Page 1,111«..1020..1,1101,1111,1121,113..1,1201,130..»

The End of the Magic World’s 50-Year Grudge – The New York Times

Gellers bent spoon demonstrations and deep fakes both create this conflict between what we think is possible and what were seeing, said Alice Pailhs, an author of The Psychology of Magic. Both elicit strong emotional responses confusion, delight, distress, maybe even paranoia.

The stakes, of course, are different. Get fooled by a spoon bender and youre likely to end up with a smile on your face. Get fooled by a pernicious deep fake and you might end up believing that video posted last year of President Volodymyr Zelensky of Ukraine appearing to surrender, or something else that is false and noxious. This time, its going to take much more than Mr. Randi and Ben Harris to flag the frauds.

The upsides of digital fakes have, inevitably, intrigued more than a few magicians. Drummond Money-Coutts, the English conjurer who starred in the Netflix series Death by Magic, said in an interview that he was looking into possibilities presented by Midjourney, the program used to produce an image of Pope Francis in a Balenciaga puffer jacket that went viral a few months ago. He still prefers nondigital methods, though, which he attributes in no small part to the influence of Mr. Geller.

Mr. Money-Coutts first met Mr. Geller in 2003. A student at the British prep school Eton who was a budding magician, he invited Mr. Geller to perform for 700 gobsmacked schoolboys. (I was told to write a letter to the catering department to apologize because they basically had no spoons for weeks after he came, Mr. Money-Coutts recalled.) Mr. Geller had relocated to Britain by then, having spent 12 tumultuous years in the United States, most of them in New York City.

While there, he had gotten rich, but he wasnt equipped for money or fame on this scale, and he was rattled by the verbal assaults. He struggled with panic attacks and became anorexic and bulimic. He also shopped compulsively, once buying 100 silk shirts during a visit to a Brioni store in Milan, few of which he ended up wearing.

It was decadence, he said. I had 10 Gucci suitcases, leather Gucci suitcases. Do you know how much they cost?

Mr. Geller gradually regained his mental equilibrium, though his taste for luxury proved hard to shake. When he moved to Britain in the mid-80s a relative suggested it would be a better place to raise a family he fell in love with a house in Sonning, a village 40 miles west of London, because it reminded him of Graceland and the White House. He more than doubled the square footage of the place, adding bedrooms, a cinema room and gold-plated bathroom fixtures. At some point, about six years ago, it all started to seem berserk.

View original post here:
The End of the Magic World's 50-Year Grudge - The New York Times

Read More..

DeepMind alum wants to use AI to speed the development of green materials – The Economic Times

Ever since ChatGPT went viral last fall, companies have touted many ways artificial intelligence can make our lives easier. Theyve promised superhuman virtual assistants, tutors, lawyers and doctors.What about a superhuman chemical engineer?London-based startup Orbital Materials would like to create just that. The startup is working to apply generative AI the method behind tools like ChatGPT expressly for accelerating the development of clean energy technologies. Essentially, the idea is to make computer models powerful and sharp enough to identify the best formulas for products like sustainable jet fuel or batteries free of rare-earth minerals.Jonathan Godwin, an Orbital Materials co-founder, imagines a system thats as accessible and effective as the software engineers use today to model designs for things like airplane wings and household furniture.That, historically, has just been too difficult for molecular science, he said.

ChatGPT works because its adept at predicting text heres the next word or sentence that makes sense. For the same idea to work in chemistry, an AI system would need to predict how a new molecule would behave, not just in a lab but in the real world.

Still, for many materials needed to decarbonise the planet, the technology isnt there yet.

That needs to happen in the next 10 years, or sooner, said Aaike van Vugt, co-founder of material science startup VSParticle.

What I thought would take 10 years was happening in a matter of 18 months, he said. Things are getting better and better and better.

Godwin compares his method with Orbital Materials to AI image generators like Dall-E and Stable Diffusion. Those models are created using billions of online images so that when users type in a text prompt, a photorealistic creation appears. Orbital Materials plans to train models with loads of data on the molecular structure of materials. Type in some desired property and material say, an alloy that can withstand very high heat and the model spits out a proposed molecular formula.

Right now, many tech investors are prowling for companies that can turn a profit by improving greener material production. Thats particularly the case in Europe, where regulators are forcing manufacturers to lower carbon emissions or face stiff fines. The markets for advanced materials in sectors like renewable energy, transportation and agriculture are set to grow by tens of billions of dollars in the coming years.

Some researchers, like those at the University of Toronto, have set up self-driving labs that pair AI systems with robots to search for new materials at unparalleled speeds. Dutch startup VSParticle makes machinery used to develop components for gas sensors and green hydrogen.

Think of it like a DNA sequencer in a genomics lab, said co-founder van Vugt, who believes his equipment can help shorten the 20-year time horizon of advanced materials to one year, and, eventually, a couple of months. His company is currently raising investment capital.

Orbital Materials, which raised $4.8 million in previously undisclosed initial funding, is planning to start with turning its AI gaze toward carbon capture. The startup is working on an algorithmic model that designs molecular sieves, or tiny pellets installed within a device that can sift CO2 and other noxious chemicals from other emissions, more efficiently than current methods. (Godwin said the startup, which has several AI researchers, plans to publish peer-reviewed results on this tech soon.) Carbon capture has failed to work at scale to date, though thanks to a slew of government incentives, particularly in the US, interest in deploying the technology is rapidly ramping up.

Eventually, Godwin said Orbital Materials would like to move into areas like fuel and batteries. He imagines mirroring the business model of synthetic biology and drug discovery companies: develop the brainpower, then license out the software or novel materials to manufacturers. Its going to take us a little bit of time to get to market," said Godwin. "But once youre there, it happens very quickly.

But getting the AI right is only half the battle. Actually making advanced materials in areas like battery and fuel production requires working with huge incumbent enterprises and messy supply chains. This can be even costlier than developing new drugs, argued MITs Gomez-Bombarelli.

The economics and de-risking make it just way harder, he said.

Heather Redman, a managing partner with Flying Fish Partners, which backed Orbital Materials, said most tech investors chasing the shiny penny of generative AI have failed to look at its applications outside of chatbots. She acknowledged the risks of startups working in the energy sector, but believes the $1 trillion potential of markets like batteries and carbon capture are worth the investing risk.

We love big hills as long as theres a big gigantic market and opportunity at the top, she said.

Gomez-Bombarelli is aware how big these hills can be. He helped start a similar company to Orbital Materials in 2015, called Calculario, which used AI and quantum chemistry to speed up the discovery process for a range of new materials. It didnt get enough traction and had to focus on the OLED industry.

Maybe we didnt make our case, he said. Or maybe the market wasnt ready.

Whether it is now is an open question. But there are encouraging signs. Computing certainly has improved. Newcomers might also have an easier time selling AI because would-be customers could more easily grasp the potential. Gomez-Bombarelli said the pitch is relatively simple: Look at ChatGPT. We can do the same thing for chemistry.

Here is the original post:
DeepMind alum wants to use AI to speed the development of green materials - The Economic Times

Read More..

4 Techniques to Calm the Mind – Psychology Today

Source: Big Shot Theory/Shutterstock

by Ran D. Anbar, MD, and Mac Lancaster, BS

A teenage patient recently asked us, How do I stop overthinking?

Though not listed in the DSM-5, overthinking is something many of us find ourselves doing and can often be a sign of psychological distress, such as in patients with depression, anxiety, and post-traumatic stress disorder (Kaiser et al, 2015).

article continues after advertisement

There is a lot on our minds with seemingly unlimited information at our fingertips, a global pandemic, and the numerous interpersonal encounters we navigate day-to-day.

Getting in touch with your inner self can help assuage these overwhelming feelings and subsequent exhaustion, leading to a calmer and clearer mind. We shared with the patient four techniques that can help lead to a more positive perspective of rumination without it overstaying its welcome.

Who could have guessed that feeling calm was as simple as 4-7-8? Coined by American physician Andrew Weil, this deep breathing exercise induces a physiological response associated with decreased stress.

The exercise involves:

Breathing in through the nose is important because the nasal passage filters out irritating particulates, while warming and humidifying it, supplying the most favorable air for our lungs (Vierra et al, 2022; Naclerio et al, 2007). Holding in breath helps boost the delivery and circulation of oxygen in the bloodstream, lowering cardiovascular load (Kaiser et al, 2015). Exhaling through the mouth allows for relatively effortless release of air from the lungs.

article continues after advertisement

It is recommended to repeat this practice twice daily over the course of a month to see physiological results, including better sleep and digestion.

Still cant stop overthinking after your breath exercise? It can be helpful to understand yourself beyond your conscious mind by being mindful of the many elements that guide your mental processes. Your subconscious can be defined as the part of your mind that generally escapes your awareness, yet has a significant impact on how you live. It is a repository of ideas and emotions that you may not even be aware of, but which have a significant impact on your behavior and general welfare.

One vehicle for accessing the subconscious mind is meditation. According to the ancient Indian science of Vedic, meditation focuses our attention on the inner realm (located in our subconscious), which allows us to develop a different perspective regarding our behavior in the outer realm (Jiang et al, 2020). The goal is to develop a more accurate understanding of one's place in the world, which helps cultivate wisdom.

Practicing meditation has been associated with an attenuation in levels of anxiety and depression (Jiang et al, 2020; Schuman-Olivier et al, 2020; Sharma, 2015).

An experienced Buddhist monk can meditate and feel less stressed, but how does that apply to a novice?

article continues after advertisement

Sometimes becoming aware of our subconscious thought process can allow us to move on, but this is not always the case. Hypnosis is another method of accessing a further connection to the subconscious, but it allows us to ask it for help in changing. For instance, we can learn how to think more calming thoughts at the conscious and subconscious levels (Anbar & Cherry, 2021).

Taking a step back from your thoughts is one key to getting the most out of the plunge youve taken into your subconscious. As you let your thoughts flow, you realize that they are not you; you are not them. Your thoughts inform your cognitive and behavioral processes but do not control the outcome. You can take a step back and observe, while your thoughts keep flowing.

There can be thousands of thoughts leading down different cognitive streams, with varying degrees of intrigue. Just because one comes into focus, does not mean that you must follow it. There is power in letting the thoughts wash away and accepting that they will be there in the future, should you desire to call upon them.

article continues after advertisement

Now you have separated yourself from your thoughts through some exploratory work into your subconscious. You have proven to yourself that youre capable of calming yourself down in the outer realm just by a few minutes of breathing. Having the mental acuity to become aware of internal experiences is a principal component of mindfulness (Burns et al, 2011). You can be proud to have taken the first steps to thinking without feeling overwhelmed.

Another technique involves recognizing certain negative words that lead to cognitive distortion and removing them from our stream of thought. For instance, viewing our inner stream from afar, we might identify the trigger word should, occupying the form of I should have done X or They should have done Y.

Should discourages us from accepting the way things are, and leads to disappointment when things arent the way we feel they should be in our minds. By establishing should as a negative buzzword, we can now recognize its effect in our subconscious and consciously let that idea go. Thus, we can learn how to accept reality, rather than becoming bogged down by it.

Dealing with overthinking can be challenging, but can be made easier by using the techniques described here. These exercises can be tucked away for use later, but do practice them when youre calm. In this way, they are more likely to become internalized and thereafter more easily within reach.

References

Anbar, Ran D, & Rebecca N. Cherry. (2021). Communicating with the Subconscious: Ideomotor and Visualization Techniques. In: Mark P. Jensen (ed), Handbook of Hypnotic Techniques, Vol. 2. Kirkland, WA: Denny Creek Press, pp. 196-231.

Burns, J. L., Lee, R. M., & Brown, L. J. (2011). The Effect of Meditation on Self-Reported Measures of Stress, Anxiety, Depression, and Perfectionism in a College Population. Journal of College Student Psychotherapy, 25 (2), 132-144. https://doi.org/10.1080/87568225.2011.556947

Jiang, H., He, B., Guo, X., Wang, X., Guo, M., Wang, Z., Xue, T., Li, H., Xu, T., Ye, S., Suma, D., Tong, S., & Cui, D. (2020). Brain-Heart Interactions Underlying Traditional Tibetan Buddhist Meditation. Cerebral Cortex (New York, N.Y. : 1991), 30 (2), 439450. https://doi.org/10.1093/cercor/bhz095

Kaiser, B. N., Haroz, E. E., Kohrt, B. A., Bolton, P. A., Bass, J. K., & Hinton, D. E. (2015). "Thinking too much": A systematic review of a common idiom of distress. Social Science & Medicine (1982), 147, 170183. https://doi.org/10.1016/j.socscimed.2015.10.044

Naclerio, R. M., Pinto, J., Assanasen, P., & Baroody, F. M. (2007). Observations on the ability of the nose to warm and humidify inspired air. Rhinology, 45 (2), 102111.

Schuman-Olivier, Z., Trombka, M., Lovas, D. A., Brewer, J. A., Vago, D. R., Gawande, R., Dunne, J. P., Lazar, S. W., Loucks, E. B., & Fulwiler, C. (2020). Mindfulness and Behavior Change. Harvard Review of Psychiatry, 28 (6), 371394. https://doi.org/10.1097/HRP.0000000000000277

Sharma H. (2015). Meditation: Process and effects. Ayu, 36 (3), 233237. https://doi.org/10.4103/0974-8520.182756

Vierra, J., Boonla, O., & Prasertsri, P. (2022). Effects of sleep deprivation and 4-7-8 breathing control on heart rate variability, blood pressure, blood glucose, and endothelial function in healthy young adults. Physiological Reports, 10 (13), e15389. https://doi.org/10.14814/phy2.15389

See the rest here:
4 Techniques to Calm the Mind - Psychology Today

Read More..

Get Deep Discounts on Blue Apron Meal Kits With This Deal – CNET

Meal kits have become wildly popular as more and more people seek simple ways to make life a little easier and free up time to get more done. If you're considering trying out a meal kit delivery service so you can tick grocery shopping off your to-do list,Blue Apronis worth checking out. The company topped our picks of thebest overall meal kitsyou can get and is dedicated to freshness, quality, choice and sustainability. Right now, Blue Apron is offering new customers free shipping on your first meal kit, along with $150 in savings across your first six orders. But this deal is only available now through July 9, so act fast if you're interested.

Blue Apron's meal kits include everything you need to make dinner for your family and are delivered straight to your door each week. They're easy to put together and are a major time saver. Most of the kits will take just 25 to 35 minutes to make from start to finish, but keep in mind that some more involved recipes may take up to 45 minutes. You'll get to choose from 12 different meal kits per week, which will include a few plant-based options, some geared towards wellness and even one or two premium meal plans -- though the higher-end meats will have an added cost. You can also pause your subscription if you want a break or will be traveling and need to skip a week. If you're looking to make meal planning easy for your family, let Blue Apron take the hassle of shopping and prep off of your plate.

See original here:
Get Deep Discounts on Blue Apron Meal Kits With This Deal - CNET

Read More..

First Sawan Somwar fast: 11 nutrition tips to keep in mind during Shravan Monday – Hindustan Times

The auspicious month of Shravan or Sawan is here and will be marked by many important fasts and festivals from Teej, Raksha Bandhan, Jasnmashtami to Nag Panchami. Sawan Somwar fasts are widely observed by Lord Shiva devotees across the country and it is believed that those who keep these fasts are blessed with good luck, fortune, wealth and fulfilment of wishes. Unmarried girls observe Shravan Mondays to get a suitable match while married women pray for their family's health and well-being. (Also read: Sawan Somwar 2023: Puja vidhi, samagri, mantra, shubh muhurat, all you want to know about the auspicious Hindu festival)

This year the month of Sawan began on July 4 and end on August 31. The first Sawan Somwar fast will be observed on July 10 and the last one on August 28, 2023. Sawan Somwar fasts not only have religious significance, but they also offer an opportunity to detox your digestive system. It is important not to overindulge in sugar-laden and deep-fried food as such diet can do more harm than good. Adding satvik foods like fresh vrat-friendly fruits and vegetables, nuts and seeds, dairy items like milk, curd, paneer can boost health and put us in a better frame of mind to meditate and worship Lord Shiva.

"Sawan season has begun again and many people observe Monday fasts in this season. Such fasts, along with serving religious purpose, also benefit from health point of view. They do the perfect job to cleanse and rejuvenate the body, calm the mind and purify the soul," says Richa Doshi, Celebrity Dietician & Founder of The Health Studio in an interview with HT Digital.

Fasting doesnt mean to starve yourselves. This fasts purpose is to include superfoods in the diet that give a boost to the bodys immune system and are light for the gut. Have small, frequent and light meals. This helps to keep balanced energy levels and also prevents dropping of blood sugar levels.

Hydration is very important whenever you are fasting. Most of the times, when we feel hungry we are actually dehydrated. Along with this, dehydration makes a person feel lazy and lethargic, adding on to troubles. Keep sipping water, lemon water, coconut water, buttermilk etc. Along with water, electrolyte replenishment is also essential for the body.

Now, this is something important to understand. This fast allows the consumption of tuberous vegetables such as potato, sweet potato, colocasia etc. Having starchy vegetables alone will cause the blood sugar levels to spike up quickly. So, in order to balance the meal, have any fibrous vegetable along like spinach, tomato, pumpkin etc.

Next tip is the balance of calories and nutrition by the way of cooking. The superfoods consumed in such fasts - buckwheat, amaranth, potato, sweet potato etc. are all loaded with vitamins and minerals. We all know that most of these are heat labile i.e. the nutrients in them are lost by cooking at high temperatures. So, the crux is to avoid deep-frying of vegetables. Use different cooking methods like baking, roasting or grilling. This will preserve the nutritional value, along with lower calorific value.

When I use the word weaning, it implies the introduction of solid or liquid foods to the baby. Now here the significance is introducing amaranth grain in the diet of Indians. This is not regularly consumed but Rajgiri/seel (local names) is a good source of protein from all the foods allowed in sawan fast (4g / 30g). Also, dairy products, preferably the ones low in fat also add on to the nitrogen containing nutrient.

Use kuttu ka atta to make rotis, uttapam, dosa etc. It is a pseudocereal that has high iron content (4.65 mg/30g), much higher than wheat, rice and ragi. Also, its protein content is comparably higher than that of other cereals.

When fasting, knowing that you have to refrain from eating certain foods, mind can get into the trap of cravings. The sugar cravings can be handled by pumpkin halwa, samai rice kheer, makhana kheer, dates, dates and walnut lassi, fruit raita etc.

Make sure to refrain from all those namkeen packets of chips and bhujia and have healthy snacks instead. Have a fruit salad when hungry. Handful of nuts will also keep you full. You can also have a small serving of baked or steamed sweet potato. Roasted makhanas work wonders for offering satiety (keep a check on the quantity of makhanas you consume).

No matter what, a glass of milk satisfies all the Indians. Locally called as kadha hua doodh, its that milk which has been heated to thicken it by evaporating its water. Flavours can be added to this such as cardamom, kesar etc. This offers complete fullness to the stomach. Also, one can have paneer or lassi to keep the gut healthy and detoxify it, since they contain appreciable levels of pre-biotics. Prefer having skimmed milk over full-fat milk.

Now rather than having processed sugar, go for jaggery or gur. Sawan fast observes a Satvik diet which doesnt include foods that have been refined and processed. Also, it is healthier than sugar. Jaggery is rich in iron too.

Fasting also requires your body to rest and relax. 7-8 hours of good quality sleep will keep the person active. Moreover, adequate sleep decreases the hunger cravings and a person tends to eat less. Lethargy and boredom invite cravings.

View original post here:
First Sawan Somwar fast: 11 nutrition tips to keep in mind during Shravan Monday - Hindustan Times

Read More..

A Deep Field’ of fanciful flora will surreally sprout at the Getty Center – NBC Southern California

What to Know

Strange specimens?

They're the stuff of sci-fi, the cinematic wonderworlds that are rife with weird flowers, gargantuan leaves, and stems that reach for the sky.

We humans also frequently remix the natural world in our imagination, pondering what a glowing rose might look like or a vine that rambles over several miles.

You can put some of that florally fanciful imagination to whimsical work at the Getty Center in the days ahead when a "Deep Field" begins to grow.

The interactive augmented reality experience is simultaneously debuting at the Brentwood-based museum and Art Gallery of New South Wales in Sydney, giving lovers of surreal landscapes the chance to fashion their own flora.

"At both museums, visitors are invited to co-create a digital ecosystem of fantastical plants," shares the Getty Center.

Want to find new things to do in Los Angeles? The Scene's lifestyle stories have you covered. Here's your go-to source on where the fun is across SoCal and for the weekend.

"Using a new drawing app on iPad Pro with Apple Pencil, participants can sketch and create imaginative plants and flowers and upload them to a global database. Almost instantly, their drawings, joined in real-time by other users' art across both museums, bloom into 3D plant structures, trailing across the floor, walls, and ceiling."

One of the urgent and ever-topical themes of "Deep Field," which comes to us from the digitally innovative artists Tin&Ed, is the "interconnectedness of living organisms."

"At a time when the threat of widespread biodiversity loss looms larger than ever,'Deep Field'invites visitors and school children at both museums to engage with forgotten worlds anew: to shift perspectives, to listen and learn, to call a wondrous future into being," says artists Tin Nguyen & Edward Cutting.

Taking part in this bi-hemispheral celebration of nature, art, the heart, and our mind while calling upon the Getty Center?

You can do so, for free (yep, parking is additional), during select times on July 8 as well as from July 11 through 16.

Link:
A Deep Field' of fanciful flora will surreally sprout at the Getty Center - NBC Southern California

Read More..

Things candidates should keep in mind while virtual recruitment – The Economic Times

Virtual recruitment has emerged as the new standard for hiring procedures as the world transitions to the digital era. Online platforms' convenience is enabling both businesses and candidates to adjust to this development. However, candidates must be aware of a few things that might make or break their prospects if they want to stand out in a virtual recruitment environment. This article outlines important pointers for candidates to properly handle online recruitment.The hiring landscape witnessed new developments during the pandemic, and one such advancement that will stay here is remote hiring. Candidates found this transition a tad vexing initially. As days passed, they became familiar with this new practice, but frankly, some level of discomfort still exists. Undoubtedly, cracking an interview in this new virtual world can be a hassle if you are not prepared or equipped with the right tools or settings. In this context, here are a few tips job seekers should keep in mind to ace an interview virtually," Ravindra Goyal, Co-Founder, Erekrut HR Automation Solutions said. Don't Gamble on Tech: Test the waters before your interviewOne of the common mistakes most candidates make is delay testing the platform, and it is just before the interview they end up facing unexpected technical issues. As a result, not only do they risk being late to the interview but also jeopardize their chances of making a positive first impression. To avoid such odds, what they must do instead is try out the platform, understand its features, and check the internet connection well in advance. Ensuring that these things are sorted will make the interview experience seamless. With these settings in place, if you answer those questions confidently and correctly, you may get hired and get the chance to work in your dream company. Beyond the Surface: Delve deep into company culture, vision and mission Another crucial aspect of acing an online interview is studying the organization in detail. Watch their videos, read employee reviews on Glassdoor, explore their website, and check their social media. Don't forget to glance at the interviewer's LinkedIn too. Uncover insights, find common ground, and present yourself as the perfect fit.

Start your research by reading the 'About Us' page, but make sure you go beyond it to uncover the company's essence and envision how you can seamlessly fit into its vibrant culture. While doing so, make sure that you study this information to explore what enthralls you about the organization. It could be a service, feature or simply a customer story that piqued your interest.

Additionally, taking the time to research the company and its culture thoroughly allows you to align your skills and interests with its vision and mission, presenting yourself as the perfect fit. Mastering situational and behavioral questions through preparation enables you to showcase your past achievements, problem-solving abilities, and adaptability under pressure.

The post COVID Era has taught us the importance of working virtually and digital recruitment has become the need of the hour. While it cannot beat the effect of a personal one to one, candidates sitting in far off, remote areas or other geographies can also easily become part of the recruitment process without the hassle of travelling and arranging accommodation, Aditi Mittal, Group Head, HR, SAVE Solutions said. This has become one of the most cost effective models when it comes to acquiring the right talent at the right time which is a critical element for any organisation. Here are some other tips to be well prepared for a virtual interview:

Technical Readiness and Punctuality: Ensuring that you have a stable internet connection, a functioning webcam, and a quiet and well-lit environment for the virtual interview is extremely important. Logging in a few minutes early to avoid any technical difficulties helps to show your professionalism and punctuality. Removing any distractions and ensuring that your background is professional and appropriate should be a priority while appearing for a digital interview. Learning how to navigate and use the virtual meeting platform being used for the interview, and testing your audio and video settings in advance is a good idea.

Dressing and Body Language: Dressing as you would for an in-person interview; and presenting yourself in a professional and polished manner helps make a positive impression. Looking directly into the camera when speaking creates a sense of connection with the interviewer. One must pay attention to their body language, posture, and facial expressions, while ensuring to maintain a confident and attentive demeanour throughout the interview.

Minimize Distractions and Listen Actively: Turn off notifications on your computer/mobile devices to avoid interruptions and close any unnecessary applications or browser tabs. It is important that one pays close attention to the interviewer's questions and statements; and responding accurately.

Prepare, Practice and Engage: When interviewees come having done research about the company and the role thoroughly, it demonstrates initiative. Coming prepared with responses to common interview questions and asking thoughtful questions about the company, role, and team dynamics shows your enthusiasm. You can also use notes or cue cards discreetly if needed.

Read more:
Things candidates should keep in mind while virtual recruitment - The Economic Times

Read More..

After my divorce, I was over men. Would I ever love again? – Los Angeles Times

My divorce papers were signed, and I had just graduated from seven years of a grueling general surgery residency in New York City. I was finally headed back home to Southern California, but first there was a pit stop. My soon-to-be ex-husband helped me find an all-women surf and yoga camp in beautiful Costa Rica en route to L.A. Luckily, my ex and I were amicable enough, and he reminded me that I had always wanted to see Costa Rica. I was, at the time, anti-men.

I lugged all my belongings from my life in New York with me, so when I landed in San Jos without any of my luggage, I was pissed off. I waited, complained, filled out papers with the airline and then finally headed to the van that was waiting to take me to the all-women surf and yoga camp. Peter was at the van already, apparently going to the same camp. Annoyed, I got into the van without my luggage but instead with this man who was not supposed to be there.

Once we arrived, I complained to the front desk that all my life belongings were not yet with me and that there was a man at the camp. The woman looked at me with smiling eyes and said, Sometimes it is an all-women camp, and sometimes it is not. Your luggage will arrive. Welcome to Costa Rica.

Over the next week at the camp, our co-ed group went on nature walks, yoga sessions and surfing lessons. My luggage finally made it to me, and I learned that every other week the camp was all-women, alternating with co-ed weeks. I unknowingly picked a co-ed week. I also learned that Peter was also divorced, had a daughter as I did, and had won a Facebook raffle that brought him to Costa Rica. He was a freelance photographer and enjoyed traveling, especially when it was paid for by somebody else. In the meantime, we both were terrible at surfing and realized paddleboarding was more in line with our abilities.

At some point, the beauty of Costa Rica brought out deep conversations between Peter and me, and I distinctly remember telling him, I dont believe in love between a man and a woman. I think true love can only exist between a parent and child.

Peters divorce had been years prior, and he was not as bitter as I was when he said to me, Thats too bad. I do believe in love. I hope you change your mind someday. He also told me that he loved to hike and camp, especially in Washington where he lived, and that he could never live in L.A. where there were no mountains or trees.

Having grown up in L.A., I took offense at his lack of appreciation of the beauty and diversity that California has to offer. After all, depending on the time of year, we have the ability to snow ski on a mountain and surf in the ocean both in the same day. I told him I hoped he would change his mind someday and experience L.A. for himself.

We exchanged email addresses at the end of our trip, and Peter asked to keep in touch. He also told me that he had a policy of not Facebook-friending new people because he wanted to get to know people through words and conversations rather than superficially through online posts. I thought this was very odd, and I was convinced he had some dark secret he did not want to share. I shrugged it off.

Over the next several months, I settled into my new life as a single mom in L.A. I loved the weather and the change of pace from New York and spending more time with my parents and daughter. Peter and I exchanged several emails during this time. I described my surgical fellowship and new lifestyle, and he told me about his various travels around the world.

Six months after my move to L.A., Peter let me know that he won a second raffle that would bring him from his home in Seattle via L.A. to get to Machu Picchu in Peru. He asked if I wanted to meet for coffee.

We met, and this time I saw him with a fresh set of eyes and a more open heart. Peter wasnt just a tall, handsome man with beautiful blue eyes. He had a kindness in his heart and a compassion for the world that I had never quite known in another person. He cared enough to donate blood regularly, volunteer at food drives and pick up other peoples trash along the beach. I found myself drawn to him in a way that was surprising and amazing all at once.

Peter left for Peru the next day, and thats when I noticed something within me starting to crack. I felt as if a wall was finally crumbling, and a glimmer of light was seeping in.

It seemed I might have changed my mind about love.

That night I sent an email to Peter, pouring out my heart and asking if he would consider a long-distance relationship. I didnt realize he was in the rainforest without internet, so I waited for what felt like an eternity for his affirmative response days later. I thanked him for his leap of faith and finally had a peaceful night of sleep.

A year later, we spent our honeymoon in Costa Rica, and this year will be our 10-year wedding anniversary. Peter moved to L.A. once his daughter went to college and he changed his mind about living here. For some reason, he keeps entering raffles for travel but has not won another one since we got married. I secretly hope he never wins one again. Oh, and he finally added me as a Facebook friend (no dark secrets after all!).

The author is a breast surgeon and an associate professor of surgery at UCLA. She lives in Woodland Hills. Shes on Twitter @DrNimmiKapoor.

L.A. Affairs chronicles the search for romantic love in all its glorious expressions in the L.A. area, and we want to hear your true story. We pay $300 for a published essay. Email LAAffairs@latimes.com. You can find submission guidelines here. You can find past columns here.

Continued here:
After my divorce, I was over men. Would I ever love again? - Los Angeles Times

Read More..

Dell launched a new global loyalty program with exclusive web3 … – PR Newswire

NEW YORK, July 7, 2023 /PRNewswire/ --Dell Technologies partnered with Oort, a web3 data cloud service provider, to launch a new global loyalty program with decentralized data storage. The program will be available for customers from Canada on July 7th, 2023, for US users from July 26th, 2023 then for over 10 million customers from the rest of the world.

Oort provided Dell customers with a decentralized storage service (DSS) including data storage and data migration that bridgesthe gap between web2 and web3 when it comes to data services and allows users to store, migrate, and retrieve data securely from anywhere, anytime.Also, it helps to save up to 60% compared with the most popular current solutions.

Oort offers a new approach to Dell's loyalty program and provides data services that maximize privacy and savings.

The new decentralized storage service is much more accessible to web2 users. They don't need to understand the complications of web3 and can just enjoy privacy, security, and cost efficiency.

"We chose to partner with Dell because of their global presence, established reputation for reliability, and commitment to innovation. By integrating our web3 data cloud services into their loyalty program, we are able to offer a seamless and secure customer experience backed by the trust and expertise of Dell," said Dr. Max Li, founder & CEO of Oort. "Our web3 data cloud offers a unique and innovative approach to Dell's loyalty program by leveraging cutting-edge decentralized technology to provide enhanced privacy, reliability, and cost efficiency. Additionally, it allows for seamless integration with other web3 applications and services, providing users with full control over their data anywhere anytime."

For web3 data cloud services, Oort has used a decentralized three-tier node architecture to achieve enterprise-grade performance:

The launch of Dell's latest customer loyalty program, Dell Rewards, is designed to foster strong engagement and deliver exceptional value to its vast network of over 10 million global loyalty program members. With a focus on enhancing members' lifestyles and businesses by fueling their passions and pursuits, this innovative program introduces a range of features, cutting-edge services, and member-only offers that cater specifically to the unique needs of Dell's esteemed customer base.

Comprising carefully selected Dell and Partner platforms, each offering member-only benefits tailored for Dell's loyal customers, this loyalty program is set to redefine customer satisfaction. Among these platforms, the inclusion of Oort DSS, the only web3 service in the program, reflects Dell's commitment to continuously introducing pioneering products to its valued clientele.

Dell Rewards is committed to fostering stronger connections, delivering exceptional support, and pioneering a new era of unparalleled service and innovation for its loyal customers.

More details about the Dell Rewards loyalty program are available here.

About OortOort is an AI-powered data cloud that unifies global computing and storage resources, maximizing privacy and savings. It enables developers and businesses to build and scale their applications easily while ensuring their data remains secure and accessible. Users can store, process and interact with their data securely from anywhere in the world while retaining complete control. More details https://www.oortech.com/

Oort in Figures:$6,2M raised investments29,000+ nodes covering 106 countries200+ patents held by the founderAlliances with 20+ universities in the US35 employees

Contacts:OortEvelina Lavrova[emailprotected]

SOURCE Oort

Here is the original post:
Dell launched a new global loyalty program with exclusive web3 ... - PR Newswire

Read More..

12 Types of Vulnerability Scans (+ When to Run Each) | eSP – eSecurity Planet

Vulnerability scanning is critically important for identifying security flaws in hardware and software, but vulnerability scanning types are as varied as the IT environments theyre designed to protect.

In this article, well delve into various types of vulnerability scans, explore their benefits, outline the ideal scenarios for running each type, and list the best vulnerability scanning tool to use for each type of scan. By understanding these distinctions, you can improve your overall cybersecurity defenses and harden your systems against potential threats.

See The Best Vulnerability Scanner Tools

Jump ahead to:

Host-based vulnerability scanning is aimed at evaluating vulnerabilities on specific hosts within an organizations network. These scans can be agent server-based, in which an agent is deployed on the target host; agentless, in which no agent is required; or standalone, in which the scanning capabilities are self-contained.

Tenable Vulnerability Management (formerly Tenable.io) provides enterprises with a comprehensive and fast solution for assessing vulnerabilities at the host level. Tenable.ios host-based scanning works by deploying lightweight software agents on specific hosts throughout the network. These agents gather data on the hosts operating system, installed software, settings, and other pertinent information. This data is subsequently transmitted to the Tenable.io platform for analysis and vulnerability assessment.

Tenable.io is a popular option for enterprises looking for comprehensive host-based scanning solutions due to its agent-based approach, continuous monitoring, asset management features, integration capabilities, and vast vulnerability knowledgebase.

Pricing: Tenable Vulnerability Management costs $2,275 a year for 65 assets, with discounts for multi-year contracts.

Port scanning sends network queries to different ports on a target device or network. The scanner detects which ports are open, closed, or filtered by analyzing the results. Open ports may suggest possible vulnerabilities or network-accessible services.

Nmap Security Scanner communicates directly with the hosts operating system to collect information on open ports and services, after which it applies techniques such as TCP connect scanning, SYN scanning, UDP scanning, and more. Each approach employs a different strategy to ascertain the state of the target ports (open, closed, or filtered).

Because of its versatility, extensive features, active development, scripting support, and cross-platform compatibility, Nmaps host-based scanning for port scans is highly respected. These features make Nmap a popular port scanning tool among network administrators, security experts, and amateurs.

Nmap is free and open source for end users, but theres also a paid license for OEM redistribution.

Also read: Nmap Vulnerability Scanning Made Easy: Tutorial

Web application scanners are used to identify vulnerabilities in web applications. These scanners frequently probe software to map its structure and discover potential attack vectors. These scanners automate the process of scanning web applications, evaluating the applications code, configuration, and functioning to find security flaws. Web application scanners simulate many attack scenarios to discover common vulnerabilities, such as cross-site scripting (XSS), SQL injection, cross-site request forgery (CSRF), and weak authentication systems. They utilize techniques such as crawling the application to identify all available pages, sending input data to forms, and reviewing server responses for potential vulnerabilities. Web app canners typically use predefined vulnerability signatures or patterns to detect existing vulnerabilities.

Invicti applies an automated scanning technique to identify vulnerabilities in web applications. It discovers and evaluates all aspects of an online application, including its pages, inputs, and functions, using a combination of crawling and scanning approaches. The scanning engine of Invicti can identify a wide range of online application vulnerabilities, such as SQL injection, XSS, and remote code execution, among others.

The platforms automated scanning, deep scanning capabilities, business logic testing, and powerful reporting capabilities make it a top choice for enterprises looking for dependable and quick web application security evaluations.

Invict does not publish pricing information, but the price for each plan can be obtained by contacting the vendor.

Also read:

Network vulnerability scanners detect vulnerabilities by scanning for known flaws, incorrect settings, and out-of-date software versions. To find vulnerabilities throughout the network, these scanners frequently use techniques such as port scanning, network mapping, and service identification. It also examines network infrastructure, including routers, switches, firewalls, and other devices.

Microsoft Defender for Endpoint (formerly known as Microsoft Defender Advanced Threat Protection) is gaining traction as a vulnerability management scanning tool, especially for remote work and work from home scenarios. Within its security suite, it provides complete network vulnerability detection capabilities and operates solely through agent-based deployment. Microsoft Defender for Endpoint captures and analyzes network traffic data, such as network flows, protocols, and communication patterns, by deploying network sensors.

Microsoft Defender for Endpoint offers a number of benefits for network vulnerability scanning. Features include seamless interaction with Microsoft threat intelligence, behavior-based detection techniques, endpoint protection correlation, and centralized management. These capabilities enable enterprises to discover and resolve network vulnerabilities proactively, strengthen their security posture, and reduce possible threats.

Microsoft offers a three-month free trial for users to test out Microsoft Defender for Endpoint. Additionally, the Microsoft 365 E5 subscription includes Microsoft Defender for Endpoint Plan P2, which costs $57 per user per month. Contact Microsoft sales for detailed price information on different plans.

See the Best Enterprise Vulnerability Scanners

Database scanners are used to evaluate the security of database systems. They examine database setup, access controls, and stored data for vulnerabilities such as insecure permissions, injection problems, or unsafe settings. These scanners frequently provide information for securing databases and safeguarding sensitive data.

Impervas Scuba Database Vulnerability Scanner can detect hidden security issues inside your databases that may be missed by routine monitoring or manual assessments. Scuba is intended to scan enterprise databases for potential security vulnerabilities and misconfigurations, such as in Oracle, Microsoft SQL Server, SAP Sybase, IBM DB2, and MySQL. Following the completion of the scan, Scuba provides information and solutions on how to fix the detected concerns. This then assists database administrators and security teams in efficiently prioritizing and mitigating threats. Scuba is available for a variety of operating systems, including Windows, Mac, and Linux (both x32 and x64).

One notable advantage of Scuba is that it is available as a free tool, making it accessible to businesses with limited budgets or those looking for a cost-effective alternative.

Also read: 7 Database Security Best Practices: Database Security Guide

Early in the development cycle, source code should be checked for security vulnerabilities to identify possible issues before they become too costly to fix. Source code scanners examine software applications source code for security flaws, coding mistakes, and vulnerabilities. They look for possible vulnerabilities such as input validation errors, improper coding practices, and known susceptible libraries in the codebase. During the software development lifecycle, source code scanners assist developers in identifying and correcting vulnerabilities.

Snyk scans the source code of software projects for potential vulnerabilities and security flaws. It examines the dependencies and libraries used in a project by scanning code sources, including Git repositories and package manifests. Snyk contains a large collection of security advisories and vulnerability information that is constantly updated, allowing it to reliably discover problematic dependencies. Snyk interfaces easily with CI/CD pipelines, enabling automatic security scanning throughout the software development lifecycle. It is compatible with common development tools and processes such as GitHub, Bitbucket, Jenkins, and others.

Snyk offers a free version with limited tests per month. Unlimited testing features can be availed in their Team plan starting at $52 per contributing developer per month.

See the Top Application Security Tools & Software

Cloud vulnerability scanners evaluate the security of cloud environments such as IaaS, PaaS, and SaaS installations. They offer insights and ideas for improving cloud deployment security. These scanners investigate cloud setups, access restrictions, and services to detect misconfigurations, poor security practices, and cloud-specific vulnerabilities.

Wiz is a cloud-native security platform that makes use of cloud-native technologies and APIs to enable seamless integration and comprehensive scanning capabilities. It was recognized as the second easiest-to-use vulnerability scanner platform on G2.

Wiz is optimized for cloud environments and has extensive features for cloud security. It is capable of handling large-scale cloud infrastructures, making it appropriate for enterprises with complicated and broad cloud installations. Wiz also automates vulnerability screening and provides continuous monitoring, allowing security teams to keep up with new threats and security issues in real time. These characteristics allow enterprises to effectively scan and monitor cloud resources, keeping up with changing cloud environments.

Wiz does not list pricing on their website but you may contact the vendor for a custom quotation.

Also read:

Internal scans are designed to identify vulnerabilities in an organizations internal network. They inspect systems, servers, workstations, and databases for security flaws that may lie within network borders. These scans are performed from within the network by looking for flaws such as privilege escalation vulnerabilities. Internal scans are particularly beneficial for mapping employee permissions and identifying potential weaknesses to an insider attack.

OpenVAS is a popular open-source vulnerability scanner for internal vulnerability scanning. It locates and identifies the assets within your internal network that require scanning. It can detect all the devices and systems on an internal network by scanning a range of IP addresses or specified network segments. It then scans the scanned systems and devices for known vulnerabilities, misconfigurations, weak passwords, and other security concerns.

OpenVAS makes use of a large number of plugins, also known as Network Vulnerability Tests (NVTs), that are continuously updated. These plugins include tests for a variety of vulnerabilities, exploits, and security flaws. The plugins are used by OpenVAS to scan and analyze internal network components, discovering potential vulnerabilities and producing thorough reports.

OpenVAS also features configuration auditing tools and a capability to generate thorough reports following the scan that highlight the vulnerabilities and misconfigurations detected during the evaluation.

OpenVAS is a free open-source program.

See the Best Open-Source Vulnerability Scanners

External scans identify vulnerabilities in an organizations internet-facing assets. These scans target internet-accessible services, apps, portals, and websites to detect any flaws that external attackers may exploit. They examine all internet-facing assets, such as employee login pages, remote access ports, and business websites. These scans help companies understand their internet vulnerabilities and how they might be exploited to obtain access to their network.

Many vulnerability scanners are designed to just scan for internal vulnerabilities, but Rapidfire Vulnerability Scanner is built to search for both internal and external vulnerabilities.

Rapidfire focuses on identifying security flaws in systems and devices accessible from beyond a networks perimeter. It searches for possible vulnerabilities in publicly available IP addresses, domains, and internet-facing assets. To find vulnerabilities, the scanner applies a number of approaches, including scans for missing patches, unsafe settings, weak passwords, known attacks, and other security flaws. It makes use of vulnerability databases and constantly updated signatures to ensure that vulnerabilities are correctly identified. Reports provide precise insights into vulnerabilities, allowing security teams to efficiently prioritize and resolve concerns.

RapidFire Tools doesnt post pricing information, but interested customers may request a quote.

Read more: External vs Internal Vulnerability Scans: Difference Explained

Vulnerability assessments entail a thorough examination of a companys systems, networks, applications, and infrastructure. These evaluations seek to identify vulnerabilities, evaluate risks, and make suggestions for risk mitigation. They can identify particular flaws or holes that might be exploited by attackers to undermine system security. Vulnerability assessment scans often comprise scanning the target environment using automated tools for known vulnerabilities, misconfigurations, weak passwords, and other security concerns. The scan results offer a full report on the vulnerabilities discovered, their severity, and potential consequences.

Rapid7 Nexpose is a vulnerability management solution with extensive assessment scanning capabilities. It provides complete vulnerability assessments, risk prioritization, and remedy advice. Nexpose is well-known for its simplicity of use and interoperability with other security solutions. Users may undertake rapid evaluations of their environment and any security risks by sorting asset information.

Rapid7 offers both free and paid plans for Nexpose. Contact the vendor for specific pricing information.

Also read: 7 Steps of the Vulnerability Assessment Process Explained

While an assessment scan is focused on a specific system or network, a discovery scan is focused on the identification and inventorying of assets within a network environment. Its goal is to map the network and identify the devices, systems, applications, and services that exist on it.

A discovery scans primary goal is to offer an accurate and up-to-date inventory of assets, including IP addresses, operating systems, installed applications, and other pertinent information. It aids in the understanding of network topology, the detection of illegal devices or rogue systems, and asset management. Discovery scans are less invasive than vulnerability assessment scans and are used to obtain information about the network architecture.

Because of its user-friendly design and enhanced network mapping features, Zenmap, a graphical interface for Nmap, stands out as an outstanding option for doing network discovery scans.

Zenmap makes network scanning and viewing easier with a user-friendly design. Zenmap lets users save frequently used scans as profiles, allowing them to be performed repeatedly without the need for manual setup.

Users can construct Nmap command lines interactively using Zenmaps command creator function. Zenmap maintains a searchable database that records scan findings, allowing for simple information access and retrieval.

Zenmap is a free open-source application.

See the Top IT Asset Management (ITAM) Tools for Security

Compliance scans compare an organizations systems and networks to regulations, standards, and best practices. These scans ensure that security policies and settings are in accordance with the appropriate compliance frameworks, assisting enterprises in meeting regulatory obligations.

OpenSCAP is an open-source platform that analyzes system security compliance and assures adherence to security standards. The scanner includes a comprehensive set of tools for scanning online applications, network infrastructure, databases, and hosts. Unlike other scanners, OpenSCAP compares the device to the SCAP standard rather than checking for Common Vulnerabilities and Exposures (CVEs).

To assess system compliance, OpenSCAP employs a mix of specified security content and scanning algorithms. It offers a security policy library known as SCAP (Security Content Automation Protocol) content, which comprises security baselines, configuration rules, and vulnerability tests. Compliance scans may be planned and done automatically using OpenSCAPs automation features, minimizing manual work and enhancing operational efficiency.

OpenSCAP is a free, open-source project and is continually enhanced, updated, and evaluated by a diverse group of contributors, assuring the availability of current security material and continued development.

See the Top Governance, Risk and Compliance (GRC) Tools

There are two primary approaches to vulnerability scanning: authenticated and unauthenticated scans. Here are key differences between the two.

A thorough vulnerability scanning approach should include both authenticated and unauthenticated scans. This provides larger coverage and better insights on a systems or networks strengths and shortcomings. Comparing the outcomes of both categories aids in identifying disparities and areas that require more research or correction. Including both authorized and unauthenticated scans improves overall security awareness and preparation.

Also read: Penetration Testing vs Vulnerability Scanning: Whats the Difference?

Here are some guidelines for choosing a vulnerability scanning tool:

Vulnerability scanning is a critically important part of cybersecurity risk management, allowing organizations to find and fix flaws in their systems, networks, and applications through a range of vulnerability scan types. To keep your systems and data safe, vulnerability scanning should be a component of a thorough vulnerability management program that includes frequent scans and timely repair of discovered vulnerabilities. Staying on top of vulnerabilities is as difficult as it is important and requires organizational commitment.

Read next:

Read the original:
12 Types of Vulnerability Scans (+ When to Run Each) | eSP - eSecurity Planet

Read More..