain and then those pirates will sell it on directly to consumers. And there’ll be resellers who are taking that content and selling it further and further along. There’s a lot of confusion very often among customers actually, as to what they're actually getting -- whether it's legal or not.” “A lot of these services, they call them IPTV services. We've seen in some countries, there will actually be a salesman going door to door. They'll knock on the door and I'll say, you know, ‘For $10 a month, would you like access to these 200 channels? We’ll set it up for you.’ They'll come in, they'll take a box of some sort and go plug it into your TV, and they'll set you up and set up the billing. Some of these guys have got 24/7 support -- pick up the phone and you have support -- and they look really legitimate. And then very often the customers themselves can't tell whether they're signing up for legitimate service or not.” “Very often these kinds of [licensing] arrangements actually drive consumers to use pirate services… We're actually seeing that kind of tendency. People are looking for content. There's actually a rise in the amount of content that's being viewed over Torrents these days because of these kinds of limitations.” “You can go on the dark web -- you can buy a set of credentials for a variety of streaming services and pay a lot less for those than you would if you were subscribing legally. And that’s also a major problem for the service providers today. There's a lot of money that they're losing to those kinds of attacks.” “In the case of video, it's a much more difficult problem because you're trying to protect the content on the device from the person who's holding the device. The pirate actually has a legitimate device with the content on it. And obviously you want a legitimate user to be able to view the content.” “There are different ways of capturing that content and then re-encoding. Today, just encrypting the content is really not enough.” “Whether it's Disney+, HBO Max, Netflix -- these new services are appearing every other day. And we all talk about the ‘streaming wars,’ but at some point they're going to have to recognize that they need to sort of get together and solve, what is really going to be a piracy problem. Because people are going looking for the content. People aren't going to sign up for ten different services. And if they don't happen to be subscribed to the particular service where there's content that they want, they're going to go look for it on Torrents. And so, they're going to have to find some way to work together after this fragmentation happens to sort of re-aggregate the content.” “Today, if you sign up for Spotify or Apple Music or Amazon, you're paying one monthly fee… You don't care what the label is behind the music. You’ve got access to all the music you could want. And when the video industry reaches a point where they make it easier to access content legally than it is to access it illegally, they will have largely solved a lot of the problems that they're seeing today.”
101st Airborne Division (https://www.army.mil/101stAirborne) D&G 189: Marlie Moxinspike (https://dgshow.org/189) The battle inside Signal (https://www.platformer.news/p/-the-battle-inside-signal) See also: Can WhatsApp stop spreading misinformation without compromising encryption? (https://qz.com/1978077/can-whatsapp-stop-misinformation-without-compromising-encryption/) What You Should Know Before Leaking a Zoom Meeting (https://theintercept.com/2021/01/18/leak-zoom-meeting/) The ‘Batman Effect’: How having an alter ego empowers you (https://www.bbc.com/worklife/article/20200817-the-batman-effect-how-having-an-alter-ego-empowers-you) Cutting Room Floor * DIY latex glove bagpipes (https://www.youtube.com/watch?v=y95I0rb1JoU) * Bagpipe swing with Gunhild Carling in Central Park NY (https://www.youtube.com/watch?v=8RbVuDuCYMY) * Menu items renamed as expense-able office items (https://www.ubereats.com/ca/toronto/food-delivery/good-fortune-burger-college/SlS7Rn6dQ1SVb59NxiWt5A) * Blue Check Homes: Apply now! (https://bluecheckhomes.com/) * Evidence of Life: Two Photographers Show Us Mysteries In The Mundane – 1977 (https://flashbak.com/evidence-mike-mandel-larry-sultan-1970s-found-photos-435986/) * Faraday Cages for Wi-Fi Routers Are the Latest 5G Conspiracy Grift (https://www.vice.com/en/article/xgzgw4/faraday-cages-for-wi-fi-routers-are-the-latest-5g-conspiracy-grift) We Give Thanks * The D&G Show Slack Clubhouse for the discussion topics!
What are the potential benefits of digital watermarking for recycling and beyond? On the occasion of the launch of the HolyGrail 2.0 project, Elisabeth Skoda speak to Michelle Gibbons, Director General at AIM, and to Gareth Callan, Sustainability Packaging Manager at PepsiCo and member of the HolyGrail leadership team to find out more. Sponsored by: Smurfit Kappa No.1 company in Europe producing corrugated packaging, container board and ‘bag in box'
Link to bioRxiv paper: http://biorxiv.org/cgi/content/short/2020.09.04.283135v1?rss=1 Authors: Oksuz, A. C., Ayday, E., Gudukbay, U. Abstract: Genome data is a subject of study for both biology and computer science since the start of Human Genome Project in 1990. Since then, genome sequencing for medical and social purposes becomes more and more available and affordable. Genome data can be shared on public websites or with service providers. However, this sharing compromises the privacy of donors even under partial sharing conditions. We mainly focus on the liability aspect ensued by unauthorized sharing of these genome data. One of the techniques to address the liability issues in data sharing is watermarking mechanism. To detect malicious correspondents and service providers (SPs) -whose aim is to share genome data without individuals' consent and undetected-, we propose a novel watermarking method on sequential genome data using belief propagation algorithm. In our method, we have two criteria to satisfy. (i) Embedding robust watermarks so that the malicious adversaries can not temper the watermark by modification and are identified with high probability (ii) Achieving {varepsilon}-local differential privacy in all data sharings with SPs. For the preservation of system robustness against single SP and collusion attacks, we consider publicly available genomic information like Minor Allele Frequency, Linkage Disequilibrium, Phenotype Information and Familial Information. Our proposed scheme achieves 100% detection rate against the single SP attacks with only 3% watermark length. For the worst case scenario of collusion attacks (50% of SPs are malicious), 80% detection is achieved with 5% watermark length and 90% detection is achieved with 10% watermark length. For all cases, {varepsilon}'s impact on precision remained negligible and high privacy is ensured. Copy rights belong to original authors. Visit the link for more info
Today George talks about the use of Machine Learning to diagnose Cancer from a blood test. By sampling 'cell-free-DNA' this test is capable of identifying 50 different types of Cancer and the localized tissue of origin with a >90% accuracy. Lan leads a discussion of what robots and researchers in robotics may be able to contribute towards fighting the COVID-19 pandemic. Last but not least, Kyle leads the panel in a discussion about watermarking data!
Aaron Conlon has personally evolved from owning physical assets to accessing game art design templates in the Unity Assets Store. Kevin Kelly suggested this sort of professional practice is inevitable. Andre Louis created the backing track.00:43 currently accessing https://2kmfromhome.com h/t OpenStreet Map with Dave Bolger 01:33 We're talking about accessing with Aaron Conlon https://twitter.com/Aaronsquid02:38 What is accessing 03:39 Aaron's memorable Sony Walkman Flip Phone04:55 Using Spotify to access popular music https://open.spotify.com/show/62fxmUNIJ7mfR6gLsD6dG005:38 Spotify and Netflix 07:40 Critical Role07:51 Insights about Ninetendo from Inside Gaming 08:31 Kindle has changed access for books08:31 Dematerialization https://en.wikipedia.org/wiki/Dematerialization_(economics)10:47 Accessing by game play level 11:15 Refunds for paid access12:46 Access to ePortfolio assets on Google Drive13:51 Collages, pins, and shared assets16:05 Watermarking the Shadowborne sword, then allowing easy access17:48 Unity Asset Store and your extended soul https://assetstore.unity.com/18:35 Accessing Aaron's current work on https://aaronconlon.artstation.com19:30 Music by https://patreon.com/onjmusic19:54 Comment on Limor
Leaving off from the last episode, “The Importance of Copywriting, Watermarking, and Camera Technology”, Michael, Mark and Ron catch up, continuing their conversation discussing photographing in the field and the enjoyment of meeting new wildlife photographers, friends and followers of the podcast. The guys also talk about the changes in the rut.
Michael, Mark, and Ron catch up and discuss all the new camera technology the importance of watermarking and copywriting your images.
In episode #9, we discuss about the top 5 reasons of why property investors should be watermarking their photos and how it will drive more buyer leads. Typically this isn't done, but should be incorporated into your tasks of preparing photos and we discuss the easy and fast tools that will only take a few seconds to watermark all your photos.
This week on Another Photography Podcast, we discuss watermarking your work, a killer milky way shot by Steven Magner, we announce our shirt, and talk about finding/funding the time to go shoot. Shirt announcement! The Just Go Shoot is now available. DM us for more info. Shipping is available We had one of our pictures get posted on another page without credit. Was it a big deal? We think yes, let us know what you think. Steven Magner took at epic shot of the milky way and Temple Crag last week which left us speechless. Check out his work at the link below. On this weeks topic we discuss finding/funding the time to go shoot. It comes down to budgeting, and not being lazy. Ray and Art usually go on big trips together and split the bill. Lastly, should you carry your gear everywhere you go? We have some mixed feelings, let us know how you feel. instagram.com/anotherphotographypodcast instagram.com/through_the_eyes_of_reignbird instagram.com/artveraphotography www.instagram.com/stevenjmagner/
Tonight is Jay Cat's own perspective on TOD16 But first .. -"I gotta vent on a certain dirty mother fu**er" -BoneFrog is coming!! --"Really don't wanna be in the fu**in lake with lightning striking" -This Cosby s**t ... -What should CZW do with Shlak? --"That's called a 'draw', DJ" -Future of DeathMatch wrestling -CZW thoughts --Sami's booking --IPPV -Doors or Tables? -Fire in wrestling -Mayweather vs McGregor --"This'll make money because people are fu**in' stupid" -"Stand the f**k up for the anthem" -More CZW ... --"I can't get a broadcast in motherf***in' Jersey ..." -"There was fu**in' trains then, but we ain't got no motherfu**in' trains now!" -"No Nazi's ... Only Shlak!" -"Did you forget someone?" --"Your camera sucks. Your pictures suck. And you're a fu**in' clown" --"Let me tell you personally why I don't like your fu**in' ass, Matt ..." --"you narrowly avoided permanent disabilities ..." --"The point where you crossed the fu**in' line" --Watermarking s**t from the bleachers -In-Depth review of TOD16 --Credit to Emil Jay --"So far, so MF'N good, right?"
Episode 034 Greetings friends and listeners, today is Fanmail Friday and I have a question from Sarita in Meridian, Idaho who asks, "Hi Sonya, I am in the process of getting my website finalized and I have given my images to my web person, she is telling me that I need to remove the watermarks from my images, but I remember from a previous podcast you said that watermarking the images is necessary, can you please explain this to me again in detail? Greetings Sarita, and thank you so much, I know that so many web people want to make things simplistic and they feel that the watermark is going to compromise the aesthetic from the website..... Ummmm not true! it's the same as if you were telloing them to not to allow them credit if they put their name at the bottom of the website. So, in my opinion, the answer is no, do not remove your watermark. However, I will say that the watermark does need to be thought out and doesn't need to take up the whole entire span of your image, it also should not be blasted across the center of your image, often times this is a turn off to the consumer and it should be in a lighter transparent layer something that isn't over taking images but will let the average viewer who might stumble on your images in that big fast Internet Highway know who who created the work. I also know that some web experts want to place high-resolution images spanning 1200 x 1200 pixels. Eeeeek!!! If you provide this size image, provide images that will benefit images of open spaces, images of your studio, photos of your exhibits with lots of people in it, a photo of you with your booth, a grouping of your artwork in a setting. But I do not recommend that you put one image 1200 pixels by 1200 pixels because then it can easily be "borrowed" from your website and utilized unfavorably without your permission. Sad, but true. I have provided art images on my site that are no more than 500 pixels wide, this will translate well and be nicely visible on tablet, laptop, smart phone etc. the whole point of putting photos on your site is so that people can see your work and anything larger than that it's going to take up unnecessary space and you want of course people to purchase prints of your work or other products that you have available. If you keep the watermark modest on the lower section of the on the image, this way you should be safe. Sarita, I am excited that you are close to launching your website and would love it if you would send me your final link so we can check out your amazing art! I hope that you will send in questions that you have that you would like for me to answer on the air about any obstacles that you are encountering or any questions that you might have. For the full summary of these show notes visit me at http://rockstarmentor.com/blog Please visit our website to sign up to be on the front lines of amazing information and free downloads that I have prepared especially for you. http://rockstarmentor.com Visit me on Twitter: http://twitter.com/crushitmentor Visit me on Instagram: http://instagram.com/rockstarmentor To learn more about me, my art and colorful product line, visit Sonya Paz through my artist website, http://SonyaPaz.com Thanks to "The Brush Guys" they can be located at
Published on Aug 27, 2013 John Taylor, Karyn O'Bryant, Katherine Curriden, Anthony Gettig join us for a fun discussion on watermarking, traveling, a recap of the DLF Poker Classic, and much more! George tells us about his recent affiliation with edge studio. Congratulations George! https://www.edgestudio.com/press-rele... Dan tells us about his recent meeting with David, and Stephanie Ciccarelli of voices.com. Hang Out Guests Included: John Taylor Karyn O'Bryant Katherine Curriden Anthony Gettig Rachel Ehrenberg Hang Out Questions and Topics Included: John Taylor's recent live broadcast of his radio show via Luci Live. Dan's progress with his ukulele lessons. Tales from the Don LaFontaine Poker Classic. Don LaFontaine, and June Foray's birthdays. Connie Terwilliger's meet up group. Shotgun mics, and pricing. Watermarking. Serious considerations. WOVO-world voices progress. Anthony's recent video presentation. Deriving work from YouTube productions. Various YouTube tips. Some of John's recent in studio experiences. Closing comments from each of our guests. Special Thanks to our newest sponsor Edge Studios! http://www.edgestudio.com/ Thanks to Harlan Hogan and Voice Over Essentials. voiceoveressentials.com/ Harlan is the exclusive supplier of portable studio booths for TED. Announcements: Sept. 18-20 Voice Over Virtual: An online virtual conference. http://www.voiceoverxtra.com/article.... Be sure to take the EWABS survey found on the front page of: EWABS.com. EWABS E-support membership: Unlimited one on one help with Dan and George. $39.95/mo. Click the support Link at the top of ewabs.com Donations are always welcome.ewabs.com For Studio Suit Orders and Info.: http://www.vostudiosuit.com/ Like our Facebook page. https://www.facebook.com/ewabshop. Subscribe on YouTube https://www.youtube.com/user/ewabs ewabs_show on Twitter WOULD YOU like to be one of our monthly sponsors??? Contact us at ewabshop.com to discuss!!! Visit World Voices at the new web address Worldvo.com. Don't forget to get your gear ! shop.ewabs.com Visit George at VOStudioTech.com Or follow George's Twitter: @EWABS_Show Visit Dan at HomeVoiceOverStudio.com/ Or follow Dan's Twitter: @HomStudioMan John Florian, and Voice Over Xtra. The daily resource for voice over success. http://www.voiceoverxtra.com/index.htm Sept 2-------Labor Day - No show this week. Sept 9----Tara Platt and Yuri Lowenthal-Actors, Animators, Authors of "VO Behind the MIC" Join the EWABS Correspondent Contest. Make a VO or home studio related video, and send it to ewabshop@gmail.com The best way to keep track of the shows activities is to visit the EWABS Facebook page. https://www.facebook.com/eastwest.aud... EWABS Twitter: EWABS_Show Thanks again to our sponsors. Harlan Hogan's Voice over Essentials. voiceoveressentials.com Voice Over Xtra http://www.voiceoverxtra.com/index.htm Thanks to Larry Hudson, Silvia McClure, Larry and Elizabeth Davis, and Rosemary Benson for the show's bumpers, promotions and drops. Special thanks to the shows producer, Katherine Curriden, Dave Courvosier for providing the shows weekly intro, Lee Pinney for posting the podcast, and, to Jason Lawson for providing our weekly show notes. Send us questions, and be on our show where Dan and George will solve your home studio problems live! Call 818-47EWABS, that's 818 473-9227, and leave us your question in the voice mail box. Go to ewabs.com for details. Contributions are also welcome at shop.ewabs.com
This part finishes Chapter 5. In this second part watermarking is explained in more detail and DRM standards as well as commercial solutions are presented.
This part finishes Chapter 5. In this second part watermarking is explained in more detail and DRM standards as well as commercial solutions are presented.
The Internet has become one of the main sources of knowledgeacquisition, harboring resources such as online newspapers, webportals for scientific documents, personal blogs, encyclopedias, andadvertisements. It has become a part of our daily life to search andaccess this immense amount of online information, and more recently wehave also started to contribute to this pool of information our owncreativity in the form of text, images and video. Unfortunately, it isstill an open question as to how we, as authors, can control the waythat the information we create is distributed or re-used.Rights management problems are serious for text since it is much easyfor other people to download and manipulate copyrighted text fromInternet and later re-use it free from control. There is a need for arights protection system that ``travels with the content''. Digitalwatermarking is an information hiding mechanism that embeds thecopyright information in the document. Besides traveling with thecontent of the documents, digital watermarks are also imperceptible(i.e., seamless) to the user, which makes the process of removing themfrom the document challenging.Using linguistic features for information hiding into natural language text is an exciting and new idea. This talk begins with a short surveyof existing technologies in natural language watermarking, and thenfocuses on a recently developed natural language watermarking systemthat is practical, easy-to-use and provides resilience to attacks throughthe use of ambiguity in natural language. The talk is aimed for a generalaudience, and will be self-contained covering the necessary backgroundinformation. About the speaker: Mercan Topkara is a PhD candidate at the Computer Science Departmentof Purdue University working with Mikhail J. Atallah and CristinaNita-Rotaru. She got her Bachelor of Science degree from ComputerEngineering and Information Science Department of Bilkent Universityin 2000. She started her graduate studies at Purdue University inAugust 2001. Her PhD thesis is focused on designing, building andevaluating natural language watermarking systems. Her researchinterests are within the areas of digital watermarking, statisticalnatural language processing, usable security and machine learning. Shehas previously worked as a research intern at AT&T Research Labs, IBMT. J. Watson Research, and Google Research. More information can befound at http://www.cs.purdue.edu/homes/mkarahan.
The Internet has become one of the main sources of knowledge acquisition, harboring resources such as online newspapers, web portals for scientific documents, personal blogs, encyclopedias, and advertisements. It has become a part of our daily life to search and access this immense amount of online information, and more recently we have also started to contribute to this pool of information our own creativity in the form of text, images and video. Unfortunately, it is still an open question as to how we, as authors, can control the way that the information we create is distributed or re-used. Rights management problems are serious for text since it is much easy for other people to download and manipulate copyrighted text from Internet and later re-use it free from control. There is a need for a rights protection system that ``travels with the content''. Digital watermarking is an information hiding mechanism that embeds the copyright information in the document. Besides traveling with the content of the documents, digital watermarks are also imperceptible (i.e., seamless) to the user, which makes the process of removing them from the document challenging. Using linguistic features for information hiding into natural language text is an exciting and new idea. This talk begins with a short survey of existing technologies in natural language watermarking, and then focuses on a recently developed natural language watermarking system that is practical, easy-to-use and provides resilience to attacks through the use of ambiguity in natural language. The talk is aimed for a general audience, and will be self-contained covering the necessary background information.
Doctor Who: Podshock Episode 19 For the Week of the 26th of December 2005 Running Time: 1:06:32 In this episode: News - Christmas Invasion News, John Barrowman to Tie the Knot, iPod Video Doctor Who?, Watermarking, NA DVD Package, etc. Features - Christmas Invasion Review (no spoilers), Chris Rattray Australian Report Announcements - I-CON 25, Web site progress, Blake's 7 Spin-off Podcast?, Ken's Podshock Apparel Challenge. Promos - Cinemaslave Hosted by James Naughton (UK), Ken Deep (US), and Louis Trapani (US). with Squiffy as a guest in the UK, and Chris Rattray in Australia. Do you need the MP3 file format? Get our MP3 version of this episode using our MP3 dedicated feed at http://www.gallifreyanembassy.org/podshock/podshockmp3.xml
Doctor Who: Podshock Episode 19 For the Week of the 26th of December 2005 Running Time: 1:06:32 In this episode: News - Christmas Invasion News, John Barrowman to Tie the Knot, iPod Video Doctor Who?, Watermarking, NA DVD Package, etc. Features - Christmas Invasion Review (no spoilers), Chris Rattray Australian Report Announcements - I-CON 25, Web site progress, Blake's 7 Spin-off Podcast?, Ken's Podshock Apparel Challenge. Promos - Cinemaslave Hosted by James Naughton (UK), Ken Deep (US), and Louis Trapani (US). with Squiffy as a guest in the UK, and Chris Rattray in Australia. Do you want the Enhanced Podcast AAC file format? Get our Enhanced Podcast version of this episode using our feed at http://www.gallifreyanembassy.org/podshock/podshock.xml
Proving ownership rights on outsourced relational databases is a crucial issue in today internet-based application environment and in many content distribution applications. In this talk, we will present mechanisms for proof of ownership based on the secure embedding of a robust imperceptible watermark in relational data. We will discuss the available watermark embedding and decoding techniques. Furthermore, we will provide a comparison between these techniques based on several dimensions such as applicability, efficiency, and security. About the speaker: Mohamed Shehab received the BSc from United Arab Emirates University in 2000. Currently he is a PhD student in electrical and computer engineering at Purdue University. His main research interests lie in information security with emphasis on rights protection, data integrity and access control. Recently, he has been also working on various topics in the areas of distributed access control and distributed secure collaboration.
Proving ownership rights on outsourced relational databases is a crucial issue in today internet-based application environment and in many content distribution applications. In this talk, we will present mechanisms for proof of ownership based on the secure embedding of a robust imperceptible watermark in relational data. We will discuss the available watermark embedding and decoding techniques. Furthermore, we will provide a comparison between these techniques based on several dimensions such as applicability, efficiency, and security.
In the past several years there has been an explosive growth in digital imaging technology and applications. Digital images and video are now widely distributed on the Internet and via CD-ROM. One problem with a digital image is that an unlimited number of copies of an "original" can be easily distributed and/or forged. This presents problems if the image is copyrighted. The protection and enforcement of intellectual property rights has become an important issue in the "digital world." Many approaches are available for protecting digital images and video; traditional methods include encryption, authentication and time stamping. In this talk we describe algorithms for image authentication and forgery prevention known as digital watermarking. A digital watermark is a signal that is embedded in a digital image or video sequence that allows one to establish ownership, identify a buyer or provide some additional information about the digital content. In this talk we will review the current state of watermarking and describe some of the open research problems. About the speaker: Edward J. Delp was born in Cincinnati, Ohio. He received the B.S.E.E. (cum laude) and M.S. degrees from the University of Cincinnati, and the Ph.D. degree from Purdue University. From 1980-1984, Dr. Delp was with the Department of Electrical and Computer Engineering at The University of Michigan, Ann Arbor, Michigan. Since August 1984, he has been with the School of Electrical and Computer Engineering at Purdue University where he is a Professor of Electrical and Computer Engineering.He is a Fellow of the IEEE, a Fellow of the SPIE, and a Fellow of the Society for Imaging Science and Technology (IS&T). His research interests include image and video compression, multimedia security, medical imaging, multimedia systems, communication and information theory. Dr. Delp has also consulted for various companies and government agencies in the areas of signal and image processing, robot vision, pattern recognition, and secure communications. More information about Professor Delp may be found in his online bio.
In the past several years there has been an explosive growth in digital imaging technology and applications. Digital images and video are now widely distributed on the Internet and via CD-ROM. One problem with a digital image is that an unlimited number of copies of an "original" can be easily distributed and/or forged. This presents problems if the image is copyrighted. The protection and enforcement of intellectual property rights has become an important issue in the "digital world." Many approaches are available for protecting digital images and video; traditional methods include encryption, authentication and time stamping. In this talk we describe algorithms for image authentication and forgery prevention known as digital watermarking. A digital watermark is a signal that is embedded in a digital image or video sequence that allows one to establish ownership, identify a buyer or provide some additional information about the digital content. In this talk we will review the current state of watermarking and describe some of the open research problems.