Home Blog Page 212

Lucy Mission: NASA Successfully Launched Probe To Jupiter Trojan Asteroids In Search Of Water

NASA Lucy Mission

For the first time, asteroids in the orbit of Jupiter are to be examined. With the NASA probe named Lucy, the Atlas V rocket has set off for the first time to Jupiter’s Trojan asteroids. This is also the first time that a mission to deep space will be powered only by solar energy.

Lucy launched on Saturday from the Cape Canaveral spaceport in the US state of Florida, as announced by NASA. The path of the Lucy probe will be long and dangerous. It will take 11 years and about 6 months, if all goes according to plan, to reach Jupiter to study the Trojan asteroids.

https://twitter.com/NASA/status/1449308070249631753

The main objective of the Lucy mission is to study the Trojan asteroids. But what are Trojan asteroids? This is the name given to the bodies that are located at Lagrange points 4 and 5 of Jupiter. These areas around the planets are very stable. In fact, the Lagrange points near the Earth are ideal places to send missions; because there they are kept with very little energy.

NASA Lucy Mission path

Asteroids, especially those far from the Sun, are still the remains of the construction of the solar system. These asteroids would be something like the bricks that were not used in the formation of our neighbourhood.

The Trojans that the Lucy mission will study are “the binary asteroid Patroclus/Menoetius, Eurybates, Orus, Leucus, Polymele, and the main-belt asteroid DonaldJohanson“, NASA notes.

In addition, Lucy is supposed to fly past an asteroid in the so-called main belt between the planetary orbits of Mars and Jupiter and also return three times to the vicinity of the Earth to get support for the flight through its gravity. The first asteroid flyby is scheduled for 2025, with the others scheduled for between 2027 and 2033.

LinkedIn To End Service In China Due To Government Censorship

LinkedIn To End Service In China

After seven years of its service, the professional-oriented social network LinkedIn announced on Thursday the upcoming closure of its portal in China. 

The announcement comes after a long history of control and censorship imposed by the Government of the Chinese Communist Party. LinkedIn noted “operational difficulties and requirements” forced them to end service in China.

LinkedIn, owned by Microsoft, was until now the only large Western social network that continued to operate in China with its localized version, where Facebook and Twitter have been banned since 2009 and from where Google left in 2010 also for Government censorship.

We recognized that operating a localized version of LinkedIn in China would mean adherence to requirements of the Chinese government on Internet platforms. While we strongly support freedom of expression, we took this approach in order to create value for our members in China and around the world. We also established a clear set of guidelines to follow should we ever need to re-evaluate our localized version of LinkedIn in China.” — says LinkedIn in its statement.

According to data from Statista, LinkedIn has approximately 50 million users in China and is only behind India, with 78 million, and the United States, with 180 million.

Windows 11 Insider Patch Fixes Problems With The L3 Cache Of AMD Ryzen

AMD Ryzen CPU

Microsoft released the new Insider Preview Build 22000.282 of Windows 11 in the Beta Channel and Release Preview Channel and thus resolves problems with the L3 cache of AMD Ryzen, which could lead to significant performance drop in some applications and games when the new operating system was released.

According to the release notes of Windows 11 Build 22000.282, “We fixed an L3 caching issue that might affect performance in some applications on devices that have AMD Ryzen processors after upgrading to Windows 11 (original release).”

The L3 latency error is one of a couple of issues AMD identified with Windows 11 earlier this month. The other Windows 11 issue identified by AMD, which may prevent high-core, high-voltage Ryzen chips from correctly assigning work to the faster individual processor cores, will be addressed by an AMD driver update.

The Release Preview Insider channel is usually the last stop on a Windows update before public release. A post shared on Reddit suggests that the Windows update is scheduled for release on Tuesday, October 19, while the AMD driver update for the other issue should be released two days later, on October 21.

Other bugs addressed in the Windows 11 update include one that prevented some updaters from seeing the new taskbar or using the Start menu, a PowerShell bug that can fill a storage volume with “an infinite number of child directories” when you try moving a directory into its own child directory, and a host of issues that could cause crashes.

How to Keep Kids Safe On Social Media

social media news and stories

With the extent of social media apps available today, it’s not uncommon to find kids with accounts on each. They love sharing their personal lives, their day-to-day activities, and more with their friends and followers. While this can be a lot of fun, there are always two sides to a coin. 

With the rates of cybercrime increasing worldwide, kids also need to learn how to keep themselves and their personal information safe when online. It’s very easy for hackers or suspicious individuals to get someone’s phone number and call them, and people often have to use a reverse phone number lookup to find out who’s doing so. 

This guide dives into five ways in which kids can be safe online. 

5 Ways For Kids to Remain Safe on Social Media 

Always Keep Your Account Private 

Social media apps often give you the options to choose between keeping your accounts public or pirate, like Instagram. Facebook gives users the option to lock their profiles if they don’t want outsiders getting access to their personal information. 

These privacy settings are a helpful first line of defense to keep yourself safe online. It prevents suspicious people from using your profile pictures, getting access to your contact information, or any other details that can be used against you to defame you, extort money, or put you in some kind of physical danger. 

As kids often like sharing their fancy lives on social media with everyone, including those who don’t follow them, they must realize the dangers that an open profile can present. Here’s how they can make their account private if they want to – 

  • Click on the hamburger icon on the top right-hand corner of the profile and tap Settings. 
  • Click on Privacy and enable the setting that reads Private Account. 

This ensures that only those people who follow them will be able to see their personal information and any other updates, while others will have to request to follow them. 

Set Strong Passwords 

While many kids often know the importance of setting strong passwords for their social media accounts, newbies and younger kids might prefer simpler passwords like their best friend’s name, their pet’s name, or their date of birth. While these can often be easy to remember, they can also make it easy for someone to hack into their Facebook account by simply entering their email and password.

The solution here is to use a good password manager that can store their passwords for them, and this is something that parents can enable to keep their kids safe. Alternatively, they must set a long password that contains both upper and lower case characters and is alphanumeric.

Enable Two-Factor Authentication

Two-factor authentication is possibly one of the best ways of keeping your account secure. It adds a second layer of protection while logging into each of your accounts to keep them safe from people who might manage to gain access to the target’s email ID and password. This system sends a code to the user’s mobile number or email ID whenever someone new tries logging into the account. It’s only when they enter this code will they be granted access to the account. 

As a result, while a hacker might have managed to find out their child’s email ID and password, chances are, they won’t have access to their mobile where from which they can read and enter the code sent to the user.

Only Add Known and Trusted People to Your Friends List 

As kids, you might often like the idea of having a long list of friends or followers. However, this can often come at the cost of your own safety. While it might be nice to brag about a long list of followers as you keep accepting requests from random people, some of these people can also use your personal information and updates to harm you in some way or steal your data. 

As a best practice, it’s always wise only to accept friend requests and or follow requests from people you’ve met personally, know of, or trust. This way, you can ensure to keep yourself as safe as possible online on social media apps. 

Feel Free to Block Someone Who Makes You Uncomfortable

Social media apps always give you an option to report or block someone who makes you uncomfortable, misuses your images or information, or sexually harasses you. These options are given to help you remain safe at all times, and as a result, you must not hesitate to use them whenever you need to. If someone on social media harasses you, misuses your information, or bullies you, you can always report them for their behavior and then block them. In fact, apps like Instagram also give you the option to block any new profiles the person might make, protecting you even in the future. 

In Conclusion

There are several ways in which people hack into someone’s social media account online. One of the most common methods worldwide is the use of phone tracking apps. While these are often used by parents to keep their kids safe or by employers to keep track of what their employees are doing, they can also be used to hack into your devices and steal your information. 

Facebook Creating AI Systems That Understand The World And How It Works From A Human Perspective

Ego4D Facebook AI project

Recently Facebook has launched its first augmented reality glasses in collaboration with Ray-Ban. However, it appears that the company has an additional focus on this technology, and the proof of this is its new artificial intelligence project to develop AI systems that understand the world and how it works from a human perspective.

The new Facebook AI project, called ‘Ego4D‘, aims to teach AI “to understand and interact with the world like we do, from a first-person perspective.”

Until now, AI systems have been able to learn day-to-day routines to, for example, show us the fastest route to work. What Facebook intends to do, however, goes much further. Ego4D, still in development, is being carried out with a group of 13 universities around the world, where more than 700 participants have helped capture 2,200 hours of first-person video while performing tasks in their day-to-day lives.

Facebook AI, in collaboration with this consortium and Facebook Reality Labs Research (FRL Research), has developed five benchmarks focused on these first-person experiences that will drive progress in implementing these applications in the real world for future personal assistants.

  1. Episodic memory: What happened when? (e.g., “Where did I leave my keys?”)
  2. Forecasting: What am I likely to do next? (e.g., “Wait, you’ve already added salt to this recipe”)
  3. Hand and object manipulation: What am I doing? (e.g., “Teach me how to play the drums”)
  4. Audio-visual diarization: Who said what when? (e.g., “What was the main topic during class?”)
  5. Social interaction: Who is interacting with whom? (e.g., “Help me better hear the person talking to me at this noisy restaurant”)

Facebook hopes that the development around these five pillars will make possible the interaction of AI with people not only in the real world, but also in the metaverse, in which augmented and virtual reality are also part.

Next-generation AI will need to learn from videos that show the world from the center of the action. AI that understands the world from this point of view could unlock a new era of immersive experiences, as devices like augmented reality (AR) glasses and virtual reality (VR) headsets become as useful in everyday life as smartphones,” says the Facebook AI team.

Kristen Grauman, a Facebook AI researcher, has highlighted to The Verge that “systems trained on Ego4D might one day not only be used in wearable cameras but also home assistant robots, which also rely on first-person cameras to navigate the world around them.”

What Are Sneaker Proxies and Why Use Them?

What Are Sneaker Proxies

You should know that sneaker copping is a real thing, and while others do it so they can have a collection of all the limited editions of the best shoes (and for the accompanying bragging rights), others do it as a full-time business.

Both groups wait for these limited editions to drop, then proceed to make multiple purchases in the shortest possible time (since sales start and end within minutes).

There are, however, several challenges to this form of copping, and aside from the fact that the window of purchase is only open within minutes, the manufacturers do not allow the purchase of more than one pair per buyer.

To enforce this, they usually set up mechanisms that read and identify internet protocol (IP) addresses and ban any that has made a prior purchase. This makes it very impossible to buy two sneakers with the same device and IP address.

Fortunately, sneaker proxies have been changing this precedent by providing users with multiple IPs and locations to choose from in order to make as many purchases as they can afford. Aside from that, sneaker proxies have also made it possible for people who live in forbidden locations to buy their favorite sneakers by allowing them to pick a different location. So that a buyer who stays in a forbidden geo-location can use, for instance, a proxy Australia and change location to anywhere in the world to cop a pair of sneakers or more. 

What Are Sneaker Proxies?

Sneaker proxies are defined as special proxy servers with multiple residential IP addresses. That is to say, they are special proxies that come equipped with IPs tied directly to actual locations. They appear as real users on the internet even though they are bots and are essentially used for copping sneakers from manufacturers’ websites.

What Are Sneaker Proxies Used For?

Originally, the sneaker proxy was designed especially for copping highly coveted sneaker editions from manufacturers’ websites. This followed the strict rules of sneaker makers such as Nike and Adidas preventing multiple purchases of limited editions by a single person.

Sneaker proxies are therefore used to switch IPs and trick those websites into thinking the subsequent requests are from a different user. This has worked so well and allowed several sneaker retailers to spring up. These retailers purchase many of these limited shoe editions to sell them for huge profits later.

The success of this arrangement has seen the application of these proxies spread into the purchase of other highly coveted products such as concert tickets.

People who cannot originally buy multiple concert tickets or even buy one because of geo-restriction issues can now use sneaker proxies to buy as many as they want and from whichever part of the world they reside in.

In whichever area you choose to apply this tool, automating it with other necessary tools is not only effective but saves you valuable time and energy.

Main Features That A Sneaker Proxy Must Have

The following are some of the main features that a proxy must have to be considered an ideal sneaker proxy:

Multiple IPs

The one thing that makes sneaker proxies so great is that they offer users numerous IP addresses to choose from. The goal is so that the user appears as a different person every time they dive back in to make another purchase. Hence this is a must-have feature for any sneaker proxy.

Speed

With sneaker copping, time is everything, as to delay is to miss out. And because the main goal of this exercise is to grab as many sneakers as possible in the short period they sell for, sneaker proxies are built to deliver the best possible speed. That way, buyers can buy as many shoes as they can afford.

Bypassing Geo-Restrictions

Geo-restrictions are mechanisms that prevent certain internet users from reaching certain websites and servers. And they are commonly used by shoe manufacturers, so their limited editions are unavailable to people from certain regions.

Sneaker proxies that work well must overcome this challenge by giving the user multiple locations to choose from. For instance, a user can use a great sneaker proxy Australia to bypass this mechanism and appear to be shopping from Australia. Learn more about proxy Australia and how it can help you avoid geo-restriction. 

Scalability

A good sneaker proxy must also be readily scalable. This is because the task they must perform differs from time to time – sometimes, it is to cop 10 pairs of sneakers from 2 different websites and other times, it could be to grab 100 concert tickets from 5 different websites. Aside from the different types of jobs, the different websites could also differ in structures.

And a good sneaker proxy should have no trouble scaling up to handle all of these.

Conclusion

Sneaker proxy is what people use when they are trying to cop multiple pairs of their favorite sneakers. Or they can be used when Sneakerheads are trying to make purchases from a forbidden location. However, their usage is not only restricted to sneaker copping alone as they can also be used to buy products such as concert tickets.

Apple Reduced iPhone 13 Production Due To A Shortage Of Chips

iPhone 13 Pro and iPhone 13 Pro Max

The iPhone 13 would already be suffering from the problems of chip shortages, forcing Apple to reduce its production.

According to Bloomberg, Apple does not have a sufficient supply of parts to meet its initial manufacturing goals with its new smartphone. Apple planned to produce 90 million iPhone 13 units by this year’s end. It might have to cut this projection down by as many as 10 million units.

The reason is that Apple does not get enough chips from Texas Instruments and Broadcom. Apple purchases components from Texas Instruments for the voltage supply of the OLED displays of the new iPhone series, while Broadcom has been Apple’s supplier in the field of wireless communication for some time.

Both Broadcom and Texas Instruments rely on contract manufacturers to make their chips. As a result, manufacturers have to compete with numerous other companies for production capacity, which makes the situation even worse.

Apple shares fell 1.6 percent after the production cut was announced. Both Apple and Broadcom, and Texas Instruments have declined to comment on the situation. Apple is also said to have problems with other suppliers.

The different models of the iPhone 13 currently have a delivery time of at least one month in the Apple online store and are foreseeable out of stock in almost all Apple stores. Apple has not yet adjusted its sales forecast. The company is expected to generate revenue of around $120 billion in the final quarter of the year, up around 7 percent year-over-year.

Google Wants To Bring Fuchsia OS To More Devices

Google Fuchsia OS

Google intends to take new steps for Fuchsia OS, suggest new job openings listed by the giant. The operating system released this year for the first generation of Nest Hub appears to be included in larger plans and could soon emerge on more Google devices.

As reported by the 9to5Google, Google is looking to expand the development team for Fuchsia OS. This is evident from the corresponding job advertisements for various positions. The goal of Google is, therefore to strengthen its efforts around the possible Linux replacement so that the system can also be used on numerous other devices in the future.

One of the job listings notes, “In 2021 we shipped Fuchsia to millions of Google smart displays, now it’s time to expand to additional smart devices and other form factors. Come join us and work on the next-generation Google operating system! The Fuchsia Devices team is responsible for making sure we can successfully apply the Fuchsia platform to real world products that make a difference to Google and our users.”

It is currently not known which devices are actually involved. However, other devices from the Nest series appear possible. 

Another ad also states that the work on Fuchsia will bring the system to devices with a new form factor that is intended for Nest and Google Assistant. An advertisement also shows that Google would like to work closely with partners for Fuchsia and influence their hardware selection so that the system runs as well as possible on the devices.

Fuchsia that Google started using on its Nest Hub smart displays earlier this year, is not based on Linux as Android. Fuchsia uses the Zircon development kernel and also Flutter, a language that allows the use of apps from different platforms, including Android. 

Google has been working on its next-gen operating system for five years and now has just posted a job offer for engineers to expand Fuchsia to new devices.