• Open-source 3D Printed Pipe Fittings Reduce Water Waste, New Study Argues
    3dprintingindustry.com
    Researchers from Canadas Western University have developed a new open-source approach for 3D printing water pipe fittings.According to the London, Ontario-based team, around 126 billion cubic meters of water are lost globally each year, mainly due to leakage and broken pipes. The researchers believe using a parametric-driven method for local, on-demand 3D printing of customized fittings will unlock more efficient water management.Their easy-connect design offers compatibility with various dimensions and materials used in most pipes on the market. During testing, the couplings withstood up to 4.551 MPa, eight times the standard residential water pressure. They were also found to be 3 to 17 times cheaper than their commercial counterparts, reportedly offering an affordable and sustainable solution to manage water repairs.Co-authored by open-source advocate Dr. Joshua Pearce, the paper was published in the Journal of Manufacturing and Materials Processing. It argues that localized, 3D printing offers value for residential, agricultural, and renewable energy sectors. They also argue that this distributed manufacturing approach is ideal for those in developing regions and remote locations facing equipment shortages.The 3D models have been uploaded to Open Science Framework (OSF) and GitHub, allowing them to be downloaded, modified, and 3D printed by anyone for free. Released under the GNU General Public License 3.0 (GPL 3.0), the files can be accessed, edited, and shared without restrictions.20 mm diameter PETG 3D printed pipe fitting parts. Photos via the Journal of Manufacturing and Materials Processing.Enhancing water security with 3D printing In their study, the Western University researchers highlighted that the worlds growing population and climate change-related water shortages have increased the demand for drinking water. This is compounded by leaks, which cause 346 million cubic meters of lost water around the world every day.The authors note that the piping in many developing countries is old and degraded due to corrosion and environmental conditions. The high cost of standard piping equipment and fittings means old components often go unreplaced, while minor leaks are regularly neglected. This contributes to wasted resources and inflated pumping costs to compensate for reduced pressure.Despite global sustainability efforts, around 30% of the worlds population remains without access to readily treated drinking water. Additionally, according to the researchers, approximately half of humanity faces water scarcity for at least one month every year. Indeed, over 2 million people in the US, Canada, and Australia face limited water access due to poor plumbing and inadequate wastewater disposal.Based at Western Universitys Mechanical and Materials Engineering and Electrical and Computer Engineering departments, the research team believes their approach offers an affordable, sustainable, and accessible solution to this problem. They argue that an open-source parametric design for customized 3D printed pipe fittings would be economically feasible and simple, allowing those with minimal experience to fix leaking pipes at the point of need.Open-source, 3D printed water pipe fittingsTo demonstrate their thesis, the researchers first created a script with adjustable design parameters on the open-source CAD software OpenSCAD. Amendable parameters include pipe diameter, thread type, wall thickness, gasket thickness and length, and tolerances. The OpenSCAD script, freely available on OSF and GitHub, can automatically generate a 3D model based on selected input values. This can then be exported as an STL file and sliced, ready for 3D printing.Next, the team 3D printed 12 pipe-fitting and nut samples in two batches. The first included three 10 mm diameter samples each using PLA, PETG, and ASA filament from Chinese materials company Polymaker. The second batch saw three additional fittings 3D printed using PETG for a 20 mm pipe diameter. Flexible TPE filament was used to fabricate the gasket sealing components.All parts were fabricated using Prusa XL and Prusa i3 MK3S desktop FFF 3D printers from Czech OEM Prusa Research. The i3 MK3S was used for the TPE gaskets, while the XL fabricated all other fitting components. 100% infill was leveraged to ensure all components were watertight, while extrusion flow was increased by 5-15% to prevent layer gaps. Support-free 3D printing was also used to minimize material usage, reduce plastic waste, and lower post-processing times.Once printed and assembled, the pipe-fitting components were subjected to hydrostatic pressure testing using a VEVOR hydraulic pressure pump. Each batch underwent at least 16 pressure tests to ensure the reliability and reusability of the 3D printed parts.STL files of the customized pipe fittings for 10 mm (a) and 20 mm (b) diameters. Images via the Journal of Manufacturing and Materials Processing.Ultimately, PETG was the best-performing material, tolerating up to 4.551 0.138 MPa of water pressure. This was followed by ASA and PLA with 2.758 and 2.275 MPa, respectively. The second batch of 20 mm-diameter PETG parts achieved 2.392 0.138 MPa pressure under 17.5 Nm of torque. All results comfortably exceeded residential plumbing requirements of 0.552 MPa.After calculating the 3D printing material, electricity, and manufacturing time prices, the academics found that PLA, ASA, and PETG 10 mm parts cost $1.03, $1.15, and $1.04, respectively. The larger 20 mm PETG fitting came to $3.30 per unit. These are significantly more affordable than a selection of conventionally manufactured counterparts available at RONA, Home Depot, Kent Building Supplies, and Amazon.Ca. The commercial parts highlighted in this research paper reportedly cost between $4.79$18.44 and possess pressure ratings below 1.586 MPa.Practical application of the couplings by connecting two plastic pipes of different materials to a waterjet cutter as a water inlet line. Photo via the Journal of Manufacturing and Materials Processing.3D printing enhances water securityThis is not the first time researchers have leveraged 3D printing to improve access to clean water. Last year, researchers from the University of Bath developed 3D printed lattice structures capable of removing forever chemicals from water sources.According to the team, their ceramic-infused monoliths can remove up to 75% of perfluorooctanoic acid (PFOA) in under three hours. PFOA is one of the most common perfluoroalkyl and polyfluoroalkyl substances (PFAS). Toxic to humans, these man-made chemicals can take up to 1,000 years to break down naturally.Found in many domestic products like non-stick pans, raincoats, paints, fabrics, and firefighting foams, PFAS have been linked to decreased fertility, hormonal changes, liver damage, cardiovascular problems, diabetes, and cancer. The paper, published in The Chemical Engineering Journal, called the findings a significant step in finding an efficient solution to combat chemical contamination.Elsewhere, Singaporean sustainability firm Nano Sun introduced 3D printing water-filtering membranes in 2018 to combat water pollution. A spin-off from Nanyang Technological University (NTU), the company claims its devices are five times more efficient than traditional processes. At its Tuas-based manufacturing plant, Nano Sun can reportedly 3D print 600 sq m of membranes every day. Early adopters included two large multinational semiconductor manufacturers in Singapore and a wastewater plant in China.More recently, ceramic 3D printers and materials manufacturer Lithoz showcased 3D printed water filter membranes developed by Evove at Formnext 2024. Optimized for lithium extraction and industrial water recycling, the membranes are produced using Lithozs CeraFab S320 system. This approach unlocks a fivefold output increase, reduces energy consumption by 80%, and recycles 80% more water.Who won the 2024 3D Printing Industry Awards?Subscribe to the 3D Printing Industry newsletter to keep up with the latest 3D printing news.You can also follow us on LinkedIn, and subscribe to the 3D Printing Industry Youtube channel to access more exclusive content.Featured image shows STL files of the customized pipe fittings for 10 mm (a) and 20 mm (b) diameters. Images via the Journal of Manufacturing and Materials Processing.
    0 التعليقات ·0 المشاركات ·38 مشاهدة
  • A new park by Field Operations is coming to Pittsburghs Cultural District
    www.archpaper.com
    Downtown Pittsburghs burgeoning Cultural District is sandwiched between the Allegheny River to the north, and Liberty Avenue to the south. Soon, a new public space there by Field Operations will host festivals, performances, art exhibitions, recreation, and relaxation. The project is a collaboration with Pittsburgh Cultural Trust, a local nonprofit. Arts Landing is set to be the Cultural Districts most transformative project in 25 years, Pittsburgh Cultural Trust said. The 4-acre destination will provide green space, but also public programming. Over 100 trees and a wide variety of native grasses and shrubs will be planted to help bolster the areas natural ecosystem.Today, the site where Arts Landing is destined is a parking lot. In the near future, a great lawn overlooking the mighty Allegheny River will be built in the parking lots place, marking Arts Landings signature space, the design team said. That 1-acre portion will have great views of Three Sisters Bridges and multiple entrances.Arts Landings signature feature will be its bandshell for hosting public performances. (Courtesy Pittsburgh Cultural Trust)The landscape topography will slightly lift up to afford optimal views of a bandshell located in Arts Landings northwest corner near Fort Duquesne Boulevard and Seventh Street, the team continued. The bandshells canopy will be a standout feature, both providing shade for performers and an architectural statement. To the northeast corner of the great lawn, there will be an installation site for future public art works commissioned by the Pittsburgh Cultural Trust. Aside from the bandshell, other features will include a garden walk, an outdoor play room, and mixed-use flex space. The 30,000-square-foot flex space will have pickleball courts, and other recreational options.A garden walk will connect spaces within Arts Landing, and have temporary public art works. (Courtesy Pittsburgh Cultural Trust)The design by Field Operations sources state-of-the-art sustainability systems. It provides innovative solutions for storm water management, like underground water tanks and surface gardens. These elements will be learning opportunities for students and the public, while also ensuring Arts Landing doesnt contribute to stormwater overflow issues.Field Operations and Pittsburgh Cultural Trust have pledged to use materials by local manufacturers and fabricators in Arts Landings construction as much as possible to reduce embodied carbon. Three-quarters of the current parking lots hard surfaces that get removed for the projects construction will be ground up into cinder blocks for future reuse, as opposed to going into a landfill.Sustainable fertilizers will be used to avoid forever chemicals and plastics in landscape maintenance, Pittsburgh Cultural Trust said.Arts Landing is set to open in June 2026.
    0 التعليقات ·0 المشاركات ·44 مشاهدة
  • www.archpaper.com
    Editors of Places Journal willcurate a citizens library at the U.S. Pavilion for the 19th International Architecture Exhibition of La Biennale di Venezia.The announcement comes a few weeks after U.S. Pavilion co-commissioners Peter MacKeith, Susan Chin, and Rod Bigelow shared the 52 finalists that will represent the U.S. this year in Italy. Places Journal has taken an open source approach: Editors started an Excel spreadsheet where anyone can suggest ideas for which books should appear. Suggested titles should relate to the porch, and American civil society more broadly, to keep in line with the pavilions exhibition.In keeping with the exhibition theme, Places Journal editors shared, the library will be broadly focused and inclusive.Collectively, the books might touch upon issues and topics of importance to American architecture, design, and culture, including community building, climate crisis, civic engagement, and the evolving public realm, Places Journal added. We welcome recommendations for books of various genres, including nonfiction (history, theory, memoir, et al.), fiction, and poetry. We ask only that you limit your selections to U.S., tribal, and territorial authors and subjects. Places Journal noted that the possibilities are almost endless. You can recommend as many books as youd likethe Library might include as many as 4,000 volumes to serve as a resource or reference library for visitors, editors said. Those who submitted ideas will have their names mentioned in the curatorial statement.As of press time, there are over 500 books folks have suggested. Classics by Michael Sorkin, Marshall Berman, and Denise Scott Brown have been proffered, but also ones by more contemporary writers like Keeanga-Yamahtta Taylor, Nick Estes, and others.
    0 التعليقات ·0 المشاركات ·48 مشاهدة
  • This is what no one planned could happen after taking a DNA test
    www.foxnews.com
    Tech This is what no one planned could happen after taking a DNA test Understand the risks of genetic data sharing and how to protect your privacy Published February 24, 2025 10:00am EST close DOGE discovers millions of Americans aged 110-360 still in Social Security database Rep. Eric Burlison, R-Mo., reacts to DOGE's revelation that millions of Americans aged 110-360 are still in the Social Security database and the department's imminent access to the IRS data retrieval system. I was one of the first to spit into a test tube, giving up my DNA forever to learn more about my health and heredity.You know, the ones that promise to connect you with distant relatives you didnt even know existed or reveal genetic risks for conditions like Alzheimers or heart disease. These DNA tests arent just about satisfying curiosity; people buy them to uncover important health information, connect with loved ones or give thoughtful gifts.But heres the thing and Im speaking from a data privacy perspective here genetic information is highly valuable and a risk to unlocking deeply intimate information unique to only you. And while these commercial DNA tests seem harmless, they come with risks that most people dont immediately think about. Once you hand over your DNA, youre giving these companies access to your most personal data. And believe me, what happens to that data after the test can be anything but straightforward. Illustration of human DNA (Kurt "CyberGuy" Knutsson)Whats the big deal?Your DNA is more than just a string of letters; it's a unique and permanent blueprint of your identity. Using a commercial DNA testing service can mean handing over not only physical samples but also information about potential medical conditions and predispositions, ethnicity and familial connections and even behavioral or lifestyle markers. This can put you at risk of things like genetic testing without your consent, increased insurance premiums, health-related scams and family secrets coming to light, sometimes with painful consequences.One woman even felt that she "lost her entire family" after taking one of these tests.And heres the kicker: Even if you choose to stay out of the genetic testing game, if anyone who shares some of your DNA, like your brother or your niece, chooses to take one, it can still expose you to many of these risks without you even knowing.What does happen to your genetic data?Aside from doing what the services advertise, it turns out that many DNA testing services may be sharing your genetic data with researchers, marketers, insurance companies and even law enforcement agencies.In fact, according to recent research, half of commercial DNA testing services use your genetic data for research (both internal and external). Nearly half (4 in 10) use it for marketing. And nearly half (also 4 in 10) also share your data with law enforcement agencies, potentially without any kind of subpoena or court order.While DNA testing companies often claim to use anonymized data for many of these purposes, the reality is that "anonymized" genetic information canoften be re-identified when combined with other data sources, sources like data brokers and people search sites that hold and sell troves of information (like lists of vulnerable individuals, such as those experiencing dementia) that could be used toward this purpose. Illustration of DNA (Kurt "CyberGuy" Knutsson)Results may not be what you expectedIf you do buy one of these DNA testing kits, you might expect that the results are pretty reliable. However, I was surprised to learn that this may not always be the case. According to Dr. Divya Vats, a clinical biochemical geneticist at Kaiser Permanente,at-home genetic tests arent as accurate as medical DNA tests ordered by your doctor. This can lead to unnecessary anxiety or false reassurance regarding your health. Even when it comes to ethnicity and ancestry, results usually rely on statistical comparisons to reference populations, whichdont necessarily yield accurate results, especially if youre from a less-studied ethnic group. DNA being tested (Kurt "CyberGuy" Knutsson)Destroying your genetic samples can be a nightmareOnce you've submitted your DNA to a testing company, the processes for having your sample and associated data destroyed are often complex, to say the least. According to an investigative journalist who tried to have her genetic footprint wiped, it was "brutally difficult." Recent events, like 23andMe going bankrupt, highlight just how precarious the situation can be.Consumers are left worried about what will happen to their genetic data if a testing company is sold or acquired, especially when they have no easy way to retrieve or destroy that data. These companies often dont disclose where and how your samples are stored, either.According to Incogni, a data broker removal service, almost none of the DNA testing services it investigated provided any information more substantial than that of a "secure facility." This lack of transparency about where their data is stored and how it can be destroyed creates a major roadblock for anyone trying to regain control over their genetic information. Test tube used to transport DNA (Kurt "CyberGuy" Knutsson)Steps to protect yourself when considering or using at-home DNA testing kitsIf youre still considering using a DNA service, if your genetic information has already been exposed or if you just want to take preventative steps, here are some things to do.1) Invest in personal data removal services:Proactively remove your personal information from online data brokers and people search sites to minimize the risk of linking anonymized genetic data back to you. Not only will this clean up and prevent your health and genetic data from circulating the web, but itll also make it much harder for your anonymized data (genetic or otherwise) to be linked to you. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.Check out my top picks for data removal services here.2) Choose reputable companies: Select well-known and trusted DNA testing providers, as they are more likely to adhere to privacy and security standards due to public scrutiny.3) Review privacy options during sign-up: Pay close attention to privacy settings when registering your test kit. Many companies allow you to opt in or out of data sharing for research or marketing purposes.4) Limit data sharing: Carefully consider whether to permit your data to be shared with third parties. While you can revoke consent later, data already shared may not be fully retrievable or deletable.5) Delete data post-test: If youve already taken a test, review the companys privacy policy and delete your data if possible. Note that data shared with third parties may remain accessible.6) Avoid uploading data to third-party databases: Refrain from uploading your genetic information to external services, which may share data with law enforcement or other entities without clear consent.7) Consider anonymous testing: Use anonymous methods when submitting DNA samples, such as pseudonyms or alternative payment methods, to reduce traceability.Kurts key takeawaysYour DNA holds some of the most personal and sensitive information about you, and once its out there, you lose control over how its used. From potential privacy violations to emotional surprises and the challenges of deleting your genetic data, DNA testing kits come with risks that many dont recognize upfront. If youre considering diving into your genetic blueprint, ask yourself: Are you comfortable with this data potentially ending up in the hands of marketers, law enforcement or even a company you didnt agree to share it with?Have you ever used a DNA testing service, or do the risks give you pause? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 التعليقات ·0 المشاركات ·34 مشاهدة
  • Government seeks payments tech partner through 49m contract
    www.computerweekly.com
    Julien Eichinger - stock.adobe.cNewsGovernment seeks payments tech partner through 49m contractUK government wants tech partner to help it embed open banking functionality into its Gov.uk Pay platformByKarl Flinders,Chief reporter and senior editor EMEAPublished: 24 Feb 2025 15:45 The UK government has begun its search for an IT supplier to support its plan to build open banking capabilities into its payment platform.The Government Digital Service (GDS) is looking for a tech supplier to start work in July this year, in a three-year contract worth 49m.The GDS, which is part of the Cabinet Office, said it wants a payment service provider to underpin the Gov.uk Pay platform, specifically for processing credit and debit card payments and pay by bank (open banking) payments.Its search includes inviting small and medium-sized enterprises (SMEs) to bid for the multimillion-pound contract. Open banking specialisation is found in the fintech sector, which includes a large number of startup SMEs.The Gov.uk Pay platform enables central government, local authorities, police forces and the NHS to take payments for their services digitally, reducing financial processes and the administrative burden.According to the government, Gov.uk Pay processed over 94 million transactions since its launch in September 2016, worth about 6bn. Gov.uk Pay is a common tool that is built once and used many times by more than 1,000 different public sector services, saving the public sector time, money and reducing duplication of effort, the government said.Read more about open bankingThe UK retail banking sector is at thebeginning of a journey towards to a more competitive futureas new regulation hits them.The dominant use of direct debit to make payments could diminish when UK consumers are offered more control of recurring payments from July throughvariable recurring payments.Open banking has had a major impact on the banking industry as finance forms harness data for better services, but thenext phase promises more.It also offers a consistent, trusted and accessible user experience, making it quick and easy for citizens to pay for public sector services. Pay has achieved significant realised benefits, saving the public sector money, and the contract includes the option for two year-long extensions.Through application programming interfaces (APIs), open banking enables banking details to be shared by consumers with third-party apps and websites if permission is granted.In 2018, UK banks were required to implement the Competition and Markets Authority open banking regulations, which led to the development of APIs in banking to give consumers more control over their accounts.The end goal was to increase competition in a sector dominated by big financial services companies. Customer banking data is shared by the industry through APIs, with customer permission, enabling businesses to offer tailored products.According to recent figures from Open Banking Limited (OBL), the implementation authority for open banking, there are now about 11.7 million active users of open banking-enabled products in the UK, and over 22.1 million open banking payments are made monthly.The OBL said there has been a total of 400 million successful open banking payments made since 2018, and added that there is an open banking ecosystem in the UK worth 4bn to the economy.In January,Marion King, chair and trustee at the OBL, said: As we reflect on the last seven years, we should be collectively proud of the financial innovation and the benefits open banking delivers to consumers and businesses, as well as the wider economy. Were at a pivotal stage in the evolution of open banking, with legislation and regulation coming forward that will not only put it on a commercially sustainable footing fit for the long term, but also move us towards open finance and other smart data schemes.In The Current Issue:AI Action Summit: Global leaders decry AI red tapeNavigating the practicalities of AI regulation and legislationDownload Current Issue
    0 التعليقات ·0 المشاركات ·37 مشاهدة
  • European Union calls for more cyber data-sharing with Nato
    www.computerweekly.com
    koya979 - stock.adobe.comNewsEuropean Union calls for more cyber data-sharing with NatoUpdates to the EUs Cyber Blueprint, establishing best practice for multilateral security incident response in Europe, include calls for more collaboration with Nato member states, as the geopolitical environment becomes ever more fractiousByAlex Scroxton,Security EditorPublished: 24 Feb 2025 14:45 The European Union (EU) has issued updated recommendations for its blueprint on cyber security crisis management and incident response, reflecting an increasingly charged security environment and growing potential threats to the 27-state bloc, candidate countries and non-member neighbours such as the UK.The Cyber Blueprint is a non-binding instrument that does not supersede national cyber security policies in Europe, but is rather designed to enable so-called Union actors meaning EU-level individual entities and networks to understand how best to interact and make the best use of available mechanisms in the event of a major cyber incident affecting individual EU member states, or the EU as a whole.Depending on its cause and impact, such an incident could escalate into a full-blown crisis affecting the workings of the EU internal market, and posing serious public security and safety risks for millions. In an increasingly interdependent Union economy, disruptions from cyber security incidents can have far-reaching impacts across various sectors, said executive vice-president for tech sovereignty, security and democracy Hanna Virkkunen.The proposed cyber security blueprint reflects our commitment to ensuring a coordinated approach, leveraging existing structures to protect the internal market and uphold vital societal functions, she said. This recommendation is a crucial step forward in reinforcing our collective cyber resilience.Among other things, the blueprint sets out what a cyber crisis is and what would trigger cyber crisis mechanisms at Union level. It also explains the various available mechanisms, such as the Cybersecurity Emergency Mechanism, that will help prepare incident response, management and recovery operations.Brussels is increasingly concerned that such an incident would form part of a wider geopolitical crisis very likely involving Russia and the US, with potential flashpoints aroundUkraine, Moldova or the Baltics that would activate a Nato military response. As such, the revisions additionally aim to promote more structured cooperation between civilian and military organisations.In this regard, it calls for the European cyber crisis liaison organisation network (EU-CyCLONe), as well as the EU Cyber Commanders Conference, the EU network of Military Computer Emergency Response Teams Operational Network (MICNET), and the Computer Security Incident Response Teams (CSIRTs) Network, as well as a future EU Cyber Defence Coordination Centre, to cooperate to develop common situational awareness between the civilian and military cyber spheres.Read more about EU cyber policyThe EU AI Act builds on existing cyber security, privacy and data governance regulationssuch as GDPR.We look at the new EU regulation for cyber resiliency, the role of IT asset management in auditingand third-party risks.A significant minority of financial services organisations in the UK will not be fully compliant with the EUs DORAcyber and risk management regulation.Such cooperation would take into account pre-existing arrangements, such as the CERT-EU/Nato technical agreement, which dates back nine years, and should endeavour to establish appropriate contact points into Nato in the event of a major cyber crisis, in order to share data and coordinate crisis response mechanisms.To this end, the blueprint reads, the Union should explore ways to improve information sharing capabilities with Nato, including through possible interconnections between their respective communication and information systems.Brussels also wants European Commission services and the European External Action Service (EEAS) to consider organising a joint staff exercise to test collaboration in the event of a large-scale cyber incident affecting Nato states in Europe, including ones in which Articles 4 and 5 of the Nato Treaty are triggered.Article 5, the cornerstone clause of the Nato Treaty, establishes that a military attack on one member is a military attack on all. It has been invoked once, in the wake of the 9/11 terrorist attacks in the US.Article 4, which is lesser known, establishes principles for multilateral consultation when a member considers its territorial integrity, political independence and security threatened. It has been invoked seven times in the alliances history, and never prior to the year 2000, five times relating to incidents arising from the 2003 invasion of Iraq and the Syrian civil war, and twice in relation to Russias continued aggression against Ukraine.Given the exposure of candidate countries and the potential of cyber incidents taking place in the Unions neighbourhood, joint exercises involving candidate countries should be considered, said the EU.The EUs full recommendations can be downloaded here.In The Current Issue:AI Action Summit: Global leaders decry AI red tapeNavigating the practicalities of AI regulation and legislationDownload Current Issue
    0 التعليقات ·0 المشاركات ·48 مشاهدة
  • Need to download lots of Kindle books fast? The secret but risky trick that worked for me
    www.zdnet.com
    ZDNETFebruary 26 is this coming Wednesday. That's how long you have to download your Kindle books as files to your computer. We discussed the deadline at length in my previous article.If you have a lot of Kindle books that you want to download and backup, it will take you about five clicks per book. If you're like my wife, Denise, who has a few thousand books, you're looking at something on the order of 10,000 clicks and a very sore wrist between now and Wednesday. Also: Download your Kindle books right now - Amazon is killing this option in a few daysBut I found a hack that can let you bulk download 25 books at a time. In her case, that reduces the clicks from about 10,000 to a few more than 50. This makes it practical to save your library to your personal storage. Since time is of the essence, let's get to it. Warnings and disclaimers To do this, you're going to need to install a Chrome plugin that lets you run any JavaScript script you want on web pages. It's very powerful, and it's equally very dangerous. The plugin, Tampermonkey, has been around in one form or another for years, but it's still a third-party plugin that can modify everything in your browser. We'll be downloading some JavaScript source code from GitHub. I looked over the code before we installed it on my wife's machine and it seems benign. But who knows if it will change between when I checked it over and when you install and use it? It's probably fine, but my point is you need to know you're walking on a cliff's edge, and you need to take care. Also: If COBOL is so problematic, why does the US government still use it?You're going to change a bunch of browser settings that could also open your browser to mischief. I'll recommend you return it to normal when you're done, but this is your warning. When the script runs, your screen will flash. If you're sensitive to flashes, you'll want to consider giving this process a pass, or at least avoid staring at the screen while it runs. Now, the disclaimer. This works on my wife's machine. I have no idea if it will work on yours. I have no idea, even though it worked on Friday, whether or not it will break on Tuesday. If it doesn't work, don't come crying to me. I can't help you. If you can't download all your books, don't come crying to me. If this stuff causes your computer to become corrupted, and you lose everything, and the Earth crashes into the sun, don't come crying to me. Also: The best AI for coding in 2025 (and what not to use)I'll tell you exactly what I told my wife. I'm telling you this thing is here. I'm advising against it. But if you want to go ahead and run the risks, good luck. But don't come crying to me or ZDNET or your local deity if something doesn't work out. Got it? Good. Now, let's do this thing. Caveat: Make sure you have a pre-registered device My wife has a whole stable of Kindle devices of various ages, all registered to her account. I'm not a big fan of the Kindle devices. I prefer reading my books on my iPhone. As such, I didn't have any Kindle devices registered to my Amazon account. So, when I tried running the procedure below in my account, I got this message. Screenshot by David Gewirtz/ZDNETSo we tried deregistering two of her older devices (a Kindle 3 with WiFi and a Kindle Fire HD) from her account. Then we tried registering them to my account. Even with two-factor authentication turned off, they simply would not register. Some Googling implied you can't register many older Kindle devices. Also: The best Kindles of 2025: Expert tested and reviewedShe is rather peeved that she now can't seem to re-register those devices. I turned my 2FA back on, as did she. But we are nothing if not persistent. This was Friday night and we still had until Wednesday to backup my books. So I bought a new Kindle, a little hundred dollar one. It arrived Saturday morning, I registered it to my account, and I got the same error message even though I have an actual, physical, current-day Kindle now registered to my account. Screenshot by David Gewirtz/ZDNETWe contacted tech support back for one more try. After the usual frustration, we finally landed on this truth: you can't get there from here. Apparently, new Kindles are already barred from downloading Kindle files to a local computer. Screenshot by David Gewirtz/ZDNETI asked, "So are all new Kindle devices (again, prior to Wednesday's deadline) prohibited from downloading books via USB?" and I was told, "Yes." Thwarted. Damn you, Bezos!! So, don't think that if you don't have a Kindle registered, you can overnight yourself a Kindle to save your library. On the other hand, if you already have a Kindle registered to your account, follow the remaining steps before it's too late. Step 1: Install Tampermonkey This works in Chrome. It might work in other browsers, but we're doing it in Chrome. Under the 3-dot menu at the upper right of Chrome, scroll down that menu to Extensions, then choose Visit Chrome Web Store. Screenshot by David Gewirtz/ZDNETPay attention to the Manage Extensions submenu as well. We'll be back for that in a little while. Now that you're in the Chrome Web Store, choose Extensions and search for "Tampermonkey." Once you find it, click Add to Chrome. Screenshot by David Gewirtz/ZDNETGo up to the little puzzle piece icon on your browser bar, click it, and turn on the pin (making it blue). That will put the Tampermonkey icon on your browser bar. Screenshot by David Gewirtz/ZDNET Step 2: Turn on Chrome's developer mode Go back to Chrome's 3-dot menu, scroll down again to Extensions, and this time select Manage Extensions. You'll be taken to a screen with all your Chrome extensions. Some of these screenshots are a little hard to see. You can click the squares at the upper right of the images to enlarge them. Screenshot by David Gewirtz/ZDNETTurn on developer mode. According to the Tampermonkey extension, this allows them to do some actions that Chrome would otherwise prohibit. Step 3: Disable ask where to save The magical little script we're going to run automatically downloads 25 books at a time. To reduce the number of button clicks, we don't want to have to specify a download location for each book. So, go back to the 3-dot menu, and scroll down to Settings. Click downloads from the menu on the left. Screenshot by David Gewirtz/ZDNETYou need to do a few things here. First, choose where you want your books. My wife set up a special download folder for her incoming book files, which she then later moved to their final home. Second, and this is the most important, make sure "Ask where to save each file before downloading" is turned off. Third, turn off "Show downloads when they're done." Step 4: Copy the download script from GitHub Now, we're starting to get to the magic. Point your browser to this URL on GitHub. This page contains a script by Chris Hollindale. Screenshot by David Gewirtz/ZDNETNotice on the right hand side the double-square icon. Click it to copy the script to your clipboard. Step 5: Install the script into Tampermonkey Click on the Tampermonkey icon on your browser bar and choose "Create a new script" from the Tampermonkey menu. Screenshot by David Gewirtz/ZDNETPaste the script that should still be in your clipboard into the provided edit field. Then from under Tampermonkey's File menu, select Save. Don't worry about the New Userscript title at the top of the page. That will change automatically. Screenshot by David Gewirtz/ZDNET Step 6: Tweak the script Next, we're going to make one, and possibly a second tweak to the script. On the Amazon Kindle Book Downloader line, click the Edit icon. Screenshot by David Gewirtz/ZDNETYou're back in the script. Scroll down to line 98 and look for the line that begins with console.log. This tells the script to put a message in the console log of Chrome. Screenshot by David Gewirtz/ZDNETThe problem is that you have to have to console open to see the message and it's not exactly clear when the script is done running. The script does a lot of simulated screen actions, with pauses between them. Instead, we want to see an alert dialog box. So change the instruction "console.log" (including the dot between console and log) to "alert." Screenshot by David Gewirtz/ZDNETIf you're in the US and use the US Amazon store, you're done. Click Save under the File menu like you did in the last step. If you're not in the US, you might -- might -- be able to still use this script. At the top of the script, on line 7, change the Amazon URL (just the part I've highlighted) to the one for your country. There's no guarantee this will work because other Amazons might have different URL structures. But it's worth a shot, right? Screenshot by David Gewirtz/ZDNETSelect Save from the File menu. Step 7: Navigate to your Kindle books library Point your browser back to Amazon. From the Account & Lists menu, select Content Library. Then click on Books. Screenshot by David Gewirtz/ZDNET Step 8: Show only your purchases The download script will only work on books you've actually purchased. Samples or Kindle Unlimited books, or any other category of content will break the script. This is Denise's library. Notice it has 2055 items. Screenshot by David Gewirtz/ZDNETNext to the menu for Books is a filter menu. Instead of All, select Purchases. Screenshot by David Gewirtz/ZDNETDoing this filtered out a lot of items that can't be downloaded, leaving her with 1,282 books to download. Screenshot by David Gewirtz/ZDNET Step 9: Download one book To make sure you have a default Kindle selected so the script will run, select Download & transfer via USB for one of your books on the current page. Then, select a Kindle from the list and click Download. Screenshot by David Gewirtz/ZDNETGo into your download folder and remove that file, so you don't get any duplicate file errors when you download the entire page. Step 10: Download your library Finally, it's time to download your library, 25 books at a time. Before we push the final button, another warning. This script does things with the currently visible web page. Once you click the script, keep your hands off your keyboard and mouse. Do not touch anything. Just let the script run. Okay, with that, look in the upper right corner of your screen. Screenshot by David Gewirtz/ZDNETYou'll see a green Trigger Download button. That button will only appear on your content library's book pages. Go ahead and click the button and wait until you see the "All dropdowns processed" dialog box. Scroll to the bottom of the page, select the next page from the page numbers, and hit Trigger Download again. Keep it up, all while keeping your hands off the keyboard once you hit the button, until you have downloaded all your books. My wife's technique was to download a page's worth of books and count to see if she had all 25. If not (this happened two or three times), she individually downloaded the missing books. Then she moved all of the files from the download folder into a more permanent location. All told, it probably took a couple of hours to complete the process. In between button presses, she kept busy (and hands off the keyboard) by reading a book on one of her Kindles. After it's over Make sure you reset things back to the way they were: Remove Tampermonkey from your Chrome extensionsTurn off developer modeSet your browser back to asking where to put downloads, if that was your choiceReset your Kindle Books filter to All, if that's what you want Were you able to save your books? Have you backed up your Kindle library yet? Did you find this method useful, or do you have another way to save your books? Are you concerned about Amazon restricting downloads in the future? Do you think digital purchases should always come with an easy backup option? Let us know in the comments below. You can follow my day-to-day project updates on social media. Be sure to subscribe to my weekly update newsletter, and follow me on Twitter/X at @DavidGewirtz, on Facebook at Facebook.com/DavidGewirtz, on Instagram at Instagram.com/DavidGewirtz, on Bluesky at @DavidGewirtz.com, and on YouTube at YouTube.com/DavidGewirtzTV.Featured
    0 التعليقات ·0 المشاركات ·48 مشاهدة
  • I tested this 16-inch Asus laptop with a 3K OLED display - and it's a game-changer for creatives
    www.zdnet.com
    The Asus Zenbook S 16 is an eye-catching laptop crafted from the brand's unique 'ceraluminum' material, but the stunning OLED display truly takes center stage.
    0 التعليقات ·0 المشاركات ·42 مشاهدة
  • Popular Google Chrome Extensions Killed Off
    www.forbes.com
    Chrome is blocking access to older extensions Photothek via Getty ImagesThe shutter is coming down on widely used Google Chrome extensions that havent been updated to a new version of the software.Google warned last year that it was barring access to extensions that hadnt updated to latest Manifest V3 framework. The new framework improves security, according to Google, but it also disables features used in popular ad blockers and other types of extension.Affected extensions include uBlock Origin, a widely used ad blocker that last year warned the changes would disrupt how its extension works. Manifest V3 is the latest version of the Chrome Extensions platform manifest, the company wrote on its website.It introduces several changes intended to enhance security, privacy, and performance. One of the most significant changes is the modification of the webRequest API, which many content blockers use to intercept and modify network requests.The company has released a more limited version of its extension, called uBlock Origin Lite, which is compatible with the new manifest. However, users are now reporting that the old uBlock Origin is being disabled in their Chrome browser. Extensions that have been abandoned by their developers are also likely to fall foul of the new requirement.Google Chrome Extension AngerIts fair to say not everyones amused by Googles move to effectively shut down uBlock Origin, with Reddit users saying they will turn to rival browsers such as Firefox, which do still allow the extension to work as it did originally.The Brave browser, which is based on the same Chromium engine as Google Chrome, also pledged that it would continue to support V2 extensions for now in a blog post published last summer.As of now, the MV2 extensions we plan to explicitly support are AdGuard AdBlocker, NoScript, uBlock Origin, and uMatrix, the company wrote on its blog.This feature will be best-effort: we might have to modify support based on either Googles plans or what extension authors ultimately decide to do. If extensions become stale or obsolete, we may remove support for them rather than offer our users an out-of-date (potentially even unsafe) experience.Users must toggle a setting in the Brave browser to continue using the Manifest V2 extensions.Google has thrown a bone to businesses still relying on V2 extensions by extending the deadline for enterprises until June 2025. These companies need to tweak a policy setting to ensure that their users can continue to run the older extensions.How To Tell If Your Chrome Extensions Are DisabledIf you want to check whether any of your Chrome extensions have been affected by the new policy, click the little puzzle piece icon at the top of the browser and click Manage Extensions, or visit chrome://extensions (link only works in Chrome).You should see a warning under Updates if any of your installed extensions are no longer supported or are about to be removed.Several browsers now include blocking tools as part of the browser, rather than reyling on extensions to add the function. Brave and Vivaldi are among the browsers with built-in ad blockers, although some sites block visitors running ad blockers because it deprives them of revenue.
    0 التعليقات ·0 المشاركات ·49 مشاهدة
  • Transforming Telecom Operations Through Agentic And Generative AI
    www.forbes.com
    AI-driven transformation in telecom is well underway, with network operators pursuing varied AI ... [+] strategies to improve both subscriber experiences and operational results.Wikimedia Commons user Anggisp, used under CC BY-SA 4.0 licenseModern AI, encompassing generative and agentic solutions, continues to be at the forefront of technology conversations. Its ability to improve productivity, enhance customer experiences, optimize decision making and foster dramatic improvements in business efficiency makes it one of the most important advancements in the history of technology, eclipsing the advent of cloud computing. Mobile network operators in growing numbers are taking note, embracing the power of generative AI and rapidly evolving agentic AI applications to not only improve network performance, but also reimagine front- and back-office operations.In this piece, I will dig deeper into several telecom service providers that I believe are embracing the power of modern AI to significantly improve subscriber experiences and in the process transform operational efficiency and service delivery including AT&T, NTT Docomo, SK Telecom, T-Mobile and Deutsche Telekom, Verizon and Vodafone.AT&T Embraces AI For Customers And Internal OperationsAT&T has long adopted AI to enhance its network operations and elevate subscriber experiences. I recently wrote about these efforts after spending time with the carriers consumer broadband and wireless services executive leader, Jenifer Robertson. However, one of its most ambitious AI initiatives is Ask AT&T, an internal AI-powered chatbot launched in 2023 that was originally targeted for use by its software developers. Today, Ask AT&T is used by nearly two-thirds of its 150,000 employees extending into customer support, financial analysis, supply chain management, retail foot traffic analysis and other use cases.Unlike conventional tools that require laborious queries, Ask AT&T enables employees to interact with it using natural language to reduce the time it takes to resolve customer issues. Digging deeper, the tool allows support staff to identify trends, merge data sources and even generate complex queries to extract insights from vast troves of network data. AT&T claims that Ask AT&T has allowed its developers to reduce coding time up to 30%, as well as save customer service agents several minutes per inbound call. Those are impressive business outcomes, ones that potentially have the power to accelerate new service delivery, reduce subscriber churn and ultimately return higher levels of profitability in a telecom industry fraught with challenges for both capital and operational expense.Broadly speaking, AT&T is also leveraging generative AI for predictive network maintenance. The company touts its deployment and continual training of large language models as allowing it to anticipate network congestion, detect potential service disruptions and automate corrective measures before customers experience issues. Analyzing historical and real-time network performance data is at the center of this capability, and the opportunity to move from a reactive to proactive stance has great potential to deliver high availability for connectivity services while reducing operational costs.NTT Docomo Deploys AI For Better Network ManagementNTT Docomo has integrated AI at the core of its network management strategy. The Japanese telecom giant employs AI-driven predictive analytics to enhance network performance, minimize latency and improve spectrum efficiency. To achieve these outcomes, its AI models dynamically adjust network parameters to pursue optimal connectivity for its subscribers by constantly analyzing data from millions of connected devices. These efforts are something that I have written about in the past after spending time with the operator in Japan.Its also worth highlighting that NTT Docomo partnered with Nokia last year to develop an AI-native air interface proof of concept 6G AI-AI. Many speculate that future 3GPP 6G standards will incorporate AI in the radio access network layer, and many potential benefits could come from this. Efficiencies include improved connectivity performance, higher availability and lower power consumption. Deploying and managing more sustainable network infrastructure is also a critical consideration, given the financial challenges faced by European mobile network operators in the current geopolitical climate. Power consumption also represents the largest operational expense for mobile service providers globally, and the findings that arise from 6G AI-AI may play a role in mitigating the financial impact in the longer term by significantly improving energy efficiency.SK Telecom Harnesses Agentic AI Beyond Customer SupportAt CES last month, Korean operator SK Telecom announced a subscriber beta registration for its AI-driven personal agent Aster. Expected to launch in March, Aster is meant to allow users to employ a single application that leverages agentic AI to move beyond answering simple questions. Aster is designed to understand intent to set goals and complete complex tasks. Its an ambitious endeavor, and one of the first uses of agentic AI by a mobile service provider to enable a host of use cases that extend beyond telecom customer support into lifestyle and personal tasks.To achieve its vision for Aster, SK Telecom is wisely collaborating with global search providers, large language model providers and application developers. This is creating a broad ecosystem to support its adoption not only in South Korea, but new markets including North America. From my perspective, Aster could serve as the tip of the spear not only for showcasing SK Telecoms technical innovation on the global stage, but also in capturing more subscriber share in its core operating market.T-Mobile And Deutsche Telekom Use AI For Customer EngagementT-Mobile and its parent company, Deutsche Telekom, are betting big on AI to transform customer engagement. In collaboration with OpenAI, T-Mobile has developed IntentCX, an AI-powered customer support platform designed to understand customer needs, predict intent and automate responses. Unlike traditional chatbots that rely on predefined scripts, IntentCX uses generative AI to dynamically create responses based on the context of customer interactions.Over time, T-Mobile and Deutsch Telekom intend to automate up to 75% of customer service interactions using IntentCX, which would prove its efficacy as a self-service tool. From my perspective, it has great potential to resolve issues quickly, provide a better customer experience and liberate staffers to engage in more value-added services to ensure high customer satisfaction.AI based on real-time user behavior on its networks also helps T-Mobile and Deutsch Telekom personalize offers, detect fraudulent activities and optimize network performance. Additionally, AIOps is used to analyze network usage patterns, optimize resource allocation and assist in infrastructure planning by identifying areas with growing demand for connectivity. The companies claim that their investments in AI have the potential to grow subscribership by nearly 5% over the next two years on an annualized basis. From my perspective, that number could potentially be larger if execution is flawless.Verizon Emphasizes Edge Computing Across 5G Private NetworksVerizon has recognized the potential to seek new profit pools using modern AI. The operator has been closely monitoring how AI impacts the smartphone ecosystem, buoyed by Qualcomms innovations with AI-powered features in flagship devices from Apple, Samsung and others. Its early days, and there is still a lot to be desired, especially with Apple Intelligence. However, AI-infused capabilities should improve over time and foster new monetization opportunities as well as innovative user functionality.From an enterprise services perspective, Verizon announced a partnership with Nvidia late last year to supercharge AI workloads on 5G private networks coupled with mobile edge computing. This effort combines Verizons secure, low-latency 5G private network offering with Nvidias AI Enterprise software platform, enabling real-time AI services on-premises for enterprise customers. The solution supports compute-intensive applications, including generative AI models, computer vision and augmented reality, by providing ultra-low latency, high bandwidth, enhanced security and intelligent micro-segmentation. The applications for this are effectively limitless, including digital twinning, manufacturing automation, retail foot traffic analysis and smart replenishment, improved efficiencies in transportation and logistics and more.To further its AI ambitions, the company recently announced Verizon AI Connect, an integrated suite of solutions that enable businesses to deploy AI workloads at scale. From an initial assessment, I interpret it as a catch-up exercise, given that AT&T and T-Mobile have clearly demonstrated more depth and investment in AI to date in North America. Time will tell whether Verizon is successful with this endeavor, but if it works out, the big bet in edge enablement could pay dividends and serve as a differentiator.Vodafone Collaborates With GoogleMany may not be aware that Vodafone recently entered a decade-long partnership with Google valued at more than $1 billion, to integrate Googles generative AI capabilities into its mobile services portfolio. The collaboration enables Vodafone to offer Googles AI-powered devices, such as Pixel smartphones, to customers across Europe and Africa while also embedding AI capabilities into its network and customer support infrastructure.Vodafones objective for the infrastructure integration is to unlock AI-powered customer insights. By analyzing anonymized customer call transcripts, Vodafone wants to leverage the power of AI to generate more accurate summaries, identify service pain points and enable more efficient issue resolution. The collaboration is also intended to facilitate AI-powered RAN site assessments and use AI-powered tools to optimize network functionality through predictive maintenance and ongoing configuration tasks.Telecom AI For The Win-WinThe AI-driven transformation of the telecom industry is well underway, and while the telecom providers highlighted have varying strategic focuses, there is a common thread: generative and agentic AI have the potential to elevate subscriber experiences and bring dramatic improvements to operational efficiency.By all measures, its a win-win. Carriers will find new ways to innovate, monetize and more efficiently manage the operational aspects of service delivery through AI at scale, and (hopefully) delight subscribers along the way. Mobile World Congress Barcelona, slated for the first week of March, should provide a further view into these ongoing efforts, and I will share my insights in an event wrap-up after the conference.Moor Insights & Strategy provides or has provided paid services to technology companies, like all tech industry research and analyst firms. These services include research, analysis, advising, consulting, benchmarking, acquisition matchmaking and video and speaking sponsorships. Of the companies mentioned in this article, Moor Insights & Strategy currently has (or has had) a paid business relationship with AT&T, Google, Nokia, NTT, Nvidia, Qualcomm, Samsung, T-Mobile and Verizon.Editorial StandardsForbes Accolades
    0 التعليقات ·0 المشاركات ·51 مشاهدة