Friday, 31 March 2023

The Untold Saga of Tik Tok’s Brother that Trumps Facebook, WhatsApp and YouTube in Downloads

Suddenly and without warning, the application of social network “A” of the Chinese company “ByteDance”, owner of “Tik Tok”, has entered the list of the ten most downloaded applications in the United States on the Apple App Store.

This announcement came after the app dropped out of the list of the 200 most downloaded apps on the App Store, according to tech website TechCrunch.

Advertising material

Bypass Gmail, WhatsApp, YouTube and Facebook

The social network managed to outperform Gmail, WhatsApp, YouTube and Facebook in speed terms of download in few days.

According to the information statistics of the “Data.ai” institute, since the application arrived on the store official in 2020, its speeds of download have been remarkably low, making its recent increase “a matter of doubt.”

These developments come amid escalating US pressure on the company to sell ‘Tik Tok’ or face its ban, with the issuance of a federal ban preventing the download of enforcement on federal agencies and prevents US states and European countries from also applying at the governmental level.

And the “Data AI” statistics indicated that the “Lemon8” application has not been officially disclosed and launched on the store “Google Play” and “App Store” just a few days ago. Throughout the period from March 2020 to a few days ago, the application was available for experimental purposes.

Huge promotional campaign

Furthermore, analyzes of this sudden increase in the United States indicate that the official launch of the application will be accompanied by a huge promotional campaign that depends on advertising the application within search results, as well as displaying advertisements for proposed applications on home page of store officers.

While the content creators described the new platform in their news site interview as “a mix between Instagram and Pinterest,” which reflects that this description is directly provided by the Chinese company to promote its new platform everywhere.

The post The Untold Saga of Tik Tok’s Brother that Trumps Facebook, WhatsApp and YouTube in Downloads appeared first on Asume Tech.



from Technology - Asume Tech https://asumetech.com/the-untold-saga-of-tik-toks-brother-that-trumps-facebook-whatsapp-and-youtube-in-downloads/

Scientists Use 3D Printing to Create Cheesecake

Making cheesecake is not easy. And first you need to decide on its basis, since some use cookies for this purpose.

And others bake themselves, with the addition of nuts. Then you need to beat the curd cheese with cream well, add berries or chocolate chips to taste, bake for a long time, and then cool.

In general, it is clear that the process of preparing a cheesecake will take some time. And here the scientists decided to make the task easier for the cooks. They were able to “bake” a cheesecake using a 3D printer.

In an article published in the journal Nature, mechanical engineers at Columbia University describe the mechanics of making cheesecakes in 7 different shapes. Jams and syrups for fruit toppings became 3D printed inks, and candies were layered in the same way as layers of architecture.

Scientists expect that the technology of three-dimensional production of cheesecake will be launched soon.

Source: news.rambler.ru

The post Scientists Use 3D Printing to Create Cheesecake appeared first on Asume Tech.



from Technology - Asume Tech https://asumetech.com/scientists-use-3d-printing-to-create-cheesecake/

Thursday, 30 March 2023

What is the age limit for human life expectancy?

Experts have long suspected that human lifespan has reached its limit, and no one can beat the record set by Frenchwoman Jeanne Calment, who reportedly died in 1997 at the age of 122.

But the new study concludes that we are still “far” from any upper lifespan limit, if there really is one.

In an article published Wednesday in the journal PLOS One, David McCarthy, professor of risk management at the University of Georgia, estimated that over the next few decades we could see people, especially women, over the age of 122.

In Japan, for example, mathematical calculations show that women born in 1940 can reach a maximum age of between 125 and 130 years. In the United States, the maximum age can be between 120 and 125, which means that today’s octogenarian could be alive in 2065.

Taken together, McCarthy says, these mathematical models show that our maximum lifespan is not biologically fixed, but rather increasing, at least for the time being.

The University of Georgia team analyzed the ages of people in the UK born after 1880 to see what might happen in the future.

Their projections show that men born in 1970 could reach 141 and older women born in 1970 could reach 131.

The authors say they “do not trust” these estimates, warning that they may be inaccurate because they are based on certain statistical assumptions.

They are more than confident that a man born in 1940 can live to his 125th birthday, and a woman born in the same year can live to 124.5 years.

These estimates have a 50% chance of being correct.

The oldest person in the world by far is believed to be Madame Calment, who is reportedly 122 years and 164 days old, though some experts doubt this.

25 years ago no one in the world reached that age.

The study looks at life expectancy in 19 selected countries. The results show that the age at which people die will increase dramatically in the coming decades.

In Sweden, where the most data is collected, the maximum age a person can live remained the same for men born in 1900 compared to those born in 1780, four generations earlier.

But the advent of modern medicine after World War II, improved nutrition, and political stability, among other factors, may have contributed to the dramatic increase in life expectancy seen so far, and is expected to continue to do so.

The authors say that the oldest among people born between 1910 and 1950 can live up to 120 years or more.

Dr. David McCarthy, who led the study from the University of Georgia, said: “As these groups reach advanced age in the coming decades, lifespan records could increase exponentially. Our findings support previous work suggesting that if there is the upper limit of human lifespan, we haven’t come close after it.”

Source: Daily Mail

The post What is the age limit for human life expectancy? appeared first on Asume Tech.



from Technology - Asume Tech https://asumetech.com/what-is-the-age-limit-for-human-life-expectancy/

Elon Musk and 1,000 experts urge to halt ‘Chatgpt’ before it replaces human interaction

After the massive development that started to enter the AI ​​world, in particular with the latest version of GBT Chat, American billionaire Elon Musk and a group of AI experts and executives called, in an open letter, to stop for a period of six months from developing systems more powerful than the chat bot (Chat.GPT-4) recently released by OpenAI, citing the potential risks of such applications for society.

The letter from the Future Institute of Life, endorsed by more than 1,000 people, also notes that “strong AI systems should be developed only when we are confident that their effects will be positive and that their risks will be controlled.”

Advertising material

You can replace us

Further, he asked, “Should we allow machines to flood our media outlets with propaganda and lies?…Should we develop non-human minds that could outnumber us and eventually be smarter, outrun and replace us?”

“Such decisions should not be delegated to unelected tech leaders,” he added.

While the Transparency Record of the European Union has revealed that the main lenders of this non-profit organization (Future of Life) are the Musk Foundation, the London-based Founders Pledge Group, as well as the Silicon Valley Community Foundation.

No response from OpenAI.

On the other hand, OpenAI has not yet responded to the open letter, which asked to halt the development of artificial intelligence systems until independent experts have worked out common security protocols.

Interestingly, Musk announced earlier this month that “AI makes him very nervous,” even though he’s a founder of the major “Open AI” company and his company, Tesla, uses AI in the’auto- guidance systems.

This message came after the Microsoft-backed OpenAI company unveiled the fourth version of its AI program (GBT Chat) earlier this month (March 2023), which won the admiration of users engaging them in conversations similar to human conversations and helping them compose songs and summarize long documents.

It also came after the European Police Agency (Europol) warned last Monday of the danger of using the app in attempts at electronic fraud, dissemination of disinformation and cybercrime.

The post Elon Musk and 1,000 experts urge to halt ‘Chatgpt’ before it replaces human interaction appeared first on Asume Tech.



from Technology - Asume Tech https://asumetech.com/elon-musk-and-1000-experts-urge-to-halt-chatgpt-before-it-replaces-human-interaction/

Wednesday, 29 March 2023

Innovating a Sustainable Plastic alternative derived from non-fossil fuel sources.

It can be said that the world is very addicted to plastic, when trying to recycle it, plastic is cheaper to recycle, so an unimaginable amount of plastic waste is thrown away and litters our oceans.

Of all the new plastics ever created, more than 6 billion metric tons of plastic waste (which does not decompose, but simply breaks down into ever smaller pieces) has been created, of which less than 10% is recycled today.

Not only is the production of the new plastic incredibly wasteful, it also uses fossil fuel-derived raw materials that must remain in the ground if we are to avoid climate change.

To make a small impact on this global problem, two materials scientists at Boise State University in the US have developed a new type of plastic that, unlike existing plastics, is not made from crude oil and its derivatives.

What’s more, small lab experiments replicating industrial processes show that approximately 93% of new plastic can be recycled into pure raw materials, even if the plastic is mixed with other untreated plastic waste, paper and aluminium.

In their paper, Alison Christie and Scott Phillips describe the production of a new type of plastic based on poly(ethyl cyanoacrylate) or PECA, derived from the monomer used to make superglue.

Like all plastic polymers, a new product is formed during the polymerization process, when single and repeating monomer units are joined together by a chemical reaction to form one long chain.

Christie and Phillips suggest that in commercial scale production, PECA’s new recyclable plastic could replace polystyrene plastic, which is not accepted in most recycling programs.

Polystyrene plastic comes in several forms: Styrofoam, also known as Styrofoam, which is used as a lightweight packaging material or to make takeaway food containers; Thermoplastic polystyrene is used to make disposable plates, cups and cutlery.

While it would be great to replace these products with easily recyclable alternatives, polystyrene accounts for only 6% of current plastic waste, a small fraction that poses a much bigger problem.

However, Christie and Phillips believe that over time, PECA’s new plastic could become a competitive alternative to other forms of plastic other than polystyrene.

“Due to its superior material properties and ease of recycling, PECA could be useful not only for simply replacing polystyrene, but also for further improving the recyclability of plastic waste,” they wrote in their article.

Initial laboratory experiments by Christie and Phillips showed that the new PECA plastic has similar properties to existing plastics and is stable in hot and humid environments.

It is this durability and resistance to degradation that makes plastic so versatile, yet difficult or impossible to break down. And yet they contain the building blocks of new plastic, joined in a neat row if you can find a way to pull them apart. But most plastics are burned or thrown away.

In terms of recycling, Christie and Phillips show how the long polymer chains of PECA plastic can be “split” at temperatures up to 210°C, and the resulting monomers are distilled into a pure product for further use.

Recycling plastic is a truly noble strategy, but consumers need to adopt the appropriate rules. Norway has made great strides in implementing schemes that have recycled 97% of plastic bottles.

Meanwhile, a recent Greenpeace USA report showed that only about 5% of plastic is currently recycled in the US, after China’s recycling industry stopped accepting plastic waste from other countries.

The bulk of this plastic waste can be traced back to several global companies, which has led some experts to argue that these companies are responsible for developing suitable alternatives and reducing the production of single-use plastic to address the root cause of the problem. garbage crisis in the world.

As three scientists wrote in the journal Science in 2017 after analyzing the production, use and fate of all plastics ever made, recycling reduces future plastic waste only if—and only if—it replaces primary plastic production.

The study was published in the journal Science Advances.

Source: Science Alert

The post Innovating a Sustainable Plastic alternative derived from non-fossil fuel sources. appeared first on Asume Tech.



from Technology - Asume Tech https://asumetech.com/innovating-a-sustainable-plastic-alternative-derived-from-non-fossil-fuel-sources/

New Anti-Tank Missile Systems Undergo Testing in India

The media reported that on March 28, the Indian company Bharat Dynamics tested the BDL Amogha-III advanced anti-tank missile system.

According to available information, the missiles that these systems are equipped with operate on a fire-and-forget basis, and its 18-kilogram missile is equipped with a two-stage solid-propellant engine, and has a warhead capable of identifying targets and dealing with them using thermal imaging and optical imaging techniques. IIR.

Targets in new systems are identified before the missile is launched from them, and the missile after its launch can hit the target from above or horizontally.

The missiles of the new complexes are capable of penetrating the armor of combat vehicles up to 650 mm thick, equipped with dynamic protection, while these missiles hit targets at distances from 200 to 2500 meters, and their launch platforms can be mounted on tripods or placed on trucks and military vehicles.

Source: Telegram/Dambeev

The post New Anti-Tank Missile Systems Undergo Testing in India appeared first on Asume Tech.



from Technology - Asume Tech https://asumetech.com/new-anti-tank-missile-systems-undergo-testing-in-india/

What’s New in iOS 16.5 Beta 1: Apple Releases Update to Developers

Developers of Apple’s Developer Program can now get iOS 16.5 beta 1. Here is what’s new in this build and how to update it.

While we say goodbye to iOS 16 and prepare for the iOS 17 beta to come out at WWDC23, Apple is still making small 16. X updates to the iPhone’s OS to make it more stable. Since iOS 16.4 is now available to everyone, the company has already started working on the next bump. Developers of Apple’s Developer Program can now get iOS 16.5 beta 1. So, what’s new in this version that’s been updated, and how do I get it? Let’s find out.

What’s New

Screen recording via Siri

Screen recording via Siri

9to5Mac says that with iOS 16.5 beta 1, users can ask Siri to start or stop a screen recording session. Before this, users had to tap the switch in the Control Center by hand.

Sports tab in Apple News

In iOS 16.5 beta 1, the Following and Search tabs of the News app are combined into one. This makes room for a brand-new account called Sports. The news and scores about a user’s favorite teams are now on the new Sports tab.

Sports tab in Apple News

We’re currently looking through iOS 16.5 beta one to see what other changes it might have. But since we’re near the end of the iOS 16 cycle, this version likely won’t have any big new features or additions. This article will be changed if we find anything interesting about this build. In the meantime, you can read Apple’s Release Notes, where the company usually lists bug fixes and patches with an iOS beta.

If you signed up for the iOS 16 developer beta program, you can update your compatible iPhone to iOS 16.5 beta 1 by doing the following:

  1. Launch the Settings app.
  2. Head to the General section.
  3. Tap on Software Update.
  4. Give the page a few seconds to refresh.
  5. The update will then appear.
  6. Tap on Download and install.
  7. Agree to the Terms of Service after reading them thoroughly and carefully.
  8. Make sure your iPhone is connected to a power source until the update finishes
  9. downloading and installing.
  10. You’re now running iOS 16.5 beta 1.

Note that as of version 16.4, beta profiles are no longer compatible with iOS and iPadOS beta updates. So, ensure that your Apple ID is signed up for Apple’s Developer Program if you want to use iOS beta updates as soon as they come out. You could also join the public beta program for free and get these updates a day or two before the full release.

The post What’s New in iOS 16.5 Beta 1: Apple Releases Update to Developers appeared first on Asume Tech.



from Technology - Asume Tech https://asumetech.com/whats-new-in-ios-16-5-beta-1-apple-releases-update-to-developers/

The Suntsipok flamethrower system: Key features revealed by military expert

Russian military expert Vladislav Shurygin said that thermobaric ammunition is the main feature of the Suntsypyuk TOS-1a flamethrower system.

In an interview with the Izvestia newspaper, he said: “(Burning Sun) is a very reliable, mobile system with great destructive power and high accuracy in hitting targets, and what’s new in it is thermal munitions that hit targets with high efficiency. “

The expert added: The use of this system during a special military operation proved its effectiveness and high capabilities.

It should be noted that this system is used with the support of the BM-21 Grad system, which allows the use of different types of projectiles for very dense coverage of targets. Thanks to the coordinated actions of the fighters, enemy losses increase, and firing points and places of deployment of his forces are subjected to heavy shelling.

Source: Izvestia newspaper.

The post The Suntsipok flamethrower system: Key features revealed by military expert appeared first on Asume Tech.



from Technology - Asume Tech https://asumetech.com/the-suntsipok-flamethrower-system-key-features-revealed-by-military-expert/

Tuesday, 28 March 2023

WhatsApp introduces message editing feature for sent messages.

Yesterday, Monday, WABetaInfo reported that instant messaging service ‘WhatsApp’ continues to develop its new feature that allows users to edit sent messages.

The site, which specializes in monitoring experimental features in “WhatsApp” had reported for the first time last February that the service was testing one of the most requested features, i.e. editing messages, in version 22.23.0.73 of the application of the service on the “WhatsApp” system. iOS” from Apple.

WABetaInfo then said the feature would allow users to edit messages within 15 minutes of being sent. Thus, this feature will be useful for correcting any errors in your messages or adding new information before the other party sees it.

And while “WhatsApp” now allows users to delete any sent message before the other party sees it, this feature seems to target users who don’t want to delete messages, but rather edit their content before they’re seen.

WABetaInfo warned that the new feature will only support the latest version of the “WhatsApp” application and will only allow editing of messages and not multimedia explanation.

Now, the site has discovered in the build number 23.6.0.74 that the functionality is still in under development and now includes a new custom alert. He posted a screenshot revealing that messages will be changed for all participants in the conversation, provided they are using the latest version of WhatsApp.

And the site said: “If you’re wondering what happens to edited messages sent to people using an older version of WhatsApp, this won’t be a problem because it’s likely WhatsApp won’t release the ability to edit messages until the versions that are not compatible with this feature have expired, so users will need to upgrade to the latest version of the app that can receive modified messages.

Interestingly, “WhatsApp” is testing many features, such as short video message function, listen to voicemail once function, and voice chat function.

Anyone wishing to try out the new features can sign up for the “WhatsApp Beta” program on Android, and the latest trial version of the application can be downloaded and manually installed from here. You can also sign up for the iOS beta program here.

The post WhatsApp introduces message editing feature for sent messages. appeared first on Asume Tech.



from Technology - Asume Tech https://asumetech.com/whatsapp-introduces-message-editing-feature-for-sent-messages/

Samsung, An OLED Supplier for Apple, Will Begin Production of iPhone 15 Panels One Month Earlier Than Originally Planned

Because of production issues with one of Apple’s other suppliers, an upcoming report out of Korea claims that Apple OLED supplier Samsung Display will begin manufacturing OLED panels for the iPhone 15 series one month earlier than originally planned.

First Avatar Frontiers of Pando ra_

Since BOE is having issues with light leakage around the portion of the OLED display where the pill and hole cutouts secure the space necessary for the TrueDepth camera and Face ID, The Elec reports that Samsung will begin manufacturing the OLED panels in May rather than June to make up for the lack of planned initial orders.

Apple has ordered its Chinese manufacturing partner BOE to produce OLED panels for the standard iPhone 15 model. Despite this, the problems were so intractable that Apple canceled the order. As a result, BOE will no longer have the opportunity to become one of the initial suppliers.

As the Announcement Draws Closer, A Number of Apple Employees have Expressed Serious Concerns Regarding the Mixed-Reality Headset_

In addition, Samsung was always scheduled to supply the OLED panel for the standard iPhone 15. Due to the difficulties experienced by the Chinese display panel maker, Samsung has decided to begin production sooner than expected.

The low-temperature polycrystalline silicon (LTPS) thin-film transistor (TFT) that is expected to be used in the standard and Plus models of the iPhone 15 is a strong indicator that these devices will not be able to support ProMotion, which is an option for an always-on display that is available on Apple’s Professional models.

Meanwhile, LG Display will start producing LTPO TFT OLED panels for the higher-tier ‌iPhone 15‌ in June. The LPTO panels offer support for 120Hz ProMotion and have the capability of a refresh rate of 1Hz. This allows an idle Lock Screen to remain visible without significantly impacting the device’s battery life.

According to the report, Samsung’s early start doesn’t necessarily mean the end for BOE as an Apple supplier. It has been reported that the Chinese display panel manufacturer is progressing in addressing the light leak problem. They may begin supplying OLED panels for the iPhone 15 within the next year.

As usual, Apple plans to release the iPhone 15 series in September. To learn everything there is to know about the new models, check out our specialized roundups by clicking on the links provided below.

The post Samsung, An OLED Supplier for Apple, Will Begin Production of iPhone 15 Panels One Month Earlier Than Originally Planned appeared first on Asume Tech.



from Technology - Asume Tech https://asumetech.com/samsung-an-oled-supplier-for-apple-will-begin-production-of-iphone-15-panels-one-month-earlier-than-originally-planned/

Ash plume ejected from Indonesia’s Levutulu volcano

Indonesian news agency Antara reported that the Levotolo volcano on Indonesia’s Lumblin Island spewed a plume of smoke and volcanic ash that rose to a height of 750 meters.

“The eruption began at 16.04 local time (11.04 Moscow time), a column of smoke and volcanic ash rose to a height of 750 meters above the top of the volcano,” the National Volcanological Center said in a statement.

According to the statement, the eruption lasted only 52 seconds and there were no reports of casualties or property damage as a result.

It is noteworthy that on March 24, the volcano released a column of smoke and volcanic ash, reaching a height of about a kilometer, and this was accompanied by an outpouring of lava and its spread to a distance of up to 500 meters, forcing the local authorities to impose a curfew in the area of ​​the volcano.

It should be noted that the strongest eruption of this volcano was at the end of 2020, which led to the evacuation of thousands of people from their homes and the closure of the local airport.

Indonesia is part of the so-called “Pacific Ring of Fire” – a powerful tectonic fault, where the accumulated energy is released in the form of an earthquake and volcanic eruptions, of which there are about 130 in Indonesia.

Indonesian authorities announced the eruption of Mount Merapi on March 11. This volcano is considered one of the most active volcanoes in Indonesia. As a result of the eruption of this volcano, lava spread up to 1.5 kilometers, which forced the authorities to prevent people from approaching the volcano at a distance of at least 7 kilometers.

Source: Izvestia newspaper.

The post Ash plume ejected from Indonesia’s Levutulu volcano appeared first on Asume Tech.



from Technology - Asume Tech https://asumetech.com/ash-plume-ejected-from-indonesias-levutulu-volcano/

Uncovering the Dark Side of Bluetooth: How Your MacBook Could be Used for Spying

Bluetooth technology has offered unprecedented solutions for device interconnections. Nearly all devices today are Bluetooth-enabled. Despite its benefits, the technology also exposes users to cyberattacks.

MacBook users face a variety of privacy and security risks while connected to Bluetooth. The technology allows connectivity within short distances. Hackers need to be within close range of their target to perform an attack. Without proper protection, your MacBook can be hacked and used for spying.

Uncovering the Dark Side of Bluetooth How Your MacBook Could be Used for Spying

Main types of Bluetooth attacks

One of the common questions asked by users is: Is Bluetooth safe from Hackers? The truth is that it is not safe. Cybercriminals keep creating new ways to find access to other people’s devices. Using the latest strategies, they can gain access to your MacBook within seconds.
When connecting Mac to Bluetooth, sometimes it fails to turn on. It is mostly caused by technical issues that are easy to solve. Search for the words to my Bluetooth won’t turn on Mac to get tips on how to fix the problem. Cybercriminals can use your laptop for spying without even interacting with you. They use two main types of attacks.

Using Bluetooth spy apps

There are a variety of Bluetooth Spy apps used by cybercriminals. The apps help them connect to your phone or laptop without asking for permission. When using spy apps, cybercriminals access your device in three methods.

Bluebugging: Using this tactic, a Bluetooth phone spy can gain full access to your device and control it. For instance, a hacker accesses your device through the back of your IOS. The hacker listens to your conversations and can even reroute your communication. This is one of the most dangerous MacBook attacks you can get.

Bluejacking: Attackers send annoying messages to Bluetooth-connected devices within range. The hacker can steal information from your computer. However, the attack is not as serious as the other two.

Bluesnarfing: This is a sophisticated type of attack. The attacker gains access to your operating system and steals your data. They can be located up to 300 feet away, and you can never notice it. They seek to steal your passwords, emails, photos, and PINs from your computer.

Hacking

Bluetooth hackers use sophisticated software to steal information. The software displays all gadgets, such as MacBooks and iPhones, connected within range. They can tell the networks you are connected to currently and previously. Anytime you allow a Bluetooth connection, your gadget automatically connects to it next time. It treats it as a safe connection and stores connection credentials. Hackers often replicate trusted networks to trick your devices into connecting to them.

They then release malware, spyware, ransomware, and other dangerous software. They use the software to steal your data, clog your MacBook, or demand ransom. If your MacBook is usually connected to Bluetooth often, they can install spy software. It helps them spy on other gadgets around you every time you are connected.

What to do to protect your MacBook from being used for spying

Bluetooth hackers often station themselves in public places. They know such places have many devices in use, and it can help them remain undetected. They may also target restaurants, cafes, and coffee shops. They know people who visit such places can sit for more than one hour. In public places, they target devices of users who often use the spot. You can take several steps to keep your gadget safe.

Disable your Bluetooth whenever not in use

Do not keep Mac or phone Bluetooth on all the time. It gives hackers enough time to breach into your device and get all the data they need. They may even use it as a spying gadget if they notice you are always connected. Whenever you are not using your Bluetooth, tap to switch it off.

Use a VPN

A VPN is one of the best methods to keep yourself secure. It connects you through a remote server that is hard for hackers to detect. Before you connect to the internet, connect your VPN first.

Use a VPN

Install antimalware in your gadget

Mostly, attackers use malware to gain access to your gadget and steal data. You can thwart them by installing antimalware on your Mac or iPhone. It protects your iOS or macOS from being compromised by different types of malware. The software blocks all suspicious activity in your gadget and thus protects your privacy.

Conclusion

Bluetooth allows you to connect to a variety of devices within range. Unfortunately, it leaves you prone to cyberattacks. Your MacBook could be used as a spying device by cybercriminals. They use spy apps or hacking software to gain access to your operating system. They then take control of your laptop and use it to spy on other devices around you.

The post Uncovering the Dark Side of Bluetooth: How Your MacBook Could be Used for Spying appeared first on Asume Tech.



from Technology - Asume Tech https://asumetech.com/uncovering-the-dark-side-of-bluetooth-how-your-macbook-could-be-used-for-spying/

Monday, 27 March 2023

Brazil’s Next-Gen Combat Frigates: A Step Forward in Defense Technology

Military website Armstrade has announced that Brazil is building new multi-role combat frigates for its fleet.

A post on the website states: “A ceremony was recently held at the Thyssenkrupp Estaleiro Brasil Sul shipyard in Santa Catarina to mark the laying of the main beam of the new F200 Tamandare multi-purpose frigate. The ceremony was attended by the Minister of Brazil. Ministry of Defense and a number of high-ranking military and company representatives.

The website states: “The company has completed 34% of the work to date on the manufacture of the new ship, and it is expected that the ship will descend into the waters next year, and in 2025 it will be transferred to the Brazilian Navy. , and by December 2029, the Brazilian army should receive 3 more ships of the same type “Type”.

Each of the new F200 Tamandare ships has a length of 17.2 m and a displacement equivalent to 3455 tons. These ships are armed with Sea Ceptor and MM40 air defense systems, 76 mm cannons and 12.7 mm remote-controlled machine guns.

Source: Weapons of Russia

The post Brazil’s Next-Gen Combat Frigates: A Step Forward in Defense Technology appeared first on Asume Tech.



from Technology - Asume Tech https://asumetech.com/brazils-next-gen-combat-frigates-a-step-forward-in-defense-technology/

The Perils of Using Unsecured WIFI: A Simple Password Can Spell Disaster

“Lending” your Wi-Fi password to a friend or neighbor is relatively common. But there are a number of risks you should consider before doing so.

Here are 10 reasons why you should think carefully before taking this step, according to the British Daily Mail.

1- Illegal downloads

If someone else uses your internet connection to download illegal content, they will leave a trail across the internet to your router.

And a friend may choose to illegally download a movie or TV series to your home to avoid putting himself on in danger.

While you may find yourself having to pay a large fine.

2- Malware can spread

You can share your password with someone you trust completely and know for sure that they will never take advantage of your kindness. However, even a trusted friend or family member connected to your network could spell disaster.

If a device, such as a smartphone, is infected with malware and connects to your Wi-Fi network, it may continue to attack your computertelephones and tablet as it spreads.

3- They can use all your data

Almost all broadband service providers offer it download unlimited and no data restrictions. So you might think that this won’t affect you. However, most of the unlimited packages are known as Standard Unlimited or Truly Unlimited.

And with unlimited packs standardthere may be restrictions, such as traffic management and fair use policies.

If you give your password to someone who downloads very regularly, your Internet Service Provider may consider that you are abusing their fair use policy, which can slow down the speed of your connection and, in severe cases, discontinue.

4- Users can see contacts

Allowing someone to connect to your Wi-Fi allows someone to access a system in where data enters and leaves.

A technically savvy person using a software For computer free can scan your network which will provide a list of all currently connected devices.

5- Your IP can be banned

Some websites, including social media and games online, they can issue IP bans to users who have violated their terms of service. This means that access to the specified website will be blocked for everyone on the same Wi-Fi network, not just for a specific account.

However, bans are not permanent and you can change your IP address.

6- They can use your password

Wi-Fi passwords are notoriously difficult to remember, filled with random numbers and letters. Many people stick the password on their refrigerator or save it as a picture on their phone.

But some choose to rename their password in something they can remember, another password they already use. This puts you at risk of someone gaining access to your accounts.

7- They can limit all bandwidth

Bandwidth is the amount of data that can be transferred from your router to your devices in ​​a given moment or the speed or your Internet connection.

If you are watching a movie in 4K, but your friend or neighbor is downloading large files and playing a game onlineyou may find that everything slows down.

8- Carrying out illegal activities on the Internet

Your business online on your Wi-Fi network, including actions that violate the law without visiting illegal websites, will be returned to you. Bullying, trolling and hate speech happen on a regular basis online and the authorities respond to reports.

When phishing is done through an anonymous account, the profile may go back to its IP address. If your friend is busy in activity online on your Wi-Fi that has real-world consequences, the police may visit you.

9- They can use other devices on the network

Many people own devices like printers, Amazon Alexa, speakers, and even internet-connected hard drives. It allows users to control aspects of their homes through their phones. However, by sharing your Wi-Fi password, you are potentially allowing others to use these devices.

While this may be accidental, you may be annoyed if a song you were listening to on your Wi-Fi speaker is interrupted by your neighbors’ songs.

10- They can share your password with those around them

If you live in a condominium or in aarea with a large number of potential Wi-Fi connections, handing over your password can cause problems.

If you share your password with one person, many other people can join in possession of the password, increasing the possibility of illegal activity via your IP address. A trusted neighbor might not abuse your Wi-Fi, but someone who doesn’t know you might see it as a good opportunity.

The post The Perils of Using Unsecured WIFI: A Simple Password Can Spell Disaster appeared first on Asume Tech.



from Technology - Asume Tech https://asumetech.com/the-perils-of-using-unsecured-wifi-a-simple-password-can-spell-disaster/

Twitter’s Source Code Breach: What You Need to Know

Some of Twitter’s source code, the central computer code that makes the social network work, got out on the internet.

Some of Twitter’s source code, which is the main computer code that makes the social network work, was leaked online, the company said in a legal filing on Sunday. The New York Times was the first to report on this.

Twitter Source Code Breach What You Need to Know

The legal document filed with the U.S. District Court for the Northern District of California says that Twitter asked GitHub, an online service for hosting software development, to remove the code from where it was posted. According to the filing, the platform agreed and said the content had been taken down. Twitter also asked the court to find out who posted Twitter’s source code on systems run by GitHub without getting permission from Twitter.

Based in San Francisco, Twitter said in the filing that the posts violated its copyrights.

The leak gives billionaire Elon Musk more problems. Last October, he bought Twitter for $44 billion and turned it into a private company. Since then, it has been in chaos, with many people losing their jobs and many advertisers leaving.

A congressional report says that the Federal Trade Commission is looking into Musk’s mass firings at Twitter and trying to get his internal communications as part of its ongoing review of the social media company’s privacy and cybersecurity practices.

The post Twitter’s Source Code Breach: What You Need to Know appeared first on Asume Tech.



from Technology - Asume Tech https://asumetech.com/twitters-source-code-breach-what-you-need-to-know/

Japan’s Navy Welcomes a New Submarine from White Whale Submarines

Naval News announced that the Japanese Navy has recently received a new modified Taigei-class submarine.

“During an official ceremony held at the Kawasaki Heavy Industries shipyard, the Japanese Navy was handed over a new Taigei-class diesel-electric submarine, or White Whale submarine,” the website said in a statement.

The publication added: “The new submarine is the second new generation Taigei submarine being developed for the Japanese military. Work on its development began in 2019, and the first time it was launched in 2021 and passed a series of tests before being transferred to the army.”

The new Taigei submarines are similar in appearance to the Japanese Soryu submarines, but very different in equipment, in addition to receiving advanced lithium-ion batteries, sonar devices and modern guidance equipment, new sound-absorbing materials were used in the manufacture of their hulls to make them difficult to detect by enemy forces .

Each Taigei submarine is 84 meters long, 9.1 meters wide and has a displacement of 3,000 tons. These submarines are armed with 533 mm torpedoes, Harpoon anti-ship missiles and naval targets.

Source: Weapons of Russia

The post Japan’s Navy Welcomes a New Submarine from White Whale Submarines appeared first on Asume Tech.



from Technology - Asume Tech https://asumetech.com/japans-navy-welcomes-a-new-submarine-from-white-whale-submarines/

Slovakia Provides Ukraine with Advanced Air Defense Systems to Replace Outdated Ones

Slovakia intends to transfer to Ukraine all its old weapons, including MiG-29 fighters, to be replaced with new-generation American weapons.

Among these obsolete weapons are self-propelled anti-aircraft missile systems “Kvadrat”, which were withdrawn from the possession of the Slovak army.

Slovakia bought it from the Soviet Union in the seventies of the last century, when this weapon was considered an air defense weapon, a modern complex designed to deal with various air targets, and its surface-to-air missiles were capable of hitting an enemy at a distance of about 22,000 meters and altitudes from 100 to 7000 meters. The complex included rocket launchers, a command and control center, reconnaissance and guidance, missile transport and loading vehicles.

As for the maneuverability of the system, it is guaranteed by a V-6 diesel engine with a capacity of 280 horsepower. The maximum speed of the system on paved roads was 44 km/h. It was exported in the seventies to many countries, including Syria and Egypt. The system is still in service with some NATO armies, such as the Polish army, which previously considered its upgraded model, where old Soviet missiles replaced American RIM-7 Sea Sparrow missiles. The operating range of the missile is 30,000 meters, the target engagement height is 15,240 meters, the mass of the missile is 230 kg, the combat weight of the warhead is 40.3 kg, and the speed is 4195 km/h.

Recently it became known that the Kiev army may receive a batch of American surface-to-air missiles to supply Soviet-made Buk complexes. It is possible that these missiles will also appear on the launchers of the Kvadrat complex.

Source: Russian newspaper

The post Slovakia Provides Ukraine with Advanced Air Defense Systems to Replace Outdated Ones appeared first on Asume Tech.



from Technology - Asume Tech https://asumetech.com/slovakia-provides-ukraine-with-advanced-air-defense-systems-to-replace-outdated-ones/

McCarthy: Lawmakers to Proceed with TikTok Legislation

As the Chinese company, TikTok, faces mounting pressure and calls to ban the app in the US, US House Speaker Kevin McCarthy announced on Sunday that lawmakers would move forward with legislation to address national security concerns over TikTok, claiming the Chinese government is looking at the app’s user data. .

McCarthy, who belongs to the Republican Party, said on Twitter: “It is very disturbing that the CEO of TikTok cannot tell the truth and acknowledge what we already know to be true, which is that China has the right to access the data of TikTok users. TikTok.”

long interrogation

Interestingly, TikTok CEO Xu Zi Zhu faced lengthy questioning from US lawmakers on Thursday about the video-sharing app’s alleged ties to China and the danger it poses to teens.

Zhu said during the session that “ByteDance Company (which owns the application) is not affiliated or controlled by the Chinese government and is a privately held company,” adding that “60% of the company is owned by international investment institutions. The 20% is owned by its founder and 20% is owned by employees from around the world.” , according to AFP.

“clear and transparent rules”

He also explained: “We believe what is needed are clear and transparent rules that apply to all technology companies. Ownership is not a basis for addressing these concerns.”

But he stressed that some US data is still available for company employees in China, saying, “Today there is still some data that we need to get rid of.”

Calls are mounting in the US to ban TikTok, which is owned by China’s ByteDance, or to pass a bipartisan bill to give President Joe Biden administrative legal authority to call for a ban. Recently, it has been banned download app on US government-owned devices.

The post McCarthy: Lawmakers to Proceed with TikTok Legislation appeared first on Asume Tech.



from Technology - Asume Tech https://asumetech.com/mccarthy-lawmakers-to-proceed-with-tiktok-legislation/

Sunday, 26 March 2023

Invention of Lightning Rod by Siberian Scientists

Scientists from the Russian city of Irkutsk in Eastern Siberia have invented a lightning detector.

This invention will allow scientists to localize forest fires caused by thunderstorms.

Researchers at the Russian Irkutsk University for Scientific Research have developed a lightning detector together with the Institute of Solar and Earth Physics of the Russian Academy of Sciences as part of the Digital Baikal project, the purpose of which is to create a unified environmental monitoring system for Lake Baikal and its environs.

This is reported by IA “IrkutskMedia” with reference to the press service of the local government.

Acting Minister of Forestry of the Irkutsk Regional Government, Eduard Filippov, said: “The activation of this special system for recording lightning strikes will allow us to quickly detect forest fires caused by lightning flashes and determine their locations. This information will be taken into account when adjusting air patrol routes, which will make it possible to identify fires. Forests are in their initial stage and urgent measures are being taken to neutralize and extinguish them.”

The lightning detection system registers the electromagnetic radiation of lightning charges. Currently, a network of stations with receivers is being formed at 4 points near Lake Baikal, namely: the Geophysical Observatory of the Institute of Physics of the Sun and the Earth in the village. the village (Listvyanka), the magnetic observatory on the island (Olkhon) and the city of Bratsk.

At the registration points, the lightning direction, time and signal characteristics are measured. The measurement results for each category are sent to the data collection and processing center, where their coordinates and characteristics are calculated. As a result, the time of the occurrence of lightning, its geographical coordinates, the possible error in calculating the coordinates, the strength of the electric component of the field (strength and direction of the electric current) are determined.

Source: TASS

The post Invention of Lightning Rod by Siberian Scientists appeared first on Asume Tech.



from Technology - Asume Tech https://asumetech.com/invention-of-lightning-rod-by-siberian-scientists/

The Pros and Cons of Tik Tok’s Ban in America: Winners and Losers Revealed

Since its launch 5 years ago, the TikTok app has amassed around 150 million users in the US alone, giving small businesses a new way to reach potential customers, while also raising concern among national security experts and US lawmakers.

The future of the application is now in game there, especially since President Joe Biden’s administration is calling on its Chinese owners to sell their stock or face bans, according to a Wall Street Journal report.

TikTok officials revealed the sale won’t solve security woes and instead proposed a $1.5 billion plan to the Biden administration that it says would isolate its US operations from China.

Negotiations with US regulators about a way to protect application data have been going on for more than two years, and the Biden administration could face a long and bumpy road in trying to implement its threats, while momentum against the application is still in increase, but who are the beneficiaries and other losers in the case in whose application is banned in the United States?

beneficiaries of the ban

And let’s start with the beneficiaries of the TikTok ban, e in At the top of the list are competitors and any company that has tried to copy the application or provide a similar service, such as Instagram through the “Rails” service.

So are parents, as teens across the country struggle to curb their use of social media.

TikTok is among the most popular apps for teenagers and those parents who are worried about their kids using the app will rejoice at the ban.

In parallel, lawmakers on both sides who have opposed the Chinese implementation will benefit.

In addition to politicians opposing the app, a group of Silicon Valley executives recently joined the group of people concerned about the Chinese parent company.

The losers of the ban

As for the list of losers from this ban, they are US and Chinese technology companies and telecommunications companies, especially since Beijing and Washington entered in a technological cold war for at least the last five years.

And the TikTok ban is likely to exacerbate matters further, as some lawmakers fear Beijing will retaliate against an American company doing business in China.

Additionally, users, creators and businesses will be among the biggest victims of the ban, as creators or influencers rely on the app to sell everything from exercise programs to books and vitamins, sometimes raking in hundreds of thousands of dollars a year. year by sponsors.

Banning TikTok would be bad news for investors in its Chinese parent company, ByteDance, which is 20% owned by its founders, 20% by employees and 60% by global investors.

Oracle company

While Oracle will be one of the biggest losers, especially since TikTok hired the company to store data from its American users, as well as monitor its video recommendation algorithm for interfering signals from China.

The US survival app relies so heavily on Oracle that it has dubbed its plans to spin off its US operations “Project Texas,” a reference to Oracle’s Austin headquarters. And if TikTok is banned, Oracle will lose a major customer.

TikTok CEO Xu Zi Qiu was reported to have undergone a grilling session of Congress on Thursday as the Biden administration faces mounting pressure from lawmakers to ban the app in the country on national security grounds.

The post The Pros and Cons of Tik Tok’s Ban in America: Winners and Losers Revealed appeared first on Asume Tech.



from Technology - Asume Tech https://asumetech.com/the-pros-and-cons-of-tik-toks-ban-in-america-winners-and-losers-revealed/

New WhatsApp feature now available exclusively for iPhone users

The world’s most popular messaging application, WhatsApp, is still fighting against time to prevent its new competitors from reaching users’ hearts.

In new updates, the instant messaging app is testing a new feature that allows iPhone users to exchange short video messages, which will be end-to-end encrypted to ensure privacy, according to WABetaInfo.

Only 60 seconds

And the new feature works the same way as voice messages, as the expected update of the application will allow the camera icon next to the microphone icon to capture a visual message.

It is also expected that the duration of the messages will be only 60 seconds.

Users will not be in able to save or forward video messages to other chats.

And the application will keep the screen capture function, as the features of the new functionality have been monitored in the beta version 73.0.6.23.

“essential”

Interestingly, “WhatsApp” has become indispensable in daily life, in as it is one of the most common and popular messaging applications in worldwide, with over two billion users.

The green app is also expected to start rolling out new features globally in the coming weeks.

The post New WhatsApp feature now available exclusively for iPhone users appeared first on Asume Tech.



from Technology - Asume Tech https://asumetech.com/new-whatsapp-feature-now-available-exclusively-for-iphone-users/

Development of Thyroid Gland Mimicking Device by Moscow Scientists

Scientists in the Russian capital have invented a medical device that mimics the work of the thyroid gland.

With the help of this innovative medical device, specialists can simulate infection with other diseases.

This helps doctors improve their skills in diagnosing tumors and taking samples from a diseased organ. This year it is planned to start mass industrial production of this useful medical device.

Ilya Tyrov, Deputy Head of the Department of Health of the Government of Moscow, said: “Moscow is conducting complex scientific work aimed at improving the healthcare system in the capital. One of the projects aimed at development was the development of important simulators for human organs. devices that mimic the organs and tissues of the human body. These devices are used to train doctors, modify and control medical equipment, expand the capabilities of radiologists in the capital, which greatly facilitates the acquisition of data related to human health.”

The use of simulations in modern medicine improves the quality of diagnostics and increases the efficiency of doctors. In this regard, devices are currently being developed that mimic the work of the prostate and blood vessels.

Specialists of the Center for Diagnostics and Telemedicine of the Ministry of Health in Moscow have developed 5 medical simulators of this type. With its help, doctors can improve the skills of ultrasound diagnostics of blood vessels, blood clots in the brain, tumors and tumor foci in the mammary and thyroid glands, as well as improve the efficiency of measurements and training when performing various operations using ultrasound technology.

Source: mos.ru

The post Development of Thyroid Gland Mimicking Device by Moscow Scientists appeared first on Asume Tech.



from Technology - Asume Tech https://asumetech.com/development-of-thyroid-gland-mimicking-device-by-moscow-scientists/

Aqara has Announced the Release of its Video Doorbell G4 With Support for HomeKit Secure Video and Face Recognition

Aqara has Announced the Release of its Video Doorbell G4 With Support for HomeKit Secure Video and Face Recognition

Aqara, a company that makes accessories for smart homes, has introduced its first video doorbell, the HomeKit-enabled G4, which features facial recognition.

Aqara has Announced the Release of its Video Doorbell G4 With Support for HomeKit Secure Video and Face Recognitio n_

The Video Doorbell G4 has a camera with a resolution of 1080p. It allows local streaming to smart devices such as Amazon Alexa and Google Home. It is compatible with Apple’s HomeKit Secure Video protocol.

On-device artificial intelligence recognizes users’ faces, then sets off individualized automation based on each individual. For instance, when the G4 detects a household member returning home, it will begin playing a scenario titled “welcome home.” The doorbell will play a pre-recorded message if it determines that the delivery person is the postman.

The wired and wireless installation methods are supported by the video doorbell powered by a battery. According to Aqara, it can use six AA batteries and have them endure for around four months. Users can also wield the G4 doorbell to an AC/DC transformer to enable recording at all times of the day and night, with the battery pack as a backup power source.

In addition, the doorbell has a sensitivity setting that can be adjusted, motion detection that can be customized, and a power-saving option for users who live in high-traffic areas so that the battery life can be extended. Users can set the chime repeater indoors thanks to the G4’s chime repeater, which features a 95 dB speaker and also comes equipped with a USB-C port.

Aqara has Announced the Release of its Video Doorbell G4 With Support for HomeKit Secure Video and Face Recognition_

Local or remote storage via iCloud or the Aqara platform is an option for storing video recordings. The latter provides cloud storage without needing a subscription for up to seven days’ worth of important event clips, such as those generated by motion detection, facial recognition, doorbell rings, and tamper warnings.

The Aqara Smart Video Doorbell G4 can be purchased in either Shadow Gray or Black, costing 119.99 dollars. It also has a microSD card slot for additional local storage if desired. According to Aqara, support for the newly developed Matter standard will be implemented in a future over-the-air software update. The G4 can be purchased on Amazon in North America and Europe, in addition, to select Aqara dealers in other parts of the world.

The post Aqara has Announced the Release of its Video Doorbell G4 With Support for HomeKit Secure Video and Face Recognition appeared first on Asume Tech.



from Technology - Asume Tech https://asumetech.com/aqara-has-announced-the-release-of-its-video-doorbell-g4-with-support-for-homekit-secure-video-and-face-recognition/

Australian Army Tests Lethal Robot Dogs: The Potential Threat to Humanity

Soldiers mentally controlling a robot dog as they patrol a dirt road and sweep a building may sound like science fiction, but this is a scene from a real-life demonstration.

The Aussie Army has optimal mind control capabilities with eight sensors neatly packaged in the helmet that work in conjunction with Microsoft HoloLens.

The innovation includes an AI decoder that translates the soldier’s brain signals into interpretable instructions that are sent to the four-legged robot, allowing humans to remain focused on their surroundings.

Killer robot dogs run by soldiers MINDs being tested by the Australian Army https://t.co/KsRC7S66Aa

– Daily Mail UK (@DailyMailUK) March 23, 2023

A new video shows a soldier conducting simulated patrols with a robotic dog that was ordered to scan an object using what it reads from a person’s brainwaves – with 94% accuracy.

The system was developed by the University of Technology Sydney, which first revealed the innovation last year, but has recently released a new paper detailing how it works.

come in paper A study published by the American Chemical Society on March 16: “A user has used our Augmented Brain-Robot Interface (aBRI) platform to control robot systems. The aBRI platform allows the user to interact with machines/robots in a more natural way, which is better than the traditional installation of a brain-robot interface application computer (BCI), which requires users to remain still.”

The researchers describe the aBRI platform, which consists of four main components: hardware interfaces, an electroencephalography (EEG) system, one tablet computer, and a robotic system.

Previous work, announced last year, demonstrated a technique for collecting EEG signals “from the frontal region of the head using non-invasive epitaxial graphene (EG) sensors based on silicon carbide (SiC) on silicon with an indivisible surface.

The latest update has shown the value of brain machine interfaces that take instructions from the occipital lobe, which is responsible for visual perceptions such as color, shape, and movement.

The human controller only needs to imagine the direction in which he wants the robot to move and the car to follow.

The technology allows soldiers to control robots hands-free and is ideal for combat.

This is very intuitive. It only took a few sessions. It’s more of a visual focus. You don’t need to think about anything. Selected to trigger the robot, but you need to focus on that blink.” Blink is a beacon in the HoloLens headset that acts as a marker that the Robot Dog moves towards, keeping it in its lane.

“The potential of the project is very broad,” said Robinson. “Essentially, it translates brain waves into ones and zeros, and this can be applied to a number of different systems.”

Source: Daily Mail

The post Australian Army Tests Lethal Robot Dogs: The Potential Threat to Humanity appeared first on Asume Tech.



from Technology - Asume Tech https://asumetech.com/australian-army-tests-lethal-robot-dogs-the-potential-threat-to-humanity/

Next Week’s Marvelous Astronomical Event Visible Without Telescope in the Sky Above Earth

Astronomy fans can enjoy a rare astronomical event on Monday night when five planets, a famous constellation and the Moon collide in one night.

The planets Mercury, Venus, Mars, Jupiter and Uranus are due to line up in the sky, accompanied by the Moon and a group of stars on March 28, but the show will also be visible in the skies in the days before and after. .

The event will be visible to the naked eye, and astronomers recommend finding a spot with a light-pollution-free view to enjoy as far as binoculars or a telescope can be used to get a more detailed view.

The planets will be located on the western horizon about 20 to 25 minutes after sunset on Monday, starting with brighter Mercury and Jupiter, according to Space.com.

However, the brightness of twilight can hide this, according to Space.com, which indicated that the viewing window takes only 25 to 30 minutes.

Experts said that Jupiter and Mercury will appear as two “bright objects” near the horizon.

However, the duo will be visible less than an hour after sunset before disappearing from view.

Venus will be easy to see with the naked eye because it is the third brightest object in the sky and will be seen in the sky next to Uranus.

Mars will appear bright red and very high and can be seen next to the Moon. The planets will line up in a 50-degree sector of the sky.

American astronomer Gary Swangen said that Venus, Mars and Jupiter will be visible to the naked eye.

However, binoculars may be needed to see Mercury and Uranus, he told the New Jersey Herald.

And this will not be the last chance for astronomy enthusiasts to learn about this event, as another planetary alignment will take place on April 11th and again later that year on August 24th.

Mercury, Uranus, Jupiter, Neptune and Saturn will also form another five planet alignment on June 17th.

Source: Daily Mail

The post Next Week’s Marvelous Astronomical Event Visible Without Telescope in the Sky Above Earth appeared first on Asume Tech.



from Technology - Asume Tech https://asumetech.com/next-weeks-marvelous-astronomical-event-visible-without-telescope-in-the-sky-above-earth/

Saturday, 25 March 2023

Google Bard: Your Complete Guide to the Newest ChatGPT Alternative

When Google released its new AI chatbot Bard this week, it could see how people responded to OpenAI’s ChatGPT and Microsoft’s new Bing chatbot.

In the past few months, people who have tried out ChatGPT and Bing have talked about their strange interactions with the AI chatbots. These chatbots can give the impression that they are intelligent with their conversational responses, but they often give data and guess what words to say to make sense.

Google Bard Your Complete Guide to the Newest ChatGPT Alternative
The Bard experience is aware of it. If you got off the waitlist and could use it, you probably saw a message that said, “Bard may give wrong or inappropriate answers,” and that it will get better as more people use it and report problems.

A short test of Bard showed that it quickly answered trivia questions about the solar system from Insider and made cautious predictions about the March Madness basketball tournament ( “The odds are that Houston will win the national title. They have a team that is strong and has much experience “Bard said.)

But it balked at getting personal. Bard can access a user’s Gmail account, but a reporter was told that Bard couldn’t look at “personal information, such as your name.”

This week, Google reassured users that Bard “is not trained on Gmail data.” This was said in a tweet.

Some users who wrote about their first thoughts said they could have been more impressed. Google shows that it will work slowly to improve the technology over time.

James Manyika, Google’s SVP of technology and society, wrote in a document about Bard, “It’s still early days for this technology, even though we’re at an important turning point and excited about how people feel about generative AI.”

The post Google Bard: Your Complete Guide to the Newest ChatGPT Alternative appeared first on Asume Tech.



from Technology - Asume Tech https://asumetech.com/google-bard-your-complete-guide-to-the-newest-chatgpt-alternative/

Google Makes AI Chatbot Bard Accessible to More Users and Developers

Users can now sign up to use Google’s AI-powered Bard, which competes with Microsoft’s Bing chatbot. The feature was introduced today. Bard is an experimental conversational AI service for Google Search that was launched for the first time back in February.

Google Makes AI Chatbot Bard Accessible to More Users and Developers_

People interested in Bard can sign up for the waitlist on Google’s website to gain access. Many users have mentioned receiving invitation emails only a few hours after signing up for the service. According to Google, Bard is capable of performing the following extensive set of sample functions:

  • Why is it possible for lightning to strike the same spot twice?
  • Assistance with writing your debut book
  • Prepare an outfit list for your weekend getaway.
  • Plan a blog article on your favorite summertime mocktails.
  • Identify the possible causes of huge language models’ errors.
  • Create a tagline for your art studio.
  • Recommend including high-protein foods in a vegan diet.

Access to the beta version of Bard is currently only available in the United States and the United Kingdom, and the waiting period is still being determined. Requesting an invitation with a Google Workspace account is not something that Google permits.

google-bard_

According to Google, Bard uses a “lightweight and streamlined version of LaMDA.” As a result, the experience provided by the chatbot will be distinct from that provided by the OpenAI-powered Bing chat interface.

Google maintains that Bard is “complementary” to Google Search and is not intended to be a replacement for the latter. Google informs users that Bard learns from a wide variety of information, including biases and assumptions that exist in the actual world. As a result, the chatbot may deliver erroneous, misleading, or untrue information. It will improve over time based on the feedback that users provide, and Google plans to add more languages and capabilities in the future, such as coding.

The post Google Makes AI Chatbot Bard Accessible to More Users and Developers appeared first on Asume Tech.



from Technology - Asume Tech https://asumetech.com/google-makes-ai-chatbot-bard-accessible-to-more-users-and-developers/

In just 30 days, artificial intelligence devises cancer cure.

Artificial intelligence has developed a cure for an aggressive form of cancer in just 30 days and has shown that it can predict patient survival using doctors’ records.

The hacks were implemented through separate systems, but they show how the use of powerful technology goes beyond the creation of images and text.

University of Toronto researchers have been working with Insilico Medicine to develop a potential treatment for hepatocellular carcinoma (HCC) using an AI drug development platform called Pharma.

The AI ​​has discovered a previously unknown healing pathway and has developed a “hit novel molecule” that can bind to that target. The system, which can also predict survival, was invented by scientists from the University of British Columbia.

Artificial intelligence has become a new weapon against deadly diseases, as the technology is able to analyze huge amounts of data, identify patterns and relationships, and predict the effects of treatments.

“While the world has been fascinated by generative AI developments in art and language, our generative AI algorithms have been able to develop powerful target inhibitors with an AlphaFold-derived structure,” said Alex Zavoronkov, founder and CEO of Insilico Medicine. in a statement.

The team used AlphaFold, an artificial intelligence (AI)-based protein structure database, to develop and synthesize a potential drug for the treatment of hepatocellular carcinoma (HCC), the most common type of primary liver cancer.

This feat was accomplished in just 30 days of target selection and after only seven vehicles had been built.

And in the second round of AI-assisted compounding, researchers have found an even more powerful molecule, although any potential drug still needs to pass clinical trials.

“AlphaFold has opened up a new scientific framework for predicting the structure of all proteins in the human body,” said Feng Ren, Chief Scientist and Co-CEO of Insilico Medicine. “We at Insilico Medicine saw this as an incredible opportunity to take these structures and apply them to our comprehensive an artificial intelligence platform to create new treatments for diseases with high unmet need. This document is an important first step in this direction.”

The system used to predict life expectancy uses natural language processing (NLP) — a branch of artificial intelligence that understands complex human language — to analyze an oncologist’s records after an initial visit to a patient’s consultation.

The model identified the unique characteristics of each patient and predicted six-month, 36-month, and 60-month survival rates with over 80% accuracy.

The documents contain many details such as the patient’s age, type of cancer, underlying health conditions, past drug use, and family history.

And AI brings it all together to paint a complete picture of patient outcomes.

Traditionally, cancer survival rates have been calculated retrospectively and classified by only a few general factors such as cancer location and tissue type.

However, the model is able to capture unique clues in the patient’s initial consultation document to provide a more accurate estimate.

Source: Daily Mail

The post In just 30 days, artificial intelligence devises cancer cure. appeared first on Asume Tech.



from Technology - Asume Tech https://asumetech.com/in-just-30-days-artificial-intelligence-devises-cancer-cure/

Friday, 24 March 2023

What the Future Holds for E-Learning

What the Future Holds for E-Learning

E-learning tools are here to stay, even as educational institutions open their doors to students once again. Research company Beyond Market Insights shares that the global market for e-learning tools was worth as much as $235.5 billion in 2022, which is when most schools have already opened for face-to-face classes. It’s expected that the industry will further increase its worth to $648.6 billion by 2030, with a compound annual growth rate of 13.5% due to the high demand for virtual learning tools.

The continued demand for e-learning tools led to the development of specialized educational technologies. To illustrate, here’s what you can expect from future e-learning technologies:

Personalized instructions for each student

It can be overwhelming for educators to accommodate each student’s needs during in-person classes. This can create setbacks in the student’s academic progress, which is why institutions plan to leverage e-learning technology in the future for more adaptive learning.

In fact, the e-learning data compiled by Research.com shows that 33% of teachers and school administrators believe that e-learning systems can help them provide more personalized instructions for their students. Rather than providing a one-size-fits-all approach, teachers and school administrators want to use virtual learning tools that can adjust activities or lessons based on their students’ skill levels. The future adoption of these technologies can speed up students’ learning process by accommodating their needs and current skill levels.

Hybrid setups for greater student engagement

Both in-person and virtual classes provide benefits for the students. As such, educational institutions plan to use e-learning tools to offer more hybrid classes in the future.

Though fully online classes are convenient and less expensive, the e-learning statistics by Studocu explain that 56% of US students struggle to stay focused during these classes. About six out of ten students would prefer a hybrid form of education where educators combine e-learning tools with physical classes to increase student engagement during classes. Through this future setup, students will be more interested in participating in class due to their increased access to digital notes, video lectures, and educational games.

Social learning setups for collaborative classes

Engaging classes are also important for individuals who are using e-learning tools for their professional development. Thus, institutions plan to insert social features into online learning systems to make classes more collaborative and fun.

To boost the knowledge of professionals, Training Mag states that learning management systems are starting to provide easier ways to share knowledge this 2023. Plenty of employees learn competencies and information at work from experience and interaction with others, which is why learning management systems are starting to facilitate social learning setups. These e-learning tools allow professionals to share their knowledge and experience online so that their colleagues can learn valuable insights about their industry.

Microlearning sessions for employees

Aside from facilitating the knowledge sharing of employees, e-learning tools are being revolutionized to help professionals learn lots of information within limited time frames.

Our article entitled ‘Top Tech Tools That Will Help Your Employees Grow and Develop Their Skills’ points out that microlearning modules discuss specific skills so that professionals can quickly pick up new information. These microlearning modules were designed to be convenient yet comprehensive to ensure that professionals can improve their performance after watching each module. Businesses can expect more microlearning sessions from e-learning platforms now that more employees want to improve their corporate skills and invest in their personal development.

E-learning tools are no longer limited to videos and articles. Due to the high demand for these tools, these e-learning technologies will start to provide more personalized, hybrid, and collaborative features in the future.

The post What the Future Holds for E-Learning appeared first on Asume Tech.



from Technology - Asume Tech https://asumetech.com/what-the-future-holds-for-e-learning/