• WWW.ARCHPAPER.COM
    group collective stages its first show at Gere Block in Syracuse as a comment on adaptive reuse in Rust Belt cities
    The Gere Block is a historic factory in West Syracuse, New York, that now functions as an art gallery. There, earlier this year, group collectivea handful of architects, educators, designers, and artists who met as visiting faculty in the architecture department of Syracuse Universitystaged Animals, a group show that weighed in on adaptive reuse in Rust Belt cities, like Syracuse. group collectiveconsists of Ayesha Ghosh, Edgar Rodriguez, Laura Salazar, Lauren Scott, Magdalena Valdevenito, Pablo Sequero, Rocio Crosetto, and Juan Balsa. Each member contributed a small scale intervention that was installed in Gere Block. These works are referred to as animals by the curators in their project statement.Many of the installations are coated in lime green paint. (Anna Morgowicz/ESTO)Curators note that these animals are meant to activate the former factory building by enabling diverse uses, from small gatherings to performances. These installations were assembled with a variety of materials like steel brackets, and wood, but theyre unified by the lime green paint that coats them, making the exhibition extra brat. This is all meant to challenge visitors to reconsider the factory buildings potentialand that of Syracuse more broadly.Economic, off-the-shelf materials were used for the group show. (Anna Morgowicz/ESTO)The decision to host Animals at Gere Block is a fitting one, given its own past. At first, Gere Block was a warehouse, servicing boats on the Erie Canal. Then it was used to produce fire trucks and paint. You can still see slivers of the buildings limestone foundation, and its tattered walls bear witness to stagnation in Syracuses deindustrialized economy since the Nixon era. All of this makes Gere Block a fitting choice to host the show, and function as a center for conversation about the Rust Belts past, present, and future. The animals are mobile, utilitarian objects made from reclaimed on-site materials like shelves and wooden structures, the curators said in a statement.Foliage abounds at the group show. (Anna Morgowicz/ESTO)(Anna Morgowicz/ESTO)Disassembled, cleaned, painted, and reassembled, these pieces reinterpret architectural elements such as platforms, walls, benches, pyramids, curtains, and columns, the curators continued. The interventions prioritize minimal impact on the building, fostering a flexible, temporary use during its renovation phase. This approach, curators said, was a cost effective and inclusive model that could be a case study for utilizing former industrial spaces in towns like Syracuse.The curators of the show assembled in the gallery space. (Anna Morgowicz/ESTO) Animals opened on May 31 and wasjust the first effort by group collective to reimagine Gere Block. More recently, the group was awarded an Independent Projects grant from New York State Council on the Arts and The Architectural League of New York for $10,000. The 25 awarded proposals encompass a range of design disciplines and engaging locales throughout New York State and were selected by a panel of design experts.The grant will fund a second iteration of group collectives work, titled In-Process: Alternative Methods in Reading Evolving Buildings. This exhibition will feature new and archival drawings, photographs, and models alongside the animals, with the goal of presenting the Gere Block as a case study for reimagining abandoned industrial buildings as spaces in a state of continual construction, Rodriguez, a member of group collective, cofounder and principal of operadora, and assistant professor at Syracuse University, shared.Additionally, in the text published with the announcement of the Independent Projects grant, the curators stated that the exhibition will display how to read and revitalize existing building stock in post-industrial cities, inviting visitors to engage with strategies of continual adaptation and collective narratives in their own built environments.In-Process: Alternative Methods in Reading Evolving Buildings will open in April 2025.
    0 Комментарии 0 Поделились 12 Просмотры
  • WWW.ARCHPAPER.COM
    ANs 2024 Holiday Gift Guide curates presents for all types of architects and designers
    A gift often says more about the gifter than the giftee. A good gift is fine-tuned to its recipient but nothing so obvious that the gifts creativity doesnt surprise and delight. The right gift then, tells the recipient that the gifter really does know themand has good taste. If the task wasnt daunting enough, its particularly challenging to buy for people whose vision is always exact and precisein other words, for architects and designers.ANs 2024 Holiday Gift Guide is calibrated to meet the standards of even the most scrupulous. It features gifts for all types of designers: those working in interiors, landscapes, structural engineering, furniture, and moreand features many objects designed by peers in the industry. Organized by increasing price, the following list ranges from art, models, decor, and toys, a resource for those in search of holiday gifts for architecture students, colleagues, principals, and architectural aficionadosincluding yourself.$50 and UnderThe Pattern Book Greeting CardCooper Hewitt, Smithsonian Design Museum | $6(Courtesy The Pattern Book)The Pattern Book finds graphic design inspiration in technical drawings and scientific illustrations. The Holiday editions include patterns found in snowflakes, as well as an interpretation on winter landscapes, an apt holiday card for those who appreciate technical details and terrain.Eames x Art of Play: Hang-It-All Playing CardsEames Office | $13.50(Courtesy Eames/Art of Play)Now in new colors, the Hang-It-All Playing cards are made in collaboration with Art of Play. Theyre inspired by the works of Charles & Ray Eames which manifests as a graphic series of lines and circles.Luna Luna Andr Heller Dream Station Porcelain MugMoMA Design Store | $24(Courtesy MoMA Design Store)This funky mug comes from the newly re-exhibited exhibitionLuna Lunawhich first debuted in 1987. Within, the shows art director Andr Heller designed an inflatable, spiked balloon sculpture that served as a cafe. This mug takes after Hellers fun vision.Modernist Weekly Planner 2025Blue Crow Media | $31(Courtesy Blue Crow Media)This weekly planner celebrates modernist interiors from the likes of Alvar and Aino Aalto, Hans Asplund, Jean Balladur, Eileen Gray, Walter Gropius, and more architects. Printed on environmentally friendly paper, the planner features a space for notes as well as blank space for each day of the weekthe perfect gift for architects who need to stay organized.Tortoise Chop SticksQuarters | $34(Courtesy Quarters)In Common With and its new showroom and bar Quarters celebrates artisan and craftsmanship. The shop, located within Quarters, is no different. These tortoise chopsticks are not only visually stunning, but they are also hand-crafted by a family-owned manufactory founded over 150 years ago.Special Edition New York MapUrban Omnibus | $50(Courtesy Urban Omnibus)In commemoration of Urban Omnibus 15th anniversary, the team has partnered with artist Stipan Tadi to create a special map of New York that highlights the physical supports for everyday life in New York. From infrastructure and housing to public spaces and neighborhoods, the map collects projects and places that explore social concerns.Under $100Blockitecture Frank Lloyd Wright UsonianAreaware | $60(Courtesy Blockitecture)From New Yorkbased designer James Paulius, these building blocks reference Frank Lloyd Wrights Usonian homes. The kit features a honeycomb grid system similar to the ones Wright used, and it can create various stacks, supports, and structures for endless playtime for little architects-in-trainingor adult ones, too.Gustaf Westman x Home in Heven OrnamentsHome in Heaven | $75+(Courtesy Heven)Stockholm-based furniture and object designer Gustaf Westman collaborated with homeware and fashion brand Home in Heaven for a fun glassware collection. In addition to Westmans signature chunky, heavy plates and cup sets, now rendered in glass, the partnership includes ornaments that take after both the fashion lines tongue-in-cheek ethos and Westmens penchant for play.Jug EMILY SkyHome Studyo |$80(Courtesy Home Studyo)Residing in the middle space between collectible design and mass production, Home Studyo aims to bring handmade objects to a more approachable level. The designers do so with the illusory jug whose inflatable-like edges disguise its ceramic materiality.Symmetry Collection BowlStudio Jialun Xiong | $85(Victor Yuan Chen)Jialun Xiong is a Los Angelesbased architect and designer known for her high-drama yet restrained approach. She applies the same methodology to interiors as well as products like her new symmetry collection. It includes a porcelain bowl that seeks, as its name suggests, perfect symmetry with elegant and sophisticated results.Ceramic PlateOWIU Goods | $90(Courtesy OWIU Goods)A gift for architects from architects: This ceramic plate is by OWIU Goods, the ceramic goods line of the Los Angelesbased architecture firm OWIU. The studio began its own ceramics line after offering employees a membership at a ceramic studio as part of a mental health benefit. It was such a hitwith employees as well as clientsthat it became its own branch that works in tandem with the architects.Yinka Ilori Radiant Blooms Recycled Leather Placemats Set of 4MoMA Design Store | $95(Courtesy MoMA Design Store)Designer Yinka Ilori made a splash at this years NeoCon when he debuted his colorful and geometric collaboration with Momentum. These placemats take after the same design language with a functional and sustainable approach.Anna G. CorkscrewAlessi | $99(Courtesy Alessi)Celebrating the iconic corkscrews originally designed by Alessandro Mendini, Alessi has relaunched the product in three new collaborations that cross disciplines: Arthur Arbesser, Studio Temp, and Fulvia Mendini. Each puts their own take on the design with new clothes for the figural corkscrews using a new, plastic-like, bio-composite material.Over $100Chirp No. 13 GEHRYChirp Birdhouses | $109(Courtesy Chirp Birdhouses)When ONY Architectures Nima Yadollahpour made an architectural birdhouse with his daughter to protect some local chicks, it blossomed into a father-daughter venture: Chirp Birdhouses. The brands latest edition of architecture-forward homes for birds is modeled after Frank Gehry and his deconstructive ethos. The avian home features a continuous textured roof form that breaks apart and folds into itself. Its best suited for White-Breasted Nuthatches, Titmice, and Wrens.Shoulder Bag ArchitectGRNBAG | 134(Courtesy GRNBAG)Working closely with architectural firm Pluskontoret, GRNBAG developed the quintessential work bag for architects. It features three inner pockets to organize a binder and A3 format, a laptop, and smaller notepads or writing utensils. On the exterior there are two outer pockets to carry water bottles or a camera and charger. The bag is made of leftover material from tarpaulin production in Denmark so its durable enough to take on construction sites yet sleek enough to transition to meetings and other events.Plus HooksGoux Studio | $150(Esther M. Choi)Brooklyn-based Goux Studio riffed on a single form to create multiple possibilities. The form in question: a plus-shape extrusion. Graphic and elemental, its used to create hang jackets, towels, and (in one iteration) plants, and, due to the symmetry and connection to the wall, the hooks get stronger with the more weight thats added. They can also be paired with one of the studios boards to create floating shelves.Mola Kit 1Mola | $189(Courtesy Moto)Mola began when architecture student Marcio Sequeira wanted a hands-on model for his studies on structural behavior but couldnt find one to suit his needs. So he made his own. The result is Mola Kit 1, a set that simulates different structural systems with over 100 configurations. Its a tangible way to learn about connections, tension members, columns, beams, frames, and trussesa stimulating gift for students, educators, or structural engineering enthusiasts.DUO Salt & Pepper Grinder SetZaha Hadid | $190.50(Courtesy Zaha Hadid Design)A kitchen staple made sculptural, the DUO set by Zaha Hadids design team evokes a pair of twisting towers, as theyre comprised of aluminum in two parts, each of which twists to form a triangular peak. As expected of something devised by architects, the salt and pepper grinders are striking on the table, in plan, and other angles.Skateboard & Walnut DishAdrianMartinus Design | $254(Courtesy AdrianMartinus Design)Brothers, skateboarders, and carpenters, Adrian and Martinus Pool were frustrated with construction material waste. The duo, founders of AdrianMartinus Design, decided to find new life for hardwood floors and old skateboards, creating homeware that mixes and matches these repurposed material. The Skateboard & Walnut dish does so with clear contrast, made from repurposed skateboards and offcuts from their furniture production.Tarp 01a83 | $300(Courtesy Gus Crain/A83)This print by Gus Crain was exhibited recently in a83s group exhibition, Architectural Drawing III.Crain presented his Ongoing Constructionseries, which depicts familiar objects in American construction rendered in precise drawings.Bocci 14pAesop | $360(Courtesy Bocci)14 is Boccis first product, a pendant light designed by Omer Arbel in 2005. The portable version, 14p, continues to capture the allure of the original designs embrace of material integrity and imperfection, featuring two hemispheres that touch along imprecise edges with air bubbles introduced as the glassblower fills the molds. This year, Bocci collaborated with Aesop to render the 14p in the body brands iconic amber hue.Real BougieMenorahMA-MA | $650(Courtesy MA-MA)Design and interiors studio MA-MA, led by Sanam, Laylee, and Safura Salek, offers a sleek, minimalist take on a menorah. Two aluminum slabs sit atop one another and rotate around their connection to reveal a new candle holder for each day of the holiday. The highly reflective metallic exterior of the Menorah aims to amplify the candle light beyond the object itself.Untitled (Grids)LAND Gallery + Blu Dot | $850(Courtesy Robert Latchman/Blu Dot)This print is a gift that gives back: 100 percent of each purchase goes directly to the artist as part of Blu Dots Art Mode collection. The gridded artwork depicts the structure of the Brooklyn Bridge, made by artist Robert Latchman who lives in Brooklyn and was born in Trinidad.The TWA Flight Center Desk ClockVulcain | $1,300(Courtesy Vulcain)The iconic clock that hangs down from TWA terminal at JFK Airport has now been reissued in a smaller, more compact format suitable for desks. The reissue remains faithful to the original design with a 316L stainless steel body and an iridescent warm light grey finish.Wicker Dog BedCharlap Hyman & Herrero | $1,500(Courtesy Charlap Hyman & Herrero)Dogs appreciate design, too, and certainly designers love their furry ones. Charlap Hyman & Herrero certainly do, designing a sophisticated bed to show some much-deserved love to pups. This resting place features an integrated cushion and bolsters consisting of a wicker and steel base which floats on glossy black spheres.LEBOND SOUTO MOURA ORIGINALLebond Watches | 2,700(Courtesy Lebond)Eduardo Souto de Moura designed a light, restrained timepiece for Lebond. The face is rotated 30 degrees to improve readability when looking at it on a wrist. The piece is exceptionally light, featuring a case that measures only 7.6 millimeters in thickness. The minimalist timepiece is both elegant and comfortable.
    0 Комментарии 0 Поделились 13 Просмотры
  • WWW.FOXNEWS.COM
    6 sneaky gift card scams to watch out for this holiday season
    Published November 27, 2024 10:00am EST close CyberGuy on how to spot holiday scammers Kurt Knutsson delves into his top four ways of spotting holiday scams as Americans begin their Christmas and New Years shopping. With the holiday season just around the corner, many of us are gearing up to spread some cheer with gift cards.However, its important to remember that these convenient gifts are also a favorite target for scammers. We're going to break down six sneaky gift card tricks that could leave you out of pocket during this time of year.Dont worry, though. Weve got your back with solid tips on how to outsmart these scammers and keep your hard-earned cash safe. Image of a holiday gift card (Kurt "CyberGuy" Knutsson)1. Display rack gift card trickOne of the latest gift card tricks involves tampering with the gift cards on the display racks at retail stores. Scammers will record the activation code on the card or place a custom barcode sticker over the real barcode, which allows them to secretly load the cash onto their own card immediately after you purchase the gift card. This means that when you or your recipient try to use the gift card, it will be empty or invalid.How to avoid this scamCheck the packaging of the gift card before buying it. Look for signs of tampering, such as the wrapping being torn or resealed or stickers placed over the barcode or card number. Also, choose a card from the back of the rack, as scammers often place their fraudulent cards at the front of the display. Fake scratch-off label on top of already scratched-off gift card label (Kurt "CyberGuy" Knutsson)2. Impersonation gift card trickAnother common gift card trick scammers use involves impersonating someone you know or trust, such as a family member, a romantic interest, a company or the government. Scammers will contact you by phone, text, email or social media and create a fake story or emergency that requires you to send them money urgently.They will ask you to buy a gift card or multiple gift cards and then send them a photo of the card or the numbers on the back of the card. Once they have the gift card information, they will disappear with your money and cut off contact.How to avoid this scamNever send money or gift cards to anyone you dont know personally or havent met in person. If someone claims to be someone you know or trust, verify their identity by contacting them directly through a different channel.Dont trust caller ID, as scammers can spoof phone numbers. Dont be pressured by threats or promises, as scammers use emotional manipulation to get you to act quickly and without thinking. And remember, no legitimate company or government agency will ever ask you to pay them with a gift card. A person holding a gift card (Kurt "CyberGuy" Knutsson)3. Resale gift card trickAnother gift card trick involves buying or selling gift cards on online platforms, such as websites, apps or social media groups. Scammers will offer to sell you gift cards at a discounted price or buy your unwanted gift cards for cash.However, they will either send you a fake or empty gift card or take your gift card information and money without sending you anything in return. They may also use stolen credit cards or hacked accounts to buy or sell gift cards, which can put you at risk of fraud or identity theft.How to avoid this scamOnly buy or sell gift cards from reputable sources, such as official retailers, authorized resellers or trusted friends and family. Avoid buying or selling gift cards from strangers online, especially if they offer a deal that sounds too good to be true.Dont share your gift card information or personal details with anyone you dont know or trust. And use a secure payment method that offers protection, such as a credit card or PayPal, instead of a gift card, wire transfer or cash. A person giving a gift cardas a present (Kurt "CyberGuy" Knutsson)4. Phishing gift card trickA very popular gift card trick this holiday seasoninvolves phishing, which is a type of online fraud that tries to trick you into revealing your personal or financial information. Scammers will send you an email, text or pop-up message that looks like it comes from a legitimate company, such as a retailer, bank ortech support service.They will claim that there is a problem with your account, your order, your device or your security and that you need to verify your identity, update your information or fix an issue. They will then ask you to click on a link, open an attachment or call a number and then request that you pay them with a gift card or provide them with your gift card information.How to avoid this scamNever click on links, open attachments or call numbers from unsolicited messages, as they may lead to fake or malicious websites or software. Dont provide any personal or financial information, such as your passwords, PINs, account numbers or gift card numbers, to anyone who contacts you unexpectedly.Dont trust messages that create a sense of urgency, pressure or fear, as they are designed to make you act without thinking. If you have any doubts about the legitimacy of a message, contact the company directly using a verified website, phone number or email address.Using antivirus protection will help to protect you against scammers and hackers who try to steal your money and personal information using gift card tricks, especiallythrough phishing. The best way to protect yourself from clicking on any malicious links, fake websites, phishing emails and text messages is to have strongantivirus protection installed and actively running on all your devices. Its the best to help stop and alert you of any malware in your system and ultimately protect you from being hacked.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices. A person purchasing a gift card online (Kurt "CyberGuy" Knutsson)5. Loyalty program gift card trickThis gift card trick involves loyalty programs, which are rewards programs that offer you points, discounts or freebies for being a loyal customer. Scammers will pretend to be representatives of a loyalty program that you are a member of or that you are eligible to join.They will tell you that you have won a prize, sweepstakes or a promotion and that you need to pay a fee, a tax or a shipping cost to claim it. They will then ask you to pay them with a gift card or provide them with your gift card information.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?How to avoid this scamBe wary of any unsolicited offers or notifications that claim that you have won something, especially if you dont remember entering or signing up for anything. Dont pay any money or fees to receive a prize, as legitimate loyalty programs will never ask you to do that. Dont provide any personal or financial information, such as your passwords, account numbers or gift card numbers, to anyone who contacts you unexpectedly.Dont trust messages that create a sense of excitement, curiosity or greed, as they are designed to make you act impulsively. If you have any doubts about the legitimacy of a message, contact the loyalty program directly using a verified website, phone number or email address. A person purchasing a gift card online (Kurt "CyberGuy" Knutsson)6. Fake balance checker scamIn this scam, fraudsters set up fake websites or phone services that claim to check the balance of your gift cards. Victims are lured into providing their gift card numbers and PINs under the guise of verifying their balance. Once the information is entered, scammers can drain the funds from the card almost immediately.How to avoid this scamTo avoid this scam, always use official websites or apps from reputable retailers to check your gift card balance. Be wary of unsolicited calls or messages asking for your gift card information, especially if they claim to be from a legitimate company. It is important never to enter your gift card details on unfamiliar websites.How to safely give and receive gift cardsBuy gift cards online instead of physical cards directly from the store, not from third parties.You can also usethese favorite sites and apps that will reward you with a percentage back on all gift card purchases.Avoid gift card racks at retail stores like the grocery store. If you still want to buy one at the store, dig back into the pile without taking the first ones off the rack. Inspect them like a detective before you buy them to make sure they are unaltered.Register the gift card directly with the retailer if offered, which also helps track the card balance.Never engage in any gift card transactions from callers making unusual claims. It is likely a scam.Avoid buying gift cards from online auction sites like eBay.Never provide personal financial information beyond a method of payment to anyone offering gift cards in-store or online.Use strong antivirus protection. Strong antivirus software is a must-have to protect against scammers and hackers who try to steal your money and personal information using gift card tricks, especially through phishing. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.I've been scammed! What to do next?Below are some next steps if you find you or your loved one is a victim of identity theft as a result of a gift card trick by scammers or hackers.1. If you can regain control of your accounts,change your passwords and inform the account provider.2. Look through bank statements and checking account transactions to see where outlier activity started.GET FOX BUSINESS ON THE GO BY CLICKING HERE3.Use an identity theft protection service: Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.Some of the best parts of using an identity theft protection service include identity theft insurance to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case manager helps you recover any losses.See my tips and best picks on how to protect yourself from identity theft.4.Report any breaches to official government agencies like the Federal Trade Commission and thegift card company.5. Get the professional advice of a lawyerbefore speaking to law enforcement, especially when you are dealing with criminal identity theft and if being a victim of criminal identity theft leaves you unable to secure employment or housing.6. Alert all three major credit bureaus and possibly place a fraud alert on your credit report.7. Run your own background check or request a copy of one if that is how you discovered your information has been used by a criminal.If you are a victim of identity theft because of a gift card scam, the most important thing to do is to take immediate action to mitigate the damage and prevent further harm.Kurt's key takeawaysAs we head into the holiday season, its important to keep an eye out for these six gift card scams weve talked about. If something feels off or sounds too good to be true, trust your gut and dont be afraid to ask questions or walk away. Gift cards are meant to bring joy, not stress, so keep these tips in mind as you shop and share this season.CLICK HERE TO GET THE FOX NEWS APPHave you ever fallen victim to a gift card scam? If so, how did it happen, and what did you do?Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Комментарии 0 Поделились 13 Просмотры
  • WWW.FOXNEWS.COM
    Talk in 2 languages with Apple Watch's real-time translation
    Tech Talk in 2 languages with Apple Watch's real-time translation Beam me up Scotty with app that translates languages like 'Star Treks' fictional communicator Published November 27, 2024 6:00am EST close Talk in 2 languages with Apple Watch's real-time translation Apple Watch has become a powerful translation tool. Imagine strolling through the bustling streets of Tokyo ordering a delicious bowl of ramen or navigating the charming alleyways of Rome all while effortlessly communicating with locals in their native tongue.Thanks to the latest update in WatchOS 11, yourApple Watch has transformed into a powerful translation tool, breaking down language barriers with the Translate app. The Translate app on Apple Watch. (Kurt "CyberGuy" Knutsson)Say goodbye to language barriersGone are the days of fumbling with translation books or frantically typing into your smartphone. With the new Translate app onApple Watch, you can have live, two-way conversations in up to 20 different languages right from your wrist. It's like having a personal interpreter always at your service.Ensure your Apple Watch is running WatchOS 11 or higherGetting started with this feature is a breeze, but first, ensure your Apple Watch is running WatchOS 11 or higher. To do this:Go to Settings.Tap General.Then tapSoftware Update to check for and install any available updates. Steps to update your Apple Watch software. (Kurt "CyberGuy" Knutsson)HOW TO MONITOR BLOOD PRESSURE WITH YOUR APPLE WATCHSetting up Apple Watch's Translate appOpen theTranslate app from your Apple Watch's Home Screen.Tap theellipsis icon.Next, adjust theplayback speed and enableAuto-Play Translations, which will automatically play the translated phrases out loud, ensuring that both you and the person you're communicating with can hear and understand the translations without needing to look at the screen. Steps to set up Translate app on Apple Watch. (Kurt "CyberGuy" Knutsson)Scroll down and tapPreferred Input.Then tapVoice orText,whichever you prefer. Steps to set up Translate app on Apple Watch. (Kurt "CyberGuy" Knutsson)Now, scroll down and tap onDownloaded Languages.Select and download yourpreferred languages for offline use.Set your input andoutputlanguages for conversation. As you can see below, we selected English as our input language and Spanish as our output language. Steps to set up Translate app on Apple Watch. (Kurt "CyberGuy" Knutsson)How to use real-time translation on your Apple WatchOpen theTranslate app on your Apple Watch.Tap themicrophone iconandspeak or type a phrase into the app.Your Apple Watch willautomatically translate the phrase into the selected output language.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Steps to use real-time translation on your Apple Watch. (Kurt "CyberGuy" Knutsson)Now, you can listen to thetranslation orread it on the screen. You can also hitplay to replay the audio translation.To delete the translation, swipe left, then tap trash to delete it.Adjust settings if needed using theellipsis icon forplayback speed andAuto-Play Translations.GET FOX BUSINESS ON THE GO BY CLICKING HERE Steps to use real-time translation on your Apple Watch. (Kurt "CyberGuy" Knutsson)Tips for smooth conversationsTo get the most out of your new linguistic superpower, remember to:Always double-check the input language before speaking.Adjust thevolume for clear audio in noisy environments.Experiment withtranslation speed to find your sweet spot.Kurt's key takeawaysWith the Translate app onApple Watch, the world truly feels smaller and more connected. Whether youre exploring new cities, mingling with locals or conducting business abroad, this feature allows you to communicate naturally and confidently across languages. No more frantic searches for translations or misunderstandings over key phrases; your Apple Watch makes it simple.CLICK HERE TO GET THE FOX NEWS APPWhat other features would you like to see added to translation apps to enhance your communication experience? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Try CyberGuy's new games (crosswords, word searches, trivia and more!)Enter CyberGuy's $500 Holiday Gift Card SweepstakesBest gifts forMen |Women |Kids |Teens |Pet loversFor those who love: Cooking |Coffee |Tools |Travel |WineAccessories: Car |Kitchen |Laptop |Keyboards |Phone |Travel |Keep It CozyCant go wrong with these: Gift Cards | Money-saving apps | Amazon Black Friday insider tipsCopyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Комментарии 0 Поделились 12 Просмотры
  • WWW.COMPUTERWEEKLY.COM
    Further disruption expected after latest NHS cyber attack
    Merseyside residents are facing a third day of significant disruption to healthcare services in the area, following a major cyber attack on Wirral University Teaching Hospitals NHS Foundation Trust.The cyber attack, which initially came to light on Monday 25 November, is believed to have affected all clinical activity at multiple sites including Arrowe Park and Clatterbridge Hospitals. The Trust has been forced to cancel surgical procedures and turn away outpatients, although emergency care remains up and running.In the wake of the attack, staff members told The Liverpool Echothey had been locked out of their IT systems and were unable to access patient records, leaving them forced to resort to manual procedures. Based on what is known of the nature of the incident, it appears to resemble a ransomware attack.In a statement published on Tuesday 26 November, a spokesperson for the Trust said: A major incident was declared at the Trust for cyber security reasons and the incident remains ongoing.We are working to rectify the issue and our business continuity processes are in place, they added. Our priority remains ensuring patient safety. Some outpatient appointments scheduled today and tomorrow are cancelled. Where appointments have been cancelled, we have contacted patients directly. We apologise for any inconvenience and we will contact our patients as soon as possible to rearrange.Maternity services are running as normal. All antenatal appointments, community midwife appointments, scans and post-natal visits are continuing as usual. Please still attend maternity appointments unless contacted otherwise. The 24-hour emergency triage service is running as normal.We urge all members of the public to attend the Emergency Department only for genuine emergencies, the spokesperson said. For non-urgent health concerns, please use NHS 111, visit a walk-in centre, urgent treatment centre, your GP, or pharmacist.Read more about security in the NHSThe two NHS Trusts most heavily impacted by the Qilin ransomware attack on pathology services provider Synnovis have cancelled over 6,000 appointments and procedures in the space of five weeks.Clinicians warn that the NHS England Outcome Registries Platform has poor security and is vulnerable to cyber attack, putting critical patient data at risk of being exposed.To save the health service, Labour is focusing on bolstering the NHS app and enabling greater sharing of patient records in England.The National Cyber Security Centre (NCSC) and the Information Commissioners Office (ICO) have both been informed of the attack, but as is usual in the wake of such an incident, the Trust has not released any additional details.Most cyber attacks cause frustration and financial disruption, but when hospitals are involved, genuine health issues can be affected, making this type of attack that much more sinister, said Jake Moore, global cyber security advisor at ESET.Hospitals, councils and other local government agencies continue to lack funding and consequently do not have the strongest network protection. They may even still rely on legacy software. This in turn makes them an easy target for those looking to exploit any weaknesses.The government needs no extra proof that our local agencies need further resources as these types of attacks are not showing any signs of slowing down, he added.Assuming Wirral University Trust has fallen victim to ransomware, such attacks on healthcare services are generally calculated, intentional intrusions because threat actors know such organisations are more likely to pay them off.Indeed, according to a July 2024 survey conducted by identity specialist Semperis, 66% of global healthcare organisations had paid a ransom, perhaps unsurprising given that maintaining their services is a critical endeavour.Semperis area vice-president for EMEA west Dan Lattimer said: Its imperative for hospitals to conduct day-to-day operations assuming breaches will occur. Overall, ransomware attacks cause disruptions and cast doubt, cut into profits, and in some cases can be a matter of life and death. Preparing now for inevitable disruptions will dramatically improve hospitals operational resiliency and better prepare them to turn away adversaries, leading the threat actors to softer targets downstream.He said there was no one silver bullet to solve the cyber challenges facing hospitals, but that best practice was to first identify critical single points of failure for the organisation and develop an incident response plan, keeping in mind that in the vast majority of ransomware attacks, cyber criminals will target their identity systems to access the most vital data.In the case of hospitals, [this] is patient data and other forms of proprietary information, said Lattimer. So have a plan to increase the operational resiliency of Active Directory and back it up so that if a cyber attack occurs, it can be restored quickly.
    0 Комментарии 0 Поделились 13 Просмотры
  • WWW.COMPUTERWEEKLY.COM
    In the cloud, effective IAM should align to zero-trust principles
    In todays digital landscape, the traditional security perimeter has dissolved, making identity the new frontline of defence. As organisations increasingly adopt cloud services and remote work models, managing and securing identities has become paramount. Effective Identity and Access Management (IAM) practices are essential for IT departments to safeguard against cyber-attacks, phishing attempts, and ransomware threats. By implementing robust IAM strategies, organisations can ensure that only authorised individuals have access to critical resources, thereby mitigating potential security risks. Lets dive into the most important things to focus on, all of which are aligned to core zero-trust principles.One of the main drivers fuelling the ongoing adoption of cloud technology is the unparalleled ease of access to resources from anywhere, from any device, at any time of day. In practical terms though, it would be short-sighted to allow this level of unchallenged access without verifying that the access requests are being made by the correct person. After all, we still live in an age where usernames and passwords are often written down near the devices theyre used on. IT security teams should have sturdy mechanisms in place to explicitly verify these access requests so that there can be confidence assigned with allowing access, especially from unrecognised network locations.Some examples of how this could look in practice would be by using strong multi-factor authentication (MFA) methods to secure requests. Strong methods include approving an access request via a notification in your chosen authenticator app on a smart device (already using biometrics to be unlocked) or by using a number matching prompt so that the requestor must manually enter the correct answer in their app before access is granted. These methods help skirt some of the growing techniques attackers are using to try and get around MFA prompts: namely, SIM-swapping and MFA fatigue. The emergence of these MFA-focused attack techniques demonstrate that attackers will always try to stay one step ahead of emerging security features.MFA isnt the be-all-and-end-all when it comes to identity security though. Its merely the first hurdle that security teams must place between an attacker and their goal of compromising an environment. The more hurdles that are in place, the more likely an attacker will give up and move to an easier target. MFA will deter most attackers, but not all.User and Entity Behavioural Analytics (UEBA) is another modern technique that can provide an additional layer of security. Regardless of whether an attacker has managed to get by the MFA hurdle theyve encountered, UEBA consistently monitors the different metrics that are generated when a user interacts with the cloud platform. Any deviations from whats considered normal for that user are assigned a risk score, and if enough anomalies are caught, it can force the user into a password reset experience, or even lock the account altogether until the security team is satisfied that the account hasnt been compromised.These techniques demonstrate a small piece of what can be done to bolster the IAM platform to be more resilient to identity-focused attacks. Where this will inevitably move to in the future will be in protecting against the use of AI-generated deepfakes. AI technology is also becoming more accessible to everyone this includes bad actors too! Using features in Microsoft Entra like Verified ID, including having to perform real-time biomimetic scans to prove authenticity, will be commonplace soon, ensuring that when someone gets that call from the CFO at the end of a Friday afternoon to approve huge invoices for payment, they can have confidence theyre speaking with their CFO, and not an AI-generated video call.As organisations grow and evolve, so do the permissions and privileges that are provisioned to make the technology work. Over time, identities can accumulate huge amounts of different al-la-carte permissions to perform very specific tasks. If these permissions arent right-sized regularly, it can mean that some identities can carry huge amounts of power over the IT environment. Lets cover some concepts that help mitigate this risk.Role Based Access Control (RBAC) is a way to consistently provision pre-mapped permissions and privileges to suit a specific role or task. These pre-defined roles make it easy to provision the correct amount of rights for the task at hand. Cloud platforms such as Microsoft 365 and Azure come with many roles out of the box, but also allow for custom roles to suit the needs of any organisation. Its recommended to use RBAC roles as much as possible, and this goes doubly so for when implementing the next technique.Just-in-time (JIT) access takes RBAC a step further. Instead of having identities stacked with elevated permissions and privileges 24 hours a day, JIT access grants elevated rights on a temporary basis. Microsoft Privileged Identity Management is an example of a JIT tool, and allows appropriate identities to temporarily upgrade their permissions to a predetermined RBAC role, and can include additional checks and balances like approvals, forcing an MFA approval, email notifications or customisation options for how long individuals can get access to a certain permissions. Ultimately, this means that if those accounts with access to higher privileges are compromised, it doesnt necessarily mean that the bad actor will be able to exploit those permissions.In addition to using modern IAM techniques and technologies to keep rights and permissions right-sized, its also important to ensure that there are processes in place to ensure good identity hygiene practices. This can come in many forms, but if focusing on Microsoft Entra solutions, we can highlight two specific tools that can help make these processes work smoother than a manual effort. Firstly, access reviews can be used to periodically check identities in an environment and provide an indication of who has been using their elevated rights or not. This leaves service owners empowered to make decisions about who should be left in permission groups or not. This is also a fantastic way of auditing external collaborators who have been invited into your tenant via Entra B2B.Access Packages are another way of keeping permission enablement standardised. Applications, groups, cloud services and more, can be grouped into a single package, for example, Entry-level Accounting may be a package created that grants access to payroll software, viewer access to multiple SharePoint sites and a specific Microsoft Team. Once that person is removed from the access package, for example, if they were to move departments, or get promoted, removing them from this single Access Package will remove all associated access to the bundle of services. This means that stagnant permissions are less likely to accumulate on a given identity.Even with all the best security tools available, organisations are never 100% immune from attacks. Facing this reality is a key part of a successful security strategy. Its important to always assume a breach is possible and to increase your resilience so that responding to attacks isnt a daunting experience. A couple of concepts can be introduced to help out here.Firstly, the idea of continuous authentication is important to embrace. Instead of adopting the mindset of user X has successfully performed an MFA request therefore Ill grant all the access theyve asked for, seems to complement some of the concepts already covered in this article, but as highlighted earlier, attackers are always going to try to get one step ahead of security tooling, and so its vital that limits are put on access, even if the user seems to be doing everything correctly. Nothing does this better than altering the sign-in frequency that users will be subjected to, especially if access content from outside of the organisation network boundary. Note though, there is an important balance to be struck between enforcing sound security practices and impacting the user experience so the point of frustration. Adaptive Access Controls can also be utilised to galvanize decision-making on access requests. For example, if User X is logging on from their registered device, within the organisational network boundary, to a SaaS platform they use every day that poses minimal risk. Access should be granted in most instances here. However, take User B who is logging on from an external IP address thats a recognised anonymous VPN platform, on an unregistered device, looking to download mass amount of information from SharePoint. This could be a legitimate request, but it also could be signs of identity compromise, and real-time adaptive controls such as the Sign-in or Risk policies in Entra ID Protection can help to keep resources better protected in these scenarios.In summary, implementing a zero-trust security model with a focus on IAM is essential for combating cyber attacks, phishing, and ransomware. By adopting principles such as verify explicitly, least privilege and assume breach, organisations can significantly reduce the risk of unauthorised access and lateral movement within their networks. Technologies like MFA, JIT access and UEBA play a crucial role in enforcing these principles. Additionally, continuous monitoring, identity analytics, and deception technologies help detect and respond to potential breaches swiftly, ensuring a robust and resilient security posture.The Security Think Tank on cloud IAM
    0 Комментарии 0 Поделились 13 Просмотры
  • 0 Комментарии 0 Поделились 13 Просмотры
  • WWW.ZDNET.COM
    Hulu's Black Friday deal is back: Get 1 year of Hulu for $0.99 a month, but sign up soon
    Hulu's Black Friday deal drops the price of a monthly subscription to the streaming service from $7.99 to $0.99 a month for your first year. Don't miss out.
    0 Комментарии 0 Поделились 13 Просмотры
  • WWW.FORBES.COM
    Fewer Fast Food Outlets Might Help Prevent Childhood Obesity: Study
    BANGKOK, THAILAND - JUNE 08: McDonald's french fries on June 08, 2024 in Bangkok, Thailand. ... [+] International fast food chains such as McDonald's, KFC and Burger King are wildly popular in Southeast Asia, with the brands found in nearly every major city and town in the region, a reflection of the brands' global appeal and reach. (Photo by Lauren DeCicca/Getty Images)Getty ImagesMore than 390 million children and adolescents were overweight or obese as of 2022, according to the World Health Organization. A recent study suggests that one way to prevent those in the 5 to 19 age group from becoming obese is to restrict the number of fast food outlets in all neighborhoods.The causes of childhood obesity are complex and multifaceted. However, environmental factors play an important role in the prevalence of childhood obesity. There has been evidence showing that the out-of-home food environment has impacts on childhood energy intake. In particular, fast-food consumption and the location of fast-food outlets are strongly associated with a higher energy intake and a higher prevalence of childhood obesity, the researchers explained in the study.The density of fast-food outlets is the number of fast-food outlets per 100,000 residents, and it has been rising across England. Data from the Food Standards Agency show that the average density of fast-food outlets increased from 142 to 170 per 100,000 residents between 2019 to the end of 2021. Areas of higher deprivation have five times as many fast-food outlets compared to more affluent areas. This may be a contributing factor to inequalities in childhood weight, they added.The team of researchers studied the data of food outlets in England from the Food Standards Agency Food Hygiene Rating Scheme (FSA FHRS), which the government agency collected from 2012 and 2020. The team also analyzed data on childrens weight from the National Child Measurement Programme (NCMP). They found that underprivileged areas had the highest proportion of fast food outlets.In a press release, Alice Wiseman from the Gateshead Council and Newcastle Council said: Creating environments that support access to healthy, affordable food is one of the biggest public health missions of our generation. The challenge of healthy weight and access to nutritious food is complex, ever-changing, and hard to resolve. There is no silver bullet, and several interventions are needed to create real, impactful, and lasting change.MORE FROMFORBES VETTEDIts great to see when teams across local government come together with full institutional support, how robust planning policies can chip away at such challenges to facilitate healthier and more resilient communities, Wiseman added.Childhood obesity could result in long-term health issues that continue well into adulthood. Prior research has reported that childhood obesity is linked to an increased risk of depression, anxiety, and low self-esteem mainly due to a higher risk of being subjected to bullying and stigmatization. Being obese during childhood is also associated with a higher likelihood of developing type 2 diabetes, cardiovascular disorders, and mental health issues in adulthood.The food environment is changing, with a growing presence of online food delivery available. Future research needs to consider whether and how the online food environment may impact the exposure to unhealthy food and whether existing guidance and legislation needs to be changed to reflect this changing food environment, the authors highlighted. The study was published in the journal Obesity.
    0 Комментарии 0 Поделились 12 Просмотры
  • WWW.FORBES.COM
    COP29 Finance Deal Acknowledges True Scale Of The Climate Crisis
    BAKU, AZERBAIJAN - NOVEMBER 23: COP29 President Mukhtar Babayev hits the gavel at the passage of a ... [+] measure during a first closing plenary. (Photo by Sean Gallup/Getty Images)Getty ImagesClimate talks in Baku ended with a mix of urgency and delay, progress and frustration. The $300 billion climate finance pledge, paired with a target of $1.3 trillion by 2035, offers hope that the world is beginning to marshal the resources needed for meaningful climate action. The $1.3 trillion target in particular, a long-term commitment, signals a shift: the financial scale of global climate action is finally catching up with the scale of the crisis itself. If realised, it could be the game-changer that aligns public and private investment with the realities of the energy transition.Yet alongside this limited progress came a serious failure. Negotiators could not agree on the next step for phasing out fossil fuels, the single largest driver of climate change. Efforts to embed language echoing the landmark UAE Consensus from COP28 were thwarted by a handful of nations representing the vested interests of the fossil fuel industry. Decisions on this critical issue were deferred to next years talks in Belm, Brazil. This failure to confront the damage caused by fossil fuels risks undermining the very momentum that the $1.3 trillion target seeks to create.BAKU, AZERBAIJAN - NOVEMBER 22: Activists protest against fossil fuels and for climate finance at ... [+] the UNFCCC COP29 Climate Conference in Baku, Azerbaijan. (Photo by Sean Gallup/Getty Images)Getty ImagesThe UAE Consensus, forged just last year, marked a watershed moment in global climate negotiations. For the first time, all nations collectively acknowledged the imminent end the fossil fuel era. It sent a powerful signal to markets and investors that the transition to clean energy was no longer a question of if but when. That clarity spurred private sector interest and catalysed plans for renewable energy projects. Baku was meant to build on that foundation, translating recognition into action. It is clear that the uptake of clean energy is unstoppable, now policy makers need to weave in how it replaces fossil fuel energy, so that we can see emission reductions going forward.The onus now shifts to national governments, as they prepare to transform global commitments into domestic action. Ambitious, investible national climate plans (known as NDCs) can serve as roadmaps for how countries plan to reduce emissions, adapt to climate impacts, and transition to clean energy. For businesses and investors, these plans are essential signals, offering the certainty needed to unlock private capital for renewable energy projects, resilient infrastructure, and other climate solutions. Clear, actionable NDCs not only accelerate the energy transition but also attract the private sector funding required to meet the $1.3 trillion target. Nations leaving Baku must ensure their NDCs are not just ambitious on paper but backed by policies that de-risk investments, encourage innovation, and deliver tangible results.MORE FROMFORBES VETTEDThe $1.3 trillion target has the chance to be a turning point. Unlike previous commitments, which often fell short of their ambitions, this pledge has the potential to reshape global climate finance. It acknowledges that the scale of investment must match the scale of the challenge. Meeting this target will require not just public funding but massive private sector mobilization. Innovative mechanisms will be essential to de-risk investments in developing countries, where climate impacts are felt most acutely and where the clean energy potential is greatest.Developing nations face disproportionate risks from climate change, including rising sea levels, extreme weather, and collapsing agricultural systems. Yet their access to finance has been limited by high-risk premiums and underdeveloped infrastructure. The $1.3 trillion pledge could change that by directing both public and private capital toward projects that build resilience and expand access to clean energy.Brazil, Belem: View of the Guama River and the Amazon rainforest. (Photo by Filipe Bispo ... [+] Vale/picture alliance via Getty Images)dpa/picture alliance via Getty ImagesBrazils leadership at COP30 will be pivotal in ensuring these funds translate into action. Hosting the summit in the Amazon, a vital carbon sink and symbol of climate urgency, provides Brazil with a unique platform to push for transformative change. The Amazon is not just a battleground for conservation; it is a reminder of what is at stake in the global climate fight. Brazil must rally nations to advance fossil fuel phase-out, finalise ambitious Nationally Determined Contributions (NDCs), and prioritise equitable finance distribution.The COP process itself came under fire during the summit, but it remains essential, despite its flaws. Climate change is a collective problem that demands collective solutions. No country, however powerful, can tackle it alone. The multilateral underpinning of the COP framework forces nations to confront these challenges together, amplifying the voices of those most affected and holding leaders accountable. However, the system must evolve to meet the urgency of the crisis. Decision-making must become more action-oriented, and the process must be insulated from the influence of nations or industries seeking to slow progress.As we look toward Brazil, the task is clear. The $1.3 trillion target must be operationalised. The fossil fuel phase-out must be brought back to the table and made central to global climate strategy. Mechanisms to mobilise private sector investment must be scaled, and adaptation and mitigation efforts in vulnerable nations must receive the support they need.The climate crisis is accelerating, but so is the momentum for solutions. The UAE Consensus began the end of fossil fuels. The $1.3 trillion goal connects the reality of the crisis with the financial needs. Now, the key is how to grow momentum and mobilization of public and private actors behind both.
    0 Комментарии 0 Поделились 12 Просмотры