Remove Internet Remove Social Remove Software Review
article thumbnail

Bodyguard is a mobile app that hides toxic content on social platforms

TechCrunch

If you’re somewhat famous on various social networks, chances are you are exposed to hate speech in your replies or in your comments. We have developed a technology that detects hate speech on the internet with a 90 to 95% accuracy and only 2% of false positive,” founder and CEO Charles Cohen told me.

Social 257
article thumbnail

Don’t leave developers behind in the Section 230 debate

TechCrunch

Shelley McKinley Contributor Share on Twitter Shelley McKinley is chief legal officer at GitHub, home to more than 100 million software developers. Supreme Court reviewed Section 230 of the Communications Decency Act of 1996. Last week marked the first time the U.S. In oral arguments in the Gonzalez v.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Epic Games to shut down Houseparty in October, including the video chat ‘Fortnite Mode’ feature

TechCrunch

Houseparty, the social video chat app acquired by Fortnite maker Epic Games for a reported $35 million back in 2019, is shutting down. At the time, these integrations appeared to be the end goal that explained why Epic Games had bought the social startup in the first place. — sima sistani (@SimaSistani) September 9, 2021.

Games 248
article thumbnail

10 Key Trends of Digital Transformation in Healthcare in 2022

OTS Solutions

There has been a tremendous impact on the advancement and accessibility of healthcare technology through Internet of Things (IoT) devices, wearable gadgets, and real-time medical data monitoring. When a group of internet-connected medical devices creates an IoMT, they’re making a new subset of the Internet of Things (IoT).

article thumbnail

NebulaGraph reaps from China’s growing appetite for graph databases

TechCrunch

Other investors in the round include Matrix Partner China, Redpoint China Ventures and Source Code Capital. Two years ago, customers were mainly using NebulaGraph to explore data relationships on social media, e-commerce and fintech platforms. The types of users have also broadened. That’s not the end of data collection.

article thumbnail

What you need to know about Okta’s security breach

CIO

Identity attacks use social engineering, prompt-bombing, bribing employees for 2FA codes, and session hijacking (among many techniques) to get privileged access. Kill chain Attack technique Deception defense Initial Access Uses stolen/purchased credentials to access internet-facing applications like IdPs, VPNs, RDP, and VDI.

article thumbnail

#MyTechFrenemy

TechCrunch

Many said Awodele carefully monitored students’ social media accounts. At least three students said that they were not allowed to create external social groups with other students. Awodele told TechCrunch her attorney is reviewing what registrations MTBF requires to continue operating. MyTechFrenemy. We did not.