• Dune Part Two: VFX Breakdown by Wylie Co.
    www.artofvfx.com
    Breakdown & ShowreelsDune Part Two: VFX Breakdown by Wylie Co.By Vincent Frei - 18/02/2025 Witness the visual effects crafted by Wylie Co. in the opening minutes of Dune: Part Two. Explore the harsh beauty of Arrakis and the dark allure of the Harkonnens in just 15 minutes!Click on the picture to watch the reel.WANT TO KNOW MORE?Wylie Co.: Dedicated page about Dune: Part Two on Wylie Co. website. Vincent Frei The Art of VFX 2025
    0 Kommentare ·0 Anteile ·62 Ansichten
  • 3 Tips to Make Your Bokeh Blurs Epic
    www.thepixellab.net
    3 Tips to Make Your Bokeh Blurs EpicIn this tutorial, Ill share three quick tips for how to make your bokeh DOF blurs pop in 3D. This is in Cinema 4D and Octane, but similar options are available for Redshift, Arnold, Blender, etc. You can even do this in After Effects!These 3 Cinema 4D Tips Will Make Your Bokeh Great!Get this free interior 3D model in our freebies section. Its part of the Hard Surfaces Freebie.Head to the FreebiesWhat Cinema 4D Quick Tips will we learn about?In this tutorial, well go over settings like Bokeh Roundness, Aperture Edge, Aperture Aspect Ratio, and also how to add a custom Bokeh Lens or Aperture Map for even more realism. I hope you learn something new!Want to add even more realism to your Bokeh? Check out Bokeh Pro!Learn More HereWant More Quick Tips?If you want more of these, head to our YouTube channel, leave a comment, and subscribe!Leave a Comment and Subscribe Here
    0 Kommentare ·0 Anteile ·61 Ansichten
  • Simone Swan, legendary adobe advocate and architectural patron, dies at 96
    www.archpaper.com
    Simone Withers Swan, who introduced Nubian vaulted adobe construction to the Chihuahuan desert of Texas and Mexico at the turn of the 21st century, died in Tucson, Arizona, on January 16, 2025. She was 96 years old. Simone Swan was a legendary personality: mercurial, seductive, cultivated, curious, determined, imperious. She was by turns an architectural patron, architectural muse, construction foreman, and construction teacher. Based in New York City, where she started a public relations firm, Swan was recruited by Houston art and architecture patron John de Menil in 1964 to publicize art events associated with Menil and his wife, Dominique Schlumberger de Menil. From 1973 until 1977, Swan was the first executive vice-president of the Menil Foundation. Photographed with Andy Warhol, profiled in newspaper articles alongside Gloria Vanderbilt, Mica Ertegun, and Charlotte Ford, Swan was even the subject of a hit song by Carly Simon (Cow Town, from 1976s Another Passenger).From left: John de Menil, Andy Warhol, Simone Swan, Fred Hughes, Dominique de Menil, and Howard Barnstone in Buckminster Fullers geodesic dome for Expo 67, Montreal, 1967. (Courtesy Menil Archives, The Menil Collection, Houston)In Houston, she was the client for (but never lived in) one of the two original Tin Houses that architect Eugene Aubry designed for her and for gallery owner Fredericka Hunter. Louis I. Kahn was designing a weekend home for her in Southold, New York, the time of his death in 1974. She later commissioned Swan House, which Charles Moore designed for her in 1976 on the same Long Island site. It was a simple but poignant wood house that embodied what was most endearing in Moores architecture. She occupied the home for 25 years; later, she spent summers there and winters in West Texas. During the 1970s, architecture editor Peter Blake prevailed on her to write for his magazine, Architecture Plus, about contemporary architecture in Africa. Swans extensive friendship network included architects Howard Barnstone, Natalie de Blois, Carlos Jimnez, Christopher Genik, and Rick Joy.In 1975, Swan made the acquaintance of the Cairo architect Hassan Fathy. Between 1975 and 1980, she traveled to Cairo numerous times to help Fathy put his papers in order and to learn the basics of Nubian adobe construction. This was a traditional practice that Fathy became aware of in the 1940s, and which he subsequently promoted as a sustainable, socially responsible technology that enabled low-income people in arid climates to construct their own dwellings. What is singular about Nubian adobe construction is that it employs adobe domes and catenary adobe vaults to enclose buildings. No other materials are required, not even wood formwork. When, in 1991, Swan first visited the Trans-Pecos region of Texas, the far western tip of the state where El Paso and Marfa are located, she recognized parallels between its arid climate and desert landscape and those of Egypt. Adobe was already the most venerable building technology in the Trans-Pecos (and in the neighboring state of New Mexico and, across the Ro Grande, in the Mexican state of Chihuahua). In 1995, Swan acquired property outside the border town of Presidio, Texas, where she determined to build vaulted adobe structures. She found allies across the border in Ojinaga, Chihuahua: the adobe brickmaker Daniel Rodrguez Camacho, master adobera Mara Jess Jimnez, and adoberos Efrn Rodrguez and Roberto Hernndez.In 1998 Swan began construction of Casa Swan, a 1,600-square-foot, off-grid, desert house with adobe vaults and domes. With the aid of her colleagues from Ojinaga, she started an adobe construction workshop, teaching all phases of the manufacturing and construction process. Swan attracted an international array of students (including architect Ronald Rael) for what became the annual November workshop of the Adobe Alliance, the nonprofit she had started in 1993. Swan did not attract the support of officials in Presidio or Presidio County, for whom she remained an exotic outsider. Nor did she persuade people in Presidio or Ojinaga to build their own adobe houses, let alone launch a movement for self-built, affordable adobe housing. To document Swans work and that of the Adobe Alliance, Dennis Dollens wrote Simone Swan: Adobe Building, published by SITES in 2005. In 2016, she received an Honorary Lifetime Membership from The Earthbuilders Guild.View this post on InstagramA post shared by The Earthbuilders Guild (@theearthbuildersguild)Swans friend, Houston artist and patron Surpik Angelini, wrote of her: Simone was a soul whisperer to celebrated and upcoming artists, architects, anthropologists, philosophers, writers, filmmakers, musical composers, ecologists, freedom fighters, activists, and humble adobe builders, all geniuses in their own fields who changed our world for good. On a personal level, Simone was an unadulterated child, marveling at everything that brought new knowledge, and an old sage with an unerring wisdom rooted in many past lives in magnificent ancestral cultures.In a remembrance for The Earthbuilders Guild, Ronald Rael shared: We spoke often about the politics of adobe. I shared my belief that building with adobe is a political acta stance against capitalism and, in some cases, restrictive building regulations. It was a way to reaffirm ones connection to heritage, land-based practices, and sustainability, standing in opposition to a disposable, plastic society. Simone was equally passionate, and from those conversations emerged Adobe is Political, a mantra that became Simones tagline. Together, we envisioned architecture as more than constructionit was an ethical and moral statement, a social act with the power to transform. Simone Juliette Withers Swan was born in Antwerp, Belgium, on November 30, 1928, the only child of a Dutch-Belgian mother, Simone van den Berch van Heemstede, and an expatriate American father, Noble Withers. Swan spent much of her youth in what is now the Democratic Republic of the Congo. In 1949, she married Alfred Hjalmar Swan, Jr., in Los Angeles. They had two children, Eric H. Swan and Victoria Swan Takahashi, before divorcing. During the 2000s, Swan split her time between Presidio and Santa Fe, New Mexico, before moving to Tucson, where she lived with her daughter. After advancing age compelled her to sell Casa Swan in 2022, the Adobe Alliance suspended operations.By force of her personality and style, Simone Swan cut a swathe across the Chihuahuan Desert. She pursued the cause of adobe construction with dedication and diligence in the conviction that, as she asserted, adobe is political. Not only a material, adobe also became a method; a means of social reproduction; and an ethical imperative for building, repairing, and living responsibly in a damaged world.Stephen Fox is an architectural historian and a fellow of the Anchorage Foundation of Texas. He is a lecturer in architecture at Rice University and the University of Houston.
    0 Kommentare ·0 Anteile ·63 Ansichten
  • Barnard Gordon House // c.1928
    buildingsofnewengland.com
    Found on Woodland Road in Southern Brookline, Massachusetts, this brick dwelling is one of a dozen-or-so whimsical Tudor cottages built there in the1920s and 1930s. The Barnard Gordon House, built around 1928, utilizes brick and stucco cladding with ornamental half-timbering, diamond pane leaded glass casement windows on the second story, and decorative half-timbering. The main attraction is the round tower with conical roof also serving as the entrance, resembling more of Rapunzels tower than a normal suburban home. We need more unique houses today like they built 100 years ago. Everything today feels so sterile and unwelcoming, maximizing interior layout at the loss to street presence.
    0 Kommentare ·0 Anteile ·64 Ansichten
  • Don't let AI phantom hackers drain your bank account
    www.foxnews.com
    Published February 18, 2025 10:00am EST close 'CyberGuy': New bank scams are costing victims thousands of dollars Kurt Knutsson joins "Fox & Friends" to discuss bank scams and a self-driving car that trapped a rider inside. Tech support scams have been around for years, but a new variant called the Phantom Hacker scam is rapidly gaining traction. It has cost victims, primarily older Americans, over $500 million since 2023. This scam is particularly deceptive because it unfolds in three carefully orchestrated phases and uses AI-powered social engineering tactics to avoid detection. Attackers leverage caller ID spoofing and AI-generated voices to make their scheme more persuasive, but there are ways to protect yourself. Illustration of a phantom hacker at work (Kurt "CyberGuy" Knutsson)How the phantom hacker scam worksAshighlighted by the FBI, the scam begins with the tech support impostor phase. You might receive a call, email, text or even a pop-up on your computer warning you that your device has been compromised. The message urges you to call a customer support number for assistance. Once you do, a scammer posing astech support claims that hackers have targeted your accounts. To "help," they instruct you to download remote access software, allowing them to take control of your computer. Under the guise of scanning for threats, they trick you into revealing your financial accounts, setting up the next phase of the scam.Next comes the financial institution impostor phase. Another scammer, pretending to be from your bank or investment firm, calls to warn that a foreign hacker has infiltrated your accounts. They advise moving your money to a "safe" government-protected account, often using wire transfers, cryptocurrency or cash deposits. They might also insist on keeping the transaction confidential, claiming its necessary for security reasons.In the final U.S. government impostor phase, a third scammer impersonates a federal official often from the Federal Reserve who pressures you to act quickly. If you start doubting the scheme, they may send you an official-looking email or document to convince you that the transfer is legitimate. By the time victims realize theyve been tricked, their money is gone, often sent overseas beyond the reach of U.S. authorities. Illustration of a phantom hacker at work (Kurt "CyberGuy" Knutsson)How AI is making things worseAI is making scams like the Phantom Hacker scam more deceptive and harder to spot. Scammers are using AI-powered chatbots to automate their schemes. Instead of relying on human operators, they can now deploy AI-driven responses that sound natural and convincing.AI-generateddeepfake voices are also being used to impersonate bank officials and government representatives. With just a short audio sample, scammers can clone a voice to make their calls seem even more authentic. This means a victim might hear what sounds like their bank manager or an official from the Federal Reserve.Email scams are also becoming more sophisticated. AI tools can craft messages that mimic the tone and style of official communications. Scammers can even generate fake but realistic-looking documents with official letterheads to convince victims that the scam is legitimate. Illustration of man getting a deepfake scam call (Kurt "CyberGuy" Knutsson)7 ways to protect yourselfThe best way to defend yourself against the Phantom Hacker scam is to stay informed, be cautious and follow these steps:1) Ignore unsolicited messages: Scammers often send pop-ups, text messages or emails claiming that your computer is infected or that your bank account is at risk. These messages may look official, but they are designed to create panic and pressure you into taking immediate action. Never click on links or attachments from unknown senders, as they may contain malware or lead to phishing websites that steal your personal information.2)Have strong antivirus software:The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.3) Verify phone numbers before calling: If you receive an unexpected message urging you to call tech support, do not use the number provided in the message. Instead, visit the official website of the company in question and find their customer support contact information. Scammers often create fake websites or usecaller ID spoofing to make their phone numbers appear legitimate, so always double-check before making a call.4) Avoid downloading unknown software: No reputable company will ever ask you to install remote access tools unless you have specifically reached out for tech support. Scammers use these programs to take control of your computer, monitor your activity and access sensitive information. If someone unexpectedly asks you to download software to "fix a problem" or "protect your account," it is likely a scam.5) Never give control of your device to a stranger: If you allow a scammer to remotely access your computer, they can view your personal files, log your keystrokes and manipulate your accounts without your knowledge. Legitimate customer support representatives will never request remote access unless you have initiated the support request through an official company channel. If someone insists on taking control of your device, hang up immediately.6) Be skeptical of urgent financial warnings: The U.S. government will never contact you unexpectedly and demand that you move your money to a "safe account." They will also never ask you to wire funds, purchase gift cards or send cryptocurrency as a form of payment. Scammers create a false sense of urgency to trick victims into acting before they can think critically about the situation. If someone claims to be from a bank or government agency and pressures you to move money, stop and verify their identity through official channels.7) Invest in personal data removal services: Scammers often gather information from data broker websites to make their scams more convincing. Your name, phone number, home address and even financial history may be publicly available without your knowledge. Consider using a data removal service to regularly scan and request the removal of your personal information from these databases. This reduces the chances of scammers targeting you with highly personalized attacks. You can also manually opt out of major data broker sites, but using a service automates the process and keeps your information protected over time.Check out my top picks for data removal services here.Kurts key takeawayThe Phantom Hacker scam is designed to be convincing, but understanding how it works can help you stay one step ahead. Scammers rely on fear, urgency and deception to trick their victims, but you can protect yourself by staying cautious, verifying requests through official sources and never sharing personal or financial information with unknown callers.Do you think law enforcement and tech companies are doing enough to combat AI-powered scams? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Kommentare ·0 Anteile ·70 Ansichten
  • EY: Industrial companies worldwide stunted in emerging technology use
    www.computerweekly.com
    Summit Art Creations - stock.adoNewsEY: Industrial companies worldwide stunted in emerging technology useBusinesses globally are spending more on emerging technologies year-on-year, but struggle to expand experimental use cases, finds EYs sixth annual Reimagining Industry Futures studyByBrian McKenna,Enterprise Applications EditorPublished: 18 Feb 2025 15:00 Many companies from a range of industries worldwide are stuck at a trial stage of emerging technologies usage, according to the sixth annual EY Reimagining industry futures study.The firm surveyed 1,635 enterprises in November 2024, including 9% in the UK, 6% in Germany and 20% in the US. Respondents were drawn from a range of industries, including financial services (13%), cars and transport (13%), energy, mining and utilities (13%), and manufacturing (12%).The study has a strong 5G and internet of things (IoT) orientation, as it has done in previous years. The lead authors come from the firms telecoms, media and technology (TMT) practices, Rob Atkinson, area managing partner for UK and Ireland TMT; and Adrian Baschnonga, global TMT lead analyst.The press statement that goes with the report says nearly half (47%) of the respondents are investing in generative artificial intelligence (GenAI), compared with 43% last year.Some 43% are investing in IoT, and 33% are investing in 5G technology, suggesting an upward trend from 39% and 27% respectively in 2024.However, the report finds that businesses struggle to convert technology trials into live deployments. Only 1% of organisations have active deployments of GenAI. And while IoT investment seems to be rising year-on-year, the proportion of businesses with active IoT deployments is in decline, slipping to 16% this year compared with 19% in 2024.Active deployments of edge computing are also flat year-on-year, at 22%.CEOs get more into technology selectionThe report finds decision-making inside enterprises is spreading out across the C-suite, with 49% of CEOs now involved in emerging technology strategy, including in choice of suppliers. Organisations where the CEO is a key decision-maker are further along, the report found.Over half (51%) of businesses with CEOs involved in new technology decisions are investing in GenAI, compared with 44% of organisations where the CEO is less involved.As well as posing a challenge to unlocking long-term value, a failure to progress beyond the trial phase means businesses risk missing out on the combined impact of different technologies deployed together, an area where four in five (79%) organisations are looking to achieve more, said Atkinson. There could also be a danger that too many emerging technologies initiatives will be conducted in isolation, limiting the resulting business benefits.The report discovered that respondents are limitedly aware of what IT suppliers have on offer.Some 73% said they need a better understanding of the changing supplier landscape. EY comments that this reflects an environment where collaborative ecosystems featuring alliances between different technology providers are becoming the norm.More than half (56%) the respondents believe they lack awareness of their technology suppliers partners. Less than a third of organisations have high awareness of new mobile technology capabilities such as network application programming interfaces (32%) and network slicing (26%).Organisations view ecosystem collaboration as a route to access new skills and capabilities but lack understanding of changing supplier ecosystems, said Baschnonga. With many companies under pressure to consolidate vendors, suppliers should prioritise their ecosystem and alliance strategies by concentrating on key partners and adapting their operating models and go-to-market approaches accordingly.Read more about enterprise adoption of 5G, IoT and AI technologies in 2025Deloitte: GenAI paving the way for transformative future for comms.The seven top IoT trends to watch in 2025 and beyond.Podcast: More enterprises are using generative AI, according to Informa TechTargets Enterprise Strategy Group. There is no consensus on the best use case or if open or closed models work better. Organisations that used AI before ChatGPT are ahead.EY: UK enterprises prioritise real-world 5G benefits over sophisticated use cases.The report found the ability to scale and integrate different technologies is important to one in four (25%) of those surveyed.The intention to focus spending on a smaller number of key suppliers makes it even more important that ICT providers present them as effective ecosystem orchestrators, able to provide end-to-end solutions with the assistance of partners and intermediaries, said Atkinson. As part of this, suppliers should take care to underline capabilities that extend beyond their core products.While enterprises remain committed to embracing leading-edge technologies like GenAI, IoT and 5G, they are facing challenges in translating their investments into real business value, he said. Now is the time for IoT suppliers to reposition themselves as holistic partners to their business customers and help them realise the full benefits of their spending on digital transformation.In the report itself, the authors say: This years findings show that organisations across all sectors remain committed to investing in emerging technologies to transform their operations but that issues around scalability and legacy integration are top of mind. Meanwhile, ICT vendors need to pay close attention to enterprises increasing focus on security and growing demand for ecosystem orchestration.Businesses dimly aware of datacentre environmental impactThey also pick out sustainability as an increasingly relevant theme for enterprise IT, especially with regard to datacentres. Sustainability factors increasingly weigh on decisions about emerging technology investments, with organisations more sensitive than before to the potentially ambivalent role of new technologies in the decarbonisation agenda.Datacentres, the reports authors comment, are an area of low environmental, social, and governance awareness for businesses. Half the organisations surveyed are unaware of their datacentres emissions profiles.Respondents are looking at a range of GenAI use cases, with no standout preferences, the report found. Some 50% of businesses see cyber security and data protection as a leading GenAI impediment, while 46% said a need to improve data governance to combat risks concerning data accuracy and ethics would be critical to future implementations.Data governance scores highest among manufacturers (46%) as a GenAI concern, while capturing productivity gains ranks top among EY's respondents in the consumer (48%) and energy (47%) sectors.Across all sectors, the most favoured GenAI use cases are software development, customer service and employee training or collaboration. However, financial services, healthcare and manufacturing respondents rated predictive or real-time operations and supply chain management as top-five GenAI use cases.Upskilling and more collaborationThe report says the two most important changes that organisations can make are employee upskilling and deeper collaboration across business functions.On a country level, education and employee upskilling is highly ranked by German respondents (36%), while deeper collaboration between business functions leads as an action among Chinese businesses (31%).Elsewhere, Indian (20%) and Japanese (18%) businesses are most likely to prioritise collaboration with suppliers.In The Current Issue:AI Action Summit: Global leaders decry AI red tapeNavigating the practicalities of AI regulation and legislationDownload Current IssueThe Private AI Infrastructure Imperative: A Practical Perspective Write side up - by Freeform DynamicsSLM series: ABBYY-A strategic recalibration of the tech arsenal CW Developer NetworkView All Blogs
    0 Kommentare ·0 Anteile ·67 Ansichten
  • Why this rechargeable pocket device is my ultimate outdoor accessory - and it's on sale
    www.zdnet.com
    The Occopa UT4 heats up fast, features a built-in flashlight, is water-resistant, and keeps your gadgets charged on the go.
    0 Kommentare ·0 Anteile ·46 Ansichten
  • Why I never use my personal credit card for free trials, and what I do instead
    www.zdnet.com
    ZDNETBuying stuff online can be a risky proposition. Sure, the big vendors do their best to make you feel safe, but what if you have to give up your credit card digits to a vendor you don't know?I have to do this quite regularly. Fortunately, I have a tool that helps make the process safe. But first, let me share a few scenarios involving where and why I give my credit card digits to vendors all over the world.I review products and services as part of my job. Often, that involves signing into online services, putting them through their paces, and giving you my honest, if a bit snarky, opinion.While I sometimes have to pay for those services out of my own pocket (or review something I previously decided to buy), most of the time, the vendors will provide a complimentary account for some period, usually a few months or a year.This is important to me because many of the services I test cost a few hundred bucks a year. If I have to test 10 or 20 services in a given year, paying for all of them could add up really fast.Usually, the way vendors provide a complimentary account is via a coupon code. This gives a 100% discount for the period. This works well because it integrates seamlessly with their systems and lets me do my testing without any out-of-pocket expense.But here's where the credit card comes into this scenario. In many instances, a given vendor's checkout process won't run without first providing a credit card number, even if it never gets charged.One category of services I regularly test is website hosting services, which can be run by vendors located all over the planet. A few years back, I went through a signup process, gave my card number, entered my coupon code, and was able to test for free.But 12 months later, I was suddenly charged almost $500. Their system auto-billed using the credit card I had on file. And since I didn't cancel my account before the charge went through (because I didn't even know it was still in operation), customer service didn't want to grant a refund. The PR person I had worked with the previous year was no longer with the company, and nobody wanted to be helpful.The company actively practiced theFerengi First Rule of Acquisition: "Once you have their money, never give it back."I did, eventually, get my money back through a combination of persuasion and intimidation. What? I'm from New Jersey. Still, it was time-consuming, stressful, and very annoying.Since that time, I've used a service that lets me put strong limits on my card being charged without my express permission. Privacy.com lets me limit the amount that can be spent on any card I create, limit how many times a card can be used, and more. Had I used a Privacy card, that hosting provider experience would never have happened.Let's talk about how you get started, go over how it works, and then dig into the benefits you get from Privacy.com. Getting started with Privacy.com To get started, point your browser to https://app.privacy.com/signup. Before we move on, there's one thing you'll need to know. Privacy asks you for some personal information, including your name, residential address, date of birth, and possibly a copy of your driver's license. They may also ask for other documents.The company explains its reasoning for these fairly intrusive requests as:To help the government fight the funding of terrorism and money laundering activities, federal law requires all financial institutions to obtain, verify and record information that identifies each person who opens a Privacy Account. You'll also need to set up a funding source. This is the account from which Privacy will pull your money in order to pay it out to the vendor you're paying. Keep in mind that although Privacy will issue you credit card numbers, it does not provide credit. Everything you pay using Privacy will either be removed from your bank account directly or via a debit card that links to your bank account.Those are your two funding source possibilities: a personal bank account or its associated debit card. Privacy (at least the free version) will not work with a business bank account. When you first create your Privacy account, you'll be asked for a funding source. If you later want to change sources, go to the Account menu item under the little head icon in the upper-right corner of the page.You can have multiple bank accounts as funding sources, but you can't have multiple debit cards, and you can't have both a bank account and debit card.It's been a while, but I recall it taking a few days after I signed up for Privacy to fully enable my account. So, if you plan on using this service, don't wait until the very last minute when you really need it. Using Privacy.com's virtual credit cards As you can see, I have two Privacy cards set up. They are, in fact, for two hosting providers I was reviewing, where I needed to provide a card number. For the record, neither was the problematic hosting company I described above. I won't be sharing the name of that company here. Screenshot by David Gewirtz/ZDNETThese two cards are currently active with a total spend limit of $1. I could have set it up for any amount I wanted, but I chose $1 since it should never actually be used. If I change my mind, I can change the transaction limit later.Before we create a new card, let's do a little housekeeping with these two cards. First, I want to pause the Bluehost card. Screenshot by David Gewirtz/ZDNETPausing prevents the card from being charged but keeps the card number viable in case I want to turn it back on later. On the other hand, let's say I want to close the WP Engine card. Using the same drop-down menu in the corner of the card, I can select Close. Screenshot by David Gewirtz/ZDNETThis permanently retires the card number and shuts down the card. If I want to pay WP Engine again, I'll need to use a different card number.Now, let's create a card. On the main dashboard, click Create Card. Notice that there are columns for Cards (showing open cards) and Activity (showing the last eight transactions). Screenshot by David Gewirtz/ZDNETOnce you hit Create Card, you'll be invited to create a Virtual Card. Privacy has paid plans that provide other services, like locking cards to certain purchase categories. In this article, I'm only showing the free plan, which has worked fine for me. Screenshot by David Gewirtz/ZDNETClick Virtual Card. Next, assign a name to describe the card. You can select from various brands, and sometimes the card's graphic will reflect the brand. If you click the "See other popular cards" button, Privacy will give you a bunch of other brand logos.I've found that some brands, even though they're not shown on that list (like Bluehost), will also be created with their proper logos. Don't worry about whether or not the vendor you want to pay has a logo in Privacy or not. I've found their cards work equally well for giant vendors and the small companies I've had to work with over the years. For the free plan, each Privacy card is tied to a given vendor once it is used at that vendor. Once used, it won't be able to be used at any other vendor. Screenshot by David Gewirtz/ZDNETI went ahead and chose the nickname Boasty Hosty. As far as I know, there aren't any hosting providers with that name, but it will serve as an example for our article. Screenshot by David Gewirtz/ZDNETNow that the Nickname is chosen, let's go ahead and click Create Card. You'll see a card number, as well as what funding source is going to be applied to it. Screenshot by David Gewirtz/ZDNETThis detail screen is what you'll get whenever you click on the card in the dashboard. Here, you can easily see all transactions (including declines), as well as pause, close, and change the financial transaction limits.It's the Transaction Limit area that contains much of Privacy's power. When you click on the words, this screen appears. Screenshot by David Gewirtz/ZDNETFor a hosting provider review account, where I have to give my digits, I usually set a spend limit of $1. I also set the card as single use, which means the card automatically terminates and ceases to exist the first time it's charged.You can also choose to set a spend limit per month (like no more than $20 per month), per year, per transaction (use it as often as needed, but never charge more than $5), and a total spend (when $100 is spent over the life of this card, stop).Keep in mind that Privacy cards don't have the same protections as credit cards. They work like debit cards. So, if you give a vendor unlimited use, and that vendor overcharges you, that money will be removed from your account. I recommend always setting conservative spending limits.Personally, I prefer the single-use option. I can issue a card for an amount I want to spend, and as soon as that card is charged, it shuts down. That way, if I want to make another charge, I have to purposely create a new virtual card.Just be aware that Privacy does assign certain usage limits for free accounts. If you plan on using this service a lot, be sure to read up on the limits assigned to your account.That's it. Beyond using Privacy cards for review accounts, I also often use virtual cards for software purchases when those purchases are out of the country. Most of the software vendors I've encountered are very much above board, but it gives me peace of mind knowing that whatever digits I share turn into a pumpkin at first use.And, for the record, I've shut down the Boasty Hosty card already. Will you use this service? Have you ever found yourself unexpectedly charged for a service you thought you had canceled? How do you usually protect your credit card information when dealing with unfamiliar online vendors?Have you tried using virtual credit cards like Privacy.com? If so, what has your experience been? Do you think services like this add an extra layer of security, or do you have other preferred methods for safeguarding your online purchases? Let us know in the comments below.You can follow my day-to-day project updates on social media. Be sure to subscribe to my weekly update newsletter, and follow me on Twitter/X at @DavidGewirtz, on Facebook at Facebook.com/DavidGewirtz, on Instagram at Instagram.com/DavidGewirtz, on Bluesky at @DavidGewirtz.com, and on YouTube at YouTube.com/DavidGewirtzTV.Featured Editorial standards
    0 Kommentare ·0 Anteile ·48 Ansichten
  • Unlocking Huntington's Disease: DNA Repair Protein Could Hold Key To New Treatments
    www.forbes.com
    Medicine scientist using computer while holding test tube with red liquid solution for research ... [+] development. Biochemistry woman with protection glasses and gloves studying lab flaskImage by DC Studio on FreepikA new discovery offers hope for Huntingtons disease. This discovery provides hope that a DNA repair process may help slow or stop disease progression. Research has identified a critical DNA repair protein that drives the expansion of certain genetic sequences at the heart of Huntingtons disease. This breakthrough could lead to treatments that address the root cause of this devastating condition.What Are CAG Repeats?To understand Huntingtons disease, its essential to discuss what CAG repeats are. DNA, the blueprint of life, is made up of four chemical building blocks: adenine (A), cytosine (C), guanine (G), and thymine (T). These letters combine in specific sequences to form genes, which provide instructions for making proteins in our bodies. In the case of the huntingtin gene, a particular sequence of three lettersCAGrepeats multiple times in a row.In healthy individuals, the number of CAG repeats is usually fewer than 27, which allows the gene to function normally. However, these sequences are inherently unstable and can expand over time. The number of repeats correlates with disease severity and age of onset. When the repeat count reaches 40 or more, it disrupts the genes ability to produce a functional protein. This malfunction ultimately leads to Huntingtons disease, causing symptoms such as movement difficulties, cognitive decline, and emotional instability.Breakthrough Research and Therapeutic ImplicationsMouse models have shown that targeting the DNA mismatch repair protein MSH3 can effectively halt or slow the expansion of CAG repeats. Research in Science Translational Medicine indicated that lower levels of the protein completely stopped repeat expansion in neurons derived from Huntingtons disease patients. Antisense oligonucleotides, synthetic molecules designed to bind to mRNA, can reduce protein levels and stabilize CAG repeats without interfering with other essential cellular functions.Similarly, dual-siRNA therapies demonstrated dose-dependent reductions in repeat instability with minimal side effects. In mouse models, these siRNA therapies effectively reduced MSH3 activity. The results were promising, showing a significant decrease in repeat instability without major side effects. Instead of directly targeting the enzyme, which could disrupt other essential functions, scientists concentrated on silencing its messenger RNA, mRNA, thereby stopping its production.MORE FOR YOUOne approach involves creating small-molecule inhibitors to block the activity of mismatch repair proteins, but no such compounds have been identified yet. Gene-editing technologies like CRISPR-Cas9 offer another promising option, as they can permanently reduce the expression of genes driving CAG repeat expansions. For example, CRISPR-Cas9 delivered via adeno-associated virus vectors has been shown to effectively disrupt the mutant HTT gene in mouse models, reducing toxic protein aggregates and improving motor function. However, systemic gene knockouts across the entire body carry risks, such as increased cancer susceptibility and disruption of essential cellular processes.Others are exploring brain-specific knockouts using AAV vectors combined with neuron-specific promoters to mitigate these risks. These knockouts target affected regions like the striatum while sparing other tissues. Nanoparticles are also being investigated as an alternative delivery method to improve targeting and minimize immune responses. RNA-based approaches offer a safer and reversible way to suppress mutant HTT expression without permanently altering DNA. These strategies are still in development but represent significant possibilities for advancing Huntingtons disease treatments while minimizing potential side effects.The Potential for Treating Other DiseasesThe ability to inhibit somatic CAG repeat expansion could transform Huntingtons treatment by addressing the root genetic cause rather than merely alleviating symptoms. Additionally, this approach may extend to other trinucleotide repeat disorders caused by similar mechanisms.For example, Spinocerebellar Ataxias, a group of inherited disorders, are caused by CAG repeat expansions in various genes. These expansions lead to difficulties with coordination and movement, often accompanied by other neurological symptoms. Another condition, known as Kennedys Disease or spinal and bulbar muscular atrophy, is linked to CAG repeat expansions, resulting in muscle weakness and hormonal imbalances.Recent discoveries about how DNA repair processes drive CAG repeat expansions open up exciting possibilities for treating these disorders. By targeting the mechanisms that cause these repeats to grow, such as modulating DNA repair pathways or stabilizing the lengths of the repeats, we can delay the onset of symptoms or slow disease progression.A Path Toward HopeIdentifying a driver of CAG repeat expansion represents a significant leap forward in understanding and treating Huntingtons disease. By targeting this protein or its associated pathways, researchers hope to slow or stop disease progression at its source. For those affected by Huntingtons and other repeat-expansion disorders, this discovery offers renewed hopeand a glimpse at a future where these conditions might finally be brought under control.
    0 Kommentare ·0 Anteile ·50 Ansichten
  • The Wiretap: Google Fought A Court Order For 2,600 User Locations. And Won.
    www.forbes.com
    The Wiretap is your weekly digest of cybersecurity, internet privacy and surveillance news. To get it in your inbox, subscribe here.(Photo by Chris Jackson/Getty Images)Getty ImagesBack in early 2024, Google was ordered by the United States Attorneys Office in Northern California to provide the supposedly-private location data and identifying information belonging to 2,654 of its users. This is according to recently-unsealed court documents detailing the order, which had been signed off by a judge and asked for data on any Google user within a combined area of more than 1,600 acres across 13 distinct locations for a total period of nearly two-and-a-half days. While the nature of the crime remains under seal, the search warrant amounted to one of the most sprawling so-called "geofence" orders on record.It also landed a month after Google had announced updates that would make geofence orders technically impossible by adding layers of security around location data. But Google, knowing that it had yet to roll out that update, and believing the order to be too broad, asked a judge to quash the order."The thousands of people who would be swept into the governments search may have been enjoying the privacy of their homes, taking part in protected religious activity in a place of worship, commuting, or engaging in countless other private activities," Google wrote in its appeal against the order, which revealed at least 500 acres of the areas being searched were in San Francisco. "The vast majorityif not allof them did not participate in the crime and are unlikely to be witnesses."That same February, the government backed down and told Google it wouldnt be asking for it to provide the data. It did not give its reasons, but noted it had reviewed Googles motion to quash.Its a rare example of how Google pushes back on data grabs that would invade the privacy of thousands of innocent users. There are, however, concerns about whether Google and its fellow tech giants will continue to push back against overly broad demands when Trump's federal agencies come knocking.Albert Fox-Cahn, executive director of the Surveillance Technology Oversight Project, says the pushback was a rare example of what happened in the pre-Trump era, when tech companies data was often raided by the U.S. government. It's even harder to trust large tech companies to hold our data safe when we see their leaders bending over backwards to appease the Trump administration, he added. If they're willing to spend millions and endorse the man in public, what are they willing to do to help him in private?Got a tip on surveillance or cybercrime? Get me on Signal at +1 929-512-7964.THE BIG STORY:Musks DOGE Wants Access To IRS Taxpayer Data(Photo by Chesnot/Getty Images)Getty ImagesThe IRS is in discussions with the White House about allowing staff from Elon Musks Department of Government Efficiency (DOGE) access to the personal information of every taxpayer in the U.S., according to unnamed sources speaking with the Washington Post.DOGE software engineer Gavin Kliger would be given permission to access the data under the proposed agreement, though he had not yet been granted that permission as of this weekend.DOGE staff are now working inside a number of agencies as they attempt to remake American institutions, from the Treasury to USAID. According to Forbes, theyre heading for the Pentagon too.Meanwhile, Michelle King, the acting head of the Social Security Administration, has quit rather than let DOGE get access to sensitive data on the agencys systems.Stories You Have To Read TodayThe DHS Cyber and Infrastructure Security Agency is shedding staff under the Trump administration, including those tasked with security elections, according to reports. At least 17 CISA staff trying to protect elections from threats like ransomware have been put on leave pending a review.Theres some new Apple Mac malware in town. Its dubbed FrigidStealer and is launched via malicious websites, according to research from Proofpoint.Winner of the WeekIn response to reports that the U.K. ordered Apple to install backdoors to allow access to encrypted iCloud accounts, Senator Ron Wyden, D-Ore., has introduced a bill that would prevent foreign government access to Americans data. Called the Global Trust in American Online Services Act, it would update the CLOUD Act, which permits foreign governments to go directly to U.S. companies to demand user data rather than going through the U.S. legal system.Loser of the WeekAn Italian spyware maker called SIO created a number of malicious Android apps posing as WhatsApp and other popular tools, according to TechCrunch. It marks another case of surveillance dealers who have been caught taking advantage of user trust in encrypted messaging services.More On Forbes
    0 Kommentare ·0 Anteile ·50 Ansichten