Sentences with phrase «technology on identity»

Not exact matches

«As a first step we're taking advantage of our existing identity and payment technologies to help people subscribe on a publication's website with a single click, and then seamlessly access that content anywhere — whether it's on that publisher site or mobile app, or on Google Newsstand, Google Search or Google News,» Gingras said.
This is a unique group of investors who are focused on building out bitcoin and blockchain technology, assisting startups and companies with developing in specific areas like compliance and regulation, payments, security, identity, smart contracts and more.
There's no doubt that blockchain will play a role in the future of identity management, but the extent to which it is used will depend on our ability to think beyond our current solution set and apply emerging technologies to build a secure and compliant user experience.
With an increasing reliance on technology, protecting your identity is harder than ever.
Blockchain technology can enable entities independent of each other to rely on the same shared, secure and auditable source of information to manage individual identities.
The article on identity management reviewed how several companies are working with the technology to create new technological tools for identity management.
These include Mindful Scientific, a medical device company addressing concussion diagnostics and management that won the startup competition at the Wall Street Journal WSJ.D Live global technology conference and the Medical Device track at the HealthKick Challenge; abridean (acquired by nCipher PLC), a software company that develops application provisioning and identity management solutions; and i - HRx (acquired by HealthConnex), a digital health company focused on chronic disease management.
over whether Bitcoin is more or less important than its underlying tech, Consensus 2016 saw keynote addresses and panel discussions on applications for blockchain or distributed ledger technology in cross-border payments, smart contracts, government, security, identity, the Internet of Things, and all different kinds of clearing and settlement.
Despite a lingering argument over whether Bitcoin is more or less important than its underlying tech, Consensus 2016 saw keynote addresses and panel discussions on applications for blockchain or distributed ledger technology in cross-border payments, smart contracts, government, security, identity, the Internet of Things, and all different kinds of clearing and settlement.
Complications may arise from several sources, including the mechanism through which ICOs are conducted, the teams spearheading ICOs, the identities of contributors to ICOs, the quantity of money that is raised, the validity of ICOs» technology and processes, marketing claims, and the impact that ICOs have on the greater cryptocurrency markets.
The volumes on Indian culture and identity that dominated stores in the 1970s were pushed aside in the 1980s to make room for manuals on technology and management.
The new logo debuted today on the rebuilt website, which features the new brand identity along with updated technology to enable greater search engine accessibility.
The ultimate social impact of blockchain technology depends on who controls our digital identities
In addition, several said that the new technology will rejuvenate taxonomy and natural history museums by focusing more on identifying new species than on debating the identity of those already found.
Dr. Goering's work at the CSNE includes studying the effects of neural technology on an individual's identity, agency (the capacity of individuals to act independently and make their own free choices) and sense of autonomy, as well as helping to create better - informed ethical guidelines and education for neural engineers.
Take advantage of the member - to - member technology utilized on BeautifulPeople that protects your identity until YOU choose to reveal it.
Using patented device - based technology, iovation's ReputationManagerTM service allows Mobeze to screen Internet - based devices at any point of customer interaction, from registration to sign - on, while protecting the identity and privacy of their customers.
Blockchain technology is revolutionary in that it is built on the idea of full transparency and identity verification, something that is missing in online dating.
Dark Net is a documentary series that explores the impact of technology on love, sex, power, children, our memories, our senses, our identities, and even our physical selves.
«A free - flowing, wackadoo meditation on stardom, identity, illusions, ageism, technology, the life and work of Robin Wright, chemical dependency, kites and whatever else crossed the filmmaker's mind at any given moment.
09, Ed.D.» 11, examine the impact of new technologies on adolescent identity, intimacy, and imagination, uncovering both disturbing drawbacks and striking benefits.
Themes ranges from love to identity to morality to technology to social change and so on.
We propose the active participation of the school library media program toward the development of STEM identities among young people by having school librarians (1) provide advisory information on the science - infused books and programs that young people can read — the school librarian as the information specialist; (2) collaborate with STEM teachers and provide intellectual and physical access that further enrichs the STEM learning — the school librarian as the instructional partner; and (3) act as technology allies to help educators and students experiment with new media tools and online communities.»
The plenary discussed focused on how technology impacts our identity, intimacy, and imagination, and featured discussions on how digital tools shape our sense of creativity and how we choose what tasks in our lives to «outsource» to apps.
Coursework focuses on critical areas such as English Language Learner (ELL) instruction, cultural competency in the classroom including gender and sexually diverse student identities, evidenced - based frameworks for technology integration, educational leadership, and teacher leader / instructional coaching best practices in order to be instructional leaders in the school / district where employed.
She is currently an Assistant Professor in the Learning, Design and Technology program at Penn State, where she conducts research on the ways that diverse youth and adults engage in learning, collaboration, identity formation, and self - efficacy with gaming, livestreaming, makerspaces and computing.
The tablet that will be showcased is instead fitted with a biometric «Iris on the Move» identity recognition technology.
We propose the active participation of the school library media program toward the development of STEM identities among young people by having school librarians (1) provide advisory information on the science - infused books and programs that young people can read — the school librarian as the information specialist; (2) collaborate with STEM teachers and provide intellectual and physical access that further enrichs the STEM learning — the school librarian as the instructional partner; and (3) act as technology allies to help educators and students experiment with new media tools and online communities.»
Don't rely on the credit bureaus or technology to alert you of potential identity theft issues.
The same type of encryption technology is used on the loan application website as is used on those other types of sites, so your identity and personal information are secure.
With an increasing reliance on technology, protecting your identity is harder than ever.
NEO is a project based on blockchain and it utilizes the technology of blockchain and digital identity to digitize assets.
Identity theft is a problem that continues to change and evolve with technology, so there is no reason to expect hackers to give up on stealing identities in 2018.
The Amex Gold card offers account alerts, banking on the go, chip technology and even access to your FICO score, all to help protect customers against fraudulent transactions and identity theft.
The Amex Gold card offers account alerts, banking on the go, chip technology and even access to your FICO score, all to help protect customers against fraudulent transactions and identity theft.
AIKELIDA ® RFID Blocking Travel Wallet - Money Belt & Passport Holder greatly reduce the risk of ever losing any travel essentials again ✔ Double stitched for maximum security ✔ Used by thousands of Amazon travelers ✔ These Travel Money Belts Make Ideal Gifts ✔ Discreet wallet hidden under the darkest of clothes ✔ Moisture wicking fabric at back for ultimate comfort ✔ Made with premium quality tough non-rip, water resistant fabric ✔ Stylishly designed and lightweight for maximum comfort on all shapes and sizes ✔ Specially designed to fit US passports, all bank notes travel tickets and iPhone 6S Secure Protection: Multi-layered lining with latest RFID blocking technology safely protects you from identity thieves & high tech pickpockets.
The Amex Gold card comes with a variety of features, such as account alerts, banking on the go, chip technology and access to FICO scores, that help protect customers against fraudulent transactions and identity theft.
✓ SAFE SHIELD YOUR IDENTITY AND FINANCIAL INFORMATION - These sleeves are designed with a multi-layer advanced RFID Blocking Security Technology, engineered metal composite designed specifically to block 13.56 MHz or higher RFID signals and protect your valuable information stored on the RFID chips of your credit cards or passports from unauthorized scans.
The Centre for Democracy and Technology called it a «huge triumph for gamers» given concern that the new policy could lead to identity theft, stalking, real - life harassment and encroach on privacy.
inFamous: Second Son may not be a game - changer like Titanfall but it's been made with love to ensure that it really uses the technology the PS4 has on offer while also holding onto the series» identity and ensuring the same level of high - intensity entertainment.
You agree not to engage in any of the following prohibited activities: (i) copying, distributing, or disclosing any part of the Service in any medium, including without limitation by any automated or non-automated «scraping»; (ii) using any automated system, including without limitation «robots,» «spiders,» «offline readers,» etc., to access the Service in a manner that sends more request messages to the Company servers than a human can reasonably produce in the same period of time by using a conventional on - line web browser (except that Humble Bundle grants the operators of public search engines revocable permission to use spiders to copy materials from Humble Bundle for the sole purpose of and solely to the extent necessary for creating publicly available searchable indices of the materials, but not caches or archives of such materials); (iii) transmitting spam, chain letters, or other unsolicited email; (iv) attempting to interfere with, compromise the system integrity or security or decipher any transmissions to or from the servers running the Service; (v) taking any action that imposes, or may impose in our sole judgment an unreasonable or disproportionately large load on our infrastructure; (vi) uploading invalid data, viruses, worms, or other software agents through the Service; (vii) collecting or harvesting any personally identifiable information, including account names, from the Service; (viii) using the Service for any commercial solicitation purposes; (ix) impersonating another person or otherwise misrepresenting your affiliation with a person or entity, conducting fraud, hiding or attempting to hide your identity; (x) interfering with the proper working of the Service; (xi) accessing any content on the Service through any technology or means other than those provided or authorized by the Service; (xii) bypassing the measures we may use to prevent or restrict access to the Service, including without limitation features that prevent or restrict use or copying of any content or enforce limitations on use of the Service or the content therein; (xiii) sell, assign, rent, lease, act as a service bureau, or grant rights in the Products, including, without limitation, through sublicense, to any other entity without the prior written consent of such Products» (defined below) licensors; (xiv) circumventing Service limitations on the number of Products you may purchase, including, without limitation, creating multiple accounts and purchasing a total number of Products through such multiple accounts which exceed the per - user limitations; or (xv) except as otherwise specifically set forth in a licensor's end user license agreement, as otherwise agreed upon by a licensor in writing or as otherwise allowed under applicable law, distributing, transmitting, copying (other than re-installing software or files previously purchased by you through the Service on computers, mobile or tablet devices owned by you, or creating backup copies of such software or files for your own personal use) or otherwise exploiting the Products (defined below) in any manner other than for your own private, non-commercial, personal use.
As phones and other technologies are built up and more of our identity is transferred across the internet this is primarily where Watch Dogs comes in, the city of Chicago is essentially a playground of technology and the identity's of people that plays into how the world is changing, and in a way this is what Watch Dogs does it carries over a view into where the future is going and the capabilities that a selected group of people could have on the world.
Using recent technology, Rachel Maclean constructs fantasy narratives set in computer - generated landscapes that play on thorny issues of identity, social life and politics.
It continues with works from the world's leading innovators in the arts, as they break through thresholds of space, memory, sound, and genre — from Philippe Parreno who, in his largest exhibition in the U.S. to date, transforms the presentation of visual art into an evolving sensory journey; to Wayne McGregor, Olafur Eliasson, and Jamie xx as they create a new contemporary ballet; to avant - garde performance artist Laurie Anderson who, through a site - specific installation in the Armory's drill hall, will expand upon her work with storytelling and technology to create a site - specific environment that serves as a meditation on time, identity, surveillance and freedom; and finally to Igor Levit and Marina Abramović as they interpret Bach's renowned Goldberg Variations, to create a concentrated durational performance that reflects upon music, time, space, emptiness, and luminosity.
For the Zabludowicz Collection, Fitch and Trecartin will push their remarkable exploration of the impact of technology on communication, language and the construction of identity to new extremes.
Metabolism and Communication, Zentrum fur Kunst und Medientechnologie, Center for Art and Media, Karlsruhe, Germany 2003 Love, Magazin4 Vorarlberger Kunstverein, Bregenz, Germany Patty Chang, Tracy Emin, Naomi Fisher, Paul McCarthy, The Moore Space, Miami, FL (performance, April 26) Water, Water, curated by Lilly Wei, The Rotunda Gallery, Brooklyn, NY Awakenings, Center for Curatorial Studies at Bard College, Annandale - on - Hudson, NY Feminine Persuasion, The Kinsey Institute and the School of Fine Arts Gallery, Indiana Univeristy, Bloomington, Indiana 2002 Videos in Progress, The RISD Museum, Providence, Rhode Island Le Plateau Frac Ile - de-France (performance only, November 7), Paris, France Mirror, Mirror on the Wall, MASS MoCA, North Adams, MA The Body Electric: Video Art and the Human Body, Cheekwood Museum of Art, Nashville, TN Americas Remixed, La Fabbrica del Vapore, Milan, Italy (performance / exhibition) Extreme Existence, curated by Klaus Ottmann, Pratt Manhattan Gallery, NY (performance / exhibition)(catalogue) Moving Pictures, Guggenheim Museum, New York Fusion Cuisine, Deste Foundation Centre for Contemporary Art, Athens, Greece (performance / exhibition), (Catalog available) Time Share, Sara Meltzer Gallery, NY Le Studio, Yvon Lambert, Paris, France Oral Fixations, curated by Sandra Firmin, Center for Curatorial Studies, Bard College, Annandale - on - Hudson, NY Panorama, curated by Carmen Zita, Room Interior Products, NY Superlounge, curated by Andrea Salerno & Mari Spirito, Gale Gates, Brooklyn, NY About the Mind (Not Everything You Always Wanted to Know), Video Cafe, organized by Hitomi Iwasaki, Queens Museum, NY Mirror Image, curated by Russell Ferguson, UCLA Hammer Museum, Los Angeles, CA Traveled to: Bard College, Center for Curatorial Studies Museum, Annadale - on - Hudson, NY Perspectives: Artists of Chinese Descent in New York, Queens College Art Center, NY Traveled to: Firehouse Art Gallery, Nassau Community College, Garden City, NY, March - April 2003 2001 Bodily Acts, curated by Jennifer L. Gray, Center for Curatorial Studies, Bard College, Annandale - on - Hudson, NY Circus Maximus, BeganeGrond, Center for the Contemporary Arts, Utrecht, Holland Group Show, Hamburg Kunstverein, Germany (performance) Mimic, Gale Gates et al., Brooklyn, NY Casino 2001, 1st Quadrennial of Contemporary Art, Stedelijk Museum Voor Actuele Kunst and the Bijloke Museum, Gent, Belgium (performance / exhibition) Looking for Mr. Fluxus: In the Footsteps of George Maciunas, Art in General, NY La Hijas de la Tierra (The Daughters of the Earth), IODAC Museum of Contemporary, Spain Panic, Julie Saul Gallery, New York Video Jam, Palm Beach Institute of Contemporary Art, Lake Worth, Florida (brochure) 2001 Art + Performance + Technology, in conjunction with the 19th International Sculpture Conference, Wood Street Galleries, Pittsburgh, PA (performance) WET, Luise Ross Gallery, New York Trans Sexual Express Barcelona, Centre d'Art Santa Monica, Barcelona, Spain Smirk: Women, Art, and Humor, curated by Debra Wacks, Firehouse Art Gallery, Nassau Community College, New York 2000 Uncomfortable Beauty, Jack Tilton / Anna Kustera Gallery, New York Cross Female, Kunstlerhaus Bethanien, Berlin, Germany (performance / exhibition): Traveled to: Kunst - und Kunstgewerbeverein Pforzheim, Germany (April / May 2001) The Art of the Screen Saver, Stanford Art Museum / Cantor Art Center, Stanford, CA Traveled to: ICA, London, England (Feb - March 2002) Steamroller, performance festival organized by Galerie MXM, Prague, Czech Republic (Catalog available) Soma, Soma, Soma, The Sculpture Center, New York Performance Festival, Kunstpanorama, Lucern and USINE, Geneva The Standard Projection: 24/7, Standard Hotel, Los Angeles Deja vu, Art Miami 2000, Miami Beach Convention Center, Miami Beach Galerie Fons Welters (two person exhibition with Atelier van Lieshout), Amsterdam ID / y2k, Identity At The Millennium, Castle Gallery, College of New Rochelle, NY 1999 - 2000 Illusion Delusion Denial, 450 Broadway Gallery, New York Mug Shots, Center for Visual Art and Culture, University of Connecticut, Storrs, CT. 1999 IDENDITAT, hat man doch zu viel, Ort halle fur kunst, Feldstr.
The focus of the exhibition lies on Hershman Leeson's continuous engagement with identity, gender construction, sexual self - determination, and her progression of these ideas in close exchange with advances in technology, and science.
His curatorial projects focus on contemporary art, with a special emphasis on the exploration of identity, technology, photo - based work, and urban culture.
For Oursler's first solo exhibition in Hong Kong, entitled «PriV % te,» Lehmann Maupin gallery presents eight new multimedia wall works and sculptures offering the artist's perspective on a particular slice of chaos erupting at the convergence of digital media and cultural identity: facial recognition technology.
From Claudia Hart's critique of digital technology and the misogyny of gaming and special effects media to Carla Gannis's performance video where the artist competes with her virtual self; from Cynthia Lin's monumental drawings detailing minuscule portions of skin to Laura Splan's mixture of scientific and domestic in molecular garments and Joyce Yu - Jean Lee's challenge of conventional viewing perspectives; from Christopher Baker's examination on participative media to Victoria Vesna's collaborative project on social networking, identity ownership and the idea of a «virtual body» — the show guides the viewer through an array of captivating approaches that challenge not only current media ideologies but also conceptual paradigms underlying today's digital art, the question of disembodiment and post-humanism in particular.
a b c d e f g h i j k l m n o p q r s t u v w x y z