DART did change the path of an asteroid

Dirmorphos’ egg-like shape and craggy, boulder-dotted surface finally came into clear view in the last few moments before DART’s impact. Dimorphos is the asteroid whose path we changed by the impact of DART.

NASA on Tuesday said it had succeeded in deflecting an asteroid in a historic test of humanity’s ability to stop an incoming cosmic object from devastating life on Earth.

The fridge-sized Double Asteroid Redirection Test (DART) impactor deliberately smashed into the moonlet asteroid Dimorphos on September 26, pushing it into a smaller, faster orbit around its big brother Didymos, said NASA chief Bill Nelson.

“DART shortened the 11 hour 55 minute orbit to 11 hours and 23 minutes,” he said. Speeding up Dimorphos’ orbital period by 32 minutes exceeded NASA’s own expectation of 10 minutes.

“We showed the world that NASA is serious as a defender of this planet,” added Nelson.

From Phys.org

Leave a Comment

Filed under Uncategorized

Going ‘rogue’: New very successful method in global marketing

Larry Sharpe signing whiteboard for White Claw Hard Seltzer. Credit: Dennis Conso

Chris Taylor, director of the beverage management program in the University of Houston Conrad N. Hilton College of Global Hospitality Leadership, watched in awe as sales of White Claw skyrocketed seemingly overnight in the summer of 2019.

As a new entry in the relatively unknown hard seltzer category, it was completely unexpected and had virtually nothing to do with the company’s own marketing strategy. White Claw’s rapid success was due, almost entirely, to a social media influencer.

“He came up with a slogan, ‘ain’t no laws when you’re drinking Claws’, and it took off from there,” said Taylor, a Hilton College associate professor. “The last thing a company wants is their alcoholic product associated with law breaking, but it started selling out everywhere.”

The influencer, with millions of followers, flooded social airwaves with the slogan, even putting it on T-shirts. It created a fervor for a product that wasn’t on the radar of the beverage industry at all. Demand went through the roof and soon White Claw was selling out everywhere.

Taylor had never seen anything like it. Neither had anyone else, for that matter. He, along with Hilton College researchers Cortney Norris and Scott Taylor Jr., set out to research and explain this new phenomenon they dubbed “rogue marketing.”

According to the researchers, rogue marketing occurs when an unaffiliated individual creates and posts an informal message about a brand on social media that becomes viral.

But… how to make anything “go viral” is the challenge. And a report about a product can be negative as well as positive.

From phys.org October 5, 2022 by Bryan Luhn, University of Houston

Leave a Comment

Filed under Uncategorized

Spooky action at a distance

The 2022 Nobel Prize in Physics goes to Alain Aspect, John F. Clauser, and Anton Zeilinger, “for experiments with entangled photons, establishing the violation of Bell inequalities and pioneering quantum information science.”

Cornell University physicist N. David Mermin once described quantum entanglement as “the closest thing we have to magic,” since it means that disturbances in one part of the universe can instantly affect distant other parts of the universe, somehow bypassing the cosmic speed-of-light limit. Albert Einstein memorably dubbed it “spooky action at a distance.” Today, The Royal Swedish Academy of Sciences honored three physicists with the 2022 Nobel Prize in Physics for their work on entanglement. Alain Aspect, John F. Clauser, and Anton Zeilinger were recognized “for experiments with entangled photons, establishing the violation of Bell inequalities and pioneering quantum information science.”

When subatomic particles interact, they can become invisibly connected even though they may be physically separated. So knowledge about one partner can instantly reveal knowledge about its twin. If you measure the state of one, you will know the state of the other without having to make a second measurement because the first measurement determines the properties of the other particle as well.

From ARS Technica, by Jennifer Ouellette – 10/4/2022

Leave a Comment

Filed under Uncategorized

Crop diversity can be exploited to make our crops more nutritious, productive and resilient to pests, diseases and environmental changes, only if we have information about it.

EURISCO documents crop diversity including different varieties of barley, pictured. Credit: Nora Capozio

The European Search Catalogue for Plant Genetic Resources (EURISCO) is an international aggregated database that provides a central entry point for information on the large crop genetic diversity preserved in more than 400 institutes in 43 European and neighboring countries.

An update on EURISCO greatly improving access has recently been published in the Nucleic Acids Research (NAR) special issue on biological databases.

Currently, more than 2 million plant genetic resources accessions are documented in EURISCO comprising 6,737 genera and 45,175 species. These include major cereal grains such as wheat and maize, pulses such as beans, peas and vetches, edible oilseed crops such as sunflower and linseed, tuber crops such as potatoes, and Brassica crops.

More than 400,000 accessions are part of the Multilateral System of Access and Benefit Sharing (MLS) of the International Treaty on Plant Genetic Resources for Food and Agriculture (ITPGRFA), which means that they have been confirmed by the respective countries to be promptly available under standard and internationally agreed benefit-sharing conditions. In addition, there are 2.6 million records of phenotypic data from more than 3,800 experiments conducted on genebank material.

Since the first publication in the NAR Database Issue in 2017, the volume of data in EURISCO has been expanding continuously: the number of data provider institutions rose from 376 to 402, the number of documented accessions increased by more than 200,000, and the number of phenotypic data points increased by 2.2 million (500%).

“This shows that EURISCO is steadily gaining acceptance as a repository of such data,” says Stephan Weise, EURISCO coordinator. “In addition, the data on plant genetic resources are continuously maintained and expanded by the data providers. Each year, between 30 and 40 National Inventory datasets are updated in EURISCO, for an average of 350,000–400,000 accessions per year. With the European Cooperative Programme for Plant Genetic Resources (ECPGR), we organize training workshops to support data providers, and ultimately improve data quality.”

From: October 5, 2022 Documenting the world’s crop diversity and making it available by The Alliance of Bioversity International and the International Center for Tropical Agriculture as republished by phys.org.

I apologize for the simple formatting, will try to go back to my former formatting which resulted from my formatting for the Highway Shopper newspaper.

Leave a Comment

Filed under Uncategorized

Sim Swapping

The new phone you bought may send your private information to criminals.

SIM-swapping is the practice of tricking or bribing mobile phone store employees into diverting a target’s phone number, text messages and calls to a device the attackers control.

SIM-swapping attacks might sound like one of the identity theft horror stories that only happens to people who are too careless or cavalier with their personal information, but more of us are at risk than it seems.

A recent study from Princeton found that several U.S. carriers are vulnerable to SIM-swapping attacks, and prepaid accounts are the most susceptible. Researchers signed up for ten prepaid accounts on AT&T, T-Mobile, Tracfone, US Mobile, and Verizon each. They were then able to successfully “trick” customer service reps and circumvent account security protocols to gain control of activated devices. They then remotely disabled these devices’ network access, which is how most SIM-swap attacks begin. You can read the entire paper here (via Engadget).

SIM-swap attacks normally begin with an old-fashioned phishing scam. Email phishing is still surprisingly common, but hackers also use fake login pages, apps loaded with spyware or keyloggers, fake ads, and malicious message attachments to gain access to your accounts. Once they have that, all it takes is knowledge of your phone number and some personal data to execute a SIM-swap attack.

Phishing isn’t the only way to start a SIM-swap attack; hackers can get your info from leaked personal data, or even physically lift it from your devices. You should always take proper care to respond to leaks and avoid losing your device (or letting the wrong people use it).
Some early SIM-swapping attack warning signs

When you’ve been hit with a SIM-swap attack, your device will start acting up. Here are some clues that you might be the victim of these specific type of hack:

Sudden changes in service. The first sign of a SIM-swap attack is receiving notifications from your provider that your phone number or SIM card has been activated elsewhere. However, many providers have security measures in place to reduce the likelihood of a successful takeover, and they may try to confirm account changes with you before they take affect. Or at least they say they do.
Unauthorized security alerts. Similarly, if you have the proper settings enabled, you may receive notifications or email alerts that important profile data—such as passwords, pin numbers, security questions, contact info—for your service provider and other accounts has been changed or that logins were made (or attempted) from unrecognized locations or devices. 

You need to respond to these alerts immediately, regardless of if anything was successfully changed. Someone is trying to hack into your accounts and steal your identity—whether by a SIM-swap attack or some other means. The faster you catch and react to these attempted changes, the better your chances are of mitigating the hack’s severity.
Signs of a successful or ongoing SIM-swapping attack

What you’ll experience after a successful SIM-swap attack is even scarier. Once someone gains access to your phone number, they now have access to any apps, accounts, or personal data tied to it (including two-step authentication requests). From there, it’s only a matter of minutes before they’ve locked you out of everything and assumed your identity.

Here are some additional warning signs to look out for:

SIM-swap attacks normally begin with an old-fashioned phishing scam. Email phishing is still surprisingly common, but hackers also use fake login pages, apps loaded with spyware or keyloggers, fake ads, and malicious message attachments to gain access to your accounts. Once they have that, all it takes is knowledge of your phone number and some personal data to execute a SIM-swap attack.

Phishing isn’t the only way to start a SIM-swap attack; hackers can get your info from leaked personal data, or even physically lift it from your devices. You should always take proper care to respond to leaks and avoid losing your device (or letting the wrong people use it).
Some early SIM-swapping attack warning signs

When you’ve been hit with a SIM-swap attack, your device will start acting up. Here are some clues that you might be the victim of these specific type of hack:

Sudden changes in service. The first sign of a SIM-swap attack is receiving notifications from your provider that your phone number or SIM card has been activated elsewhere. However, many providers have security measures in place to reduce the likelihood of a successful takeover, and they may try to confirm account changes with you before they take affect. Or at least they say they do.
Unauthorized security alerts. Similarly, if you have the proper settings enabled, you may receive notifications or email alerts that important profile data—such as passwords, pin numbers, security questions, contact info—for your service provider and other accounts has been changed or that logins were made (or attempted) from unrecognized locations or devices. 

You need to respond to these alerts immediately, regardless of if anything was successfully changed. Someone is trying to hack into your accounts and steal your identity—whether by a SIM-swap attack or some other means. The faster you catch and react to these attempted changes, the better your chances are of mitigating the hack’s severity.

Signs of a successful or ongoing SIM-swapping attack

What you’ll experience after a successful SIM-swap attack is even scarier. Once someone gains access to your phone number, they now have access to any apps, accounts, or personal data tied to it (including two-step authentication requests). From there, it’s only a matter of minutes before they’ve locked you out of everything and assumed your identity.

Here are some additional warning signs to look out for:

You cannot send or receive texts and phone calls. 

Someone says your social media or email has been hacked. A hacked Twitter account can be a sign of more than just poor password strength—it’s one of the easiest ways to catch a SIM-swap attack. 

Being unable to use any apps on your phone. If you’ve suddenly been signed out of all your apps and various other accounts and can’t log back in, that’s an obvious sign of some kind of identity theft. 

Unauthorized bank activity.

From Krebs on Security  and Lifehacker.

Leave a Comment

Filed under Uncategorized

Enzymes in worm spit gobbles polyethylene plastic-bag waste

Plastic waste on the banks of the polluted Las Vacas River, in Chinautla, Guatemala
Plastic waste on the banks of the polluted Las Vacas River, in Chinautla, Guatemala.

Oct. 4, 2022

Enzymes found in the saliva of wax worms can degrade one of the most common forms of plastic waste, according to research published Tuesday that could open up new ways of dealing with plastic pollution.

Humans produce some 400 million metric tons of plastic waste each year despite international drives to reduce single-use plastics and to increase recycling.

Around a third is polyethylene, a tough plastic thanks to its structure, which traditionally requires heating or radiation before it starts to break down.

But those contained in the saliva the wax worm moth (Galleria mellonella) can act in only a few hours, Tuesday’s research showed.

Researcher Federica Bertocchini, an avid beekeeper, said she originally stumbled on the idea that this small caterpillar had unusual powers when storing honeycombs a few years ago.

“At the end of the season, usually beekeepers put some empty beehives in a storage room, to put them back in the field in the spring,” she told AFP.

“One year I did that, and I found my stored honeycombs plagued with wax worms. In fact, that is their habitat.”

Bertocchini cleaned the honeycombs and put the worms in a plastic bag.

When she returned a short time later she found the bag “riddled with holes”.

“That raised the question: is it the result of munching or there is a chemical modification? We checked that, doing proper lab experiments, and we found that the polyethylene had been oxidized in a chemical reaction, not by munching,” she told AFP.

“We can imagine a scenario where these enzymes are used in an aqueous solution, and liters of this solution is poured over piles of collected plastic in a waste management facility,” said Bertocchini.

From Phys.org, October 4, 2022 by Patrick GALEY

Leave a Comment

Filed under Uncategorized

Sept. 11, 2022- Snake River Dams- Inslee & Murray kick can down road again

Leave a Comment

Filed under Uncategorized

Sept. 7, 2022- The last issue of the Highway Shopper

Leave a Comment

Filed under Uncategorized

Aug. 31, 2022- Even farther dark matter found

Leave a Comment

Filed under Uncategorized

Aug. 24, 2022- Shredded phones are rich gold ore

Leave a Comment

Filed under Uncategorized