Michigan Tech Researchers Develop ‘Smart’ Deep Brain Stimulation Systems for Parkinson’s Patients

source: mfu.edu  |  image: pixabay.com

Researchers at Michigan Technological University are applying neuromorphic computing to improve the effectiveness and energy efficiency of deep brain stimulation systems used to treat Parkinson’s disease.

 

Currently incurable, Parkinson’s disease is a neurodegenerative disorder that affects millions worldwide. Deep brain stimulation (DBS) is an alternative to medications that are effective but lose effectiveness as patients develop drug resistance. Over time, larger doses of medication become necessary to control the condition and with them come potentially serious side effects. DBS is one alternative.

Making Deep Brain Stimulation Systems Better for Patients

DBS systems function like a pacemaker for the brain. They suppress the motor symptoms of Parkinson’s disease, including slowed or delayed movements (called bradykinesia), tremors and stiffness. An electrode, implanted into a specific target in the brain, emits electrical impulses using a battery-powered device in the chest. 

DBS systems can be life-changing for people diagnosed with Parkinson’s disease. But battery life is a challenge. Current devices use an implantable pulse generator (IPG), surgically inserted in the chest or abdomen, to send stimulation signals to the brain at a constant frequency, regardless of the clinical state of the patient. Nonchargeable batteries last approximately two to five years. Battery replacement can be disruptive for patients; it requires a surgical procedure. And there can be unwanted side effects caused by the IPG’s continuous stimulation.

Continue reading “Michigan Tech Researchers Develop: Systems for Parkinson’s Patients”

The DEA is using Apple’s AirTags for surveillance

source: imore.com  |  image: pixabay.com

It’s the first time a federal agency has used the tracker for surveillance.

A new report says that the DEA used an AirTag for surveillance in anti-drug operations last year, in what is believed to be the first instance of a federal agency using the tracker in such a manner.

According to Forbes(opens in new tab), border agents intercepted two packages from Shanghai, China, in May of 2022, which were found to contain a pill press that is used to turn powders into tablets. “Believing that they were destined for an illegal narcotics manufacturer”, the DEA stepped in, and rather than swipe the goods, instead placed an AirTag inside the device so they could track its whereabouts. 

A warrant seen by the outlet reveals what “appears to be the first known case of a federal agency turning Apple’s location-tracking device into a surveillance technology.”

Continue reading “The DEA is using Apple’s AirTags for surveillance”

US cyber officials make urgent push to warn businesses about vulnerabilities to hackers

source: cnn.com  |  image: pixabay.com

WashingtonCNN — 

US cybersecurity officials are unveiling a new program to warn critical American companies that their systems are vulnerable to ransomware attacks before the hackers can successfully strike.

The new federal program – details of which were shared exclusively with CNN – is needed because “the pace and the impact of (ransomware) intrusions are still unacceptable,” said Eric Goldstein, a senior official at the US Cybersecurity and Infrastructure Security Agency.

Ransomware attacks, like the 2021 incident that temporarily shut down one of America’s largest fuel pipelines, have disrupted key services important to American life and made the issue a national and economic security concern for the Biden administration.

But federal officials and private researchers have sometimes struggled in recent years to get in touch with key organizations like hospitals or universities in the crucial window between when a hacker gains access to a network and when they lock up the network and demand a multimillion-dollar ransom.

Continue reading “US cyber officials make urgent push to warn businesses about vulnerabilities to hackers”

Ring Is in a Standoff With Hackers

source: wired.com  |  image: pixabay.com

WHAT’S MORE CONTROVERSIAL than a popular surveillance camera maker that has an uncomfortably cozy relationship with American police? When ransomware hackers claim to have breached that company—Amazon-owned camera maker Ring—stolen its data, and Ring responds by denying the breach.

But we’ll get to that.

Five years ago, police in the Netherlands caught members of Russia’s GRU military intelligence red-handed as they tried to hack the Organization for the Prohibition of Chemical Weapons in The Hague. The team had parked a rental car outside the organization’s building and hid a Wi-Fi snooping antenna in its trunk. Within the GRU group was Evgenii Serebriakov, who was caught with further Wi-Fi hacking tools in his backpack.

 

Ring Is in a Standoff With a Ransomware Gang

ALPHV, a prolific group of hackers who extort companies with ransomware and leak their stolen data, said earlier this week that it had breached security camera maker Ring and threatened to dump the company’s data online if it doesn’t pay. “There’s always an option to let us leak your data …” the hackers wrote in a message to Ring on their leak site. Ring has so far responded with a denial, telling Vice’s Motherboard, “We currently have no indications of a ransomware event,” but it says it’s aware of a third-party vendor that has experienced one. That vendor, Ring says, doesn’t have access to any customer records. 

Meanwhile, ALPHV, which has previously used its BlackCat ransomware to target companies like Bandai Namco, Swissport, and hospital firm Lehigh Valley Health Network, stands by its claim to have breached Ring itself, not a third-party vendor. A member of the malware research group VX-Underground shared with WIRED screenshots of a conversation with an ALPHV representative who says that it’s still in “negotiations” with Ring.

Chinese surveillance from above may make stealth planes obsolete | Opinion

source: sun-sentinel.com  |  image: pixabay.com

 

When Pentagon brass rolled out the bat-shaped B-21 Raider late last year amid self-congratulatory speeches and glowing news reports, they touted it as the ideal deterrent against Beijing’s military ambitions. Projected to cost some $720 million apiece, the airplane was called the ultimate in radar-evading technology, able to carry out conventional and nuclear strikes virtually undetected in China and elsewhere.

As a journalist who covered previous stealth aircraft, the praise evoked disturbing echoes of glaring design flaws. Such missteps initially made the B-21′s predecessor, the Air Force’s B-2 Spirit, less stealthy and more difficult to operate than advertised. Northrop Grumman Corp. built both bombers.

Now, former senior officials involved in the classified B-21′s early development worry the Pentagon is repeating a version of those mistakes, this time by underestimating Beijing’s ability to closely track the latest bomber from space.

Continue reading “Chinese surveillance from above may make stealth planes obsolete | Opinion”

 

What is a QR Code + How Does It Work?

Everything Marketers Should Know

 

source: blog.hubspot.com, contributed by FAN, Steve Jones. |  image: pixabay.com

 

I’ll never forget the first time dining at a restaurant after my pandemic-induced hibernation. Before I could ask for a menu, the waitress nodded towards a piece of paper with a barcode on it. “Open your phone camera and scan it. The menu should pop up.”

QR codes have become a common sight almost overnight — from cereal boxes and billboards to even employee uniforms. With a 94% increase in interactions from 2018 to 2020, there’s no denying QR codes are seeing an epic revival in a new touch-free world.

Let’s explore the origins of the QR code, learn how it works, and discuss ways it can refresh your marketing strategy.

What is a QR code?

Short for quick response, QR codes are scannable barcodes that store data. In the marketing sphere, they’re commonly used to redirect users to landing pages, websites, social media profiles, or store coupons.

For instance, someone can place a QR code on the back of their business card to direct you to their LinkedIn profile. A QR code on a billboard may send you to a landing page.

QR codes vary in design and function, and primarily fall into one of the following categories — static or dynamic.

Static vs. Dynamic QR Codes

A static QR code contains information that cannot be modified once it’s live. This means any typo or misstep will require you to create a brand new one. The good news is that static codes don’t expire — so once the content is set, your work is done.

Static QR codes are ideal for storing fixed or sensitive info — think Wi-Fi passwords, employee ID numbers, or access codes. But they’re not so helpful if you need to update your data regularly.

Dynamic QR codes allow you to change your info as many times as you want. This is because the information isn’t ingrained into the code itself. Instead, it redirects users to a specific URL that can be changed at any time. For example, a restaurant can redirect users to a menu on their website.

A major benefit of dynamic QR codes is the ability to gather scanning metrics. While you can’t access personal information from users, you can see the time, location, and device used for each scan. And as marketers, we know these metrics are crucial to gauging campaign effectiveness.

How do QR codes work?

A QR code works similarly to barcodes at the supermarket. Each QR code consists black squares and dots which represent different pieces of information. When scanned, the unique pattern on the barcode translates into human-readable data. This transaction happens in seconds.

Users must scan the code with a QR reader or scanner, although nowadays most people scan QR codes with smartphones. On the off chance your phone doesn’t have the capability, there are plenty of free apps for QR scanning like NeoReader and QuickMark Barcode Scanner.

Continue reading “What is a QR Code + How Does It Work?”

Artificial intelligence is changing how people work. That can be scary. But for now, most jobs are still safe.

source: nytimes.com, contributed by FAN, Bill Amshey  |  image: pixabay.com

‘It’s been revolutionary’

Eli Snyder, a special-education teacher in Colorado, wanted to play basketball with his students. He had questions: How could he adapt the game for a child with cerebral palsy? And how could he help his students with autism play a highly stimulating activity?

ChatGPT had answers.

The artificial intelligence chatbot had analyzed the internet’s vast amount of data, including information about disabilities and basketball. It used patterns it found in all that text to generate recommendations: Shrink the court size to reduce the distance players need to travel in wheelchairs. Lower the hoop and install a ramp leading up to it so students can roll the basketball into the net. Pair up players so each person has a buddy for support.

Snyder could have found this information through a simple Google search. He turned to ChatGPT because it produced complete paragraphs instead of delivering links that would have left him with more clicking and synthesizing to do. The chatbot’s response helped him quickly write adapted lesson plans for each of his students.

“It’s been revolutionary,” Snyder, 30, said. “What used to take me an hour now takes me five minutes.”

Ford patents self-driving car that repossesses itself if the owner fails to keep up with payments – and drives itself back to the showroom or scrapyard

 

source: dailymail.co.uk/, contributed by Artemus Founder, Bob Wallace  |  image: pixabay.com

 

Ford is not taking any chances with owners missing car payments – the company is working on a system that prompts the vehicle to repossess itself. 

A newly awarded patent describes a car self-driving back to the showroom or a scrapyard if the owner does not answer messages about their delinquent account. 

The American carmaker would start the process by disabling ‘comfort features,’ playing noises inside the car and limiting where the vehicle can drive.

 

If all else fails, Ford will activate the self-driving feature and the owner has no choice but to give up the car.

While patent applications do not always turn into real-world services, Ford describes using a ‘repossession computer’ that could be installed to let it take control of functions.

Continue reading “Ford patents self-driving car that repossesses itself…”