
ITP TECHBLOG
Category
- AI
- Big Tech
- Careers
- Cartoons
- Climate Change
- Democracy
- Diversity
- Education
- Events
- Getting Started
- Government
- ITP News
- Industry News
- Innovation
- Interview
- Legal
- Membership
- Mental Health
- Navigating Change
- Regional Spotlight
- Regulation
- Security
- Skills
- Society
- Telecommunications
- Volunteer
- Women in technology
- advice
- bridging the gap
- ethics
- growing the industry
- industry news
- tech talk
Griffin on Tech: The promise and the peril of Apple Intelligence
If Apple can use AI to make our interaction with phones and computers more seamless, including the dozens of apps we navigate every day, that’s a good thing for developers. Those who suddenly have no moat around their business thanks to the rise of generative AI have some hard thinking to do.
Griffin on Tech: Deck chairs, Titanic, and Budget 2024
The lack of investment in anything forward-looking that has the ability to boost capability in the digital economy is deflating and in stark contrast to what we saw delivered the Australian Federal Budget earlier this month.
What will be in Budget 2024 for tech?
We are unlikely to see similar growth-orientated tech and digital initiatives this year, not that the National Party, which owns most of the tech-related policy, isn’t interested in spending on tech, which it sees as an economic growth enabler.
Australia will trial ‘age assurance’ tech to bar children from online porn. What is it and will it work?
Implementing and enforcing these will be challenging and there is the potential for people to bypass such “age assurance” controls.
Supermarket facial recognition failure: why automated systems must put the human factor first
AI errors and human errors cannot be avoided entirely. AI security protocols with “humans in the loop” need more careful safeguards that respect customer rights and protect against stereotyping.
An anonymous coder nearly hacked a big chunk of the internet. How worried should we be?
Code maintainers around the world are now thinking about their vulnerabilities at a strategic and tactical level. It is not only their code itself they will be worrying about, but also their code distribution mechanisms and software assembly processes.