Google voice recognition could transcribe doctor visits

Doctors work long hours, and a disturbingly large part of that is documenting patient visits — one study indicates that they spend 6 hours of an 11-hour day making sure their records are up to snuff. But how do you streamline that work without hiring an army of note takers? Google Brain and Stanford think voice recognition is the answer. They recently partnered on a study that used automatic speech recognition (similar to what you’d find in Google Assistant or Google Translate) to transcribe both doctors and patients during a session. The approach can not only distinguish the voices in the room, but also the subjects. It’s broad enough to both account for a sophisticated medical diagnosis and small talk like the weather. Doctors could have all the vital information they need for follow-ups and a better connection to their patients. The system is far from perfect. The best voice recognition system in the study still had an error rate of 18.3 percent. That’s good enough to be practical, according to the researchers, but it’s not flawless. There’s also the matter of making sure that any automated transcripts are truly private and secure. Patients in the study volunteered for recordings and will have their identifying information scrubbed out, but this would need to be highly streamlined (both through consent policies and automation) for it to be effective on a large scale. If voice recognition does find its way into doctors’ offices, though, it could dramatically increase the effectiveness of doctors. They could spend more time attending patients and less time with the overhead necessary to account for each visit. Ideally, this will also lead to doctors working more reasonable hours — they won’t burn out and risk affecting their judgment through fatigue. Via: 9to5Google Source: Google Research Blog , ArXiv.org

See the original article here:
Google voice recognition could transcribe doctor visits

DOJ names Iranian as hacker who stole unaired episodes from HBO

Enlarge / Acting US Attorney Joon H. Kim speaks during a press conference at the US Attorney’s Office, Southern District of New York, on September 26, 2017. (credit: Kevin Hagen/Getty Images ) On Tuesday, federal authorities in New York indicted Behzad Mesri, an Iranian citizen, accusing him of hacking HBO earlier this year. Seeing as Iran and the United States lack an extradition treaty, it is unlikely that Mesri will be sent to the United States to face the charges, unless he somehow decides to come to the states of his own volition. According to prosecutors, Mesri stole unaired episodes of Game of Thrones , Curb Your Enthusiasm , and other popular shows. He then allegedly demanded a ransom of $5.5 million, payable in Bitcoin. Read 3 remaining paragraphs | Comments

Taken from:
DOJ names Iranian as hacker who stole unaired episodes from HBO

Report: Uber paid hackers $100,000 to keep 2016 data breach quiet

Enlarge (credit: Jaap Arriens/NurPhoto via Getty Images ) In a public statement, Uber has announced that it sustained a massive data breach in 2016: 57 million customers’ and drivers’ names, e-mail addresses, and phone numbers were compromised. According to Bloomberg , no trip location info, credit card information, or Social Security numbers was taken. Uber did not immediately respond to Ars’ request for comment. Read 7 remaining paragraphs | Comments

Original post:
Report: Uber paid hackers $100,000 to keep 2016 data breach quiet

PC vendors scramble as Intel announces vulnerability in firmware

Enlarge / All the Cores are affected by a major vulnerability in management firmware—as are Xeon servers and Atom, Celeron and Pentium devices. (credit: Intel ) Intel has issued a security alert that management firmware on a number of recent PC, server, and Internet-of-Things processor platforms is vulnerable to remote attack. Using the vulnerabilities, the most severe of which was uncovered by Mark Ermolov and Maxim Goryachy of Positive Technologies Research, remote attackers could launch commands on a host of Intel-based computers, including laptops and desktops shipped with Intel Core processors since 2015. They could gain access to privileged system information, and millions of computers could essentially be taken over as a result of the bug. The company has posted a detection tool on its support website for Windows and Linux to help identify systems that are vulnerable. In the security alert, members of Intel’s security team stated that “in response to issues identified by external researchers, Intel has performed an in-depth comprehensive security review of its Intel® Management Engine (ME), Intel® Trusted Execution Engine (TXE), and Intel® Server Platform Services (SPS) with the objective of enhancing firmware resilience.” Four vulnerabilities were discovered that affect Intel Management Engine firmware versions 11.0 through 11.20. Two were found in earlier versions of ME, as well as two in Server Platform Services version 4.0 firmware and two in TXE version 3.0. Read 3 remaining paragraphs | Comments

See the original article here:
PC vendors scramble as Intel announces vulnerability in firmware