By now, you have probably heard of STEM education. This encompasses Science, Technology, Engineering, and Mathematics. You may see many children’s toys with the STEM acronym on them. Schools that teach STEM education, integrate all aspects rather than separate them into their different disciplines. Doing this allows the student to learn computational thinking and problem solving.
Even Amazon.com has a section devoted to STEM educational toys.
Hopefully you were able to purchase some STEM toys for your children or grandchildren. The future of our children’s learning will depend on STEM even for non-STEM courses as they are a way of learning to look at a full problem from all angles.
On the run with his new girlfriend, Malina, they try to figure out what is going on. Not knowing it in the beginning, Sergio finds out Malina’s sister was murdered and blames it directly on Circles. Not knowing who he can trust he works it out with Malina and they continue to find the truth.
The crux of the mystery is that what was found was “socialbots,” bots that parade as people and interact with people and learn using AI algorithms. The bots were going to be used in a bigger plot to sway people to vote for a certain president whose agenda was to bring the US to own over a third of the earth’s rare earth metals. Once in, a Chinese diplomat was going to blackmail him into not doing this as China would lose out a lot of their economy over this.
Microsoft Edge has come a long way. The Victor crew tried something out this past week and it works like a charm. You can connect your phone to your PC through Edge. The practical side is if you are looking at something on your phone (small device) and want to view something larger, you can send the page you are viewing on your phone to your PC. And yes, iPhone users, that means you too!
Install Edge on your mobile device (works with iPad as well). Sign in with your Microsoft password.
Scroll to a site and at the bottom you will see some icons.
The middle icon (mobile device with arrow) is what you touch to send to your PC.
Next when you see the screen below, you would choose which PC to send it to. I only had one connected PC as shown below (name partially obscured.) Press the PC you want to send the page to.
Here are a few new things the Victor crew found in iOS 11 for use in emergencies.
You can add Medical ID for emergency contact. Open the Health app and tap the Medical ID tab. Edit then scroll to Emergency Contacts. Press the + and it will take you to your contacts. On this page, you can also add medical conditions, notes, allergies, and medications as well.
There is Emergency SOS where you can call for help quickly. The Emergency SOS slider and Medial ID slider you can bring up to quickly contact emergency services. For iPhone 7, you will need to press the side button five times to get the sliders to show. For iPhone 8 or X, you would press and hold the side button and one of the volume buttons. After the call ends, the iPhone sends your emergency contacts a text message with your current location unless you cancel. If you have your location services turned off, they will turn back on temporarily.
We’ve talked about passwords before and yet it is such an important thing because of all the breaches we see. Some people say they don’t have anything that important so it doesn’t matter or they say they need to use the same password for everything.
This is a totally bad practice and attitude to have about this. Think about all your accounts where you have purchased items, or your banking or credit card accounts. Do you really want to use the same password for everything? Once they breach one account, say your email, they can look through that to find what other accounts you are subscribed to and have a field day. This is even how identities are stolen.
Here are some things you can do:
Go to HaveIBeenPwned.com and check your email for pwnage.
Also click on their password tab and check to see if your passwords are on any common lists.
Use a password manager like LastPass.
Use 2 step verification. Use an authenticator, too.
Once you download LastPass, set it up with a hard to hack easy to remember password (the first video below gives some suggestions on how to find one.) You can then import all the passwords saved to your browsers. Once you have LastPass you can also run a kind of audit check for recommendations on which passwords to change – it will show you duplicates or not so secure passwords you already have.
Firefox just got faster. Two times faster. This past week, Firefox updated to Firefox Quantum (Version 57.0.) There are two versions – one for regular browsers and one for developers. It is built on a new engine for better and faster page loading. It also will use less memory than previously, and they say it is 30% lighter than Chrome.
It has built in privacy modes. You can block even hidden trackers by turning on tracking protection. When you block the ads and scripts that are bogging you down, the page loads even faster.
If there’s a page you want to see later, you can save it to Pocket to view later. There is a library where it will place these articles as well as your bookmarks. You can search with other search engines with just a click. You can also customize it with themes or placement of icons for your tools and addons. You can take screenshots without adding an extension – it’s built right in.
So various places are adding “Distracted Walking” laws to try to prevent people from texting or just reading their phones while walking.
The latest place to pass this law was Honolulu. They have started passing out tickets to those distracted while walking in a crosswalk. They are the first major city in the U.S. to pass such a law. Minimum fines will be $15 but repeat offenders can look at $75-$99. (Even higher rates of $100 for first, $200 for second, and $500 for third offenses were previously considered.)
The Mayor of Honolulu says that they had more pedestrians hit in crosswalks than almost anywhere else.
Ontario Canada is looking to pass a “Phones Down, Heads Up Act” as well to make it illegal to cross a street while using a phone.
I’m sure everyone has looked up something in Wikipedia at one time or another. Kevan Davis, a developer in London, has developed a Wikipedia game called Wikipedia: the Text Adventure.
You choose where you want to start and it brings up information from Wikipedia. You can choose one of the locations offered or put something in. You can then choose where to go from there from the offerings it gives. You would type “go ” and then the direction choice from the list. Example: go northeast.
It’s a few years old now, but if you haven’t had the chance to see it, The Internship is quite entertaining. It costars Owen Wilson and Vince Vaughn as two washed up salesmen, who lost their jobs to the digital world, trying to figure out a new career path. They decide to try for an internship at Google.
So here are two guys in their mid-forties trying to land an internship against a bunch of 20-somethings. To them it was like having their dads with them. What makes it even more interesting is their lack of tech-savviness against the younger generation but they do bring their life experiences. You will see some Google products in the credits such as Google Drive, Translate, Google+, and more.
We recently came across the term “whaling” so of course, we needed to know more about it. Here is what the Victor crew found out. It is a form of phishing aimed at high-profile business executives, managers, CEOs, etc. They are going after the “big fish.” The emails sent to them are more official looking and target a particular person. A regular phishing attack usually goes out to a lot of people trying to lure anyone. Whaling is also considered “spear phishing” where it is an attempt to target an individual person or company.
As with phishing, whaling is used to get a person to reveal sensitive information, such as login credentials, to an account. They do this by trying to scare the individual into giving this information up.
Whaling goes so far as to make a web page or email that looks like the legitimate one. You may even be enticed into downloading a program in order to view a page or to get your information. It may come in the form of a false subpoena, message from the FBI, or some kind of legal complaint against you.
Be aware of what you are clicking. If you can, hover over the link and see where it is taking you. Try putting the URL in an analyzer, such as VirusTotal or TrendMicro to see if it is safe. If in doubt, don’t click or download anything you are unsure of.
It has recently been found that WPA2 protocol is vulnerable to hacking. They are known as Krack Attacks (Key Reinstallation AttaCKS) and there is a website where you can learn more about it. It is found that Android and Linux are most vulnerable to this exploit. They can be tricked into reinstalling an encryption key with all 0s that will allow them to enter your network and then get to sites you visit and capture your login credentials.
If you watch the video below you will see it is a rather involved process to actually crack into the network but that doesn’t stop someone who is intent on getting into your network.
There isn’t a whole lot you can do because this vulnerability bypasses any security measures. Some of the more simple things you can do is not use unsecure Wi-Fi. Ever. Keep your firmware to your router updated. Do not downgrade to even more insecure protocols like WPA or WEP.
We love tech movies. The Victor crew recently got to see The Circle. The main characters are played by Emma Watson (Mae) and Tom Hanks (Bailey). Mae leaves her hum-drum job join a tech/social media company called the Circle.
At first Mae is reticent about sharing her life but is pushed by co-workers to push the boundaries and become more transparent. As she becomes more transparent, she rises through the ranks from customer service to being part of the “inner circle.” She eventually has people all over the world following her, getting to know her, her friends, her family, and all she does.
As the movie moves along, eventually tragedy happens. Without giving away the full plot, through this tragedy and people she meets, she exposes the top people of the Circle and keeps them from hiding their secrets.
The taglines: Knowing is good. Knowing everything is better.
Some other lines are: Secrets are lies. Sharing is caring. Privacy is theft.
Last week, Amazon announced new devices. Among the new devices are the Echo Show, costing $229.99. This is a more triangular device with a screen. It allows you to make video calls as well. They are offering $100 off if you buy 2 devices with code SHOW2PACK. You can actually watch flash news briefings, see lyrics of songs, security cameras, just to name a few.
Other new devices are a shorter new Echo, the Echo Plus and the 4K Fire TV device. Also announced was the Echo Connect, Echo Buttons, and BMW partnership. The Echo Connect is an accessory to link Echo to home phone line. It costs $35 and is coming later in the year.
If you already own an Echo, Echo Dot, or Echo Show, effective immediately you can make phone calls. It is supposed to work with your land line or your mobile phone.
The Victor crew just updated their new iPad to iOS 11. Here are some first findings and reactions.
After the initial update, if you had fingerprint access enabled, you will still have to use your signin to get in. You will then need to enter your iCloud password.
You can have the dock hidden but pop it up from the bottom at any time.
You swipe the dock up from the bottom and continue the swipe to show the App Switcher. The App Switcher has a new design as well and shows all open apps in a grid pattern rather than having to scroll through to find open apps. You can still swipe an app in this grid pattern to hard close or reset an app.
The dock has a folder that shows recently opened documents. It also allows you to browse documents. You can add your iCloud, and if you have the apps – Google Drive, Dropbox, OneDrive, and any other file managers you may have downloaded within this folder area. Once you enable these drives, you may need to log into them again to access them there. You can also tag files with colors.
The dock has a separator bar. To the right of the bar it shows the recently opened apps and to the left of it, your permanently set apps. If you move an app from the right to the left, it seems to permanently disappear from the home screen.
The App Store has a new design.
Another change is the keyboard. Usually you click on the 123 to access numbers and some symbols. Now you can just pull down on the key that shows the numbers or symbols to access without changing the keyboard.
If you go to settings, you will see you can choose some apps to show up in the control center all the time.
By now you’ve heard about the Equifax breach. Something you may want to do by November 21 is put a security freeze on your account. Until then, they are waiving fees to do this.
A security freeze is supposed to block outsiders from opening an account in your name. This is different from a fraud alert which will only notify you if someone opens an account in your name (even you).
A security freeze has you adding a PIN in order to make any changes. The three major credit monitors are TransUnion, Experian, and Equifax.
Right now you can only put the freeze on Equifax for free. TransUnion and Experian will charge $10 for each. Currently there is legislation pending on making this free. If you are planning to buy a car or house you don’t want to freeze your credit just yet.
Equifax will not be calling you so if you get a call saying it is from them, it is most likely a scam.
If you enroll in their monitoring program, you would waive rights to sue if you are impacted by the breach.
Sometimes you try to empty a folder or delete a file only to find out you can’t because something else is using it. XKCD pictures it like this:
Sometimes you think you have everything closed yet you still get this message. You may need to restart your PC to make sure all instances that may have been previously connected to it are now disconnected. Another thing you can try is a program called LockHunter. Once it’s installed, you right click on a folder or file and you will see “What is locking this folder?” or “What is locking this file?”
After you click that, you will see what is locking the file or folder. I right clicked on a Pictures folder and clicked “What is locking this folder?” After that, this came up:
I can now find out what is locking the folder and take the actions I need to try to remove it.
Maybe you love, maybe you hate it but social media is here to stay. Many people used it as their lifeline during the past storm in Texas, known as Harvey. Many used Twitter or Facebook or Instagram to let people know they were in stuck and needed to be rescued. Still others used social media to let people know they were able to help.
The U.S. Coast Guard preferred for people to call them or 911 but people had trouble getting through. People even turned to Airbnb to offer their homes as shelters for those in need. The Hurricane Harvey Texas Rescue Facebook group offered ways to help those trapped or in need of rescue.
The Amazon and Whole Foods deal going through today is leaving its mark in a lot of different ways. Whole Foods prices are going down on a lot of items in an effort to allow more people to enjoy the benefits of organic foods. You may start seeing some Amazon devices on Whole Food shelves and Whole Food items on Amazon’s website.
Prices have been slashed on many items already. For example in New York it was reported that organic fuji apples went from $3.49/lb to $1.99/lb, avocados dropped $0.80 per lb, organic rotisserie chicken dropped $4.00/lb, and organic bananas went from $0.99 to $0.69 per lb.
The Amazon devices like Echo and Echo dot found in the Whole Foods stores are the same discounted prices found on their website right now.
The Victor crew plans to shop at one later this week and will report back any other findings.
See SpotMini run! In this TedTalk by Marc Raibert of BostonDynamics gives a demo of how far robotics have come. He talks about dynamic mobility, balance, and mobile manipulation. He has a few demonstrations on video and live to show some things they have done to meet the goals of using robots.
In one demonstration, they show some examples of what might challenge the robots if faced with some obstacles keeping them from what they are trying to do. For his live demonstration he shows the different movements of SpotMini – a dog-like robot. He shows on the screen what the dog robot is seeing and how the robot plans where and how it will step.
It is important to keep all software you use up to date. There are updates for a reason – most likely some of the code used was found to be vulnerable to attacks.
This past week, a popular extension was hijacked. The developer of the Web Developer for Chrome extension had his own account hijacked. The hijackers phished his Google account, then modified the code in his account and pushed it out to users. The version of Web Developer for Chrome that was pushed out is 0.4.9. You need to make sure you have the updated version 0.5 installed NOW!
The version the hijackers uploaded can force ads on pages, capture passwords, or other unreported problems. Consider changing passwords to pages visited during the time of the compromise. The date was August 2. The developer himself admits he fell for a phishing attack that started this. This effected over one million users.
The developer details the events in his blog. The bottom line is anyone can click on a bad link and it is important to have two-factor verification in place.
If you are looking for a password, you can check to see if the password you want to use has ever been used. Just go to the Have I Been Pwned website and look at the Passwords link. They now have a list of the passwords that have been breached. You can test your password against it and it will tell you if it’s been breached but it will also tell you it may not be a good password even if it’s not been breached.
Here is what you get if your password has been used before and found on a breach list:
So what is a bliki? The Victor crew came across this work and wondered. Well, in short terms it is a mashup of BLOG and WIKI. Blog is already a shortening of weB LOG. WIKI is a Hawaiian word meaning quick. So let’s look at all these terms.
What is a blog?
A blog is posts put on a site diary-style. People use them to report news, rant, keep journals, etc. They are quite popular. If you have a blog, you are probably the only who posts on it. Some blogs may have guest authors contributing or employees if it is a news blog. There are many popular blog softwares out there such as WordPress, Blogger, Typepad. In the case of WordPress, you can either use their blog at wordpress.com or download the software at wordpress.org and install it yourself using your own domain.
What is a wiki?
A wiki is usually run on wiki software. It generally doesn’t have just one owner or leader but rather is open to the public to edit or to a group of users to edit. This is not as carefully planned out since anyone can contribute. There may be misspellings, poor grammar, etc. Wikipedia is probably the most popular wiki. Wikis may also not be reliable as to its actual content as we are all humans and have our own opinions and experiences that may influence our contributions.
What is a bliki?
So now we come to explaining this. Some explanations are that it is a blog with wiki support, or a blog that allows others to edit and contribute. This goes beyond the usual comments only you would find on a regular blog. There are wiki plugins for WordPress.
iPhones bring many people joy. Their prices vary in different regions. They happen to be cheaper in Hong Kong than mainland China, due to taxes and levies, so people try to get them there. A woman was recently caught by customs trying to smuggle in 102 iPhones strapped to her body. She was also smuggling 15 luxury watches. The added weight came to about 44 pounds.
Unsure of what types she was carrying, if they all were the iPhone 7 Plus, she would have had over $78,438 in USD at the very least. For the full capacity iPhone 7 Plus, it would have come to $98,838 at $969 each.
It seems this is an ongoing thing in China. In January 2015, a man was arrested at customs for smuggling 94 iPhones. Just two months later in March 2015, another man was caught trying to smuggle 146 iPhones. Most people are caught with up to a dozen or so. Sometimes they are caught with more, but this number made international news. It’s easier to smuggle in colder weather because they can wear heavier jackets.
By now, many have already chosen to update to the newest Creators Update for their Windows 10 machine. You can see what version you are running by going to Start >> Settings >> System >> About. The newest version is 1703. Before installing this version, you will be asked to review your privacy settings so you are not giving out any information you don’t want to. They will bring up a page of privacy settings to review. The privacy settings don’t go into effect until you actually install the Creators Update.
You can always visit your privacy settings after the update to further set your privacy preferences by going to Start >> Settings >> Privacy.
Here are some nice features you can only use with the Microsoft Edge Browser:
You can save tabs for later
You can pin tabs to your start menu
You can preview all open tabs either all at once or one at a time
You can sweep all your open tabs aside to use later
You can pin pages to open next time you come back
Are there times when you aren’t sure you are getting the speed from your ISP that you pay for? Running a simple test on your computer will tell you. First you need to know that the speed you receive via a computer connected through an ethernet cable may be closer to what your ISP says you have and connections through Wi-Fi will be lower.
Why would you need to do these tests? Well if you are streaming and run into a lot of buffering problems or connection problems, you might want to take a look at your speeds. Are others in your household doing things that require more bandwidth such as streaming or gaming?
Here are a few sites you can test (we are supposed to have 75 mbps up and down with FiOS):
Many ISPs have a speedtest if you want to try them – in some cases you just the need the url of your ISP then add /speedtest/ to the end of it.