Category Archives: Tech NEws

Tesla to Purchase Solar City

American-based electric vehicle manufacturer Tesla Motors recently announced its plans to purchase solar panel manufacturer SolarCity for $2.6 billion. The deal, which was originally proposed back in June, exemplifies Tesla’s attempt to expand its reach as not only an EV and autonomous driving software developer, but also as a clean energy manufacturer.

tesla“Just over a month ago, Tesla made a proposal to purchase SolarCity and today we are announcing that the two companies have reached an agreement to combine, creating the world’s only vertically integrated sustainable energy company,” reads the announcement published on Tesla’s website, authored by “The Tesla Team”.

“As one company, Tesla (storage) and SolarCity (solar) can create fully integrated residential, commercial and grid-scale products that improve the way that energy is generated, stored and consumed.”

Elon Musk currently owns 22% of SolarCity; he founded the company and sits on the renewable energy firm’s board of directors. SolarCity’s chief executive, Lyndon Rive, is Elon Musk’s cousin.

“Now is the right time to bring our two companies together,” explains the Tesla Team. “Tesla is getting ready to scale our Powerwall and Powerpack stationary storage products and SolarCity is getting ready to offer next-generation differentiated solar solutions. By joining forces, we can operate more efficiently and fully integrate our products, while providing customers with an aesthetically beautiful and simple one-stop solar + storage experience: one installation, one service contract, one phone app.”

The deal between SolarCity and Tesla allows for the solar panel company to solicit offers from other potential buyers until September 14th, so until that date the deal will not be fully official.

tesla2According to the announcement on Tesla’s website, “Solar and storage are at their best when they’re combined.” While many have criticized a marriage between two companies that have yet to make a profit, Musk described the deal as a “no brainer,” asserting that it could turn Tesla into the “world’s only vertically integrated energy company offering end-to-end clean energy products.”

Financier Jim Chanos publicly criticized the deal, calling it a “shameful example of corporate governance at its worst.” His negative views of the deal are widely shared by many industry experts, whose opinions have led to a considerable fall in the stock values of both companies.

That said, Tesla is not discouraged by the nay-sayers:

“We expect to achieve cost synergies of $150 million in the first full year after closing. We also expect to save customers money by lowering hardware costs, reducing installation costs, improving our manufacturing efficiency and reducing our customer acquisition costs. We will also be able to leverage Tesla’s 190-store retail network and international presence to extend our combined reach.”

The Tesla Team claimed to have done ample research on the deal and cited its sources:

“After comprehensive due diligence in consultation with independent financial and legal advisors, the independent members of the Tesla and SolarCity boards of directors approved their transaction. Tesla’s financial advisor was Evercore and Wachtell, Lipton, Rosen & Katz was its legal advisor. The financial advisor committee of SolarCity’s board of directors was Lazard and its legal advisor was Skadden, Arps, Slate, Meagher & Florm.

New Software Fights Ransomware

Ransomware, a harmful new type of malware that encrypts computer files and only releases digital information back to its rightful owners for a fee, may finally have met its match.

Much to the dismay of the increasing number of victims of cyber crime, ransomware is extremely well-suited to the current digital landscape. Hackers are paid using cryptocurrencies like bitcoin, making all illegal transactions virtually untraceable. The files that they take hostage tend to be of great value and the fees that they demand tend to be just under what it would take to pay to have the files recovered, so more often than not, desperate victims are willing to pay the ransom. Because of these advantageous circumstances, the instances of ransomware-related cybercrime have more than quadrupled over the past year, making it one of the most prevalent threats of the digital world.

cryptodrop2Luckily, scientists at the  University of Florida recently announced their development of a software that can stop ransomware in its tracks. According to the researchers, their CryptoDrop software can detect malware and stop it after has encrypted just a few files.

“Our system is more of an early-warning system,” explained Nolan Scaife, who worked with Patrick Traynor, an associate professor in UF’s department of computer and information science, to co-create the software along Henry Carter.

“It doesn’t prevent the ransomware from starting… it prevents the ransomware from completing its task… so you lose only a couple of pictures or a couple of documents rather than everything that’s on your hard drive, and it relieves you of the burden of having to pay the ransom.”

CryptoDrop has proven extremely effective in testing, during which it has flagged 100% of the malware samples and stopped it after an average of 10 files had suffered encryption.

This miracle solution couldn’t come at a more pressing time. According to the United States’ Federal Bureau of Investigation, the number of ransomware attacks has more than doubled in the past year and is expected to keep growing. The FBI further stated that it has received over 2,400 complains in 2015 and that the estimated losses from these attacks clocked in at around $24 million.

Everyone from governments to large corporations, banks, hospitals, and educational institutions have fallen victim to the attacks.

Expert at security firm Alert Logic Richard Cassidy had this to say about the recent development of CryptoDrop:

“Whilst the step taken by researchers at the University of Florida are indeed a novel way in which to detect and contain ransomware, it doesn’t serve as the ‘silver bullet’ for ransomware as a whole.”

crypt“There are new variants being written all the time,” Cassidy continued,” and ransomware writers will indeed take the time to dissect and understand how this new technology operates, creating versions that will attempt to either bypass detection, or at the very least search more effectively for likely sensitive files, before encrypting them, with the hope of having the biggest impact of securing a ransom payment.”

The UF team has a working prototype for Windows-based systems and is seeking a commercial partner for its new software.

Facebook Tacked On Suicide Prevention

This week, Facebook announced that it would be putting forth new tools for its users to use for suicide prevention. While those tools are already available in the United States, the resources are now going to be made readily accessible to users on a global scale.

The tools in Facebook’s suicide prevention arsenal are designed to help both members who are considering committing suicide or otherwise hurting themselves and the friends and families of people who are concerned about the health of their loved ones.

fb2If a Facebook user falls under any of these categories, he or she can contact the vulnerable person directly or use Facebook as an intermediary, as Facebook has recently hired entire teams of workers trained to help members in distress. According to the Global Head of Safety Antigone Davis and researcher Jennifer Guadagno, the teams are trained to help the member find help “before pain or sadness turns into something far more serious.”

Facebook’s original suicide prevention program was launched in partnership with other mental healthcare providers like Forefront, Lifeline and Suicide Awareness Voices of Education. These entities supply tools on their websites such as links to suicide prevention hotlines, links to guide users to friends, family or other professionals who might be able to comfort them and talk them through whatever situation, and links to toll-free numbers to mental health groups.

Facebook has also started to provide links to eating disorder organizations, websites offering self-care tips, and websites made for reporting cyber bullying and other unacceptable and abusive behavior. Links for parents or teachers who believe a child may be at risk are also listed.

Now that Facebook will be listing resources globally, they have organized all of these resources into local languages where members are based. For people in difficult situations where it’s a real challenge to communicate through traditional challenges, these resources can be the difference between a problem being managed and it spiraling our of control.

“The idea is that Facebook provides assistance vis a vis their network to people who are concerned about somebody,” explained Jennifer Stuber, faculty director at Forefront. “They see a post about a potential suicide or people who are suicidal, [and] they provide access to information about resources.”

fb3“Facebook has been incredibly responsive and interested in hearing from experts and users of their tools to improve them,” observed Save’s executive director Dan Reidenberg. “They have continually worked to try and help people who are in anything from a minor crisis to a major life-threatening situation, and they have developed some of the best technology and tools to save lives.”

While suicide may be an unfamiliar thought to some, almost 43,000 Americans killed themselves in 2014 alone. Tragically, suicide was the 10th leading cause of death in America overall and the second leading cause of death among those ages 15-24.

Facebook’s status as having over 1.65 billion active users makes it the world’s most powerful social network and gives it a unique and enormous opportunity to reach out to those struggling with thoughts of suicide.

Back Up; What Was the Dot Com Bubble?

As the today’s tech bubble, comprised of over-valued giants like Uber, AirBnb, and even Apple, prepares to burst (or bursts, as many are coming to say), many look to the dot com bubble as a reference point. But what was the dot com bubble, and how and why did it pop? Here’s a quick overview for those of you that are curious.

dot com bubThe “Dot Com Bubble” is said to have started in April of 1997 and spanned through June of 2003, before it popped. In order to explain how and why all of it happened, it’s first important to establish  working definition of what exactly an economic bubble even is. Let’s use the definition provided by business insider:

“An economic bubble exists whenever the price of an asset that may be freely exchanged in a well-established market first soars then plummets over a sustained period of time at rates that are decoupled from the rate of growth of the income that might reasonably be expected to be realized from owning or holding the asset.”

In other words, an economic bubble occurs when the value of something, be it a service or a company itself, becomes unrooted from what it can be consistently expected to be worth and instead its value enters a volatile and inconsistent state. According to a paper released by Zhonglan Dai, Douglas A. Shackelford, and Harold h. Zhang, this is how the Dot Com Bubble started to inflate:

rise and fall“We use the Taxpayer Relief Act of 1997 as our event to empirically test the impact of a change in the capital gains tax rate on stock return volatility. TRA97 lowered the maximum tax rate on capital gains for individual investors from 28 percent to 20 percent for assets held more than 18 months. TRA97 is particularly attractive for an event study because the capital gains tax cut was large and relatively unexpected, and the bill included few other changes that might confound our analysis. Little information was released about TRA97, until Wednesday, April 30, 1997, when the Congressional Budget Office (CBO) surprisingly announced that the estimate of the 1997 deficit had been reduced by $45 billion. Two days later, on May 2, the President and Congressional leaders announced an agreement to balance the budget by 2002 and, among other things, reduce the capital gains tax rate. These announcements greatly increased the probability of a capital gains tax cut. On Wednesday, May 7, 1997, Senate Finance Chairman William Roth and House Ways and Means Chairman William Archer jointly announced that the effective date on any reduction in the capital gains tax rate would be May 7, 1997. As promised, the lower rate on long-term capital gains (eventually set at 20 percent) became retroactively effective to May 7, 1997, when the president signed the legislation on August 5, 1997.”

The researchers then came across a stunning finding through testing stock market return data before and after May 7, 1997 (the date when investors would understand that a reduction in the capital gains tax would become effective):

“To provide more compelling evidence that the 1997 tax cut affected volatility (and mitigate concerns about omitted correlated variables), we focus on cross-sectional tests which are designed to detect the differential responses in return volatility of stocks with different characteristics. We hypothesize that the effect of a capital gains tax change on stock return volatility should vary depending upon dividend policy and the size of the unrealized capital losses (or gains). Consistent with expectations, we find that non- and lower dividend-paying stocks experienced a larger increase in return volatility than high dividend-paying stocks. We also find that stocks with large unrealized capital losses had a larger increase in return volatility after a capital gains tax rate reduction than stocks with small unrealized capital losses. However, we do not find a similar relation with unrealized capital gains.”

TRA 1997 ended up leaving dividend tax rates at the same rate as regular income in the United States, creating incentive for investors to favor low-to-no dividend paying stocks over those that paid out more significant dividends.

This came to a close when the Jobs and Growth Tax Relief Reconciliation Act of 2003 rolled around, which set both tax rates for capital gains and for dividends at equal rates once again, which they had been from 1986 to 1997. That act ended market volatility and effectively ended the Dot Com Bubble.

What’s Next For Apple?

Apple computers are one of the most unique large tech companies because they are not solely an “internet company.” That is to say their revenue primarily comes from the sales of computers and hardware. It seems almost crazy to say that this is the exception to the rule in tech, but if you look across the board at the tech giants you get: Google (alphabet), Amazon, Facebook and so on, none of which have a real physical presence in terms of the hardware they are serviced by.

Apple CEO Tim Cook has addressed that this week, in a state of the company address to shareholders, and says that it is high time that they change how they do business this upcoming year, and that they aim to put a greater emphasis on its online services as well as iCloud, iMessage, and Apple Music. This is not to say they are going to over haul their whole infrastructure of the company, their bread and butter will always be the iPhone and the Macbook Pro; however, there is definitely room that they can expand and grow their base in new markets. wowww

This is all well and good and makes sense from their perspective and the perspective of their stock holders, except when you consider the face that Apple isn’t very good at providing online service. That is to say, at the very least, they do not appear as capable as some of their rivals like Google and Microsoft and it has all the potential to be a blunder for the company.

The problem is that unlike the other companies Apple isn’t a service first kind of company. The others have their entire infrastructure and priories around this fact, where as Apple has it a means to support their other products. This coming from analyst Ben Thompson of Stratechery who writes, “the root problem is all these services cases is the lack of accountability” as long as the iPhone keeps the money flowing and the captive customers coming, it doesn’t really matter if Apple’s services are as good as they could be.”

dfgggggrHe goes on to claim that, “the solution to all these problems- and the key to Apple actually delivering on its services vision is to start with the question of accountability and work backwards: Apple’s services need to be separate from the devices that are core to the company, and the managers of those services need to be held accountable via dollars and cents, if that makes sense.”

On play for them that is on the table is that they have the means to buy Dropbox which has eluded to the fact that it wants to be bought out by a major tech company and their founders can cash in. This is because drop box has an insanely bubble valuation of 3.1 billion dollars. Which is absurd when you consider the simplicity of the service they provide. However, what they do have is brand recognition in the service aspect of tech, something Apple desperately needs, or at the very least wants.

Chinese Aerospace Businessman Pleads Guilty in Data Conspiracy Case

Su Bin (also known as Stephen Su and Stephen Subin), a resident of the People’s Republic of China, recently pleaded guilty to participating in a conspiracy to steal sensitive military and export-controlled data from major U.S. defense contractors. The Chinese aviation and aerospace businessmen allegedly entered into a deal in which he would steal the data and then send the information to China, according to the United States Department of Justice.

su bin4Su Bin entered his plea before Judge Christina A. Snyder of the Central District of California. Bin’s original indictment was issued against him in 2014. According to the indictment, Bin was part of a criminal conspiracy to steal military technical data, including data relating to the C-17 strategic transport aircraft and a variety of other fighter jets produced for the U.S. military. Bin was arrested from Canada and transported to the United States shortly after the indictment was issued and Su waived his extradition.

“This plea sends a strong message that stealing from the United States and our companies has a significant cost; we can and will find these criminals and bring them to justice,” stated assistant attorney general for national security John P. Carlin.

Su’s plea agreement involved him admitting to conspiring with two people in China from October 2008 to March 2014 to break into protected American computer networks, including computers belonging to Boeing in Orange County, California, with the intention of stealing “sensitive” military detail and sharing it with counterparts located in China. Su’s plan was to email his co-conspirators and inform them regarding who and what to target after having penetrated a computer network, according to the Department of Justice.

Su’s co-conspirators would then send Su lists of files and folders that were successfully accessed during a network invasion. Su would then instruct the conspirators on which files and folders should be stolen of the list provided.

Su also held another skill valuable to his co-conspirators; he was able to translate stolen files and folders from English to Chinese. He could then write reports regarding the thieved data, approximating its value to its beneficiary.

su bin3Although Su in many ways played the role of a spy, at no point during the proceedings was there any mention of Su and his co-conspirators being associated with the Chinese central government.

“The plea agreement steers clear of accusing China of being behind it, even thouh Su Bin was working with two members of the military,” stated Richard Steinnon, chief research analyst with IT-Harvest.

“The two co-conspirators were identified as military officers, but it seems like these guys were moonlighting,” ventured CEO of Taia Global Jeffrey Carr. “This was not a PLA (People’s Liberation Army) operation. If it was, they wouldn’t have needed Su Bin,” he continued. “Neither would one of the co-conspirators be trying to buy malware on the dark web. The PLA doesn’t have to buy malware on the dark Web to attack a targeted company.”

The true story may be impossible for any standard onlookers to access, but it looks like either way Su Bin will be doing five years in American prison and a fine of around $250,000 for his snooping.

Toyota Creates Device for Blind People

Toyota recently announced its development of a wearable device engineered with the intention of enabling blind and visually impaired people to have greater mobility.

The gadget is a cushioned U shaped object worn around the neck, somewhat like a long and thin neck pillow. It is packed with sensors and cameras that, with the help of computers, can recognize surroundings and direct the wearer accordingly using speakers and vibration motors.

Toyota released these details last week, but the actual day that the product will become available has yet to be specified. That said, the Royal National Institute of Blind People (RNIB) has stated that it finds the creation an exciting development.

*COMPOSITE*The device owes its existence to the research and development team working on Project Blaid. According to the researchers, they’re working on plans to introduce mapping, object identification and facial recognition technologies to the device as well.

This news all came after Microsoft claimed that it was designing a headset that utilizes location and navigation data along with a network of information beacons in urban locations to verbally inform visually impaired people of where they are and how to get where they want to go in urban areas.

“This is a very exciting development within the rapidly growing field of wearable assistive technology,” stated Robin Spinks, senior strategy manager at the RNIB. “Mobility is at the heart of so much in our society and a device like Blaid could open up limitless possibilities for millions of blind and partially sighted people.”

Toyota stated during its announcement that its device was not made with the intention of replacing the aids currently available to blind and visually impaired people. The device would be complimentary to the devices already owned by any visually impaired people, and perhaps “help to fill the gaps left by canes, dogs, and basic GPS devices by providing users with more information about their surroundings.”

For example, a video that Toyota shared online demonstrated the way that the device could inform the user/wearer about the distinction between a bathroom door marked gentlemen’s toilet and another marked exit. This is a crucial detail that unfortunately no amount of hearing aids or seeing eye dogs will be able to explain to a blind or partially-sighted person.

toyotaAccording to Toyota, Project Blaid’s device is made primarily with the intention of allowing the partially-sighted or blind to navigate indoors.

“Project Blaid is one example of how Toyota is leading the way to the future of mobility, when getting around will be about more than just cars,” stated Totoya executive Simon Nagata. “We want to extend the freedom of mobility for all, no matter their circumstance, location or ability.”

Project Blaid has certainly been a team effort; Toyota apparently requested employees to submit videos of common indoor landmarks so that developers could use them to teach the device to recognize them.

Toyota is likely to also come out with an autonomous car sometime soon in the future; autonomous driving has been seen as one of the most mobilizing and empowering upcoming technologies to hit the blind and partially sighted community.

Science and the Computer Revolution

Many scientists and sociologists could find the means to make the argument that we are currently involved in a scientific revolution spurred by computers. Although the last scientific revolution may have involved the invention of science itself, our current one does at least seem to involve, if not the proliferation of science, the proliferation of completely new means of conducting science, at levels so much more powerful and informative than previously known that science itself arguably has changed.

rev in evTake for example the rise of big data, as well as deep learning, machine learning, artificial intelligence, cognitive computing, whatever you want to call it capabilities that have risen along side the data. Now not only can huge amounts of data be collected, the process of analysis is speeding up faster and faster as computers are being programmed to look at large data sets and figure out how to best sort them, tasks that can take huge teams of researchers 1000% longer. With these tools, the medical and engineering fields are growing faster than ever before. Genomes are being fully written down or predicted, viruses are being mapped, all kinds of cool stuff.

Computers have also made the invention of new tools much easier. Without the computing that went into creating LIGA’s equipment, likely the physicists responsible for finally discovering the first confirmed gravitational wave would have never been able to understand whether that wave was real or just a result of a passing train or earthquake. Truly amazing stuff.

And then to move on to how computing may affect the human mind; it’s hard to say, as the rise of the internet is so unprecedented and remains so fresh in our era that longterm studies have yet to be conducted on the results of our newest companions. That said, the rise of the cloud and cloud computing as well as neural mapping progress have led some transhumanists to end belief and hope to the 2045 initiative, the movement towards making it possible to upload one’s “self” to the cloud and live as a hologram for as long as there are computers and an internet an infrastructure to project one’s self.

rockoThat said, some believe that there truly is a limit to how much the human spirit can be melded with the human-made. Those who counter transhumanist theory and the 2045 initiative stress that the human brain and neural connections do not work linearly and would likely to be too immense to ever translate into digital, binary code.

And perhaps they’re right, but then there’s the highly awaited rise of quantum computing, an effort to make subatomic particles function as transistors that actually can function with more parts than just 0 and 1. If that’s to happen, perhaps less linear and more biological movements can be mimicked by computers which, if they were made out of subatomic particles, would perhaps be capable of being more biological themselves.

Yes, the world is changing, and it takes a huge amount of time and internet wandering to even get a tiny piece of it into your brain, so perhaps the rate at which a human being learns would be the biggest change of all. If only we could figure out how to speed that up.

Get the Most out of Google Search

Everyone’s familiar with Google search, but not everyone knows that there’s a lot of ways to make their searching methods more effective. After all, the internet’s immense store of information is only useful so much as it can be sorted, and you have a hand in how you trigger what information is deemed important for you to see based on your question. Here are some tips on how to get to the details you want as directly and effectively as possible.

1. If you’re searching for a particular phrase, be sure to include quotation marks in your search. For example, “Here’s Johnny” or “Let them eat cake.” If you can remember most of the phrase but not all of it, put an asterisk where the missing word should be and Google will help you fill it in.

2. If you’re searching for a word with a variety of connotations, you can delete out the irrelevant results by adding a “-” and then putting all the unimportant topics that a search engine might show you. For example, if you wanted to search about red hot chili peppers but not the band, you could try typing “red hot chili peppers -music”

3. Search within a site by inputting the domain name into the service bar like so: “” If I wanted to search what CNN had to say about Bernie Sanders I could search “Bernie Sanders”

site-4. Now say you have a website that you like but you want to see if there are sites similar to that one. All you have to do is write “related” and then enter a colon and the site you like. You loved neopets but need to move on? Try “”

5. Maybe you have a very specific set of keywords and you only want to see search results that contain every single one of them in their text. simply write “allintext:” and then whichever words you need.

6. Similarly, you can use the “allintitle” function to search words that you specifically want to see in the title of any document that comes up. If you want to search some key words that can occur throughout the document and some that you want in the title, you can do that too using “intitle”  like this: “jerry garcia intitle:death”.

7. Last iteration: use allinurl: for… you get it. For example “allinurl:chimmychonga”.

8. Search for news related to a particular location with “location:”, like you could search “Hillary Clinton location:Iowa”.

choco cake9. Search only for certain file types by adding “filetype:” like “filetype:mp3” or “filetype:pdf”.

10. This one really helps with shopping: search only for results with numbers between a certain range by adding two periods between the lowest and highest number. “used canoe $200..$600”.

Now you’re all grown up and ready to use the Google search engine to the best of yours and its ability. Good luck with all your searching efforts and may you find all the information that you need to fulfill your life and move on to the next step! You can do it, I bet!