A few years ago, a new game spread on Facebook. The rules of this play, called The 10-year Challenge, are simple. Put a picture of yourself 10 years ago and a picture of myself. That’s all. This play can boast that you are more cool, adult, or still youth. That’s why many people participate in this play.
Is it just play? It is said that it is not in Kate Onel’s column in the wire. Facebook is collecting photos to secure face recognition (facial recognition) data that changes over age. The truth is unknown, but one is certain. Facial recognition technology has already been widespread while we do not notice, and is more likely to be used in the future. Very convenient and dangerous.
Why does the camera look at my face?
Face recognition technology refers to the technology to grasp information from photographs, videos, and creatures. Compared to other identification methods, you do not have to contact the recognition device directly, so it is used a lot because of the lack of rejection of the user. It is mainly used to check the identity compared to the database, but it is also used to identify aging and illness recently. It is also developing technology that identifies animals as well as humans.
The study began in the 1960s, but in the 1990s, the commercialization was made in the 90’s, and the recent combination with artificial intelligence technology has increased the accuracy and is rapidly spreading. The company with the best technology was Google, Facebook, and Amazon, but recently, Chinese companies have used numerous demonstration tests to secure data and increase their technology.
All companies that created the top five algorithms in the Face Recognition Algorithm Test (FRVT), organized by the US National Standards Technology Research Institute (NIST) in 2018 were all Chinese companies.
Face recognition technology of security and surveillance
The outwardly visible use is divided into security and identification.
The most used field is also security/surveillance. It is used in some airports, casinos, and stadiums, and it is installed 카지노 at the entrance of the building to control the entry. It is also used in public safety sectors, such as finding and arresting a suspect.
In the early days of commercialization, there was a problem in the face of the face recognition, but according to the 2018 report by the leader of this field, the malfunction rate shows more than 99% of the perception. The recognition rate varies depending on. The actual recognition rate depends on how the operating person sets up.
The most common country is China, which does not consider “criminal human rights” much. In 2017, Shanghai, which built a facial recognition security system, arrested 567 criminals for three months, and 22 criminal suspects were caught at the Qingdao Beer Festival. In 2018, a singer’s concert was arrested using facial recognition technology to arrest eight criminals.
As shown in the video above, Senzen uses a surveillance camera installed in front of the traffic light to detect signal violators, and automatically sends the caught to a person who violates the text message. In the name of ‘Sheang’, it is also working on a project to install surveillance cameras with facial recognition in rural villages across China.
This is not the only way in China. China began to export the system to countries in South America.
Malaysian police introduced a body cam that can be recognized.
Since 2004, the US has been operating and operating a security system using fingerprints and facial authentication at airports and major ports.
More than 3 million surveillance cameras are already installed in the UK, and some of them use the Automatic Face Recognition System (AFS). Mobile surveillance cameras are also placed in concerts and stadiums where people gather.
IPhone, facial recognition technology spreads
The next most used field is identification. It is already used for this purpose in the Korean government building. After Apple presented the iPhone X and presented the authentication method through ‘Face ID’, it is used to the public because it is also used for unlocking smartphones.
It is especially used in the field of immigration, and the US Department of Homeland Security (DHS) is creating a service that confirms the identity of the traveler by only facial recognition. At Incheon Airport and Beijing New Airport, the company plans to introduce a system to finish the immigration screening with only facial recognition.
China’s HSBC Bank has released an app that can open an account with only facial recognition, and more than 50 banks, including China Agricultural Bank, are also introducing ATM devices that can be paid by facial recognition. In Jedi Bao, a Chinese loan company, identification is recognized as a face. Many universities, such as San Francisco University and Beijing Normal University in China, are using face recognition technology to control access.
When using simple payment services such as unmanned convenience stores and Alipay, there are already services in China. Even the robot dog Aibogo Facial recognition technology is used to find out the owner.
I live in a world full of facial recognition cameras
Even if it is not in the field of security and identification, face recognition is used for various purposes. You can distinguish between age, gender and emotional state, and the camera can track your face.
It is a well -known example that content producers are premiere and analyze the faces of visitors and review the expected reaction to the film.
The vending machine checked the customer’s face to recommend the goods, or the experiment was made to write a statistical report by checking the gender and age of the customer’s gender and age.
Even now, there are some places where large stores track customers and check their routes through face recognition.
In China, pigs and Ireland are also researching and managing cattle faces.
Hyundai Motor has introduced a system that recognizes the emotions of passengers at CES 2019.
Didn’t everyone write an app that matches the user’s face and finds a blind date or a celebrity that looks like a blind date?
It is also used to find a trafficking child or missing children.
Stanford University used facial recognition to develop an algorithm that determines individual sexual tendencies.
It is also developing a method of analyzing the face to determine the condition of health and disease.
We already live in a world full of facial recognition cameras. It is an app that is recognized as a face, taking a picture of a cute rabbit ear, and uploading a picture on SNS where the person’s name is tagged by the face recognition. I replace my laptop and smartphone password with my face, and send emoticons to my avatar with my face.
See the video uploaded by the virtual YouTuber, which has changed your appearance using your face recognition technology, and use a virtual makeup app to make makeup or change your hair. If you look at the smartphone camera and laugh, press the shutter.
Before facial recognition technology becomes a monster
As it is used a lot, it is often incomplete errors or abuse.
Recently, the facial recognition system ID.ME’s recognition, which is used to verify the US unemployment benefit application, has suspended unemployment benefits in 24 states. In the 2020 BLM demonstrations, the US police were suspected of using facial recognition technology, and IBM, Microsoft, and Amazon declared that they would not sell their face recognition technology to the police.
On the other hand, in China, it is required to scan a face mandatory when opening a mobile phone from December 2019. More than 400 million CCTVs are installed in China, more than half of the world’s CCTVs. In February 2019, a DB of a facial recognition monitoring company, which monitored 2.5 million people in the Uighur, China, China, was leaked. Big Brother already exists on Earth.
The data from the face is very comfortable and dangerous. Although it has changed due to Corona 19, the face cannot be easily changed, and it is a personal information that is openly exposed to the outside. If you want, anyone can easily collect, easily manipulate it, and track it easily.
There is a danger of becoming a surveillance society, but it is not a technology to stop. Face recognition technology is used for various purposes and will be used more. The more you show your facial expressions in virtual reality, or the robot recognizes humans or works remotely.
Maybe it is good. Privacy and surveillance are always both sides of the coin. Just dichotomy to accept or reject it does not help. Between convenience and oppression, you must set a clear guideline before the facial recognition technology becomes a monster. Technology is convenient, because it is too easy to exploit.
100 Books of Business, published for 20 years,
What if one book contains 100 books that have been published for 20 years?
In this work, Kim Min -ju (writer, translator), Koo Ja -ryong (writer, consultant), Han Geun -tae (writer, consultant), Ko Hyun -sook (writer, professor of business administration) , translator). A total of seven business coaches participated.
100 Business Books 100 Photo
AD, close ads
1. Beyond a good company, as a great company
2. Power of detail – minor
3. The law of broken glass window
4. Hidden champion
6. Lean startup
7. Are you a strategist
8. Zero Toy One
9. Can’t you earn money or good?
10. Intellectual capital theory
12. The path of accumulation
13. Blue Ocean Shift
14. Destructive Innovation 4.0
16. Psychology of sales
17. Stick Stick!
18. Trend Korea
19. All businesses are branding
21. Philip Kotler’s Market 4.0
22. Release the secret of brain and desire
23. Sincerity Marketing
24. Long Tail Economics
25. Technology to read trends
26. New Normal
27. Klaus Schwab’s 4th Industrial Revolution
28. The future of work
29. The era of geometry is coming
30. Everyone lies
31. Machine Platform Crowd
32. Trust movement
33. Pono Sapiens
34. A time without a job comes
35. Economics of subscription and likes
CEO and leadership
36. Living as a president
37. Steve Jobs
38. Lean in Lean in
39. Courage facing me
40. Lunch with Warren Buffett
41. Leave a person
42. Shu 온라인바카라 Dog
43. My great discovery strength revolution
44. Heat Refresh
45. Leadership of the decisive moment
46. Super Gap
47. Multi -Flyer
Success and happiness
48. After WHO
49. Why do you work?
50. Discovery of creativity
51. degree of life
52. Search your inner side
53. Why do I do this?
54. Power of observation
56. Rediscovery of 10,000 hours
58. Deep Work
59. The power of the moment
60. End of average
61. Design the perspective
Behavior and psychology
64. Immersion Flow
65. The birth of thought
67. Positive Psychology
68. Insight, from ordinary to non -crime
69. Mind Set
70. Thought about thoughts
71. Bad Samaritans
72. The BOX The Box
73. Money War
74. The living ideas of dead economists
75. Victory in the city
78. House built by debt
79. 21st century capital
80. Economics of recession
81. Determined Future
82. The secret of 300 years of Gyeongju
83. 880,000 won generation
84. Cool altruist
85. The poor are more reasonable
86. Things that cannot be bought with money
87. Jewish story
89. This changes everything
90. Who is the future?
91. Climate Casino
92. Contraction society
93. Skin in the game
94. Fact Fullness
95. European Dream
96. Why does the state fail
97. Is the intensity of the United States over?
98. The power of Asia
99. Secret of hegemony
100. Scheduled War
<100 Responsibility for Reading in one book> Quotes in the book
“People are not the most important assets. Only the right person is the most important asset. People who are not suitable are the biggest debt. Characters are more important than school, technology, expertise, and work experience. ” (Beyond a good company, as a great company)
The most important question in Lean Startup was, “to find out what kind of acts creates value and what is a waste.” (Lean Startup)
Google’s new employees are trained to express their position. This is called ‘take a position’. Through this training, we practice to clarify our position at the meeting. This is a training to eliminate irresponsibility. (productivity)
Who is the main culprit of destruction? It is not technology, but because of customers. Is there a new technology developed by Airbnb, Amazon and Uber? The technology that has already been shown is combined with the needs that the customer wants to create new value. In this respect, Teishera’s claim is different from the “disruptive innovation” that Professor Christensen claims. (Discourse)
In short, it should be ‘simple, quirky, concrete, sincere, and emotional story.’ (stick)
In the past analog economy, the customer path was 4A, which passed from customers to purchase. Aware, attitude, act, and repeated behavior. However, in the digital economy, the customer path changed to 5A. Aware, appeal, question (ASK), action, and advocate. (Market 4.0)
Consumers now have a story of birth, they are good, but they prefer brands that are humble, warm, cool, passionate, sympathetic and communicating with social issues. (Santic marketing)
The author says that creating a service that provides continuous value to customers based on a specific customer -based need should be the goal of all businesses. In other words, it is argued that the subscription economy is a change of converting customers to subscribers to generate repetitive profits by providing services, not product sales. (Economics of subscription and likes)
If you talk about the owner’s spirit, he says, “How do you work like a master?” I do not agree. The definition of the spirit I think is the person who thinks about it as a master. When I think of what I have to do like a master, I am a servant of work when I think like a servant. (Why do you work?)
Recommended for these people.
1) Those who want to insight shortly because they don’t have time to read books
2) I read a book, but I can’t organize it in my head, so those who do not remain in memory
3) Those who want to get compressed insight from business experts
4) Those who want to get a guide for which book to read
5) Those who want to know how to read business administration well and how to apply it to my business
* Source: 100 Business Books of Businessmen <100 Business Responsibilities Reading in One Volume>