Tumgik
#Protecting sensitive data
technologywalabandha · 7 months
Text
Unlock Fort Knox for Your Laptop: The Definitive Guide to Bulletproof Security
Tumblr media
What steps can I take to enhance my laptop's security?
Dive into my latest Blog post and discover the ultimate secrets to fortifying your laptop's defenses! Transform your device into a digital fortress and safeguard your data like never before.
From foolproof password strategies to state-of-the-art encryption techniques, explore a treasure trove of tips and tricks to keep hackers at bay. Say goodbye to cyber worries and hello to peace of mind!
Ready to take control of your laptop's security? Arm yourself with knowledge now!
Read the full post and become the guardian of your digital domain. #LaptopFortress #SecureYourData #ReadMore
1 note · View note
gifti3 · 8 months
Text
....did we really have to put a bomb in the building though?
4 notes · View notes
graysongarelick · 5 months
Text
Elevate Client Services with Excel: Expert Tips for Financial Consultants by Grayson Garelick
Tumblr media
Financial consultants operate in a dynamic environment where precision, efficiency, and client satisfaction are paramount. Excel, as a versatile tool, offers an array of features that can significantly enhance the services provided by financial consultants. Grayson Garelick, an accomplished financial analyst and consultant, shares invaluable Excel tips to help financial consultants elevate their client services and add tangible value.
The Role of Excel in Financial Consulting
Excel serves as the backbone of financial consulting, enabling consultants to analyze data, create models, and generate insights that drive informed decision-making. As the demands of clients become increasingly complex, mastering Excel becomes essential for financial consultants aiming to deliver exceptional services.
1. Customize Excel Templates
One of the most effective ways to streamline workflows and improve efficiency is by creating customized Excel templates tailored to specific client needs. Grayson suggests developing templates for budgeting, forecasting, and financial reporting that can be easily adapted for different clients, saving time and ensuring consistency.
2. Utilize PivotTables for Data Analysis
PivotTables are powerful tools in Excel that allow financial consultants to analyze large datasets and extract meaningful insights quickly. Grayson emphasizes the importance of mastering PivotTables for segmenting data, identifying trends, and presenting information in a clear and concise manner to clients.
3. Implement Conditional Formatting
Conditional formatting is a valuable feature in Excel that allows consultants to highlight important information and identify outliers effortlessly. By setting up conditional formatting rules, consultants can draw attention to key metrics, discrepancies, or trends, facilitating easier interpretation of data by clients.
4. Leverage Excel Add-ins
Excel offers a variety of add-ins that extend its functionality and provide additional features tailored to financial analysis and reporting. Grayson recommends exploring add-ins such as Power Query, Power Pivot, and Solver to enhance data manipulation, modeling, and optimization capabilities.
5. Automate Repetitive Tasks with Macros
Macros enable financial consultants to automate repetitive tasks and streamline workflows, saving valuable time and reducing the risk of errors. Grayson advises recording and editing macros to automate tasks such as data entry, formatting, and report generation, allowing consultants to focus on value-added activities.
6. Master Advanced Formulas and Functions
Excel's extensive library of formulas and functions offers endless possibilities for financial analysis and modeling. Grayson suggests mastering advanced formulas such as VLOOKUP, INDEX-MATCH, and array formulas to perform complex calculations, manipulate data, and create sophisticated models tailored to client needs.
7. Visualize Data with Charts and Graphs
Visualizing data is essential for conveying complex information in an easily digestible format. Excel offers a variety of chart types and customization options that enable consultants to create compelling visuals that resonate with clients. Grayson recommends experimenting with different chart styles to find the most effective way to present data and insights.
8. Collaborate and Share Workbooks Online
Excel's collaboration features enable financial consultants to work seamlessly with clients, colleagues, and stakeholders in real-time. Grayson highlights the benefits of sharing workbooks via OneDrive or SharePoint, allowing multiple users to collaborate on the same document, track changes, and maintain version control.
9. Protect Sensitive Data with Security Features
Data security is a top priority for financial consultants handling sensitive client information. Excel's built-in security features, such as password protection and encryption, help safeguard confidential data and ensure compliance with regulatory requirements. Grayson advises implementing security protocols to protect client data and maintain trust.
10. Stay Updated with Excel Training and Certification
Excel is a constantly evolving tool, with new features and updates released regularly. Grayson stresses the importance of staying updated with the latest Excel training and certification programs to enhance skills, explore new capabilities, and maintain proficiency in Excel's ever-changing landscape.
Elevating Client Services with Excel Mastery
Excel serves as a catalyst for innovation and excellence in financial consulting, empowering consultants to deliver exceptional services that add tangible value to clients. By implementing Grayson Garelick Excel tips, financial consultants can streamline workflows, enhance data analysis capabilities, and foster collaboration, ultimately driving client satisfaction and success. As financial consulting continues to evolve, mastering Excel remains a cornerstone of excellence, enabling consultants to thrive in a competitive landscape and exceed client expectations.
2 notes · View notes
zedtreeosposts · 3 months
Text
Discover why data security is crucial in data entry and learn effective strategies to safeguard sensitive information. Explore best practices, potential threats, and the role of secure data management in ensuring confidentiality and compliance. Stay informed and protect your data with insights from Zedtreeo.
0 notes
zapperrr · 6 months
Text
Securing Your Website: Best Practices for Web Developers
As the digital landscape continues to evolve, website security has become a paramount concern for businesses and individuals alike. With cyber threats becoming increasingly sophisticated, it is crucial for web developers to adopt robust security measures to safeguard their websites and the sensitive data they handle. In this article, we'll delve into the best practices that web developers can implement to enhance the security of their websites and protect against potential threats.
Introduction
In today's interconnected world, websites serve as the digital storefront for businesses, making them vulnerable targets for cyber attacks. From data breaches to malware infections, the consequences of a security breach can be severe, ranging from financial loss to damage to reputation. Therefore, prioritizing website security is essential for maintaining the trust and confidence of users.
Understanding Website Security
Before diving into best practices, it's crucial to understand the importance of website security and the common threats faced by websites. Website security encompasses measures taken to protect websites from cyber threats and unauthorized access. Common threats include malware infections, phishing attacks, SQL injection, cross-site scripting (XSS), and brute force attacks.
Best Practices for Web Developers
Keeping Software Updated
One of the most fundamental steps in website security is keeping all software, including the content management system (CMS), plugins, and server software, updated with the latest security patches and fixes. Outdated software is often targeted by attackers due to known vulnerabilities that can be exploited.
Implementing HTTPS
Implementing HTTPS (Hypertext Transfer Protocol Secure) encrypts the data transmitted between the website and its users, ensuring confidentiality and integrity. HTTPS not only protects sensitive information but also boosts trust among visitors, as indicated by the padlock icon in the browser's address bar.
Using Strong Authentication Methods
Implementing strong authentication methods, such as multi-factor authentication (MFA) and CAPTCHA, adds an extra layer of security to user accounts. MFA requires users to provide multiple forms of verification, such as a password and a one-time code sent to their mobile device, reducing the risk of unauthorized access.
Securing Against SQL Injection Attacks
SQL injection attacks occur when malicious actors exploit vulnerabilities in web applications to execute arbitrary SQL commands. Web developers can prevent SQL injection attacks by using parameterized queries and input validation to sanitize user inputs effectively.
Protecting Sensitive Data
It's essential to employ encryption techniques to protect sensitive data, such as passwords, credit card information, and personal details, stored on the website's servers. Encrypting data at rest and in transit mitigates the risk of data breaches and unauthorized access.
Regular Security Audits
Conducting regular security audits helps identify vulnerabilities and weaknesses in the website's infrastructure and codebase. Penetration testing, vulnerability scanning, and code reviews enable web developers to proactively address security issues before they are exploited by attackers.
Choosing a Secure Hosting Provider
Selecting a reputable and secure hosting provider is critical for ensuring the overall security of your website. When evaluating hosting providers, consider factors such as security features, reliability, scalability, and customer support.
Evaluating Security Features
Choose a hosting provider that offers robust security features, such as firewalls, intrusion detection systems (IDS), malware scanning, and DDoS protection. These features help protect your website from various cyber threats and ensure continuous uptime.
Ensuring Regular Backups
Regularly backing up your website's data is essential for mitigating the impact of security incidents, such as data breaches or website compromises. Choose a hosting provider that offers automated backup solutions and store backups securely offsite.
Customer Support and Response to Security Incidents
Opt for a hosting provider that provides responsive customer support and has established protocols for handling security incidents. In the event of a security breach or downtime, prompt assistance from the hosting provider can minimize the impact on your website and business operations.
Implementing Firewall Protection
Firewalls act as a barrier between your website and external threats, filtering incoming and outgoing network traffic based on predefined security rules. There are several types of firewalls, including network firewalls, web application firewalls (WAF), and host-based firewalls.
Configuring and Maintaining Firewalls
Properly configuring and maintaining firewalls is crucial for effective security. Define firewall rules based on the principle of least privilege, regularly update firewall configurations to reflect changes in the website's infrastructure, and monitor firewall logs for suspicious activity.
Educating Users about Security
In addition to implementing technical measures, educating users about security best practices is essential for enhancing overall website security. Provide users with resources, such as security guidelines, tips for creating strong passwords, and information about common phishing scams.
Importance of User Awareness
Users play a significant role in maintaining website security, as they are often the targets of social engineering attacks. By raising awareness about potential threats and providing guidance on how to recognize and respond to them, web developers can empower users to stay vigilant online.
Providing Training and Resources
Offer training sessions and educational materials to help users understand the importance of security and how to protect themselves while using the website. Regularly communicate updates and reminders about security practices to reinforce good habits.
Monitoring and Responding to Security Incidents
Despite taking preventive measures, security incidents may still occur. Establishing robust monitoring systems and incident response protocols enables web developers to detect and respond to security threats in a timely manner.
Setting Up Monitoring Tools
Utilize monitoring tools, such as intrusion detection systems (IDS), security information and event management (SIEM) systems, and website monitoring services, to detect abnormal behavior and potential security breaches. Configure alerts to notify you of suspicious activity promptly.
Establishing Incident Response Protocols
Develop comprehensive incident response plans that outline roles, responsibilities, and procedures for responding to security incidents. Establish clear communication channels and escalation paths to coordinate responses effectively and minimize the impact of security breaches.
Securing your website requires a proactive approach that involves implementing a combination of technical measures, choosing a secure hosting provider, educating users about security best practices, and establishing robust monitoring and incident response protocols. By following these best practices, web developers can mitigate the risk of security breaches and safeguard their websites and the sensitive data they handle.
#website security has become a paramount concern for businesses and individuals alike. With cyber threats becoming increasingly sophisticated#it is crucial for web developers to adopt robust security measures to safeguard their websites and the sensitive data they handle. In this#we'll delve into the best practices that web developers can implement to enhance the security of their websites and protect against potenti#Introduction#In today's interconnected world#websites serve as the digital storefront for businesses#making them vulnerable targets for cyber attacks. From data breaches to malware infections#the consequences of a security breach can be severe#ranging from financial loss to damage to reputation. Therefore#prioritizing website security is essential for maintaining the trust and confidence of users.#Understanding Website Security#Before diving into best practices#it's crucial to understand the importance of website security and the common threats faced by websites. Website security encompasses measur#phishing attacks#SQL injection#cross-site scripting (XSS)#and brute force attacks.#Best Practices for Web Developers#Keeping Software Updated#One of the most fundamental steps in website security is keeping all software#including the content management system (CMS)#plugins#and server software#updated with the latest security patches and fixes. Outdated software is often targeted by attackers due to known vulnerabilities that can#Implementing HTTPS#Implementing HTTPS (Hypertext Transfer Protocol Secure) encrypts the data transmitted between the website and its users#ensuring confidentiality and integrity. HTTPS not only protects sensitive information but also boosts trust among visitors#as indicated by the padlock icon in the browser's address bar.#Using Strong Authentication Methods#Implementing strong authentication methods
0 notes
rajaniesh · 8 months
Text
Unlock Data Governance: Revolutionary Table-Level Access in Modern Platforms
Dive into our latest blog on mastering data governance with Microsoft Fabric & Databricks. Discover key strategies for robust table-level access control and secure your enterprise's data. A must-read for IT pros! #DataGovernance #Security
Tumblr media
View On WordPress
0 notes
hamadisthings · 3 months
Text
HELP US STOP CHAT CONTROL!
If you live in the EU, you absolutely need to pay attention to what's to come. What is Chat Control, you may ask? In a (failed) attempt to combat child abuse online the EU made Chat Control, Chat Control will result in getting your private messages and emails to be scanned by artificial intelligence aka AI to search for CSAM pictures or discussion that might have grooming in there. And on top of having your private conversations handed to AI or the police to snoop in, like your family pictures, selfies, or more sensitive pics, like the medical kind, only meant to be seen by your doctors, or the "flirtatious" kind you send to your partner, you either have to ACCEPT to be scanned...or else you will be forbidden from sending pictures, videos, or even links, as said here.
Kids should absolutely be protected online, without question, but the things that Chat Control gets wrong is that this is a blatant violation of privacy, without even considering the fact that AI WILL create tons of false positives, this is not a theory, this is a fact. And for all the false positives that will be detected, all of them will be sent to the police, which will just flood their system with useless junk instead of efficiently putting resources to actual protect kids from predators.
It also does not help that politicians, police officers, soldiers etc will be exempt from Chat Control if it passes. If it's for the sake of protection, shouldn't everyone get the same treatment? Which further prove that Chat Control would NOT keep your data of private life safe. Plus, bad actors will simply stop using messenger apps as soon as they know they're being tracked, using more obscure means, meanwhile innocent people will be punished by using those services On top of this, the EU also plans on reintroducing Data retention called "EU Going Dark". Both Chat Control and EU Going Dark are clear violation of the GDPR, and even if they shouldn't stand a chance in court, its not going to prevent politicians from trying to ram these through as an excuse to mass surveil European citizens, using kids as a shield. Even teenagers sending pictures to each other won't be exempt, which entirely goes against the purpose of protecting kids by retaining their private photos instead. Furthermore, once messaging apps are forced to comply with Chat Control, the president of Signal, a secured messaging app with encryption, have confirmed that they will be forced to leave the EU if this is enforced against them.
Tumblr media
If Chat Control also ends up targeting any websites with the option of private messages, you better expect Europe to be geo-blocked by any websites offering such function. I would also like to add that EU citizens were very vocal in the fight against KOSA, an equally bad internet bill from the US-- and it showed! Which is why we heavily need the help of our fellow US peers to fight against Chat Control too, so please, because we all know if it passes, the US government will take a look at this and conclude "Ooh, a way to force mass surveillance on citizens even more than before? don't mind if I do!" It's always a snowball effect.
Tumblr media
KEEP IN MIND THE EUROPE COUNCIL WILL LIKELY VOTE ON CHAT CONTROL THIS 19 JUNE OF NEXT WEEK TO SEE IF IT WILL ENTER TRILOGIES OR NOT. Even if it does enter Trilogues, the fight will only be beginning. Absentees may not count as a no, so it is crucial that you contact your MEPs HERE, as well as HERE, and you can also show your support for Edri's campaign against Chat Control HERE.
You can read more on Chat Control here as well, and you can find useful information as to which arguments to use when politely contacting your MEP (calling is better than email) here, and beneath you will find graphics you can use to spread the word!
YOU CAN ALSO JOIN OUR DISCORD SERVER (linked here) TO HELP ORGANIZE AGAINST CHAT CONTROL NON EU PEOPLE ARE MORE THAN WELCOME TO JOIN TOO!
Tumblr media
https://discord.gg/FPDJYkUujM
PLEASE REBLOG ! NON EU PEOPLE ARE ENCOURAGED TO REBLOG AS WELL CONTACT YOUTUBERS, CONTENT CREATORS, ANYONE YOU KNOW THAT MAY HELP GET THE WORD OUT ! Let's fight for our Internet and actually keep kids safe online! Because Chat Control and EU Going Dark will only endanger kids.
PLEASE REBLOG! NON EU PEOPLE ARE ENCOURAGED TO REBLOG AS WELL CONTACT YOUTUBERS, CONTENT CREATORS, ANYONE YOU KNOW THAT MAY HELP GET THE WORD OUT !
Let's fight for our Internet and actually keep kids safe online! Because Chat Control and EU Going Dark will only endanger kids.
3K notes · View notes
michellesanches · 1 year
Text
Understanding GDPR Fines - Key Take Aways
Navigating the complex terrain of the General Data Protection Regulation (GDPR) can be daunting, but it’s crucial for businesses to stay compliant to avoid heavy penalties. The European Data Protection Board (EDPB) shed more light on this area by finalising its guidelines for calculating administrative fines. Aimed at bringing consistency to GDPR fines imposed across the EU, these guidelines were…
View On WordPress
0 notes
mywealthlocker · 1 year
Text
Unclaimed assets often happen when families are unaware of a deceased person's investments or assets due to a lack of communication or a missing will/estate plan. It's vital to keep financial information up-to-date and communicate with family members to prevent assets from going unclaimed.
1 note · View note
Text
This is not a drill
Tumblr media
This is IMPORTANT especially if you live in the USA or use the internet REGULATED by the USA!!!!
Do not scroll. Signal boost. Reblog.
Reblog WITHOUT reading if you really can't right now, I promise all the links and proof are here. People NEED to know this.
( I tried to make this accessible but you can't cater to EVERYONE so please just try your best to get through this or do your own research 🙏)
TLDR: Homeland Security has been tying our social media to our IPs, licenses, posts, emails, selfies, cloud, apps, location, etc through our phones without a warrant using Babel X and will hold that information gathered for 75 years. Certain aspects of it were hushed because law enforcement will/does/has used it and it would give away confidential information about ongoing operations.
This gets renewed in September.
Between this, Agincourt (a VR simulator for cops Directly related to this project), cop city, and widespread demonization of abortions, sex workers, & queer people mixed with qanon/Trumpism, and fascism in Florida, and the return of child labor, & removed abortion rights fresh on our tails it's time for alarms to be raised and it's time for everyone to stop calling us paranoid and start showing up to protest and mutual aid groups.
🚨🚨🚨🚨🚨🚨🚨🚨🚨🚨
These are the same feds who want to build cop city and recreate civilian houses en masse and use facial recognition. The same feds that want cop city to also be a training ground for police across the country. Cop city where they will build civilian neighborhoods to train in.
Widespread mass surveillance against us.
Now let's cut to some parts of the article. May 17th from Vice:
Customs and Border Protection (CBP) is using an invasive, AI-powered monitoring tool to screen travelers, including U.S. citizens, refugees, and people seeking asylum, which can in some cases link their social media posts to their Social Security number and location data, according to an internal CBP document obtained by Motherboard.
Called Babel X, the system lets a user input a piece of information about a target—their name, email address, or telephone number—and receive a bevy of data in return, according to the document. Results can include their social media posts, linked IP address, employment history, and unique advertising identifiers associated with their mobile phone. The monitoring can apply to U.S. persons, including citizens and permanent residents, as well as refugees and asylum seekers, according to the document.
“Babel data will be used/captured/stored in support of CBP targeting, vetting, operations and analysis,” the document reads. Babel X will be used to “identify potential derogatory and confirmatory information” associated with travelers, persons of interest, and “persons seeking benefits.” The document then says results from Babel X will be stored in other CBP operated systems for 75 years.
"The U.S. government’s ever-expanding social media dragnet is certain to chill people from engaging in protected speech and association online. And CBP’s use of this social media surveillance technology is especially concerning in connection with existing rules requiring millions of visa applicants each year to register their social media handles with the government. As we’ve argued in a related lawsuit, the government simply has no legitimate interest in collecting and retaining such sensitive information on this immense scale,” Carrie DeCell, senior staff attorney at the Knight First Amendment Institute, told Motherboard in an email.
The full list of information that Babel X may provide to CBP analysts is a target’s name, date of birth, address, usernames, email address, phone number, social media content, images, IP address, Social Security number, driver’s license number, employment history, and location data based on geolocation tags in public posts.
Bennett Cyphers, a special advisor to activist
organization the Electronic Frontier Foundation, told Motherboard in an online chat “the data isn’t limited to public posts made under someone’s real name on Facebook or Twitter.”
The document says CBP also has access to AdID information through an add-on called Locate X, which includes smartphone location data. AdID information is data such as a device’s unique advertising ID, which can act as an useful identifier for tracking a phone and, by extension, a person’s movements. Babel Street obtains location information from a long supply chain of data. Ordinary apps installed on peoples’ smartphones provide data to a company called Gravy Analytics, which repackages that location data and sells it to law enforcement agencies via its related company Venntel. But Babel Street also repackages Venntel’s data for its own Locate X product."
The PTA obtained by Motherboard says that Locate X is covered by a separate “commercial telemetry” PTA. CBP denied Motherboard’s FOIA request for a copy of this document, claiming it “would disclose techniques and/or procedures for law enforcement investigations or prosecutions”.
A former Babel Street employee previously told Motherboard how users of Locate X can draw a shape on a map known as a geofence, see all devices Babel Street has data on for that location, and then follow a specific device to see where else it has been.
Cyphers from the EFF added “most of the people whose location data is collected in this way likely have no idea it’s happening.”
CBP has been purchasing access to location data without a warrant, a practice that critics say violates the Fourth Amendment. Under a ruling from the Supreme Court, law enforcement agencies need court approval before accessing location data generated by a cell phone tower; those critics believe this applies to location data generated by smartphone apps too.
“Homeland Security needs to come clean to the American people about how it believes it can legally purchase and use U.S. location data without any kind of court order. Americans' privacy shouldn't depend on whether the government uses a court order or credit card,” Senator Ron Wyden told Motherboard in a statement. “DHS should stop violating Americans' rights, and Congress should pass my bipartisan legislation to prohibit the government's purchase of Americans' data." CBP has refused to tell Congress what legal authority it is following when using commercially bought smartphone location data to track Americans without a warrant.
Neither CBP or Babel Street responded to a request for comment. Motherboard visited the Babel X section of Babel Street’s website on Tuesday. On Wednesday before publication, that product page was replaced with a message that said “page not found.”
Do you know anything else about how Babel X is being used by government or private clients? Do you work for Babel Street? We'd love to hear from you. Using a non-work phone or computer, you can contact Joseph Cox securely on Signal on +44 20 8133 5190, Wickr on josephcox, or email [email protected].
Wow that sounds bad right.
Be a shame if it got worse.
.
.
It does.
The software (previously Agincourt Solutions) is sold by AI data company Babel Street, was led by Jeffrey Chapman, a former Treasury Department official,, Navy retiree & Earlier in his career a White House aide and intelligence officer at the Department of Defense, according to LinkedIn.
🙃
So what's Agincourt Solutions then right now?
SO FUCKING SUS IN RELATION TO THIS, THATS WHAT
Tumblr media Tumblr media
In essence, synthetic BATTLEVR training is a mixture of all three realities – virtual, augmented and physical. It is flexible enough to allow for mission rehearsals of most types and be intuitive enough to make training effective.
Anyway the new CEO of Babel Street (Babel X) as of April is a guy named Michael Southworth and I couldn't find much more on him than that tbh, it's all very vague and missing. That's the most detail I've seen on him.
And the detail says he has a history of tech startups that scanned paperwork and sent it elsewhere, good with numbers, and has a lot of knowledge about cell networks probably.
Every inch more of this I learn as I continue to Google the names and companies popping up... It gets worse.
Monitor phone use. Quit photobombing and filming strangers and for the love of fucking God quit sending apps photos of your actual legal ID to prove your age. Just don't use that site, you'll be fine I swear. And quit posting your private info online. For activists/leftists NO personally identifiable info at least AND DEFINITELY leave your phone at home to Work™!!!
7K notes · View notes
liminalweirdo · 7 months
Text
HERE'S WHAT YOU CAN DO:
email, call, or write your reps (this is the most important one) — use this tool to find your reps HERE IS A TEMPLATE that you can pull from.
Here is the text used in the petition that you can pull from to include in your email/letter to your reps:
I’m writing to urge you to reject the Kids Online Safety Act, a misguided bill that would put vulnerable young people at risk. KOSA would fail to address the root issues related to kid’s safety online. Instead, it would endanger some of the most vulnerable people in our society while undermining human rights and children’s privacy. The bill would result in widespread internet censorship by pressuring platforms to use incredibly broad “content filters” and giving state Attorneys General the power to decide what content kids should and shouldn’t have access to online. This power could be abused in a number of ways and be politicized to censor information and resources. KOSA would also likely lead to the greater surveillance of children online by requiring platforms to gather data to verify user identity. There is a way to protect kids and all people online from egregious data abuse and harmful content targeting: passing a strong Federal data privacy law that prevents tech companies from collecting so much sensitive data about all of us in the first place, and gives individuals the ability to sue companies that misuse their data. KOSA, although well-meaning, must not move forward. Please protect privacy and stop the spread of censorship online by opposing KOSA.
Here is an open letter from parents of trans and GNC kids that you can also add your name to/ pull from in writing your own letter
sign this petition
2K notes · View notes
nasa · 7 months
Text
Black Scientists and Engineers Past and Present Enable NASA Space Telescope
The Nancy Grace Roman Space Telescope is NASA’s next flagship astrophysics mission, set to launch by May 2027. We’re currently integrating parts of the spacecraft in the NASA Goddard Space Flight Center clean room.
Once Roman launches, it will allow astronomers to observe the universe like never before. In celebration of Black History Month, let’s get to know some Black scientists and engineers, past and present, whose contributions will allow Roman to make history.
Tumblr media
Dr. Beth Brown
The late Dr. Beth Brown worked at NASA Goddard as an astrophysicist. in 1998, Dr. Brown became the first Black American woman to earn a Ph.D. in astronomy at the University of Michigan. While at Goddard, Dr. Brown used data from two NASA X-ray missions – ROSAT (the ROentgen SATellite) and the Chandra X-ray Observatory – to study elliptical galaxies that she believed contained supermassive black holes.  
With Roman’s wide field of view and fast survey speeds, astronomers will be able to expand the search for black holes that wander the galaxy without anything nearby to clue us into their presence.
Tumblr media
Dr. Harvey Washington Banks 
In 1961, Dr. Harvey Washington Banks was the first Black American to graduate with a doctorate in astronomy. His research was on spectroscopy, the study of how light and matter interact, and his research helped advance our knowledge of the field. Roman will use spectroscopy to explore how dark energy is speeding up the universe's expansion.
Tumblr media
NOTE - Sensitive technical details have been digitally obscured in this photograph. 
Sheri Thorn 
Aerospace engineer Sheri Thorn is ensuring Roman’s primary mirror will be protected from the Sun so we can capture the best images of deep space. Thorn works on the Deployable Aperture Cover, a large, soft shade known as a space blanket. It will be mounted to the top of the telescope in the stowed position and then deployed after launch. Thorn helped in the design phase and is now working on building the flight hardware before it goes to environmental testing and is integrated to the spacecraft.
Tumblr media
Sanetra Bailey 
Roman will be orbiting a million miles away at the second Lagrange point, or L2. Staying updated on the telescope's status and health will be an integral part of keeping the mission running. Electronics engineer Sanetra Bailey is the person who is making sure that will happen. Bailey works on circuits that will act like the brains of the spacecraft, telling it how and where to move and relaying information about its status back down to Earth.  
 Learn more about Sanetra Bailey and her journey to NASA. 
Tumblr media
Dr. Gregory Mosby 
Roman’s field of view will be at least 100 times larger than the Hubble Space Telescope's, even though the primary mirrors are the same size. What gives Roman the larger field of view are its 18 detectors. Dr. Gregory Mosby is one of the detector scientists on the Roman mission who helped select the flight detectors that will be our “eyes” to the universe.
Dr. Beth Brown, Dr. Harvey Washington Banks, Sheri Thorn, Sanetra Bailey, and Dr. Greg Mosby are just some of the many Black scientists and engineers in astrophysics who have and continue to pave the way for others in the field. The Roman Space Telescope team promises to continue to highlight those who came before us and those who are here now to truly appreciate the amazing science to come. 
Tumblr media
To stay up to date on the mission, check out our website and follow Roman on X and Facebook.
Make sure to follow us on Tumblr for your regular dose of space!
2K notes · View notes
taikeero-lecoredier · 19 days
Text
RECENT UPDATES ON THE BAD INTERNET CALIFORNIA BILLS:
Sadly, both AB1949 and SB976 passed and are now on their way to the governors desk.
We need him to veto them so they dont become Law.
If you havent Heard of the danger of those bills for the Internet , this post explain it thoroughly :
- Post doing a deep explanation on those bills here
I CANNOT emphasize enough how these would have a global effect on the Internet given that most websites and apps originates from California and not all of them could afford either following those bills or moving states.
Now, as the bills are on their way to the governor, we need Californian citizens to voice their oppositions to those bills to the Governor Gavin Newsome HERE
(Non California peeps, we are urging you to share this as well!!! )
Please keep in mind that calling with phone is much,much more efficient.
You can also send faxes with Faxzero
Here are scripts you can use as arguments : (text/alt version below the read more )
Tumblr media
Tumblr media
Than you for reading. Even if youre not from California, please spread the word anyway ! Make posts,tweets,etc
REBLOGS ENCOURAGED
TEXT VERSION :
AB 1949
Hello, my name is (INSERT NAME HERE) and I'm one of the Senator's constituents from (INSERT CITY HERE). I'm calling to urge the Senator to vote NO on AB 1949, the amendment to the California Consumer Privacy Act of 2020. While this bill's intent is to prevent the sharing and sale of minor's information under the age of 18, the method it would intend to do so by is written far too broadly for it to be safely and reasonably implemented.
While this bill retains a safer standard of the business requiring actual knowledge of a consumer being under the age of 18 to be held liable for the sharing or sale of personal information, its wording is still too broad to exclude a default usage of age verification by online businesses in order to protect themselves from liability. Taking measures such as age verification, age assurance, or other data collection and analysis to determine the age of users. Even though measures like this have been proven to be vulnerable to data breaches no matter how secure they proclaim to be. Such as this year's largest discovered breach of AU10TIX, which supplies age verification to companies like TikTok, X, Uber, LinkedIn, Paypal, and many others.
As it stands, this bill is far too broad in its wording and enforcement of its age-specific measures to be considered a safe piece of legislation. Which is why I urge the Senator to vote in opposition to this measure.
Vote NO on AB 1949.
---------------------------
SB 976
Hello, my name is (INSERT NAME HERE) and I'm one of the Assembly member's constituents from (INSERT CITY HERE). I'm calling to urge the Assembly member to vote NO on SB 976, the Protecting Our Kids from Social Media Addiction Act. Although this bill has intent to protect the mental and emotional health of California's youth, the method this bill would intend to use could be counterproductive to that goal, or even endanger them further.
One of this bill's primary measures includes requiring verifiable parental consent to allow websites to display “addictive” feeds to minor users. However, the ways “verify” the identity and age of a responsible parent are often invasive and dangerous. Especially since these methods have proven repeatedly to be vulnerable to data breaches that can leak sensitive information to bad actors. Such as this year's largest discovered breach of AU10TIX, which supplies age verification to companies like TikTok, X, Uber, LinkedIn, Paypal, and many others. To determine if this is necessary at all would also require collecting even more data on minors and non-minors alike to determine who would even require these measures to be set in place. Especially when it would have control over someone's access to a website or application based on the time of day, as this bill would require in order to “reasonably determine” the user is not a minor.
The vagueness of this bill's text at all is dangerous as well. The broad-spectrum definition it gives of “addictive internet-based service or application” could cause an unintended censorship effect where minors and adults alike could be blocked from accessing information purely because some part of a website or application uses a “feed” which could arguably fit the bill's definition of “addictive”
With all of this in mind, I urge the Assembly member to vote in opposition of this measure to protect the privacy and safety of California's minors and adults alike.
Vote NO on SB 976.
346 notes · View notes
Text
quo vadis
latin
where are you going?
tags: depiction of mutilation, gore—sebastian basically kills you but in a disturbing way, all in all—dont read if you have a sensitive heart.
•*¨*•.¸¸♪✧•*¨*•.¸¸
“Do you think we’re soulmates in every universe?” You absentmindedly asked, staring at the ceiling that was adorned in paper stars.
Oh, how you loved those stars.
You enjoyed stargazing before your life went to shit, it was an everyday ritual of yours.
It was a pleasant surprise when Sebastian told you to cover your eyes and lay down on the cold floor.
“Just trust me, lay down.” You could hear a smile in his voice, so you chose to trust him.
You settled into a comfortable position, letting your body relax.
“Open your eyes now.” And you did. The ceiling was filled with all sorts of stars that were made with paper and pencil.
“You… remembered?”
“Of course I did.” He laid down next to you, rolling his tail up so that it wouldn’t be in your way.
“In every universe? Of course! I don’t see it any other way.” He interlocked his fingers with yours. No matter how many times he does it, it still makes your face heat up.
“Pinky promise?”
“Pinky promise.”
You smile at the reassurance, closing your eyes and letting yourself fall into a peaceful slumber.
Sebastian didn’t notice it until he heard soft snores next to him.
“You’re hopeless, I love you.” Sebastian whispered before reaching his free hand up to his lure, flicking it down to let the room be consumed in darkness.
When you awoke, Sebastian was nowhere to be seen. There was a mild ache in your back from sleeping on the hard floor, but your main focus was looking for Sebastian.
After sitting up, you crawled towards the vent’s opening.
You peeked your head out, the doors were closed, and it was silent.
You knew it was a bad idea, you did, but your curiosity got the better of you.
He told you to never leave his hideout without him. He was afraid of you getting hurt.
With a slight push, you were out of the vent. The air seemed thick, thicker than when you made your way through these halls the first few times.
You decided to go to the doors that were in descending order, figuring that it would be pointless for Sebastian to go through the newer doors.
It was lonely. Sebastian wasn’t here to distract you from the horrors down here, it was scary, almost.
You shook the thoughts away, continuing on.
You found data scattered throughout the levels, how did he miss them?
You shoved as many vials and usb sticks into your pockets as you could since you didn’t bring a bag.
Shit.
You had no proper protection.
Oh, well. At least the creatures down here could be easily countered.
You passed through at least seven doors, and yet, there was no sign of Sebastian.
You were starting to grow more and more paranoid, would it be too late to turn back?
No, keep pushing. You needed to see him.
You could hear your heartbeat in your ears, and cold sweat made your clothing cling to your body uncomfortably.
You heard quiet footsteps behind you, thank goodness Sebastian was here.
He didn’t have legs though.
You turned around with a relieved smile, but that was quickly wiped off of your face as you were met with what you assumed to be an Urbanshade guard.
Shit.
“Hands. Up.” He pointed his gun straight at your face.
Your anxiety was through the roof. You had no choice but to comply with his demand.
You held your hands up, the weight of your selfish actions could be described as a pressing weight on your chest.
“You little brat. The company knew something was up when your PDG was rendered destroyed.” He continued on, his grip on his gun tightening ever so slightly. “Don’t think we don’t know about Z-13 at door 50.“ Your eyes widened at the mention of your beloved’s code name.
“You will come with me.” He walked towards you, the gun never lowering.
Your body felt heavy. This was all your fault, wasn’t it?
The guard got behind you. He holstered his gun and grabbed your arms harshly enough to make you wince.
“Shut up.” He cuffed your wrists together. The cold metal felt uncomfortable, and the cuffs were adjusted a little too tight.
He grabbed his gun again, pointing it at your head. “Walk.”
So you did.
Thoughts were running rampant in your mind. Where was Sebastian? Was he okay? Were you going to die? Will you ever see him again?
You were trying your best to hold back tears. You felt so helpless, you hated it.
The numbers on the doors got smaller and smaller. Would it be so bad to let him kill you right then and there?
A loud yell was heard behind the two of you, the guard turned around, leaving you with an opportunity.
You kicked the guard’s legs with your dominant leg, causing him to fall on his back.
You ran.
“You little bitch, get back—“
His words were cut off, but you didn’t stop. You ran as far as you could, trying to stay balanced.
Adrenaline. That’s all that was keeping you going. You had passed through three doors, and you felt your muscles ache.
You knew you should have worked out more.
You tripped on your own feet, landing face first onto the cold, smooth, concrete floor.
Harsh winces escaped from your throat, you lifted your face up to see blood on the once greyish-white floor. It must be from your nose.
Even if you wanted to, you couldn’t get up as your hands were cuffed.
You felt so pathetic. You couldn’t save yourself.
Whatever had gotten the guard was about to get you, too.
It came into the room, ripping the door off of the hinges and coming near you.
It flipped you over, and you saw Sebastian.
He was covered in blood. He didn’t look anything like the Sebastian you knew.
The Sebastian who would hold you close at night.
The Sebastian who would company you on small scavenges.
Bloodlust was all that you saw in his eyes.
Before you could even speak, he began to attack you.
His claws dug into your chest, and he harshly pulled them out, leaving deep cuts in your chest. “Sebastian—!” You cried out, he couldn’t hear you, could he?
His head dipped down towards your arm, and he bit your bicep.
He bit your bicep.
His razor sharp teeth easily tore through your skin, hitting your bone.
The noises of your bones being crunched made you cringe. The pain wasn’t registering yet.
The flesh that once protected your arm was now being chewed by Sebastian.
Your beloved was about to eat you alive.
In a desperate attempt to make him stop, you screamed, loudly.
The high pitched noise snapped him out of it.
The darkness that clouded his eyes was now gone.
His sworn spouse.
The person he ‘married’.
Sebastian ate their flesh.
He felt nauseous.
How were you even conscious?
Sebastian’s eyes met your half-lidded ones.
Poor Sebastian.
It wasn’t his fault, right?
He didn’t mean to.
No, he just wanted to protect you.
Sebastian weakly called your name.
Your breathing was labored, your hand was weakly clutching at your chest where blood quickly seeped out of, and your head was lolling back due to the lack of strength in your body.
It felt like you were high. You could feel your body tingle, trying its best to keep you conscious.
Sebastian cradled your body in his arms, fat tears falling from all of his eyes. “[Name]… Nononono. This isn’t—happening?! Don’t go. Please. Please stay with me.”
It was hard to make out what he was saying, you couldn’t hear him properly, nor could you speak in the current state that you were in.
The pain was hitting you at full speed now.
You cried.
All you could do was weakly cry. Your body was messed up beyond comprehension, there was no way that you were going to survive this.
Every breath was agony. Every inhale felt like needles were being inserted into your chest.
Sebastian just watched. He couldn’t reverse what just happened.
He was powerless. He couldn’t save you. Not this time.
157 notes · View notes
gottalottarocks · 6 months
Text
Are you an American? Frustrated by the political process? Do you feel like you have no voice in our government? Let me introduce you to the wonderful world of public comments. 
This is where federal agencies propose new regulations asking for public feedback:
Regulations.gov
Here's a step by step on how to navigate this:
Look through the proposals on the explore tab and filter by "Proposed Rule". These are the regulations that have been proposed, but not finalized. 
Tumblr media
If you click on these, they are pretty dense, text heavy explanations of the proposed rule changes. I definitely do a lot of googling when trying to understand what I'm reading. Also there are a lot of different topics here and I definitely don't comment on everything.
This is how you make a public comment. For example, for this proposed rule:
Tumblr media
Start a new document and write the subject and docket number. Your comment NEEDS to have the docket number for them to count it most of the time, and the correct subject some of the time.
Tumblr media
^^ this is ambiguous, but add the docket ID and subject just to be safe, it should look like this:
Ref: Docket ID No. NSD 104
Provisions Pertaining to Preventing Access to Americans' Bulk Sensitive Personal Data and U.S. Government-Related Data by Countries of Concern
Then address to the person at the very very end of the page. 
Scroll all the way to the end:
Tumblr media
^^this is the person you address to. 
Then introduce yourself. If you have experience related to the proposed rule, talk about that. For rules related to the environment and public health I say that I'm a geologist with a master's degree and I work in environmental remediation. Otherwise, I just say I'm a concerned citizen. 
Then I say hey I agree/ disagree with this proposed rule and here's why. Oftentimes there will be lists that the federal agency is asking for specific feedback on.
Tumblr media
Commenting on these will have a lot of impact. 
Here's an example comment I forgot to post for a rule regarding methane emissions in the oil and gas industry:
Administrator Michael Regan The United States Environmental Protection Agency 1200 Pennsylvania Avenue, N.W. Washington, DC 20460
Ref: Docket ID No. __ Waste Emissions Charge for Petroleum and Natural Gas Systems Dear Administrator Regan, My name is __ and I am writing to you as a geologist and graduate of ___.  I currently work in ____. Thank you for your interest in reducing methane pollution, which I believe to be one of the most important aspects in reducing the harm caused by the climate crisis. Within the short term, methane is a much more powerful force of global warming than carbon dioxide. It breaks down faster than carbon dioxide— but it traps significantly more heat that should be bouncing back into space. When scientists talk about taking our foot off the gas pedal in regards to the climate crisis, methane is at the forefront of our minds. Natural gas is often proposed as a solution to reducing our greenhouse gas emissions (since it produces less carbon dioxide than coal plants), but these methane leaks are a serious threat to public health. Not only is methane hazardous, it’s ability to cause short-term superheating is contributing to the rapid increase in wildfires within the U.S. and globally, further degrading air quality. Last summer in NYC skies were orange, caused by ash from Canadian wildfires. As someone who sets up air monitoring equipment every day to ensure the surrounding community is not impacted from the disposal of hazardous waste, I have a unique opportunity to see on a day-to-day basis how air quality is degrading. I strongly support the Environmental Protection Agency's proposed waste emissions charge. For EPA’s implementation of the fee to fulfill Congress’s goals, the final regulation must continue to include key requirements including: ·       Regulatory compliance exemptions must only become available after final standards and plans are in effect in all states and that these plans are at least as strong as the EPA's 202 methane emissions proposal. Operators filing for exemption must also demonstrate full compliance across their facilities; ·       Strong and clear criteria must remain in place for operators seeking an exemption based on unreasonable permitting delays; ·       When operators seek an exemption for plugged wells, they must clearly demonstrate that their wells have been properly plugged and are no longer polluting; ·       Transparent calculations and methodologies to accurately determine an owner or operator’s net emissions; and ·       Strong verification protocols so that fee obligations accurately reflect reported emissions and that exemptions are only available once the conditions Congress set forth are met. I urge the EPA to quickly finalize this proposal with limited flaring, strengthened emissions standards for storage tanks, and a pathway for enhanced community monitoring. Thank you, ___________
And then paste your comment in or upload a document and submit! You will be asked to provide your name and address. Also the FCC will only take comments on their website, but the proposed rule will be posted on the federal regulations website I put above and they should have a link to the FCC website within that post. 
295 notes · View notes
reasonsforhope · 2 months
Text
Paywall-Free Article
"In one of its first big decisions, Britain’s new Labour government on Friday [July 12, 2024] announced the early release of thousands of prisoners, blaming the need to do so on a legacy of neglect and underinvestment under the Conservative Party, which lost last week’s general election after 14 years in power.
With the system nearly at capacity and some of the country’s aged prison buildings crumbling, the plan aims to avoid an overcrowding crisis that some had feared might soon explode.
But with crime a significant political issue, the decision is a sensitive one and the prime minister, Keir Starmer, a former chief prosecutor, lost no time in pointing to his predecessors to explain the need for early releases.
“We knew it was going to be a problem, but the scale of the problem was worse than we thought, and the nature of the problem is pretty unforgivable in my book,” Mr. Starmer said, speaking ahead of the decision while attending a NATO summit in Washington...
Under the new government’s plan, those serving some sentences in England and Wales would be released after serving 40 percent of their sentence, rather than at the midway point at which many are freed “on license,” a kind of parole.
The even earlier releases will not apply to those convicted of more serious crimes, including sexual offenses, serious violence and terrorism. But Mark Icke, vice president of the Prison Governors’ Association, told the BBC that the plan could remove from the system “between 8,000 and 10,000 people,” providing “some breathing space.”
[Note: And more importantly - breathing space for thousands of people who have been unjustly imprisoned for minor offenses, as well as their families.]
Despite some early releases under the previous government, the strain on the prison system has been relentless. In England and Wales, the prison population stands at 87,505 — very close to the maximum capacity of 88,956 — according to the latest official data...
In its first week in power, Labour has said that it is grappling with a difficult inheritance after years of restraint in spending on public services under the Conservatives. In one of her first acts in government, the new chancellor of the Exchequer, Rachel Reeves, has ordered a review of Britain’s public finances.
Before Labour had won the election, it identified the strain on Britain’s prisons as a potentially major problem. The issue was cited on an internal list of key concerns; others included the strain on the overburdened health care system and financial pressure on municipalities and universities.
The prison population of England and Wales has doubled over the last 30 years, despite a decline in crime rates, and it has increased by 13 percent in the past three years...
Rory Stewart, a former Conservative prisons minister, said that Britain had incarcerated too many people, including for minor crimes such as repeated failure to pay council tax, which is levied by local authorities for municipal services.
According to Mr. Stewart in remarks to the BBC, imprisoning people for minor crimes “doesn’t protect the public. It doesn’t help these people get away from offending. And it creates these violent, filthy, shameful places which our prisons have become today.” The Conservative and Labour parties, he added, had “competed with each other on being more and more ferocious in demanding longer and longer sentences.”
Mr. Starmer has raised hopes among those who want to change that policy by appointing a prominent advocate of overhauling the prison system, James Timpson, as prisons minister. Mr. Timpson, a businessman, has a record of employing former prisoners in an effort to give them a second chance."
-via The New York Times, July 12, 2024
220 notes · View notes