Michigan Tech Researchers Develop ‘Smart’ Deep Brain Stimulation Systems for Parkinson’s Patients

source: mfu.edu  |  image: pixabay.com

Researchers at Michigan Technological University are applying neuromorphic computing to improve the effectiveness and energy efficiency of deep brain stimulation systems used to treat Parkinson’s disease.

 

Currently incurable, Parkinson’s disease is a neurodegenerative disorder that affects millions worldwide. Deep brain stimulation (DBS) is an alternative to medications that are effective but lose effectiveness as patients develop drug resistance. Over time, larger doses of medication become necessary to control the condition and with them come potentially serious side effects. DBS is one alternative.

Making Deep Brain Stimulation Systems Better for Patients

DBS systems function like a pacemaker for the brain. They suppress the motor symptoms of Parkinson’s disease, including slowed or delayed movements (called bradykinesia), tremors and stiffness. An electrode, implanted into a specific target in the brain, emits electrical impulses using a battery-powered device in the chest. 

DBS systems can be life-changing for people diagnosed with Parkinson’s disease. But battery life is a challenge. Current devices use an implantable pulse generator (IPG), surgically inserted in the chest or abdomen, to send stimulation signals to the brain at a constant frequency, regardless of the clinical state of the patient. Nonchargeable batteries last approximately two to five years. Battery replacement can be disruptive for patients; it requires a surgical procedure. And there can be unwanted side effects caused by the IPG’s continuous stimulation.

Continue reading “Michigan Tech Researchers Develop: Systems for Parkinson’s Patients”

 

What is a QR Code + How Does It Work?

Everything Marketers Should Know

 

source: blog.hubspot.com, contributed by FAN, Steve Jones. |  image: pixabay.com

 

I’ll never forget the first time dining at a restaurant after my pandemic-induced hibernation. Before I could ask for a menu, the waitress nodded towards a piece of paper with a barcode on it. “Open your phone camera and scan it. The menu should pop up.”

QR codes have become a common sight almost overnight — from cereal boxes and billboards to even employee uniforms. With a 94% increase in interactions from 2018 to 2020, there’s no denying QR codes are seeing an epic revival in a new touch-free world.

Let’s explore the origins of the QR code, learn how it works, and discuss ways it can refresh your marketing strategy.

What is a QR code?

Short for quick response, QR codes are scannable barcodes that store data. In the marketing sphere, they’re commonly used to redirect users to landing pages, websites, social media profiles, or store coupons.

For instance, someone can place a QR code on the back of their business card to direct you to their LinkedIn profile. A QR code on a billboard may send you to a landing page.

QR codes vary in design and function, and primarily fall into one of the following categories — static or dynamic.

Static vs. Dynamic QR Codes

A static QR code contains information that cannot be modified once it’s live. This means any typo or misstep will require you to create a brand new one. The good news is that static codes don’t expire — so once the content is set, your work is done.

Static QR codes are ideal for storing fixed or sensitive info — think Wi-Fi passwords, employee ID numbers, or access codes. But they’re not so helpful if you need to update your data regularly.

Dynamic QR codes allow you to change your info as many times as you want. This is because the information isn’t ingrained into the code itself. Instead, it redirects users to a specific URL that can be changed at any time. For example, a restaurant can redirect users to a menu on their website.

A major benefit of dynamic QR codes is the ability to gather scanning metrics. While you can’t access personal information from users, you can see the time, location, and device used for each scan. And as marketers, we know these metrics are crucial to gauging campaign effectiveness.

How do QR codes work?

A QR code works similarly to barcodes at the supermarket. Each QR code consists black squares and dots which represent different pieces of information. When scanned, the unique pattern on the barcode translates into human-readable data. This transaction happens in seconds.

Users must scan the code with a QR reader or scanner, although nowadays most people scan QR codes with smartphones. On the off chance your phone doesn’t have the capability, there are plenty of free apps for QR scanning like NeoReader and QuickMark Barcode Scanner.

Continue reading “What is a QR Code + How Does It Work?”

The Deepfake Dangers Ahead

source: wsj.com, contributed by Artemus Founder, Bob Wallace  |  image: pexels.com

 

AI-generated disinformation, especially from hostile foreign powers, is a growing threat to democracies based on the free flow of ideas

 

By Daniel BymanChris Meserole And V.S. Subrahmanian

Feb. 23, 2023 9:58 am ET

Bots, trolls, influence campaigns: Every day we seem to be battling more fake or manipulated content online. Because of advances in computing power, smarter machine learning algorithms and larger data sets, we will soon share digital space with a sinister array of AI-generated news articles and podcasts, deepfake images and videos—all produced at a once unthinkable scale and speed. As of 2018, according to one study, fewer than 10,000 deepfakes had been detected online. Today the number of deepfakes online is almost certainly in the millions.

We can hardly imagine all the purposes that people will find for this new synthetic media, but what we’ve already seen is cause for concern. Students can have ChatGPT write their essays. Stalkers can create pornographic videos featuring images of the people they are obsessed with. A criminal can synthesize your boss’s voice and tell you to transfer money.

Deepfakes risk leading people to view all information as suspicious.

Continue reading “The Deepfake Dangers Ahead”

Protect your privacy: A guide to avoiding drone surveillance

source: foxnews.com  |  image: pexels.com

It’s difficult to learn who owns a drone; some have their registration numbers visible, usually in case the owner loses sight of it.

I share a ton of tips to protect your privacy online. Do this quick 30-second check to keep your Google and Facebook accounts safe if you haven’t yet.

What about when you leave your home? Just about everywhere you go, you’re being watched. 

Not all cameras are out in the open, either. I once found more than a dozen cameras in an Airbnb I rented. Here are my best tips for spotting hidden cams in a rental, new apartment, home, or hotel room. But now we have drones to deal with.

The internet is a dangerous place. Join over 400,000 people and stay updated with my free daily newsletter.

I spy with my eye a drone in the sky

The other day, I heard a familiar buzz while swimming in my backyard pool. Sure enough, a drone hovered overhead and quickly vanished when I shooed it away with my hand. That’s how I got the idea for this post.

Continue reading “Protect your privacy: A guide to avoiding drone surveillance”

Cybersecurity trends in 2023 that will directly impact everyday life

source: cybersecuritydive.com  |  image: Pixabay.com

 

The scale of cyberthreats are growing, spilling into the mainstream. In 2023, expect the spotlight to add pressure to businesses that have underinvested in security.

 

There are a few certainties in cybersecurity: ransomware will cause headaches for companies; third parties will spark cyber incidents; and every December, cybersecurity analysts will put together lists of their predictions and trends they believe will have an impact in the coming year. 

Most of the predictions are designed to help organizations build out their security programs, but every so often a trend will build slowly over time until its impact is clear.

Sometimes these trends will reach far beyond an individual company and impact society at large. 

Here are some of the biggest trends Cybersecurity Dive is watching this year. Are there any security patterns you are watching closely? Email us at cybersecurity.dive.editors@industrydive.com.

The global impact of state-sponsored activities

State-sponsored threats trend every year, but as we begin 2023, those threats have a different, more menacing, feel to them. The countries responsible for much of the state-sponsored activity — Russia, China and Iran — are embroiled in conflict. 

“In the past year, we’ve seen [Russia’s] invasion of Ukraine; a worsening of the relationship between China and the West combined with tightening control by Xi Jinping and further pressure on Taiwan; and a growing concern in Iran about dissident activity and pressures on the regime both internally and abroad,” said Mike McLellan, director of intelligence for the Secureworks Counter Threat Unit. 

Continue reading “Cybersecurity trends in 2023 that will directly impact everyday life”

5 scientific breakthroughs in 2022 that should give you hope for the future

 

source: fastcompany.com  |  image: Pixabay.com

 

It’s been a challenging year on many fronts, but where science is concerned, the future is brighter than it is bleak.

While there was no shortage of upsetting news in 2022, researchers and science enthusiasts can point to a number of uplifting advancements and discoveries to revive hope in humanity. This year, the brightest minds in STEMs brought us steps closer to a revolutionary future, with breakthroughs in energy production, space exploration, and planet protection. Here are five scientific breakthroughs from 2022 to reflect on how far we’ve come. 

WE HIT A NUCLEAR-FUSION MILESTONE

It took 70 years, but physicists at the National Ignition Facility (NIF) finally had more output than energy input. Although commercial production of fusion energy is still a pipe dream, researchers at NIF in California have done what a similar project in France has yet to do. The hope for the future is more energy gains from nuclear fusion, which can provide an infinite source of clean energy that’s carbon-free and doesn’t emit radioactive waste. 

Continue reading “5 scientific breakthroughs in 2022…”

Your Home Security Cameras Are in the Wrong Spots. Here’s Where to Put Them

source: cnet.com  |  contributed by Steve Page  |  image: pixabay.com

If you have a home security camera (or are you thinking about finding a Black Friday deal on one), you may have wondered about the best places to put them to deter bad actors and give you the best view of your property — and where not to put them. 

Your home and yard layout, budget and home security priorities are different from your neighbor’s, so there is no one-size-fits-all rule for security camera placement. But this guide will help you consider all the aspects of your home security setup and identify which ones are absolute musts based on the vulnerabilities in your home.

For more home security tips, check out how to prevent your home security cameras from being hacked, and the best cheap home security systems you can buy.

Where you should consider installing a home security camera

1. Exterior: Front door

You might assume that intruders always sneak into side entrances, but statistics from the International Association of Certified Home Inspectors show that 34% of burglars use the front door. It’s also where package thieves are likely to strike. A camera at your main entrance keeps tabs on everybody going in and out of your home, from family members and babysitters to maintenance people, delivery people and more. (Pro tip: Video doorbells are great picks for the front door. You can use them as the primary camera or in conjunction with another outdoor camera aimed at the yard or garage.)

Continue reading “Your Home Security Cameras Are in the Wrong Spots. Here’s Where to Put Them”

Apple Tracks You More Than You Think

source: wired.com  |  image: pexels.com

CYBERSECURITY STARTUP CORELLIUM offered or sold its software to spyware and hacking-tool creators in multiple repressive countries, a WIRED investigation revealed this week. A previously unreported 507-page document, believed to have been prepared by Apple, details how Corellium offered a trial of its products to the controversial spyware firm NSO Group, to a cybersecurity company with ties to the UAE government, and to a firm in China that also has government links. In response, Corellium, which makes phone-virtualization software that can help find security bugs in iOS and Android, published a blog post detailing how it now vets potential customers.

As millions of people across the US celebrated Thanksgiving and attended parades, we looked at the US shortage of bomb-sniffing dogs. Experts say the pandemic has led to a drop in the supply of dogs in the country—85 to 90 percent of them come from overseas—and that the lack of trainer animals is fueling national security concerns.

Apple’s privacy policy for analytics services on its devices, which gather data about how you use its products, claims the information collected isn’t used to identify you. However, a new analysis of the tools, reported by Gizmodo, claims a permanent ID number within the service is “tied to your full name, phone number, birth date, email address and more.” This ID number is sent to Apple alongside the analytics data about how you use your device, researchers from the software company Mysk told the publication. 

The findings appear to contradict the company’s privacy promises. Apple did not answer Gizmodo’s questions on the report. In recent years, Apple has pushed a pro-privacy stance, using it as an advantage over competitors, and it has run ads saying the data on people’s iPhones stays on their devices. However, experts have increasingly questioned some of Apple’s practices. (At the same time, Apple has been growing its advertising business.) In separate research published earlier in November, Mysk researchers claimed that Apple collects detailed information on people using its products through its own apps, even when they turn tracking off.

You Really Need a Password Manager.

Here’s How to Get Started

source: cnet.com  |  image: pixabay.com

 

Using a password manager is easy, and it’s one of the best ways to stay secure online.

It may seem like more trouble than it’s worth, but you really need to create a unique password for each of your online accounts. Each password should ideally be at least eight characters in length and consist of capital and lowercase letters, numbers and symbols. (Yes, using “password123” for everything isn’t going to cut it.) It may be tempting, but using one easy-to-remember code across all of your accounts can jeopardize your online security — and you definitely don’t want to make yourself an easy target for cybercriminals. In fact, recent research by cybersecurity firm Hive Systems has suggested that a weak password can be cracked instantly by a hacker.

Password managers are vital tools that can help you stay safe online and be more digitally secure by simplifying the process of using strong passwords. And they’re easier to use than you may think. Even so, 4 out of 5 American adults don’t use a password manager, according to a study from Security.org. 

Here’s why you need a password manager and how to set one up.

What is a password manager, and why do I need one?

A password manager is an online service that stores your passwords as well as other data like credit card numbers, bank account information and identification documents in a secure, encrypted environment. It takes one of the biggest potential vulnerabilities — weak or recycled passwords — and does the hard work for you.

Continue reading “You Really Need a Password Manager. Here’s How to Get Started”

The 3 Worst Spots to Put a Home Security Camera

source: cnet.com (contributed by FAN, Steve Page)  |  image: pixabay.com

 

Don’t compromise your home security: Put your home security cameras in the right places.

Security cameras are one of the simplest ways to deter would-be burglars and protect your home. With the help of a few well-placed cameras, you can easily keep a remote eye on most of your home and property. And with more affordable options on the market and improvements in wireless technology, it’s now possible for just about anyone to set up a wired or wireless security camera system that fits your home’s needs and budget. 

But it’s also possible to set up a home camera security systemthe wrong way. The last thing that you want to do is place a camera in a spot where it is rendered ineffective and find out too late that its footage is useless. This guide will steer you away from camera placements to avoid and help you establish a more effective home security camera system. For more on home security, check out the best security camera deals and how to keep your security cameras from being hacked

Ineffective spots

You might be tempted to point cameras at the spots around your home that are difficult to see. There is an intuitive reason for this: If you can’t see a location from your windows or doors, it feels possible that someone might be lurking there. You might think these hidden areas are a burglar’s preferred place to break and enter. 

Continue reading “The 3 Worst Spots to Put a Home Security Camera”