Technology is now part of our everyday lives: no program or technology solution operates in isolation. Therefore, to live up to the commitment to do no harm, policymakers and practitioners need to anticipate and work to mitigate harms, even those that originate outside of a given initiative.| digitalprinciples.org
Today, as digital public infrastructure gains popularity, trust is critical, as important information of all types is being stored – and shared – across national data exchange systems and beyond. Verifiable credentials, when well designed, implemented, and governed can ensure these data assets are being accessed and shared in a trusted, secure manner. To learn more about the power of verifiable credentials, read our primer piece here.| Digital Impact Alliance
This is the logged out version of a short course in Apolitical’s Government AI Campus. You won’t be able to access some interactive elements of the course or download a certificate of completion. For the full course experience, sign up for free.| Apolitical
The ImageNet competition ends today. But its legacy is just starting to take shape.| Quartz