The Most/Recent Articles

Showing posts with label technology. Show all posts
Showing posts with label technology. Show all posts

THE EDGE: Stem Cells from Foreskin of Circumcised Baby Penis' used to Grow 'Mini-Brains' able to Process Data and Run AI, Faster - While Consuming Almost NO ENERGY...

The Edge By Ross Davis

Welcome to THE EDGE, a series that focuses on the edge of technology. This series will not be about obscure, small advances in technology—our goal is to be where you will first hear about something that everyone will be talking about in the next few years. This is where you'll discover tech with the ability to transform and shape our future, and follow its development from its earliest phases.

Personally, as someone who's been interested in the evolution of technology for as long as I can remember, I feel the next wave of technology comes with a risk factor we haven't seen before.

AI brings with it the disruption of human-to-human interaction, whether it be professionally, as it replaces co-workers or entire departments in the workforce, or in the still little-explored but very real issue of AI replacing intimate personal relationships. Virtual reality opens the doors to everything from entertainment reaching new levels of immersion to face-to-face interactions, meetings, and even family gatherings, regardless of the miles separating people. But it also comes with the very real risk of people choosing virtual worlds over real life, replacing themselves with an avatar based on their idealized version of themselves. It can feel real enough that it's easy to ignore the fact that the only interactions in this virtual world are between façades.

The source of the most dangerous technology has remained the same for most of human history, probably because it has always had the largest budget—and that is military technology. Even here, advances introduce entirely new levels of danger, where the atom bomb has become just one of several weapons that could end mankind.

But I chose the topic for this first issue for several reasons: the ability of this technology to have major implications on all the other technologies I've mentioned, the pace at which it is progressing, and the very real concerns that come with it. However, my primary reason for choosing this topic is that while people are familiar with the general concept, outside of the labs where its development is taking place, people seem completely unaware of just how deep scientists are into this uncharted territory.

I’m talking about where life meets machine—the point where the lines between the biological and the artificial are not just blurred, they’re rapidly becoming entirely erased.

Human Stem Cells Used to Create Lab-Grown Brain Tissue, Now Being Used for Organoid Intelligence (OI)...

The human brain can rapidly process massive amounts of data, and brain cells also require less energy to do the work. It turns out when these cells are given data, they return data as well.  This has scientists now working towards a new kind of computer processor, one powered by the neurons we have in our brains instead of silicon. 

Lab-Grown Brains:
The stem cells can come from a number of sources, one popular source for researchers are the previously-discarded foreskin from circumcised infants. These cells can can basically be re-programmed to become stem cells.  Stem cells can be thought of as a human cell that hasn't yet been told what it should become, it can turn into tissue, skin, organs, bone - this is when OI researchers are able guide these cells to become neurons, by putting them in a culture dish with already formed neurons, the neurons secrete molecules that (for lack of better words) tricks the stem cell in to thinking it is supposed to help grow a human brain. Done repeatedly, and eventually you have a lab grown brain.

This image shows a lab-grown mini brain created by Cortical Labs, which learned to play the video game 'pong'. 

Organoid Intelligence represents a new frontier, utilizing lab-grown brain organoids in order to accomplish some sort of computational task. While artificial intelligence today depends on silicon chips and machine-learning algorithms, OI would exploit inherent biological neuron capabilities for information processing and storage. The idea is that self-organizing, adaptive brain-like structures might be far more powerful and flexible for computer systems today, even opening new routes for information processing and cognitive studies.

Controversy
The largest concern with Organoid Intelligence is the eventuality of such brain organoids becoming conscious or sentient. Currently, scientists agree that so far, the  organoids used in research are too simple to become conscious. 

However, as these systems become more complex, and lab grown 'mini-brains' are no longer 'mini' - these artificially constructed brains could develop the the capacity to feel or, worse, think. 

This Tech is Classified as 'Wetware'...

Wetware is our human 'hardware' - the parts of human biology able to process data, such as the brain and central nervous system.  Wetware, in more advanced contexts, embraces also engineered or synthetic biological constructs merging the natural, real capabilities of the brain with advanced technology.

Controversy
Wetware falls into that gray area between biology and technology, begging questions of autonomy, human identity, and the ethics involved in manipulating living systems for technological ends. Some critics see it as the commodification of life or reducing human beings to mere components of larger machine-driven systems. The most heated debates will continue to revolve around privacy and control—are these systems vulnerable to being hacked or manipulated? What might happen when biological and digital components have become so intertwined as to be inseparable?

What's Next?

Wetware systems are here, and just weeks ago, became accessible to people outside of research labs when a Swiss company announced the world's first 'neuroplatform' where a 4-Organoid biocomputer can be accessed for a $500/month fee. 

Now that it's here, the future of wetware is about increasing its capabilities, by growing larger networks of lab-grown neutrons. The successive stages of development into brain-computer interfaces will be advanced neuroprosthetics, neural interfaces that WOULD enable real-time interaction between the activity of a brain and machine learning algorithms. Among other things, this might have serious implications from both the medical and enhancement ends, pushing us toward a world where thoughts can directly control computers—and conceivably vice versa.

Neural Dust: Tiny Sensors Inside Your Brain

Neural Dust is formed from micro-sized, wirelessly powered sensors that can be implanted in the human body and, more particularly, inside the brain, for the perception and manipulation of neural activity. These speck-of-dust-sized particles operate on the power provided by external ultrasound to send information about real-time brain activity to the outside world. Some of the other potential uses of Neural Dust include the treatment of various neurological disorders, such as epilepsy, and deeper brain-computer interfacing that could enable people to control machines with their minds.

Controversy
The very notion of dust-sized sensors nestled inside our bodies or brains conjures up certain immediate implications of privacy and self-governance. That such sensors may, in fact, be capable of monitoring brain activity and maybe even altering it opens up a Pandora's box of ethical considerations: who does the information belong to, and what are the safeguards against misuse or surveillance? In theory, Neural Dust might allow for highly invasive monitoring; it could be a tool for government overreach or corporate exploitation. There are also medical risks since the long-term effects of having foreign objects implanted in the body—let alone the brain—are not yet fully understood.

What's Next?
But despite these cautions, researchers forge ahead. The next generation of Neural Dust sensors will be even smaller and could, in theory, be used to monitor individual neurons and directly respond with artificial intelligence. Applications could range from advanced medical treatments to human augmentation and more: the direct integration of the brain with the machinery around it. At every single step, there will be the need to discuss exhaustively privacy, consent, safety, and security.

In Closing...

Organoid Intelligence, Wetware, and Neural Dust are only the very cutting edges of technologies where biology and computing meet. While such technologies have the power to disrupt businesses, from medicine to artificial intelligence, by providing never-before-imagined capabilities, they also face us with a completely new world of ethical dilemmas and beg questions about our stance toward technology, biology, and our perceived sense of self.

The crazy thing is, this still barely scratches the surface. But the goal isn’t to cover everything there is to know, but instead to cover what you need to know to stay informed, aware, and ready for how emerging new technologies can shape our world - and our lives.

Stay tuned for more as we continue to explore the edge of innovation.

------------------------
Author: Ross Davis
Silicon Valley Newsroom

Video: As Robotics and AI Merge, a Huge Competition for Progress, and Funding, is Developing...


In This Video: Major technology and robotics companies are advancing their efforts to develop and train artificial intelligence models. These AI systems are being designed to perform a wide range of roles and functions, preparing for a future where AI is integral to various industries and aspects of everyday life.

Video Courtesy of NBC News

Major Windows Security Hole Went Unpatched by Microsoft for Over a YEAR...

 

Windows Exploit

Hackers have been targeting Windows 10 and 11 users with malware for over a year, but a fix has finally arrived in the latest Windows update released on July 9th.

This vulnerability, exploited by malicious code since at least January 2023, was reported to Microsoft by researchers. It was fixed on Tuesday as part of Microsoft’s monthly patch release, tracked as CVE-2024-38112. The flaw, residing in the MSHTML engine of Windows, had a severity rating of 7.0 out of 10.

Security firm Check Point discovered the attack code, which used “novel tricks” to lure Windows users into executing remote code. One method involved a file named Books_A0UJKO.pdf.url, which appeared as a PDF in Windows but was actually a .url file designed to open an application via a link.

Internet Explorer Continues to Haunt Windows...

When viewed in Windows, these files looked like PDFs, but they opened a link that called msedge.exe (Edge browser). This link included attributes like mhtml: and !x-usc:, a trick long used by threat actors to open applications such as MS Word. Instead of opening in Edge, the link would open in Internet Explorer (IE), which is less secure and outdated.

Internet Explorer, Microsoft's infamously insecure browser has been discontinued for years, and even more previously unknown vulnerabilities are still occasionally discovered.  The point being - once a hacker has Internet Explorer open, and the ability to tell it to open a URL, they can choose from a wide variety of methods to install software, execute code, or destroy data.

IE would prompt the user with a dialog box to open the file, and if the user clicked “open,” a second dialog box appeared, vaguely warning about opening content on the Windows device. Clicking “allow” would cause IE to load a file ending in .hta, running embedded code.

Haifei Li, the Check Point researcher who discovered the vulnerability, summarized the attack methods: the first technique used the “mhtml” trick to call IE instead of the more secure Chrome/Edge. The second technique tricked users into thinking they were opening a PDF while actually executing a dangerous .hta application. The goal was to make victims believe they were opening a PDF using these two tricks.

Check Point’s report includes cryptographic hashes for six malicious .url files used in the campaign, which Windows users can use to check if they’ve been targeted.

____
Author: Stephen Hannan
New York Newsroom

'Godfather of AI' on AI's Potential Risk To Society...

Geoffrey Hinton is one of the leading voices in the field of AI,  he quit his job at Google over concerns about what AI could eventually lead to if unchecked.

Video courtesy of PBS Newshour

19 of The World's Largest Tech Companies ORDERED to REVEAL Algorithms Behind Their Latest AI Developments....

ai in europe

The European Commission is making 19 tech giants, including Amazon, Google, TikTok, and YouTube, reveal their AI algorithms under the Digital Services Act. This is a significant step towards making AI more transparent and accountable, and ultimately, improving our lives.

As we know, AI is expected to impact every aspect of our lives, from healthcare to education, to even how well we write. However, it also generates fear, such as concerns about machines becoming smarter than us or causing harm inadvertently. To avoid these risks, transparency and accountability will be crucial for AI to benefit us positively.

The EU Artificial Intelligence Act aims to achieve this goal. By sharing commercial information with regulators before using AI for sensitive practices such as hiring, companies can be held accountable for the outcomes of their algorithms. EU rules could quickly become the global standard, making this a significant development in AI regulation.

However, there's always a balance to strike when it comes to regulation. The major tech companies view AI as the next big thing, and innovation in this field is now a geopolitical race. Too much regulation could stifle progress, but at the same time, we need to make sure that companies are accountable for their algorithms' outcomes.

Companies will also need to answer any questions the commission members have about their AI projects.

\This is a significant development for AI regulation that will benefit everyone. By making AI more transparent and accountable, we can ensure that it improves our lives and avoids the potential risks.

Will They Even Have The Answers?

Interestingly, AI researchers are increasingly devoting time to understanding what AI is doing. Sometimes they can dig into the data and identify particular parameters on which the AI relies heavily. However, explaining why AI did or said something can be like explaining a magic trick without knowing the secret. 

This may be the most alarming revelation from these hearings – the creators don't always understand their creations.

-----------
Author: Trevor Kingsley
Tech News CITY /New York Newsroom

Banking App PAYS YOU To Try It Out - Stars Leonardo DeCaprio and Robert Downey Jr Fund New 'Green' Banking Startup...

Aspiration Mobile App Download and Review

From Hollywood to finance? This banking app is backed by stars Leonardo DeCaprio and Robert Downey Jr - they're entering the financial sector, and keeping their involvement 'behind the scenes' for this one.  

With DiCaprio's Investment This "Environmentally Cconscious" Banking App is PAYING People to Try It...

Yes, the rumors are confirmed that a "green digital banking" solution that just launched is backed by the funds of DiCaprio himself.

With these funds they can afford the expensive but effective marketing strategy of  paying people to try it out - you can claim $50 once you setup the app and your first transaction.

DiCaprio is going all in on his 'stop global warming' campaign, so this is part of multiple earth-friendly investments, others include the climate technology fund with Princeville Capital, and new adviser role with green start-up Bluon Energy. 


The app is called Aspiration, which NerdWallet described as "the only socially conscious bank on their list" caught his eye. Now it's caught ours, so lets get right in to this Aspiration Review!

"Each year, $100 billion worth of pipelines, drilling and other fossil fuel-extraction projects are funded with money deposited at traditional banks. To bring about long-term solutions for our planet, we need alternatives that empower everyday consumers to take action against climate change…" is how DiCaprio decided to invest in the new app, he tells us.

With this, the Aspiration Banking App has $100 Million in venture capital to play with, and they're spending it.

This graphic shows some of the new things they're bringing to banking....:
Aspiration app review bank Zelle cash back app
A look at some features.

Get Your Piece of the $100 Million Pie…

Now you can get those good feelings Leo got, by getting the app, getting a $50 'welcome' deposit from then, and then choosing a charity you'd like them to donate another $25 to.

At a price tag of $75 spent on every new user it's the biggest mobile banking app bonus we've seen so far.

…and that's not even everything, lastly, being a user comes with cell phone insurance up to $600 included for free!

I have to admit, it feels good getting some perks from a bank, that's something I only heard of as a 'back in my day' story from parents and grandparents.

Is It Actually Worth Using?


It actually is! They refund your ATM charges (not just the ones your bank charges, they literally pay you $3 if an ATM charged you $3!)

The app is free, with the option to donate if you like it, or not.

They pay you interest on the funds you save with them, and those profits won't be made by investing in companies that pollute.

So do some good for the world, and claim your $50 by joining the free app now.

---------
Author: Don Kennedy
Austin Newsdesk Aspiration Review

Like Free Money? You like this app too: Cash Back on Gas!

FINALLY - We Have DoorDash, UberEats and Uber Promo Codes... For EXISTING Users! (2022 Updated!)

Promo Code Discounts For Existing Users Of DoorDash and Uber Eats

There's A New App That Will Give Users A Discount On EVERY ORDER...

If you’re using Uber, UberEats, or DoorDash in 2022, you likely placed your first order using a promo code that was strictly for brand spanking new users. Since then, you’ve spent plenty but haven’t gotten any discounts, like they forgot about existing customers.

Finally there’s an answer for everybody asking when these apps will have promo codes for existing users! It’s about time those that faithfully and frequently get rides from Uber, or food delivered from Doordash and Uber Eats get something too.

The Existing Users Discount Comes Easier Than You'd Think.

All You Need Is This App For iPhone Or Android...

It's called Fluz, and yes it’s totally free — no membership fees ever! you merely use it when ordering your food from Doordash/UberEats, or before you invite a ride from Uber.

Available for both iPhone and Android, and it gives you discounts on EVERY ORDER you make on any of these popular apps, regardless of how long you've been a customer.

Promo Code and Existing Customer Makes A Happy User  doordash existing user discount

Up To 45% Off EVERY Time…

Yep, we’re not talking a few small discount either. This really adds up if you employ these apps often like I do.

At the time of publishing this , the present offer is 20% but I think it goes as high as 38% and as low as 2% (there’s dozens of popular places you'll earn cashback from on here, and it looks like they rotate which of them pay high or low).

Better than Getting A Promo Code As An Existing User of Uber and DoorDash.

The Fluz App Is Quick Cashback Earnings From Dozens Of Popular Places. catch on at https://www.fluz.rocks

Actually Get Your ‘Cash Back’…

You may have wasted time on other apps that used the term ‘cash back’ just to see future discounts  had a limited place to use them.

I’m happy to report, none of that BS here. You’re able to transfer money to your checking account via PayPal — whenever you want… the cash = back!

With No Fees, Ever…

This isn’t some scheme where they’ll let a bunch of individuals join free, then slap a monthly fee on once it’s popular enough. Fluz promises to NEVER charge a fee.

“No transaction fees. No signup fees. No payout fees” - just discounts! 

How are they able to give these discounts?

My first concern was — are they selling my personal info?  Not only is that not happening — but they’re actually protecting it. They guard your info with “Bank level-security” AES-256 encryption.

You only got to link your card once then can begin spending at dozens of places earning cash back. Before Fluz, you'd have needed to type in your card to each of them.

They’ve simply arranged partnerships with the businesses you see inside. Apps like this attract smart spenders — the people that search for good rewards programs actually tend to earn extra money. They’re people that are smart with their money, because they worked hard to earn it.

So — existing users of Uber, Uber Eats, and Doordash — enjoy this one! Life isn’t so bad as an existing customer.

Grab your discounts at https://www.fluz.rocks/


-------
Author: Cody Garrison
Palo Alto Newsroom

Tesla Joins Apple, Amazon and Microsoft, as Company Valuation Break The $1 TRILLION Mark - The 100,000 Vehicle Order That Made It Happen...

Tesla hit a $1 trillion market cap today following news that Hertz car rental is ordering 100,000 cars to buildits electric vehicle rental fleet.

The company joins trillion-dollar market cap companies like Apple, Amazon and Microsoft.

The deal will bring in a reported $4.2 billion for Tesla  - this is the largest purchase of electric vehicles, ever...

News of the deal brought Tesla’s stock to $1,028 by midday, a new record high - a gain of about 13%.

Morgan Stanley’s Adam Jonas raised his price target on Tesla to $1,200 a share from $900 on Sunday. Jato Dynamics said Monday that Tesla’s Model 3 electric sedan became the first fully electric vehicle to top new car sales overall in Europe in September.

The deal with Hertz, which will bring in a reported $4.2 billion for Tesla, is the largest ever purchase of electric vehicles, Bloomberg previously reported.

The cars are set for delivery within the next 14 months and will be available to US customers as early as November.

The deal comes more than a year after Hertz filed for bankruptcy protection during the height of the coronavirus pandemic, as demand for travel and rental vehicles waned.

But now they have new backing, and an agressive comeback plan as Knighthead Capital Management and Certares Management takes over the company.

Video courtesy of CNBC

Teachers And School Admin Begin A New Aggressive Online Safety Program, Learning How To Track Down Bullies, and Stop Cyber Attacks...


The Partner Schools Global Network (PSGN) are giving schools support by training teacher and administrative the importance online child protection awareness and cyber well-being. They provide services such as the Online Safety Program, which helps schools to prepare for and respond to cyber crime attacks and identify risk indicators. 

For the first time ever, a school has a secure portal to identify and respond to cyber attacks. Letting all online bullies and trolls to stay far away, we know who you are. 

Communicating online is a great way for children to build social connections, share thoughts and ideas, while learning about their interests. With this pandemic, children's social life have been set to a halt , while online harassment, bullying and cyber harassment are increasing at an alarming pace. Their goal is to create a safe place for kids, which allows parents to keep track of their kids' online activities.

Without over bearing control over the content of online media, kids would be exposed to even more damaging cyber threats.

Parents have found it challenging to suprvise their children online while keeping the idea of privacy alive, since there are numerous ways to harass and stalk kids online. Tragic incidents in the world have made us more aware of how real this online, "make believe" world full of trolls, catfishes, even some scammers is, more alive than it ever has been in the world before.

Truth is, as time continue to go, it will only become more and more present, even apart of ever aspect of daily life task, with inventions like AR, VR, and the COVID-19 pandemic. Watching the amount of our children's friends dwelling away from sleep over to, text them at the dinner table, online chat rooms.

Technology surely isn't going anywhere. If anything, we will become totally dependent on these technologies, which are only becoming more and more powerful. With enlightened knowledge , we can truly feel connected. Be sure you take advantage of all the ways to protect your child online. Overall, we need to adapt technology to our lives in a manner that is both secure and sustainable.

---------------
Author: Kirsten K. Knoll
Palo Alto Newsroom
.


SpaceX Has Made NASA 'Cool' Again For A Whole New Generation....


NASA reached peak cool on July 20th, 1969 when it sent the first men to the moon. However, the agency's impact on society goes far beyond space.

That's why until recently, for teens any exciting first hand stories about what NASA had accomplished, were stories told by their grandparents. 

. But Neil deGrasse Tyson, the famous astrophysicist, says NASA partnering with Elon Musk's SpaceX is one of the biggest advancements the agency has made since the moon landing.

Video courtesy of CNBC

Tesla's Position As The #1 Electric Car Faces It's First Real Threat, As Competitors Develop New Solar Powered EVs...

80 million cars powered by fossil fuels were sold last year. 
Many Tesla owners charge their cars at home, often unknowingly thanks to a coal burning power plant. 
Now meet "Lightyear"  - a startup developing a truly green electric vehicle, solar-powered.

Video Courtesy of Vice News





XBox Series X First Look At The Specs...


Xbox Series X is here with full impressions of the preview console and its very first optimized games with support for 120Hz, like Dirt 5 and Gears 5. Impressive backwards compatibility performance and Quick Resume are still the console's initial standout features, but does that warrant a day-one purchase? Stay tuned for a full review of the final hardware with the full Xbox Series X specs in the coming weeks as people await the pre-order date launch.

New Tech Allows For Containers That Contained Hazardous Materials To Be Recycled!

High-density polyethylene is one of the most frequently used plastics in the manufacture of containers for the storage of hazardous substances. After their use, these containers are classed as hazardous waste. In order to recycle them, any remaining hazardous residues must first be eliminated.

In Europe, traditional cleaning systems involve a three-step cleaning and rinsing process that is applied to the ground plastic waste, known as triple washing and rinsing procedure. The process uses large quantities of water, a large amount of energy, chemical cleaning products. This procedure thereby generates a large volume of wastewater that requires subsequent treatment. At the end of this process, the ground plastic material is free of hazardous substances and ready for use, yet the aggressive nature of this cleaning procedure usually undermines the quality of the plastic itself. This is why this treated plastic is often used in applications of low added value. 

LIFE EXTRUCLEAN: Project was launched in order to mitigate the drawbacks of this conventional recycling process, improve the final quality of the plastic and enable the material to be used in its original application.

LIFE EXTRUCLEAN: is a European project involving five Spanish companies, which have joined forces to develop a more efficient decontamination and recycling process for polyethylene plastic packages that have contained hazardous substances.

This technology is based on the use of supercritical carbon dioxide; supercritical fluids have been successfully used by the food, wood and leather industries in extraction processes. Supercritical carbon dioxide is inert, inexpensive, highly-available and is not harmful to the environment. It has also been shown to be highly efficient in the removal of hazardous substances, arising from organic solvents and pesticides. This makes this technology perfect for the removal of contaminating substances.

In the LIFE EXTRUCLEAN process, two of the three washing and drying stages, used on the traditional decontamination methods have been eliminated, employing supercritical carbon dioxide at the extrusion stage during the polyethylene recycling process. 

This new process reduces water consumption, the use of cleaning agents and energy use. It results in less wastewater and its associated sludge. After being used, the CO2 is purified and reused in the cleaning process, preventing further emissions into the atmosphere. Because carbon dioxide is an inert gas, most of the mechanical properties of the decontaminated plastic are conserved. This means that it can be reused in applications calling for better quality plastic, such as in manufacture of new containers for hazardous materials.

These helps to close the life cycle of these plastic materials. At the pilot plant scale, this new technology was found to be nearly 70 % more effective than other traditional decontamination procedures. 

These results will be corroborated at the last phase of the project, where the process will be applied at the industrial scale.

_________

Author: Pike Murry
Toronto Newsroom


iPhone 12 Full Details Announced - Everything You Need To Know...

Iphone12 features camera and review

Apple's event unveiled the iPhone 12, which is their first 5G phone, along with the iPhone 12 Mini, and two iPhone 12 Pro models. 

Camera upgrades include a super wide lens, f1.6 aperture, and Night Mode on all cameras and the announcement of "MagSafe" a new charging system that automatically snaps onto the back of your phone. 

Other releases included the new HomePod mini and new features like Intercom.

[Video courtesy of Tech Insider]

Cryptocurrency Holders Find Themselves With An Advantage During Hard Economic Times...

Photo Of Bitcoin Loans
Currently, a lot are going through hard times due to the effect of the recent pandemic which hit the globe gross. This pandemic is not one that would be forgotten too soon as many have lost their family members and loved ones, many have lost their jobs and source of livelihood. In the midst of this threat to sustenance, cryptocurrency loans are helping to provide for needs.

When Covid Hit...

In late 2019, coronavirus was identified as the cause of the disease (COVID-19) outbreak that started in China. The disease started to spread and increase around countries as people traveled around the world ( it has infected people in over 200 countries) and in March 2020, the World Health Organization (WHO) declared the outbreak a pandemic.

The pandemic has since its start has impacted virtually all the sectors negatively and continues to eat deep into the economy as it continues. Its effect has been termed as the worst recession the world has faced since the Great Depression of the 1930s and it is believed that only a partial recovery would be seen in 2021.

In a quest to contain and combat the virus, countries have been forced into debts with the UK government spendings on the virus measures pushing to a staggering over £2 trillion debt. A lot of people have lost their jobs (700,000 in the US alone), some people have seen their salaries take a huge cut, the inability to gather a large crowd has put an end to cinemas and live performances by musicians, and the sustenance of many is at stake.

To cushion the effect of the pandemic, many countries are implementing favorable financial measures to increase their health systems capacity and provide relief to the sectors and citizens that are mainly affected. Researchers are trying hard to make a vaccine but it may take between 1 and 2 years to find one that works safely, so a cure is not seen in near months.

Despite The Negative Effects Of The Present Pandemic, Crypto Loans Is Working Wonders..

Crypto loans are helping to save lives today. With the effects of the pandemic hitting hard, the eyes of many are being widely opened to crypto loans.

You can acquire a bitcoin loan within a short time, it only requires you to create an account on the loan platform. The transactions are transparent and instantaneous at no extra fees asides interests making them cheaper and also fraud-free.

Are you being severely hit by the effects of the pandemic?
Is your means of sustenance at stake?
Do you have cryptocurrency investment you don't want to lose and yet want to make passive income on them?

A crypto loan may just be the solution!

____
Author: Dustin Hajivic
UK News Team

As 2020 Elections Approach, Both Political Parties Prepare To Blame Losses On Social Media...

Social media is facing more criticism by experts who warn that  it is used to spread misleading stories and is undermining democratic processes. But how accurate are these claims? 

It's all  about what  you choose to believe. What makes users uncomfortable is  the lack of factual details or even evidence that support the claims being made.

Democrats claim the sites do not properly censor 'fake news' that is often about their candidates, while Republicans say the tech companies themselves censor conservatives. 

Facebook however has been working on addressing some of their privacy concerns  by working with   media organisations to fact check more accurate stories on the site.  As an example, last month the social media giant made the decision to stop allowing fake news stories to be posted in its Trending section.

But critics say social media is being blamed by people who lose elections, using them as a poor excuse for bad a campaign or candidate.   In some cases, users have even resorted to calling for an investigation into election fraud using Facebook 's social media channels.

 The company is currently facing complaints from members of the public who say the company has become a breeding ground for false claims , especially after the last election in the UK.

We can expect to see  similar complaints from the public who believe that Facebook is not doing enough to prevent the spread of inaccurate or misleading information on their platform ahead of the  upcoming general election.

 As such , the company has promised to spend a lot of time and resources to address the issue .  This will include a massive campaign to ensure that all stories posted on Facebook are verified. 

____
Author: Stephen Hannan
New York Newsroom

Scientists Discover Replacement For Lithium Cellphone Batteries... And Well, It's FISH GUTS...

Fish gut powered phones
Lithium is the dominating mineral in the production of cell phone batteries and furthermore of electric vehicles. Sodium and magnesium are different options called to supplant this exceptionally debased component.

In any case, a Spanish report by the University of Córdoba along with the University of Xiamen (China) and the Wentworth Institute of Technology (Boston, United States) have focused on the ocean and China.

In China alone, around 59 million tons of fish are created every year, of which 58% isn't devoured as food and winds up turning out to be bio-squander.

Its natural option for batteries is fish collagen. This marine buildup can be utilized as vitality stockpiling material and consequently fabricated with batteries in which to supplant lithium, a decent gathered in barely any nations and whose accessibility could be scant later on.

In the three-manner work with China and the United States, Spanish specialists have explored different avenues regarding lithium batteries, utilized around the world, and with sodium and magnesium gadgets, two of the fundamental items planned to supplant lithium.

As per the finishes of the examination, the limit esteems ​​achieved in the three cases are fundamentally the same as, and significantly higher in certain extents, than those acquired with other artificially integrated materials, with the favorable position that, on this event, the anode of the battery originates from a supportable material that frequently transforms into a great many huge amounts of waste.

The specialist responsible for the undertaking at the University of Córdoba, Gregorio Ortiz, calls attention to that collagen has been utilized as an anode - negative shaft and exposed to various lab tests to gauge how it would work when joined with cathodes - positive post customary.

As per the University of Córdoba, it is the first occasion when that collagen from fish squander has been utilized for use in batteries, in spite of the fact that it had recently been utilized in different parts of the business, as an impetus to eliminate benzene, a compound unpredictable toxin that causes ecological and medical issues.

_________
Author: Ryan Scandi
UK Newsroom

Hackers Want Into Your Phone - How To Keep Them Out...

Phone hackers
Smartphones became a kind of disaster drawer into which absolutely fits all the lifetime of the user. From your emails to your contact numbers or bank codes.

So it's not surprising that cybercriminals are currently taking a interest in ' hacking ' them ; especially in cases where it's known that the user handles sensitive information . To avoid a drag , and make it difficult for a malicious third party to access the device, there are a series of measures that, along side the utilization of a top quality security solution, must be implemented.

Beware of "phishing"
The " phishing ", or spoofing so as to trick users and steal personal data, is one among the favourite cybercriminals mechanisms in their campaigns. It are often produced through different channels: email , SMS or WhatsApp message . To be effective, criminals often impersonate well-known companies or banks and send messages using social engineering to draw in the eye of the victim and make it easier for them to fall under the trap.

Recently, the National Cybersecurity Institute drew attention to a case during which hackers were posing as Amazon and other companies via email . within the message, they affirmed that the platform had a special offer for all those that fill out a form during which a good sort of personal information was requested, also because the mastercard .

It is extremely important to use sense . within the case of scams that attempt to steal the user's checking account , for instance , you've got to understand that banks don't inherit contact with the customer

To avoid falling into the trap, experts recommend paying close attention to emails and messages received from third parties. Especially people who are sent, theoretically, by companies and public institutions. just in case the message is strange, and if it doesn't add up that it's sent via " mail ", SMS or WhatsApp, it should be contacted by means of a call with, supposedly, signed. Likewise, it's advisable to verify that the domain that sends the message is that the official one among the sender.

«It is extremely important to use sense . within the case of scams that attempt to steal the user's checking account , for instance , you've got to understand that banks don't contact the customer through emails or via SMS to invite their credentials. it's very rare. i might say that it doesn't happen with any entity. just in case we've a doubt, it's advisable to call our bank and consult it ", tells ABC José De la Cruz , technical director of the cybersecurity firm Trend Micro Iberia.

Take an honest look before downloading an app
The " apps " have helped to significantly facilitate the user's life. However, cybersecurity experts recommend being very careful before downloading them, as they will host computer viruses and steal control or information that's stored on the device.

One of the foremost common techniques employed by criminals who work with "apps" is forging popular platforms to urge more downloads. The study "A Multi-modal Neural Embeddings Approach for Detecting Mobile Counterfeit Apps", prepared by the University of Sydney and published last year, maintains that, during two years, the presence of quite 2,000 applications for Android present within the official Google Play store posing as other well-known "apps" and containing "malware", that is, computer viruses.

That is why it's crucial to pay close attention to the very fact that the appliance we would like to download is that the original one . "This are often seen by checking the amount of downloads, the reviews of other users or the syntax within the description," Eusebio Nieva , technical director of the cybersecurity company Check Point , told this newspaper . Likewise, the expert highlights that it's essential to always download the applications from the official stores of the devices, be it the Google Play Store, on Android, or the App Store, on iOS.

WiFi isn't good for everything
Open WiFi networks are widespread for years, but there's certain information that ought to not be consulted when connected to at least one of them, since it's going to are "hacked". «In general, people have the incorrect perception that using an open Wi-Fi network doesn't have any quite danger for his or her security of the info stored on the device that's connected, in order that they don't take the required measures to ensure protection of your information, "they say during a statement from the cybersecurity company Check Point.

To avoid risks, it's important to not consult sensitive information when connected, like the checking account . Likewise, the browsing history and cookies, also because the browser's temporary files, must be deleted after using them.

Keep the device up so far (and inaccessible)
The application updates and operating systems are crucial to strengthening the safety of the terminal. And it's that, normally, the new versions are amid solutions of open gaps which will be exploited by cybercriminals.

For this reason, cybersecurity experts recommend not letting time pass and completing the corresponding update as soon because it is out there . Likewise, it's advisable to stay the services that we've installed on the "smartphone" duly protected by using strong passwords .

"A good password must be of considerable length and intelligible"
The password of a social network, for instance , is that the key that provides access to its interior; so it's not something to be chosen randomly . Thus, when creating one, it's important to use ingenuity in order that they're especially difficult to decipher. That happens, of course, by not using personal information, like birthday dates, or dozing off and typing the classic and dangerous 12345 on the keyboard.

'A good password must be of considerable length and intelligible. The user must not use in any case a word that has got to do with him, like his month of birth or his name. It must even have numbers, letters and special signs, like asterisks or dollar symbols, "ethical hacker Deepak Daswani told ABC .

In addition to always employing a strong password, it's important that the user change it frequently. in theory , having it done once every three months would be enough. Likewise, it's not advisable to use an equivalent altogether social networks. within the event that a platform suffers a knowledge leak, or the user falls victim to a cyber scam, the utilization of various passwords can help limit the risks of losing control of several sites at an equivalent time.


____
Author: Lan Jing
Asia News Team

Microsoft Surface Duo Review: MS Goes Android?! The Specs, Price, and Release Date...


Microsoft's ambitious, dual-screen Android phone is priced at $1,399 and with release date of Sept. 10th. Let's take a look and see if Microsoft can return to the mobile market. 

Magento Ecommerce - Right For Your Online Storefront?

Online storefront
Magento Ecommerce package allows you to focus on your ecommerce store and does away with the hassle of integrating with other parts of the system. The team at Magento includes ecommerce experts as well as code specialists, so that the novices can easily create a fully-functional ecommerce store.

The package, which costs $8,000 per year, includes a fully-functional shop front that allows you to create a truly professional store, with checkout procedure that is simple and quick. Apart from the Magento theme customization, you have the integrated payment gateway, so that the orders and payments can be managed easily.

The preferred way of doing business these days is to turn your store into an anchor, so that it attracts traffic and users. So, Magento-based ecommerce solutions are the most suited ones. You can select from a wide range of extensions and add another layer of protection to your ecommerce store.

A well designed Magento store has an intuitive user interface and can be easily customized as well. You can edit and upgrade the software, so that you can easily handle any situation that may arise. Moreover, this software is of high quality and is SEO compliant, which means that it can be easily integrated with search engines and can bring a good amount of traffic into your store.

While Magento is easy to use, it comes with a lot of functionality that makes it powerful ecommerce software in the world. You can easily search for products, place an order and pay immediately. The software also offers you the opportunity to customize your store and can tailor it according to your preferences. It helps you with online Payments as well, Confirmation Emails regarding deliveries and track status-so that you do not have to invest extra time and effort.

With the emergence of Magento in the e-commerce sector, web designers have become quite competitive. But with Magento Website Builder, they can easily customize a great looking store front without hiring an expert web designer. Yes, developers at low cost will bring the flexibility and reliability of shopping carts into your store without any extra cost.

When you are ready to take the decision to go in for Magento ecommerce development, it is high time to check out the options available. What is the best, low or high fee for Magento customization? Which Magento Extensions are compatible with your ecommerce platform? Which Magento Theme that will match your design and style?

Before you start shopping around for Magento ecommerce developers, it is high time to have a look at the market and see whether the ones who have been serving the online industry since a long time provide you with all the features that you want. Just compare their prices and you will end up with the right one, don't you think?

----
Author: Brian Kelly
Canadian Newsroom