Web inventor Tim Berners-Lee wants us to ‘ignore’ Web3: ‘Web3 is not the web at all’

source: cnbc.com  |  image:  pexels.com

 

LISBON, Portugal — The creator of the web isn’t sold on crypto visionaries’ plan for its future and says we should “ignore” it.

Tim Berners-Lee, the British computer scientist credited with inventing the World Wide Web in 1989, said Friday that he doesn’t view blockchain as a viable solution for building the next iteration of the internet.

He has his own web decentralization project called Solid.

“It’s important to clarify in order to discuss the impacts of new technology,” said Berners-Lee, speaking onstage at the Web Summit event in Lisbon. “You have to understand what the terms mean that we’re discussing actually mean, beyond the buzzwords.”

Continue reading “Web inventor wants us to ‘ignore’ Web3…”

A new satellite brighter than any star could ruin the night sky

source: fastcompany.com  |  image:  pixabay.com

Another space internet provider is going to defile our skies with a satellite that looks to be brighter than everything but the moon.

How will the moon’s resources be managed?

source: fastcompany.com  | image: pixabay.com

The 2020s will be recognized as the decade humans transitioned into a truly space-faring species that utilizes space resources to survive and thrive both in space and on Earth.

It’s been 50 years since humans last visited the moon, and even robotic missions have been few and far between. But the Earth’s only natural satellite is about to get crowded.

At least six countries and a flurry of private companies have publicly announced more than 250 missions to the moon to occur within the next decade. Many of these missions include plans for permanent lunar bases and are motivated in large part by ambitions to assess and begin utilizing the moon’s natural resources. In the short term, resources would be used to support lunar missions; but in the long term, the moon and its resources will be a critical gateway for missions to the broader riches of the solar system.

But these lofty ambitions collide with a looming legal question. On Earth, possession and ownership of natural resources are based on territorial sovereignty. Conversely, Article II of the Outer Space Treaty—the 60-year-old agreement that guides human activity in space—forbids nations from claiming territory in space. This limitation includes the moon, planets, and asteroids. So how will space resources be managed?

I am a lawyer who focuses on the peaceful and sustainable use of space to benefit all humanity. I believe the 2020s will be recognized as the decade humans transitioned into a truly space-faring species that utilizes space resources to survive and thrive both in space and on Earth. To support this future, the international community is working through several channels to develop a framework for space resource management, starting with Earth’s closest neighbor, the moon. Continue reading “How will the moon’s resources be managed?”

Software engineers from big tech firms like Google, Amazon, Microsoft, and Meta are paying at least $75,000 to get 3 inches taller, a leg-lengthening surgeon says

source: businessinsider.com  |  image:  pixabay.com

  • Workers from Google, Microsoft, Amazon, and Meta are paying $75,000 to be taller, a surgeon told GQ.
  • The Las Vegas surgeon can lengthen patients’ legs via a painful months-long process.
  • He breaks the thigh bones and inserts nails that are extended every day for three months.

 

A Las Vegas cosmetic surgeon who specializes in leg-lengthening procedures that can extend people’s height by 3 to 6 inches told GQ magazine that many of his patients are tech workers.

Kevin Debiparshad founded LimbplastX Institute in 2016, and the clinic’s business has boomed during the pandemic, he told GQ. 

Here’s how it works: The doctor breaks the patients’ femurs, or thigh bones, and inserts metal nails into them that can be adjusted. The nails are extended a tiny bit every day for three months with a magnetic remote control, GQ reported.

Continue reading “Big Tech Engineers Pay to Get Taller”

A new technology uses human teardrops to spot disease

 

 

 
 
 
 

source: sciencenews.org  |  image: pexels.com

 

A new method to rapidly analyze teardrops could help scientists detect molecular signatures of disease.

Human tears could carry a flood of useful information.

With just a few drops, a new technique can spot eye disease and even glimpse signs of diabetes, scientists report July 20 in ACS Nano.  

“We wanted to demonstrate the potential of using tears to detect disease,” says Fei Liu, a biomedical engineer at Wenzhou Medical University in China. It’s possible the droplets could open a window for scientists to peer into the entire body, he says, and one day even let people quickly test their tears at home.

Like saliva and urine, tears contain tiny sacs stuffed with cellular messages (SN: 9/3/13). If scientists could intercept these microscopic mailbags, they could offer new intel on what’s happening inside the body. But collecting enough of these sacs, called exosomes, is tricky. Unlike fluid from other body parts, just a trickle of liquid leaks from the eyes.

So Liu’s team devised a new way to capture the sacs from tiny volumes of tears. First, the researchers collected tears from study participants. Then, the team added a solution containing the tears to a device with two nanoporous membranes, vibrated the membranes and sucked the solution through. Within minutes, the technique lets small molecules escape, leaving the sacs behind for analysis.

The results gave scientists an eyeful. Different types of dry-eye disease shed their own molecular fingerprints in people’s tears, the team found. What’s more, tears could potentially help doctors monitor how a patient’s diabetes is progressing. 

Now, the scientists want to tap tears for evidence of other diseases as well as depression or emotional stress, says study coauthor Luke Lee, a bioengineer at Harvard Medical School. “This is just the beginning,” he says. “Tears express something that we haven’t really explored.”

 

 

 

 

 

 

 

Listy is a simple, free way to catalog your favorite stuff

source: fastcompany.com  |  image: pexels.com

 

You can list your favorite albums, books, movies, TV shows, video games, sites, apps, wines, beers or social posts.

 

This article is republished with permission from Wonder Tools, a newsletter that helps you discover the most useful sites and appsSubscribe here.

Listy is a free and simple app for making lists of your favorite things. It automatically includes related images, like book or album covers, and you can create shareable visual lists with the free app on Mac, iOS, or Android. It’s a handy way to quickly share recommendations with friends.

You can list your favorite albums, books, movies, TV shows, video games, sites, apps, wines, beers, or social posts. Your list shows up with the appropriate cover art: Any book, album, TV show, or movie you list will be paired with its representative image, just as whatever wines or beers you list will include images of their bottles.

MAKING LISTS IS SIMPLE

  • To make a list you first pick a category—like books, movies, video games. Then you add items one by one. Unlike many other apps, you don’t have to register or log in to start using it.
  • When you start typing the name of something, Listy searches a database to find it. That item, along with its image and other basic info, is added to your list.
  • You can sort lists by title, genre, rating, data added, or other info, depending on the category.
  • For films, the app automatically adds the movie’s release date, description, and fan score, drawn from the Movie Database, a free, community-built platform that’s now used by 400,000 developers and companies. It also notes where the movie is available to watch online.

EDIT AND SHARE YOUR LISTS

  • Once you’ve added items, you can edit your list to change its order or to delete or update items. You can also mark items as watched, read, played, or tasted.
  • You can share any of your lists as an image, making it easy to post lists to your social network of choice. You can also text or email a list as an image.
  • You can make as many lists as you’d like, each with as many items on it as you want.
  • Lists can be backed up to iCloud so they stay in sync between your iPhone, iPad, and Mac.

LIMITATIONS

  • You can export lists as images or in Listy’s own proprietary file format, but you can’t open or edit the app’s lists in other text apps.
  • You can’t send someone a link to a list. You have to attach the list as an image.
  • You can’t yet collaborate on a list with others, though that feature is in the works. The company has been careful about privacy: Its site uses no cookies.
  • You can use Listy for to-do lists or lists of ideas, but it’s not designed primarily for that. Better to use other simple free alternatives like Apple’s Reminders or Google Tasks, or dedicated to-do apps like Things.
  • Listy has a limited number of categories. If you want to make a list of your favorite snacks, animals, cartoon characters, or other categories the app hasn’t added yet, you’re out of luck, though new categories are added monthly.

ALTERNATIVES

 

 

Smishing vs. Phishing: Understanding the Differences

 

source: proofpoint.com  |  image: pexels.com

 
What have smishing offenders learned from their phishing email counterparts?

Email-based credential theft remains by far the most common threat we encounter in our data. But SMS-based phishing (commonly known as smishing and including SMS, MMS, RCS, and other mobile messaging types) is a fast-growing counterpart to email phishing. In December 2021, we published an article exploring the ubiquity of email-based phish kits. These toolkits make it straightforward for anyone to set up a phishing operation with little more than a laptop and a credit card. Since then, we’ve tracked their evolution as they gain new functions, including the ability to bypass multifactor authentication.

In this blog post we’re going to look at smishing vs. phishing and what smishing offenders have learned from their email counterparts, as well as some significant differences that remain between the two threats.

Setting the (crime) scene

A modern email phishing setup can be as simple as one person with a computer and access to common cloud-hosted services. But for a smishing operation, the picture is somewhat different. While software smishing kits are available to buy on the dark web, accessing and abusing mobile networks requires a little more investment.

Continue reading “Smishing vs. Phishing: Understanding the Differences”

What is IoT? Guide to the Internet of Things

 

source: eweek.com  |  image: pexels.com

The Internet of Things introduces opportunities for organizations to achieve practical gains and transformative changes.

The Internet of Things (IoT) shifts human and computer interaction to a broad and widely distributed framework. By connecting various “things” and “objects”—smartphones, lights, industrial machines, wearables, remote sensors and physical objects that have been equipped with RFID tags—it’s possible to drive advances that would have seemed unimaginable only a couple of decades ago.

The IoT—which serves as a broad term for a vast network of connected devices—has moved into the mainstream of business and life. It now serves as a fabric for far more advanced human-machine interaction. It encompasses everything from home thermostats and wearables to tracking systems and smart systems for agriculture, buildings and even cities.

Today, virtually no technology lies outside the realm of the IoT. Self-driving vehicles, manufacturing robots, environmental monitoring, supply chain tracking, transportation systems, and remote medical devices are just a few of the areas undergoing radical change due to the IoT.

Mobile phone company Ericsson reports that there are currently about 29 billion IoT devices in use worldwide. Businesses are increasingly turning to the IoT to drive innovation, trim costs, improve safety and security, and promote greater sustainability.

Continue reading “What is IoT? Guide to the Internet of Things”

Cyber Companies and Universities Are Building ‘Cyber Talent Hub’

source: wsj.com  |  image: unsplash.com

 

Cyber firms will make practical training on their technology available to students in an attempt to address a skills shortage. The effort comes as fears mount that global competitors like China are outpacing the West on talent

Cybersecurity companies, investors and universities are collaborating to build a platform that would connect students with private-sector employers in hands-on training on the companies’ own technologies.

The effort is aimed at addressing a dearth of cyber professionals—around 600,000 positions in the U.S. alone are unfilled, according to industry surveys. Job seekers, however, are often stymied by excessive requirements for entry-level jobs, including demands for experience typically gained after years in the industry.

The Cyber Talent Hub, as the new platform will be called, will allow companies worldwide to post custom content allowing students to train on specific technologies they are likely to encounter in their careers. It will be launched at the end of this year.

Continue reading “Cyber Companies and Universities Are Building ‘Cyber Talent Hub’”

Nobody likes self-checkout. Here’s why it’s everywhere

source: cnn.com  |  image: unsplash.com

New York (CNN Business). “Unexpected item in the bagging area.”
“Please place item in the bag.”
“Please wait for assistance.”
If you’ve encountered these irritating alerts at the self-checkout machine, you’re not alone.  According to a survey last year of 1,000 shoppers, 67% said they’d experienced a failure at the self-checkout lane. Errors at the kiosks are so common that they have even spawned dozens of memes and TikTok videos.
“We’re in 2022. One would expect the self-checkout experience to be flawless. We’re not there at all,” said Sylvain Charlebois, director of the Agri-Food Analytics Lab at Dalhousie University in Nova Scotia who has researched self-checkout.  Customers aren’t the only ones frustrated with the self-checkout experience. Stores have challenges with it, too.