Installation Begins on Bezos-Backed 10,000 Year Clock

How will our actions affect our grandchildren? Our great-grandchildren? And their great-grandchildren? That's the kind of long-term thinking that the non-profit organization the Long Now is trying to foster. And now Amazon founder Jeff Bezos has revealed that construction has begun on the organization's ambitious project, the 10,000 year clock.

The 10,000 year clock is designed to measure time in years and centuries, rather than minutes and seconds. It will tick once a year. The century hand will advance, you guessed it, once a century, and the cuckoo will emerge once a millennium. The idea is to give us a greater sense of the impact of our decisions, and to think about long-term consequences of what we do.

According to Bezos' tweet, the clock will be powered by day and night thermal cycles and synchronized at solar noon. The team just finished drilling a 500 foot deep vertical shaft for the clock. You can see a video about the process embedded in Bezos' tweet below. (His connection to the project: The clock is being installed on a plot of land that he owns in Texas.)

 

New York to DC Hyperloop could happen as Elon Musk reportedly gets green light

According to recent reports, Elon Musk is now one more baby-sized step towards his dreams of creating a Hyperloop network.

After tweeting in July 2017 that he had received verbal permission to build a New York to Washington DC Hyperloop, the Washington Post states that Musk and his Boring company has finally received something on paper.

As you’d expect, the government hasn’t just given Musk permission to start digging tunnels from DC to New York without any further ado. Instead it’s granted a very limited permit for preliminary excavation and preparation at a single site in Washington DC.

DC digging

When asked about the permit, a Boring Company spokesperson told the Washington Post that the “New York Avenue location if constructed, could become a station” in the wider Hyperloop network.

Looking at the fence-lined parking lot on New York Avenue, it’s hard to imagine any kind of station but according to the Boring Company “stations in a Loop or Hyperloop system are small in size and widely distributed in a network — very different from large-station termini considered for train systems.”

Clearly, this is a very small start and progress is slow. According to DC Mayor Muriel E. Bowser's chief of staff, John Falcicchio, “We're just beginning, in the mayor's office, our conversation to get an understanding of what the general vision is for Hyperloop.” Telling Musk he can dig in an abandoned parking lot for a while seems like a good way to secure a little more time for thought. 

If work on the Washington DC Hyperloop does get started, Musk has said that the system of high-speed tubes and pods will be able to carry people between the capital and New York in as little as 29 minutes. Given the current journey takes around three hours, this is impressive. 

However, the kind of infrastructure required for the US-wide Hyperloop system Musk dreams of could take decades to build, and we’re barely out of the starting gate with this permit. 

With that in mind, it’ll be a very long time before we see this become a viable transport solution. At the very least, Musk has the backing of the White House Office of American Innovation and a conditional utility permit from the state of Maryland to help keep things moving.

Security Tips For Protecting Mobile Phones & Tablets

What is at risk?

Only you can determine what is actually at risk. If a thief steals your laptop or mobile device, the most obvious loss is the machine itself. However, if the thief is able to access the information on the computer or mobile device, all of the information stored on the device is at risk, as well as any additional information that could be accessed as a result of the data stored on the device itself.

Sensitive corporate information or customer account information should not be accessed by unauthorized people. You've probably heard news stories about organizations panicking because laptops with confidential information on them have been lost or stolen. But even if there isn't any sensitive corporate information on your laptop or mobile device, think of the other information at risk: information about appointments, passwords, email addresses and other contact information, personal information for online accounts, etc.

How can you protect your laptop or internet-enabled device?

  • Password-protect your computer - Make sure that you have to enter a password to log in to your computer or mobile device.
  • Keep your valuables with you at all times - When traveling, keep your device with you. Meal times are optimum times for thieves to check hotel rooms for unattended laptops. If you are attending a conference or trade show, be especially wary—these venues offer thieves a wider selection of devices that are likely to contain sensitive information, and the conference sessions offer more opportunities for thieves to access guest rooms.
  • Downplay your laptop or mobile device - There is no need to advertise to thieves that you have a laptop or mobile device. Avoid using your device in public areas, and consider non-traditional bags for carrying your laptop.
  • Be aware of your surroundings - If you do use your laptop or mobile device in a public area, pay attention to people around you. Take precautions to shield yourself from "shoulder surfers"—make sure that no one can see you type your passwords or see any sensitive information on your screen.
  • Consider an alarm or lock - Many companies sell alarms or locks that you can use to protect or secure your laptop. If you travel often or will be in a heavily populated area, you may want to consider investing in an alarm for your laptop bag or a lock to secure your laptop to a piece of furniture.
  • Back up your files - If your mobile device is stolen, it's bad enough that someone else may be able to access your information. To avoid losing all of the information, make backups of important information and store the backups in a separate location. Not only will you still be able to access the information, but you'll be able to identify and report exactly what information is at risk.

What can you do if your laptop or mobile device is lost or stolen?

Report the loss or theft to the appropriate authorities. These parties may include representatives from law enforcement agencies, as well as hotel or conference staff. If your device contained sensitive corporate or customer account information, immediately report the loss or theft to your organization so that they can act quickly.

Seven Privacy Habits You Can Start Today

identity-theft.jpg

Taking care of your identity and protecting your privacy might seem like insurmountable tasks, especially in the face of major data breaches, large-scale international hacking, and other “out of my hands” threats. 

While those things certainly are problematic, the reality is there are many steps you can take to make yourself less likely to become an identity theft victim and to minimize the damage if your information has already been compromised.

Trying to take every single privacy step all at once is a surefire way to suffer from burnout and “data breach fatigue,” a very real phenomenon that can occur when the public is overwhelmed with constant news of identity theft dangers. But experts in a variety of fields know that making real changes in your life starts small by developing good habits and sticking to them.

Here are seven great privacy habits you can start working on:

Mailbox Monday 

Your mailbox contains many of the pieces of your identity puzzle, and recent statistics have shown that mail theft is still a widespread problem. Make Monday the day you stop leaving mail in your mailbox, stop mailing important papers or checks in the corner mailbox, and stop throwing away unshredded documents or credit card offers.

TMI Tuesday 

Sign up to receive the Identity Theft Resource Center’s TMI Weekly delivered to your inbox each week …yes, as in “too much information.” It outlines news items and information on oversharing and other threats to your personal data. Signing up is easy, and the link can be found here.

Weak Password Wednesday 

It’s tempting to use a super-simple password (like “password”…literally) or to make one really good password and use it for all your online accounts. Unfortunately, both of those are great ways to hand your information over to a hacker. Use Wednesday to think about your passwords and to change a few of them on the dozens of online accounts you may have.

Twitter Thursday 

From live Twitter chats to daily social media updates from privacy experts, Thursday is a great day to spend a little while on Twitter catching up on the latest news. A number of organizations host regular chats throughout the month, like the ITRC’s monthly #IDTheftChat events.

Financial Friday 

It’s the last day of the work week for a lot of people, and there’s no better day to spend some time on your financial privacy. Monitor your bank accounts and credit card accounts for any signs of unusual activity, and check up on any mobile payment accounts or apps you use (like PayPal and Apple Pay) to make sure there’s nothing out of the ordinary. If your credit card company offers it, log in and take a peek at your credit score; you won’t see your whole report, but if there’s a sudden, dramatic change in your score, that’s a sure sign that you need to order copies of your credit reports.

Share It Saturday 

Did you know that you can be harmed if someone you know falls for a scam? Let’s say your mom shares a “forward this to ten people” hoax email or social media post, and you click on a link it contains. Congratulations, you may have just downloaded a virus to your computer. It’s not enough to protect your own privacy, so Saturdays are a great day to share genuine news items about data breaches, scams, and fraud. You’ll protect the people you care about, and you just might be protecting yourself.

Social Media Sunday 

A lot of people like to set aside Sundays for a little rest and relaxation before heading into another work week, and that can mean checking up on social media buzz. But are you oversharing online? Do you have your privacy settings in place, and are they set to the most protective level? Stop and think for a while about what you share, where you share it, and how far it can go.

Track Elon Musk's Tesla Roadster on its Way to Mars

Earlier this month Elon Musk’s SpaceX successfully launched Falcon Heavy, the company’s most powerful rocket yet. Inside was a red Tesla Roadster sports car with built-in cameras for capturing what it sees as well as a copy of Isaac Asimov’s science fiction book series Foundation, and a plane engraved with 6,000 SpaceX employee names. The car’s destination: Mars.

So, what does the road to Mars actually look like?

One space enthusiast has created a website for tracking the car’s journey using NASA data to track the Roadster’s course. Aptly named Where Is Roadster? The site offers real-time data on where the Roadster currently is as well as an interactive tool to help you see where it’s headed as well.

As it turns out, the car isn’t making a beeline right for the Red Planet. Like all other things, it has to deal with the force of gravity working against it, which means that instead of going straight for Mars, it’s instead traveling in a bit of an arc.

Right now, the roadster and its passenger, a dummy named Starman, are roughly 2.25 million miles away from Earth and 137.5 million miles away from Mars. It’s not expected to reach its destination until October 2020.

And bad news for Starman if he runs into trouble along the way: The car exceeded its 36,000-mile warranty 636 times while driving around the sun.