• Over 8M patient records leaked in healthcare data breach

    Published
    June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles!
    In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work  Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data     How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop  5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication. It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    #over #patient #records #leaked #healthcare
    Over 8M patient records leaked in healthcare data breach
    Published June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles! In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work  Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data     How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop  5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication. It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #over #patient #records #leaked #healthcare
    WWW.FOXNEWS.COM
    Over 8M patient records leaked in healthcare data breach
    Published June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles! In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work   (Kurt "CyberGuy" Knutsson)Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data      (Kurt "CyberGuy" Knutsson)How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop   (Kurt "CyberGuy" Knutsson)5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication (2FA). It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    Like
    Love
    Wow
    Sad
    Angry
    507
    0 Yorumlar 0 hisse senetleri 0 önizleme
  • Researchers genetically altered fruit flies to crave cocaine

    Fruit flies don't naturally enjoy the taste of cocaine. Credit: Deposit Photos

    Get the Popular Science daily newsletter
    Breakthroughs, discoveries, and DIY tips sent every weekday.

    In a world first, scientists at the University of Utah have engineered fruit flies susceptible to cocaine addiction. But as strange as it sounds, there are potentially life-saving reasons for genetically altering the insects to crave the drug. The novel biological model could help addiction treatment therapies development and expedite research timelines. The findings are detailed in the Journal of Neuroscience.
    As surprising as it may sound, humans have a lot in common with fruit flies. In fact, we share around 70–75 percent of the same genes responsible for various diseases, as well as many of the same vital organs. Researchers have relied on the insects for genetic studies for years, especially for investigating the biological roots of certain addictions like cocaine abuse. This is due in large part to the fruit fly’s quick life cycle and its comparatively simple genetic makeup. But while scientists have administered the drug to the bugs in the past, there’s always been a small problem.
    “Flies don’t like cocaine one bit,” Adrian Rothenfluh, the study’s senior author and an associate professor of psychiatry, said in a statement.
    Even when previously introduced to cocaine, Rothenfluh’s team noted that the insects routinely opted for pure sugar water over sugar water laced with cocaine. Study first author Travis Philyaw theorized the reason may reside in a fly’s sense of taste that is found on their legs.
    “Insects are evolutionarily primed to avoid plant toxins, and cocaine is a plant toxin,” Philyaw explained. “They have taste receptors on their ‘arms’—their tarsal segments—so they can put their hand in something before it goes in their mouth, and decide, ‘I’m not going to touch that.'”
    After confirming that cocaine activates a fruit fly’s bitter-sensing taste receptors, Rothenfluh and Philyaw switched off those nerves. Once deactivated, there was little to stop the flies from developing a cocaine habit. These modified flies were subsequently introduced to sugar water infused with a low concentration of cocaine. Within 16 hours, the insects indicated a preference for the drug-laced drink.
    “At low doses, they start running around, just like people,” said Rothenfluh. “At very high doses, they get incapacitated, which is also true in people.”
    Now that researchers know how to breed the modified fruit flies, they can more easily study how cocaine addiction evolves in the body. Not only that, but they can do so on a much faster timeline by analyzing hundreds of genes at a time.
    “We can scale research so quickly in flies,” said Philyaw. “We can identify risk genes that might be difficult to uncover in more complex organisms, and then we pass that information to researchers who work with mammalian models.”
    From there, scientists can identify treatment targets that help link to human therapy options.
    “We can really start to understand the mechanisms of cocaine choice, and the more you understand about the mechanism, the more you have a chance to find a therapeutic that might act on that mechanism,” explained Rothenfluh.
    #researchers #genetically #altered #fruit #flies
    Researchers genetically altered fruit flies to crave cocaine
    Fruit flies don't naturally enjoy the taste of cocaine. Credit: Deposit Photos Get the Popular Science daily newsletter💡 Breakthroughs, discoveries, and DIY tips sent every weekday. In a world first, scientists at the University of Utah have engineered fruit flies susceptible to cocaine addiction. But as strange as it sounds, there are potentially life-saving reasons for genetically altering the insects to crave the drug. The novel biological model could help addiction treatment therapies development and expedite research timelines. The findings are detailed in the Journal of Neuroscience. As surprising as it may sound, humans have a lot in common with fruit flies. In fact, we share around 70–75 percent of the same genes responsible for various diseases, as well as many of the same vital organs. Researchers have relied on the insects for genetic studies for years, especially for investigating the biological roots of certain addictions like cocaine abuse. This is due in large part to the fruit fly’s quick life cycle and its comparatively simple genetic makeup. But while scientists have administered the drug to the bugs in the past, there’s always been a small problem. “Flies don’t like cocaine one bit,” Adrian Rothenfluh, the study’s senior author and an associate professor of psychiatry, said in a statement. Even when previously introduced to cocaine, Rothenfluh’s team noted that the insects routinely opted for pure sugar water over sugar water laced with cocaine. Study first author Travis Philyaw theorized the reason may reside in a fly’s sense of taste that is found on their legs. “Insects are evolutionarily primed to avoid plant toxins, and cocaine is a plant toxin,” Philyaw explained. “They have taste receptors on their ‘arms’—their tarsal segments—so they can put their hand in something before it goes in their mouth, and decide, ‘I’m not going to touch that.'” After confirming that cocaine activates a fruit fly’s bitter-sensing taste receptors, Rothenfluh and Philyaw switched off those nerves. Once deactivated, there was little to stop the flies from developing a cocaine habit. These modified flies were subsequently introduced to sugar water infused with a low concentration of cocaine. Within 16 hours, the insects indicated a preference for the drug-laced drink. “At low doses, they start running around, just like people,” said Rothenfluh. “At very high doses, they get incapacitated, which is also true in people.” Now that researchers know how to breed the modified fruit flies, they can more easily study how cocaine addiction evolves in the body. Not only that, but they can do so on a much faster timeline by analyzing hundreds of genes at a time. “We can scale research so quickly in flies,” said Philyaw. “We can identify risk genes that might be difficult to uncover in more complex organisms, and then we pass that information to researchers who work with mammalian models.” From there, scientists can identify treatment targets that help link to human therapy options. “We can really start to understand the mechanisms of cocaine choice, and the more you understand about the mechanism, the more you have a chance to find a therapeutic that might act on that mechanism,” explained Rothenfluh. #researchers #genetically #altered #fruit #flies
    WWW.POPSCI.COM
    Researchers genetically altered fruit flies to crave cocaine
    Fruit flies don't naturally enjoy the taste of cocaine. Credit: Deposit Photos Get the Popular Science daily newsletter💡 Breakthroughs, discoveries, and DIY tips sent every weekday. In a world first, scientists at the University of Utah have engineered fruit flies susceptible to cocaine addiction. But as strange as it sounds, there are potentially life-saving reasons for genetically altering the insects to crave the drug. The novel biological model could help addiction treatment therapies development and expedite research timelines. The findings are detailed in the Journal of Neuroscience. As surprising as it may sound, humans have a lot in common with fruit flies. In fact, we share around 70–75 percent of the same genes responsible for various diseases, as well as many of the same vital organs. Researchers have relied on the insects for genetic studies for years, especially for investigating the biological roots of certain addictions like cocaine abuse. This is due in large part to the fruit fly’s quick life cycle and its comparatively simple genetic makeup. But while scientists have administered the drug to the bugs in the past, there’s always been a small problem. “Flies don’t like cocaine one bit,” Adrian Rothenfluh, the study’s senior author and an associate professor of psychiatry, said in a statement. Even when previously introduced to cocaine, Rothenfluh’s team noted that the insects routinely opted for pure sugar water over sugar water laced with cocaine. Study first author Travis Philyaw theorized the reason may reside in a fly’s sense of taste that is found on their legs. “Insects are evolutionarily primed to avoid plant toxins, and cocaine is a plant toxin,” Philyaw explained. “They have taste receptors on their ‘arms’—their tarsal segments—so they can put their hand in something before it goes in their mouth, and decide, ‘I’m not going to touch that.'” After confirming that cocaine activates a fruit fly’s bitter-sensing taste receptors, Rothenfluh and Philyaw switched off those nerves. Once deactivated, there was little to stop the flies from developing a cocaine habit. These modified flies were subsequently introduced to sugar water infused with a low concentration of cocaine. Within 16 hours, the insects indicated a preference for the drug-laced drink. “At low doses, they start running around, just like people,” said Rothenfluh. “At very high doses, they get incapacitated, which is also true in people.” Now that researchers know how to breed the modified fruit flies, they can more easily study how cocaine addiction evolves in the body. Not only that, but they can do so on a much faster timeline by analyzing hundreds of genes at a time. “We can scale research so quickly in flies,” said Philyaw. “We can identify risk genes that might be difficult to uncover in more complex organisms, and then we pass that information to researchers who work with mammalian models.” From there, scientists can identify treatment targets that help link to human therapy options. “We can really start to understand the mechanisms of cocaine choice, and the more you understand about the mechanism, the more you have a chance to find a therapeutic that might act on that mechanism,” explained Rothenfluh.
    0 Yorumlar 0 hisse senetleri 0 önizleme
  • How Beige Became Shorthand for Everything Wrong With the World

    “Was your interior designer Ayn Bland?” Barely ten minutes into Mountainhead, the first feature film from Succession creator Jesse Armstrong, the viewer is confronted with one of the film’s central tenets: beige is bad.Articulated by Jeff, the movie does a lot to engage this train of thought. Its central characters—tech bro founders Randall, Hugo, and Venis—are pitted against not just each other, but the world writ large as it begins to crumble around them, mostly thanks to their own machinations.But when did our current beige malaise set in? Much of the recent divisiveness might be attributed to the Kardashians, whose homes are synonymous with muted putty tones: “less is more” taken to its only logical conclusion—least is best. The aesthetic has occasionally gone viral, with the TikTok account Sad Beige even garnering notoriety for documenting the lifelessness of children’s retail offerings in the voice of German documentary filmmaker Werner Herzog.Warner Bros.The cast of Mountainhead, the new HBO Original film from Succession creator Jesse Armstrong.Social media is as much a progenitor of the trend as it is the platform to document it and repackage it for frictionless consumption. Beige is safe, easy, legible—if your entire house has been unpacked from Amazon boxes, why fight the natural inclination to just live in one? The Mountainhead home might be the lair of a fictional tech boss, but the aesthetics remain the same up and down the corporate ladder.The color family has its own troubled history: “khaki,” which is derived from the Urdu term for “dusty,” originated in mid-19th-century colonial India, as the critic and author Andrea Codrington noted in an eerily prescient 2001 essay for Cabinet magazine that further elaborates on beige’s latent potential for evil. Mountainhead, then, sees the hue returning to its roots, becoming shorthand for what Armstrong sees as everything that’s wrong with the world: complacency, exhaustion, and boredom.MACALL POLAY. SMPSPAnother beige couch in the Mountainhead house. Armstrong’s camera treats the home, designed by local Utah firm Upwall Design, as a character in and of itself, with lingering shots of quietly humming servers, spiraling staircases and vacant driveways presenting solitude and menace as two sides of the same coin. Town & Country reported that production designer Stephen Carter liked the property for its The Shining-esque vibes. He wasn’t wrong. “There’s a solitary nature to that house, too,” star Steve Carrell told The Salt Lake Tribune. “You feel like you’re away from everything.”Another word for that feeling—articulated by scenes of the men laying about the home glued to their phones as scenes of worldwide terror stream in—would be dissociation. Think home is where the heart is? Mountainhead makes a compelling case that it's often just another a bad trip.Sean SantiagoDeputy EditorSean Santiago is ELLE Decor's Deputy Editor, covering news, trends and talents in interior design, hospitality and travel, culture, and luxury shopping. Since starting his career at an interior design firm in 2011, he has gone on to cover the industry for Vogue, Architectural Digest, Sight Unseen, PIN-UP and Domino. He is the author of The Lonny Home, has produced scripted social content for brands including West Elm and Streeteasy, and is sometimes recognized on the street for his Instagram Reels series, #DanceToDecor
    #how #beige #became #shorthand #everything
    How Beige Became Shorthand for Everything Wrong With the World
    “Was your interior designer Ayn Bland?” Barely ten minutes into Mountainhead, the first feature film from Succession creator Jesse Armstrong, the viewer is confronted with one of the film’s central tenets: beige is bad.Articulated by Jeff, the movie does a lot to engage this train of thought. Its central characters—tech bro founders Randall, Hugo, and Venis—are pitted against not just each other, but the world writ large as it begins to crumble around them, mostly thanks to their own machinations.But when did our current beige malaise set in? Much of the recent divisiveness might be attributed to the Kardashians, whose homes are synonymous with muted putty tones: “less is more” taken to its only logical conclusion—least is best. The aesthetic has occasionally gone viral, with the TikTok account Sad Beige even garnering notoriety for documenting the lifelessness of children’s retail offerings in the voice of German documentary filmmaker Werner Herzog.Warner Bros.The cast of Mountainhead, the new HBO Original film from Succession creator Jesse Armstrong.Social media is as much a progenitor of the trend as it is the platform to document it and repackage it for frictionless consumption. Beige is safe, easy, legible—if your entire house has been unpacked from Amazon boxes, why fight the natural inclination to just live in one? The Mountainhead home might be the lair of a fictional tech boss, but the aesthetics remain the same up and down the corporate ladder.The color family has its own troubled history: “khaki,” which is derived from the Urdu term for “dusty,” originated in mid-19th-century colonial India, as the critic and author Andrea Codrington noted in an eerily prescient 2001 essay for Cabinet magazine that further elaborates on beige’s latent potential for evil. Mountainhead, then, sees the hue returning to its roots, becoming shorthand for what Armstrong sees as everything that’s wrong with the world: complacency, exhaustion, and boredom.MACALL POLAY. SMPSPAnother beige couch in the Mountainhead house. Armstrong’s camera treats the home, designed by local Utah firm Upwall Design, as a character in and of itself, with lingering shots of quietly humming servers, spiraling staircases and vacant driveways presenting solitude and menace as two sides of the same coin. Town & Country reported that production designer Stephen Carter liked the property for its The Shining-esque vibes. He wasn’t wrong. “There’s a solitary nature to that house, too,” star Steve Carrell told The Salt Lake Tribune. “You feel like you’re away from everything.”Another word for that feeling—articulated by scenes of the men laying about the home glued to their phones as scenes of worldwide terror stream in—would be dissociation. Think home is where the heart is? Mountainhead makes a compelling case that it's often just another a bad trip.Sean SantiagoDeputy EditorSean Santiago is ELLE Decor's Deputy Editor, covering news, trends and talents in interior design, hospitality and travel, culture, and luxury shopping. Since starting his career at an interior design firm in 2011, he has gone on to cover the industry for Vogue, Architectural Digest, Sight Unseen, PIN-UP and Domino. He is the author of The Lonny Home, has produced scripted social content for brands including West Elm and Streeteasy, and is sometimes recognized on the street for his Instagram Reels series, #DanceToDecor #how #beige #became #shorthand #everything
    WWW.ELLEDECOR.COM
    How Beige Became Shorthand for Everything Wrong With the World
    “Was your interior designer Ayn Bland?” Barely ten minutes into Mountainhead, the first feature film from Succession creator Jesse Armstrong, the viewer is confronted with one of the film’s central tenets: beige is bad.Articulated by Jeff (Ramy Youssef), the movie does a lot to engage this train of thought. Its central characters—tech bro founders Randall (Steve Carrell), Hugo (Jason Schwartzman), and Venis (Cory Michael Smith)—are pitted against not just each other, but the world writ large as it begins to crumble around them, mostly thanks to their own machinations.But when did our current beige malaise set in? Much of the recent divisiveness might be attributed to the Kardashians, whose homes are synonymous with muted putty tones: “less is more” taken to its only logical conclusion—least is best. The aesthetic has occasionally gone viral, with the TikTok account Sad Beige even garnering notoriety for documenting the lifelessness of children’s retail offerings in the voice of German documentary filmmaker Werner Herzog.Warner Bros.The cast of Mountainhead, the new HBO Original film from Succession creator Jesse Armstrong.Social media is as much a progenitor of the trend as it is the platform to document it and repackage it for frictionless consumption. Beige is safe, easy, legible—if your entire house has been unpacked from Amazon boxes, why fight the natural inclination to just live in one? The Mountainhead home might be the lair of a fictional tech boss, but the aesthetics remain the same up and down the corporate ladder.The color family has its own troubled history: “khaki,” which is derived from the Urdu term for “dusty,” originated in mid-19th-century colonial India, as the critic and author Andrea Codrington noted in an eerily prescient 2001 essay for Cabinet magazine that further elaborates on beige’s latent potential for evil. Mountainhead, then, sees the hue returning to its roots, becoming shorthand for what Armstrong sees as everything that’s wrong with the world: complacency, exhaustion, and boredom.MACALL POLAY. SMPSPAnother beige couch in the Mountainhead house. Armstrong’s camera treats the home, designed by local Utah firm Upwall Design, as a character in and of itself, with lingering shots of quietly humming servers, spiraling staircases and vacant driveways presenting solitude and menace as two sides of the same coin. Town & Country reported that production designer Stephen Carter liked the property for its The Shining-esque vibes. He wasn’t wrong. “There’s a solitary nature to that house, too,” star Steve Carrell told The Salt Lake Tribune. “You feel like you’re away from everything.”Another word for that feeling—articulated by scenes of the men laying about the home glued to their phones as scenes of worldwide terror stream in—would be dissociation. Think home is where the heart is? Mountainhead makes a compelling case that it's often just another a bad trip.Sean SantiagoDeputy EditorSean Santiago is ELLE Decor's Deputy Editor, covering news, trends and talents in interior design, hospitality and travel, culture, and luxury shopping. Since starting his career at an interior design firm in 2011, he has gone on to cover the industry for Vogue, Architectural Digest, Sight Unseen, PIN-UP and Domino. He is the author of The Lonny Home (Weldon Owens, 2018), has produced scripted social content for brands including West Elm and Streeteasy, and is sometimes recognized on the street for his Instagram Reels series, #DanceToDecor
    0 Yorumlar 0 hisse senetleri 0 önizleme
  • US lawyer sanctioned after caught using ChatGPT for court brief | Richard Bednar apologized after Utah appeals court discovered false citations, including one nonexistent case.

    The Utah court of appeals has sanctioned a lawyer after he was discovered to have used ChatGPT for a filing he made in which he referenced a nonexistent court case.Earlier this week, the Utah court of appeals made the decision to sanction Richard Bednar over claims that he filed a brief which included false citations.According to court documents reviewed by ABC4, Bednar and Douglas Durbano, another Utah-based lawyer who was serving as the petitioner’s counsel, filed a “timely petition for interlocutory appeal”.Upon reviewing the brief which was written by a law clerk, the respondent’s counsel found several false citations of cases.“It appears that at least some portions of the Petition may be AI-generated, including citations and even quotations to at least one case that does not appear to exist in any legal database (and could only be found in ChatGPT and references to cases that are wholly unrelated to the referenced subject matter,” the respondent’s counsel said in documents reviewed by ABC4.The outlet reports that the brief referenced a case titled “Royer v Nelson”, which did not exist in any legal database.Following the discovery of the false citations, Bednar “acknowledged ‘the errors contained in the petition’ and apologized”, according to a document from the Utah court of appeals, ABC4 reports. It went on to add that during a hearing in April, Bednar and his attorney “acknowledged that the petition contained fabricated legal authority, which was obtained from ChatGPT, and they accepted responsibility for the contents of the petition”.According to Bednar and his attorney, an “unlicensed law clerk” wrote up the brief and Bednar did not “independently check the accuracy” before he made the filing. ABC4 further reports that Durbano was not involved in the creation of the petition and the law clerk responsible for the filing was a law school graduate who was terminated from the law firm.The outlet added that Bednar offered to pay any related attorney fees to “make amends”.In a statement reported by ABC4, the Utah court of appeals said: “We agree that the use of AI in the preparation of pleadings is a legal research tool that will continue to evolve with advances in technology. However, we emphasize that every attorney has an ongoing duty to review and ensure the accuracy of their court filings. In the present case, petitioner’s counsel fell short of their gatekeeping responsibilities as members of the Utah State Bar when they submitted a petition that contained fake precedent generated by ChatGPT.”As a result of the false citations, ABC4 reports that Bednar was ordered to pay the respondent’s attorney fees for the petition and hearing, refund fees to their client for the time used to prepare the filing and attend the hearing, as well as donate to the Utah-based legal non-profit And Justice for All.
    #lawyer #sanctioned #after #caught #using
    US lawyer sanctioned after caught using ChatGPT for court brief | Richard Bednar apologized after Utah appeals court discovered false citations, including one nonexistent case.
    The Utah court of appeals has sanctioned a lawyer after he was discovered to have used ChatGPT for a filing he made in which he referenced a nonexistent court case.Earlier this week, the Utah court of appeals made the decision to sanction Richard Bednar over claims that he filed a brief which included false citations.According to court documents reviewed by ABC4, Bednar and Douglas Durbano, another Utah-based lawyer who was serving as the petitioner’s counsel, filed a “timely petition for interlocutory appeal”.Upon reviewing the brief which was written by a law clerk, the respondent’s counsel found several false citations of cases.“It appears that at least some portions of the Petition may be AI-generated, including citations and even quotations to at least one case that does not appear to exist in any legal database (and could only be found in ChatGPT and references to cases that are wholly unrelated to the referenced subject matter,” the respondent’s counsel said in documents reviewed by ABC4.The outlet reports that the brief referenced a case titled “Royer v Nelson”, which did not exist in any legal database.Following the discovery of the false citations, Bednar “acknowledged ‘the errors contained in the petition’ and apologized”, according to a document from the Utah court of appeals, ABC4 reports. It went on to add that during a hearing in April, Bednar and his attorney “acknowledged that the petition contained fabricated legal authority, which was obtained from ChatGPT, and they accepted responsibility for the contents of the petition”.According to Bednar and his attorney, an “unlicensed law clerk” wrote up the brief and Bednar did not “independently check the accuracy” before he made the filing. ABC4 further reports that Durbano was not involved in the creation of the petition and the law clerk responsible for the filing was a law school graduate who was terminated from the law firm.The outlet added that Bednar offered to pay any related attorney fees to “make amends”.In a statement reported by ABC4, the Utah court of appeals said: “We agree that the use of AI in the preparation of pleadings is a legal research tool that will continue to evolve with advances in technology. However, we emphasize that every attorney has an ongoing duty to review and ensure the accuracy of their court filings. In the present case, petitioner’s counsel fell short of their gatekeeping responsibilities as members of the Utah State Bar when they submitted a petition that contained fake precedent generated by ChatGPT.”As a result of the false citations, ABC4 reports that Bednar was ordered to pay the respondent’s attorney fees for the petition and hearing, refund fees to their client for the time used to prepare the filing and attend the hearing, as well as donate to the Utah-based legal non-profit And Justice for All. #lawyer #sanctioned #after #caught #using
    WWW.THEGUARDIAN.COM
    US lawyer sanctioned after caught using ChatGPT for court brief | Richard Bednar apologized after Utah appeals court discovered false citations, including one nonexistent case.
    The Utah court of appeals has sanctioned a lawyer after he was discovered to have used ChatGPT for a filing he made in which he referenced a nonexistent court case.Earlier this week, the Utah court of appeals made the decision to sanction Richard Bednar over claims that he filed a brief which included false citations.According to court documents reviewed by ABC4, Bednar and Douglas Durbano, another Utah-based lawyer who was serving as the petitioner’s counsel, filed a “timely petition for interlocutory appeal”.Upon reviewing the brief which was written by a law clerk, the respondent’s counsel found several false citations of cases.“It appears that at least some portions of the Petition may be AI-generated, including citations and even quotations to at least one case that does not appear to exist in any legal database (and could only be found in ChatGPT and references to cases that are wholly unrelated to the referenced subject matter,” the respondent’s counsel said in documents reviewed by ABC4.The outlet reports that the brief referenced a case titled “Royer v Nelson”, which did not exist in any legal database.Following the discovery of the false citations, Bednar “acknowledged ‘the errors contained in the petition’ and apologized”, according to a document from the Utah court of appeals, ABC4 reports. It went on to add that during a hearing in April, Bednar and his attorney “acknowledged that the petition contained fabricated legal authority, which was obtained from ChatGPT, and they accepted responsibility for the contents of the petition”.According to Bednar and his attorney, an “unlicensed law clerk” wrote up the brief and Bednar did not “independently check the accuracy” before he made the filing. ABC4 further reports that Durbano was not involved in the creation of the petition and the law clerk responsible for the filing was a law school graduate who was terminated from the law firm.The outlet added that Bednar offered to pay any related attorney fees to “make amends”.In a statement reported by ABC4, the Utah court of appeals said: “We agree that the use of AI in the preparation of pleadings is a legal research tool that will continue to evolve with advances in technology. However, we emphasize that every attorney has an ongoing duty to review and ensure the accuracy of their court filings. In the present case, petitioner’s counsel fell short of their gatekeeping responsibilities as members of the Utah State Bar when they submitted a petition that contained fake precedent generated by ChatGPT.”As a result of the false citations, ABC4 reports that Bednar was ordered to pay the respondent’s attorney fees for the petition and hearing, refund fees to their client for the time used to prepare the filing and attend the hearing, as well as donate $1,000 to the Utah-based legal non-profit And Justice for All.
    0 Yorumlar 0 hisse senetleri 0 önizleme
  • Ask Engadget: How do I set up an Xbox for my kid?

    Q: My question is how best to set up an Xbox for my kid. I want to know how to control use time and whether I should use my email to set up. – Guillermo from Utah
    A: You're in luck! Console parental controls have come a long way from the days of hiding NES systemsfrom unruly kids. Microsoft, in particular, has made it very easy through its Xbox Family Settings app for iOS and Android, which supports Xbox Series X/S and Xbox One systems. Once you've added your kids to your Xbox family group, you'll be able to manage and see reports of their playtime, restrict access to specific content, require parental approval for purchases and sort incoming friend requests. In typical Microsoft fashion, though, setting up Xbox family accounts can be a bit confusing, so let's go over it step by step.
    Microsoft
    How to set up an Xbox for your child

    Turn on your Xbox and sign in with your Microsoft account.
    Press the Xbox button on your controller, and head to Profile & system > Settings > account > Family settings > Manage family members.
    Choose Add to family > Add new.
    Unfortunately, Microsoft requires an email address for new accounts. You can either enter your child's existing email if they have one, or choose the Get a new email option to create an Outlook email address.Next, you'll have to verify the addition of a new family group member. You can do so by either choosing This Xbox on the next screen and entering your Microsoft account details, or selecting Their phone/PC to have an email sent to you. In either case, you'll have to consent to the new member.

    What is a Microsoft child account?
    In its documentation, Microsoft says "a child account is defined as any Microsoft account that’s affiliated with an adult Microsoft account when the age of the child or teen is less than the age of majority for their country or region." These accounts are broken into "Child" and "Teen" categories, which specify age ranges between eight and 12, and 13 to 17. Microsoft notes there can be differences depending on location, like in South Korea where teen accounts range from 13 to 18.
    Devindra Hardawar for Engadget
    Are there any issues with Microsoft child accounts?
    As useful as the Xbox Family app and child accounts may seem, they can also lead to problems while playing Minecraft, according to comments on Reddit. Reddit user "Microdad_" said they weren't able to gift a game to their child's account, they had to deal with a buggy website to allow them to play Minecraft and after all of that trouble their child still can't play in their realm. User "Electronic_Ocelot825" encountered similar issues, replying, "You are spot on. I go through samecrap and it drives me to the point where I am furious.”
    Have a tech question you’d like Engadget to answer?
    As tech reporters, the Engadget staff is always answering questions from readers, friends and family about electronics, software, gaming, big tech policies and more. So we decided to write down our answers. This question came from a coworker from Yahoo, Engadget's corporate parent. If you’ve got a tech-related question you’d like us to answer for you, please email ask@engadget.com.This article originally appeared on Engadget at
    #ask #engadget #how #set #xbox
    Ask Engadget: How do I set up an Xbox for my kid?
    Q: My question is how best to set up an Xbox for my kid. I want to know how to control use time and whether I should use my email to set up. – Guillermo from Utah A: You're in luck! Console parental controls have come a long way from the days of hiding NES systemsfrom unruly kids. Microsoft, in particular, has made it very easy through its Xbox Family Settings app for iOS and Android, which supports Xbox Series X/S and Xbox One systems. Once you've added your kids to your Xbox family group, you'll be able to manage and see reports of their playtime, restrict access to specific content, require parental approval for purchases and sort incoming friend requests. In typical Microsoft fashion, though, setting up Xbox family accounts can be a bit confusing, so let's go over it step by step. Microsoft How to set up an Xbox for your child Turn on your Xbox and sign in with your Microsoft account. Press the Xbox button on your controller, and head to Profile & system > Settings > account > Family settings > Manage family members. Choose Add to family > Add new. Unfortunately, Microsoft requires an email address for new accounts. You can either enter your child's existing email if they have one, or choose the Get a new email option to create an Outlook email address.Next, you'll have to verify the addition of a new family group member. You can do so by either choosing This Xbox on the next screen and entering your Microsoft account details, or selecting Their phone/PC to have an email sent to you. In either case, you'll have to consent to the new member. What is a Microsoft child account? In its documentation, Microsoft says "a child account is defined as any Microsoft account that’s affiliated with an adult Microsoft account when the age of the child or teen is less than the age of majority for their country or region." These accounts are broken into "Child" and "Teen" categories, which specify age ranges between eight and 12, and 13 to 17. Microsoft notes there can be differences depending on location, like in South Korea where teen accounts range from 13 to 18. Devindra Hardawar for Engadget Are there any issues with Microsoft child accounts? As useful as the Xbox Family app and child accounts may seem, they can also lead to problems while playing Minecraft, according to comments on Reddit. Reddit user "Microdad_" said they weren't able to gift a game to their child's account, they had to deal with a buggy website to allow them to play Minecraft and after all of that trouble their child still can't play in their realm. User "Electronic_Ocelot825" encountered similar issues, replying, "You are spot on. I go through samecrap and it drives me to the point where I am furious.” Have a tech question you’d like Engadget to answer? As tech reporters, the Engadget staff is always answering questions from readers, friends and family about electronics, software, gaming, big tech policies and more. So we decided to write down our answers. This question came from a coworker from Yahoo, Engadget's corporate parent. If you’ve got a tech-related question you’d like us to answer for you, please email ask@engadget.com.This article originally appeared on Engadget at #ask #engadget #how #set #xbox
    WWW.ENGADGET.COM
    Ask Engadget: How do I set up an Xbox for my kid?
    Q: My question is how best to set up an Xbox for my kid. I want to know how to control use time and whether I should use my email to set up. – Guillermo from Utah A: You're in luck! Console parental controls have come a long way from the days of hiding NES systems (or their controllers) from unruly kids. Microsoft, in particular, has made it very easy through its Xbox Family Settings app for iOS and Android, which supports Xbox Series X/S and Xbox One systems. Once you've added your kids to your Xbox family group, you'll be able to manage and see reports of their playtime, restrict access to specific content, require parental approval for purchases and sort incoming friend requests. In typical Microsoft fashion, though, setting up Xbox family accounts can be a bit confusing, so let's go over it step by step. Microsoft How to set up an Xbox for your child Turn on your Xbox and sign in with your Microsoft account. Press the Xbox button on your controller, and head to Profile & system > Settings > account > Family settings > Manage family members. Choose Add to family > Add new. Unfortunately, Microsoft requires an email address for new accounts. You can either enter your child's existing email if they have one, or choose the Get a new email option to create an Outlook email address. (This may seem a bit absurd for younger children, so if you don't want to create an email for your 6 year old, you may be better off just physically controlling access to consoles like the old days.) Next, you'll have to verify the addition of a new family group member. You can do so by either choosing This Xbox on the next screen and entering your Microsoft account details, or selecting Their phone/PC to have an email sent to you. In either case, you'll have to consent to the new member. What is a Microsoft child account? In its documentation, Microsoft says "a child account is defined as any Microsoft account that’s affiliated with an adult Microsoft account when the age of the child or teen is less than the age of majority for their country or region." These accounts are broken into "Child" and "Teen" categories, which specify age ranges between eight and 12, and 13 to 17. Microsoft notes there can be differences depending on location, like in South Korea where teen accounts range from 13 to 18. Devindra Hardawar for Engadget Are there any issues with Microsoft child accounts? As useful as the Xbox Family app and child accounts may seem, they can also lead to problems while playing Minecraft, according to comments on Reddit. Reddit user "Microdad_" said they weren't able to gift a game to their child's account, they had to deal with a buggy website to allow them to play Minecraft and after all of that trouble their child still can't play in their realm. User "Electronic_Ocelot825" encountered similar issues, replying, "You are spot on. I go through same [sic] crap and it drives me to the point where I am furious.” Have a tech question you’d like Engadget to answer? As tech reporters, the Engadget staff is always answering questions from readers, friends and family about electronics, software, gaming, big tech policies and more. So we decided to write down our answers. This question came from a coworker from Yahoo, Engadget's corporate parent. If you’ve got a tech-related question you’d like us to answer for you, please email ask@engadget.com.This article originally appeared on Engadget at https://www.engadget.com/gaming/xbox/ask-engadget-how-do-i-set-up-an-xbox-for-my-kid-110022860.html?src=rss
    0 Yorumlar 0 hisse senetleri 0 önizleme
  • This startup wants to make more climate-friendly metal in the US

    A California-based company called Magrathea just turned on a new electrolyzer that can make magnesium metal from seawater. The technology has the potential to produce the material, which is used in vehicles and defense applications, with net-zero greenhouse-gas emissions.

    Magnesium is an incredibly light metal, and it’s used for parts in cars and planes, as well as in aluminum alloys like those in vehicles. The metal is also used in defense and industrial applications, including the production processes for steel and titanium.

    Today, China dominates production of magnesium, and the most common method generates a lot of the emissions that cause climate change. If Magrathea can scale up its process, it could help provide an alternative source of the metal and clean up industries that rely on it, including automotive manufacturing.

    The star of Magrathea’s process is an electrolyzer, a device that uses electricity to split a material into its constituent elements. Using an electrolyzer in magnesium production isn’t new, but Magrathea’s approach represents an update. “We really modernized it and brought it into the 21st century,” says Alex Grant, Magrathea’s cofounder and CEO.

    The whole process starts with salty water. There are small amounts of magnesium in seawater, as well as in salt lakes and groundwater.If you take that seawater or brine and clean it up, concentrate it, and dry it out, you get a solid magnesium chloride salt.

    Magrathea takes that saltand puts it into the electrolyzer. The device reaches temperatures of about 700 °Cand runs electricity through the molten salt to split the magnesium from the chlorine, forming magnesium metal.

    Typically, running an electrolyzer in this process would require a steady source of electricity. The temperature is generally kept just high enough to maintain the salt in a molten state. Allowing it to cool down too much would allow it to solidify, messing up the process and potentially damaging the equipment. Heating it up more than necessary would just waste energy. 

    Magrathea’s approach builds in flexibility. Basically, the company runs its electrolyzer about 100 °C higher than is necessary to keep the molten salt a liquid. It then uses the extra heat in inventive ways, including to dry out the magnesium salt that eventually goes into the reactor. This preparation can be done intermittently, so the company can take in electricity when it’s cheaper or when more renewables are available, cutting costs and emissions. In addition, the process will make a co-product, called magnesium oxide, that can be used to trap carbon dioxide from the atmosphere, helping to cancel out the remaining carbon pollution.

    The result could be a production process with net-zero emissions, according to an independent life cycle assessment completed in January. While it likely won’t reach this bar at first, the potential is there for a much more climate-friendly process than what’s used in the industry today, Grant says.

    Breaking into magnesium production won’t be simple, says Simon Jowitt, director of the Nevada Bureau of Mines and of the Center for Research in Economic Geology at the University of Nevada, Reno.

    China produces roughly 95% of the global supply as of 2024, according to data from the US Geological Survey. This dominant position means companies there can flood the market with cheap metal, making it difficult for others to compete. “The economics of all this is uncertain,” Jowitt says.

    The US has some trade protections in place, including an anti-dumping duty, but newer players with alternative processes can still face obstacles. US Magnesium, a company based in Utah, was the only company making magnesium in the US in recent years, but it shut down production in 2022 after equipment failures and a history of environmental concerns. 

    Magrathea plans to start building a demonstration plant in Utah in late 2025 or early 2026, which will have a capacity of roughly 1,000 tons per year and should be running in 2027. In February the company announced that it signed an agreement with a major automaker, though it declined to share its name on the record. The automaker pre-purchased material from the demonstration plant and will incorporate it into existing products.

    After the demonstration plant is running, the next step would be to build a commercial plant with a larger capacity of around 50,000 tons annually.
    #this #startup #wants #make #more
    This startup wants to make more climate-friendly metal in the US
    A California-based company called Magrathea just turned on a new electrolyzer that can make magnesium metal from seawater. The technology has the potential to produce the material, which is used in vehicles and defense applications, with net-zero greenhouse-gas emissions. Magnesium is an incredibly light metal, and it’s used for parts in cars and planes, as well as in aluminum alloys like those in vehicles. The metal is also used in defense and industrial applications, including the production processes for steel and titanium. Today, China dominates production of magnesium, and the most common method generates a lot of the emissions that cause climate change. If Magrathea can scale up its process, it could help provide an alternative source of the metal and clean up industries that rely on it, including automotive manufacturing. The star of Magrathea’s process is an electrolyzer, a device that uses electricity to split a material into its constituent elements. Using an electrolyzer in magnesium production isn’t new, but Magrathea’s approach represents an update. “We really modernized it and brought it into the 21st century,” says Alex Grant, Magrathea’s cofounder and CEO. The whole process starts with salty water. There are small amounts of magnesium in seawater, as well as in salt lakes and groundwater.If you take that seawater or brine and clean it up, concentrate it, and dry it out, you get a solid magnesium chloride salt. Magrathea takes that saltand puts it into the electrolyzer. The device reaches temperatures of about 700 °Cand runs electricity through the molten salt to split the magnesium from the chlorine, forming magnesium metal. Typically, running an electrolyzer in this process would require a steady source of electricity. The temperature is generally kept just high enough to maintain the salt in a molten state. Allowing it to cool down too much would allow it to solidify, messing up the process and potentially damaging the equipment. Heating it up more than necessary would just waste energy.  Magrathea’s approach builds in flexibility. Basically, the company runs its electrolyzer about 100 °C higher than is necessary to keep the molten salt a liquid. It then uses the extra heat in inventive ways, including to dry out the magnesium salt that eventually goes into the reactor. This preparation can be done intermittently, so the company can take in electricity when it’s cheaper or when more renewables are available, cutting costs and emissions. In addition, the process will make a co-product, called magnesium oxide, that can be used to trap carbon dioxide from the atmosphere, helping to cancel out the remaining carbon pollution. The result could be a production process with net-zero emissions, according to an independent life cycle assessment completed in January. While it likely won’t reach this bar at first, the potential is there for a much more climate-friendly process than what’s used in the industry today, Grant says. Breaking into magnesium production won’t be simple, says Simon Jowitt, director of the Nevada Bureau of Mines and of the Center for Research in Economic Geology at the University of Nevada, Reno. China produces roughly 95% of the global supply as of 2024, according to data from the US Geological Survey. This dominant position means companies there can flood the market with cheap metal, making it difficult for others to compete. “The economics of all this is uncertain,” Jowitt says. The US has some trade protections in place, including an anti-dumping duty, but newer players with alternative processes can still face obstacles. US Magnesium, a company based in Utah, was the only company making magnesium in the US in recent years, but it shut down production in 2022 after equipment failures and a history of environmental concerns.  Magrathea plans to start building a demonstration plant in Utah in late 2025 or early 2026, which will have a capacity of roughly 1,000 tons per year and should be running in 2027. In February the company announced that it signed an agreement with a major automaker, though it declined to share its name on the record. The automaker pre-purchased material from the demonstration plant and will incorporate it into existing products. After the demonstration plant is running, the next step would be to build a commercial plant with a larger capacity of around 50,000 tons annually. #this #startup #wants #make #more
    WWW.TECHNOLOGYREVIEW.COM
    This startup wants to make more climate-friendly metal in the US
    A California-based company called Magrathea just turned on a new electrolyzer that can make magnesium metal from seawater. The technology has the potential to produce the material, which is used in vehicles and defense applications, with net-zero greenhouse-gas emissions. Magnesium is an incredibly light metal, and it’s used for parts in cars and planes, as well as in aluminum alloys like those in vehicles. The metal is also used in defense and industrial applications, including the production processes for steel and titanium. Today, China dominates production of magnesium, and the most common method generates a lot of the emissions that cause climate change. If Magrathea can scale up its process, it could help provide an alternative source of the metal and clean up industries that rely on it, including automotive manufacturing. The star of Magrathea’s process is an electrolyzer, a device that uses electricity to split a material into its constituent elements. Using an electrolyzer in magnesium production isn’t new, but Magrathea’s approach represents an update. “We really modernized it and brought it into the 21st century,” says Alex Grant, Magrathea’s cofounder and CEO. The whole process starts with salty water. There are small amounts of magnesium in seawater, as well as in salt lakes and groundwater. (In seawater, the concentration is about 1,300 parts per million, so magnesium makes up about 0.1% of seawater by weight.) If you take that seawater or brine and clean it up, concentrate it, and dry it out, you get a solid magnesium chloride salt. Magrathea takes that salt (which it currently buys from Cargill) and puts it into the electrolyzer. The device reaches temperatures of about 700 °C (almost 1,300 °F) and runs electricity through the molten salt to split the magnesium from the chlorine, forming magnesium metal. Typically, running an electrolyzer in this process would require a steady source of electricity. The temperature is generally kept just high enough to maintain the salt in a molten state. Allowing it to cool down too much would allow it to solidify, messing up the process and potentially damaging the equipment. Heating it up more than necessary would just waste energy.  Magrathea’s approach builds in flexibility. Basically, the company runs its electrolyzer about 100 °C higher than is necessary to keep the molten salt a liquid. It then uses the extra heat in inventive ways, including to dry out the magnesium salt that eventually goes into the reactor. This preparation can be done intermittently, so the company can take in electricity when it’s cheaper or when more renewables are available, cutting costs and emissions. In addition, the process will make a co-product, called magnesium oxide, that can be used to trap carbon dioxide from the atmosphere, helping to cancel out the remaining carbon pollution. The result could be a production process with net-zero emissions, according to an independent life cycle assessment completed in January. While it likely won’t reach this bar at first, the potential is there for a much more climate-friendly process than what’s used in the industry today, Grant says. Breaking into magnesium production won’t be simple, says Simon Jowitt, director of the Nevada Bureau of Mines and of the Center for Research in Economic Geology at the University of Nevada, Reno. China produces roughly 95% of the global supply as of 2024, according to data from the US Geological Survey. This dominant position means companies there can flood the market with cheap metal, making it difficult for others to compete. “The economics of all this is uncertain,” Jowitt says. The US has some trade protections in place, including an anti-dumping duty, but newer players with alternative processes can still face obstacles. US Magnesium, a company based in Utah, was the only company making magnesium in the US in recent years, but it shut down production in 2022 after equipment failures and a history of environmental concerns.  Magrathea plans to start building a demonstration plant in Utah in late 2025 or early 2026, which will have a capacity of roughly 1,000 tons per year and should be running in 2027. In February the company announced that it signed an agreement with a major automaker, though it declined to share its name on the record. The automaker pre-purchased material from the demonstration plant and will incorporate it into existing products. After the demonstration plant is running, the next step would be to build a commercial plant with a larger capacity of around 50,000 tons annually.
    0 Yorumlar 0 hisse senetleri 0 önizleme
  • Texas’s New App Store Age Verification Law Has Serious Privacy Issues

    Age verification is coming to app stores in Texas, meaning that users could soon be required to provide some form of identification in order to download anything from the Google Play and Apple App stores, regardless of the app's content. Earlier this week, Gov. Greg Abbott signed the Texas App Store Accountability Act, which is set to take effect at the beginning of next year. The new law, which purports to be about keeping children safer online, has significant implications for user privacy and data security. What will be required for app store age verification in Texas?The Texas law will require Google and Apple to verify the age of all users before they download any app through their app stores, even if the app has no sensitive or age-specific content. Parents will have to provide consent for minors to download apps or make purchases, and app stores will have to confirm that parents or guardians have the legal authority to make those decisions for their children. App stores will also have to share which age categories users fall intowith app developers. While the specifics are yet to be determined, that means Google and Apple will have to collect some form of user identification, whether that's a driver's license, passport, or other government-issued ID, or biometric data, such as a facial scan, for anyone using their app stores in Texas. Even more documentation will be required for parents proving legal guardianship of minor users. Utah passed a similar bill earlier this year making app stores responsible for centralizing age verification, and while its requirements are slightly less onerous, they're not much better when it comes to your privacy. How age verification compromises your privacyPrivacy experts—as well as both Apple and Google—have raised alarms about the implications of age verification, noting that requiring all users to turn over sensitive personal information included in data-rich documents that can prove your age is a form of digital surveillance. It creates an identifiable record of online activity and increases the risk that the data will be used, shared, or sold. Age verification also presents security concerns with how sensitive user data is collected and stored. Data breaches are a fact of life in 2025, and individuals may have very littleknowledge about whether and how their information is used and stored without their consent, and without recourse if it is compromised. Aaron Mackey, free speech and transparency litigation director at the Electronic Frontier Foundation, notes that the Texas law doesn't have any built-in protections for user data, such as minimizing what is collected and transmitted and for how long it is retained. Plus, there are risks present in the likelihood that app stores will utilize third-party verification services to comply with the requirements, meaning data is available to multiple parties. The EFF and the ACLU also argue that online age verification requirements violate users' First Amendment rights, as they may make protected free speech inaccessible—if adults don't have a valid form of identification, or facial recognition inaccurately estimates age, or minors can't get parental consent—or force people to choose between shielding their privacy and being online. "If I have to provide this level of personal information because the government mandates it just to download an app from an app store, I'm going to be significantly worried about what happens to my data, and I might just decide to not actually download the app or even use this app store," Mackey says.
    #texass #new #app #store #age
    Texas’s New App Store Age Verification Law Has Serious Privacy Issues
    Age verification is coming to app stores in Texas, meaning that users could soon be required to provide some form of identification in order to download anything from the Google Play and Apple App stores, regardless of the app's content. Earlier this week, Gov. Greg Abbott signed the Texas App Store Accountability Act, which is set to take effect at the beginning of next year. The new law, which purports to be about keeping children safer online, has significant implications for user privacy and data security. What will be required for app store age verification in Texas?The Texas law will require Google and Apple to verify the age of all users before they download any app through their app stores, even if the app has no sensitive or age-specific content. Parents will have to provide consent for minors to download apps or make purchases, and app stores will have to confirm that parents or guardians have the legal authority to make those decisions for their children. App stores will also have to share which age categories users fall intowith app developers. While the specifics are yet to be determined, that means Google and Apple will have to collect some form of user identification, whether that's a driver's license, passport, or other government-issued ID, or biometric data, such as a facial scan, for anyone using their app stores in Texas. Even more documentation will be required for parents proving legal guardianship of minor users. Utah passed a similar bill earlier this year making app stores responsible for centralizing age verification, and while its requirements are slightly less onerous, they're not much better when it comes to your privacy. How age verification compromises your privacyPrivacy experts—as well as both Apple and Google—have raised alarms about the implications of age verification, noting that requiring all users to turn over sensitive personal information included in data-rich documents that can prove your age is a form of digital surveillance. It creates an identifiable record of online activity and increases the risk that the data will be used, shared, or sold. Age verification also presents security concerns with how sensitive user data is collected and stored. Data breaches are a fact of life in 2025, and individuals may have very littleknowledge about whether and how their information is used and stored without their consent, and without recourse if it is compromised. Aaron Mackey, free speech and transparency litigation director at the Electronic Frontier Foundation, notes that the Texas law doesn't have any built-in protections for user data, such as minimizing what is collected and transmitted and for how long it is retained. Plus, there are risks present in the likelihood that app stores will utilize third-party verification services to comply with the requirements, meaning data is available to multiple parties. The EFF and the ACLU also argue that online age verification requirements violate users' First Amendment rights, as they may make protected free speech inaccessible—if adults don't have a valid form of identification, or facial recognition inaccurately estimates age, or minors can't get parental consent—or force people to choose between shielding their privacy and being online. "If I have to provide this level of personal information because the government mandates it just to download an app from an app store, I'm going to be significantly worried about what happens to my data, and I might just decide to not actually download the app or even use this app store," Mackey says. #texass #new #app #store #age
    LIFEHACKER.COM
    Texas’s New App Store Age Verification Law Has Serious Privacy Issues
    Age verification is coming to app stores in Texas, meaning that users could soon be required to provide some form of identification in order to download anything from the Google Play and Apple App stores, regardless of the app's content. Earlier this week, Gov. Greg Abbott signed the Texas App Store Accountability Act, which is set to take effect at the beginning of next year. The new law, which purports to be about keeping children safer online, has significant implications for user privacy and data security. What will be required for app store age verification in Texas?The Texas law will require Google and Apple to verify the age of all users before they download any app through their app stores, even if the app has no sensitive or age-specific content. Parents will have to provide consent for minors to download apps or make purchases, and app stores will have to confirm that parents or guardians have the legal authority to make those decisions for their children. App stores will also have to share which age categories users fall into (child, young teen, older teen, or adult) with app developers. While the specifics are yet to be determined, that means Google and Apple will have to collect some form of user identification, whether that's a driver's license, passport, or other government-issued ID, or biometric data, such as a facial scan, for anyone using their app stores in Texas. Even more documentation will be required for parents proving legal guardianship of minor users. Utah passed a similar bill earlier this year making app stores responsible for centralizing age verification, and while its requirements are slightly less onerous, they're not much better when it comes to your privacy. How age verification compromises your privacyPrivacy experts—as well as both Apple and Google—have raised alarms about the implications of age verification, noting that requiring all users to turn over sensitive personal information included in data-rich documents that can prove your age is a form of digital surveillance. It creates an identifiable record of online activity and increases the risk that the data will be used, shared, or sold (unlike physical ID checks, which are momentary and impermanent). Age verification also presents security concerns with how sensitive user data is collected and stored. Data breaches are a fact of life in 2025, and individuals may have very little (if any) knowledge about whether and how their information is used and stored without their consent, and without recourse if it is compromised. Aaron Mackey, free speech and transparency litigation director at the Electronic Frontier Foundation (EFF), notes that the Texas law doesn't have any built-in protections for user data, such as minimizing what is collected and transmitted and for how long it is retained. Plus, there are risks present in the likelihood that app stores will utilize third-party verification services to comply with the requirements, meaning data is available to multiple parties. The EFF and the ACLU also argue that online age verification requirements violate users' First Amendment rights, as they may make protected free speech inaccessible—if adults don't have a valid form of identification, or facial recognition inaccurately estimates age, or minors can't get parental consent—or force people to choose between shielding their privacy and being online. "If I have to provide this level of personal information because the government mandates it just to download an app from an app store, I'm going to be significantly worried about what happens to my data, and I might just decide to not actually download the app or even use this app store," Mackey says.
    0 Yorumlar 0 hisse senetleri 0 önizleme
CGShares https://cgshares.com