-
Posts
7,139 -
Joined
-
Last visited
Content Type
Profiles
Forums
Blogs
Events
Everything posted by ResidentialBusiness
-
Cyberattacks are constantly evolving. Almost all of the breaches (95%) are caused by people. That’s why implementing preventative measures is so important. Latest Emerging Network Security Attacks Here are some of the cyber attacks to watch for. Remember even outbound traffic needs to be filtered through a firewall. Artificial intelligence: AI can spot employee behavior patterns that lend themselves to social engineering attacks. And it can spot other vulnerabilities leading to cybercrime events. Man in the Middle attacks: Another emerging threat, this is basically digital eavesdropping. Hackers steal personal data. SQL injection attacks: Attackers can view user lists, get admin rights or even delete tables. These use harmful code to get into the backend database. Crypto-Malware: This is also called crypto-mining malware. Hackers steal cryptocurrencies. Typosquatting: This is another significant issue. Users are often deceived by common misspellings of URLs, leading them to unknowingly visit harmful websites. IP theft or unauthorized access: One can lead to the other. Unauthorized access (a hack) can lead to the theft of inventions and ideas. Phishing attacks: Hackers dupe people into opening a malicious link. And fool them into giving up information. One way to stop these malicious actors and their malicious software is user authentication. READ MORE: What is Cybersecurity? Why Preventing Cyber Attacks is so Important Malicious code that infects or steals business data can disrupt your small business operations. To avoid legal issues, it is essential to protect your network system from attacks. READ MORE: The Average Cost of a Cyber Attack on a Small Business is More than $25,000 How a Cyber Attack Occurs These attacks take different shapes. They can access mobile phones and other connected devices like personal computers. A malware attack can destroy your finances. They start with an infected attachment. Or someone being duped into giving up info. Or even all-out assaults through denial of service attacks. Top Cyber Security Vulnerabilities Most cyber-attacks are financially motivated. Remote work, cloud-centered technologies, and VPNs are especially susceptible. Here are vulnerabilities to pay attention to: Unused Patches. Keep your software up to date. Encryption Matters. If your communications are encrypted, you leave usernames and passwords open for hackers. Old Software. Increased risks of a breach include dated user authentication. That results in cyber criminals finding a way in. Unrestricted Access. It’s not just about a victim’s device being hacked. Unlimited accounts increase cyber threats. READ MORE: Small Business Cybersecurity Concerns Amid Russia-Ukraine Crisis How to Prevent Cyber Attacks and Data Breaches Secure systems make for good business. Avoid a distributed denial of service attack and others with these tips. Create Strong Passwords and Change Them Often Passwords help to prevent data breaches. Set up two-step authentication with the security software. Good password security logins change frequently. Create a Cybersecurity Policy A good cyber security policy can help you keep customers and sensitive data safe. Cyber risks are in the cloud, too. Outline who can migrate data to the cloud from your company. Install Firewalls and Top Antivirus Software Look for products that offer the best VPN and firewall protection together. Choose a product that can handle most viruses. Here’s a list to sort through. Use Endpoint Protection Software This software protects mobile devices as well as laptops and desktops plus tablets. These can cover a total network. Store Data Securely First, it’s important to limit how much information you share online. Being proactive means addressing concerns. Like Baiting and scareware. Give User Training This is another proactive step to help employees spot and report suspicious activity. Look for a company that complies with HIPAA, ISO, and Cyber Essentials, to name a few. They should have categories for email protection and password policies. And how to recognize social engineering. Update and Patch Software and Systems Regularly Hackers seek out vulnerabilities in web browsers and operating systems. Additionally, software weaknesses provide an avenue for malicious actors to install malware and gain unauthorized access. Update and apply patches on your phones, laptops, and tablets. Automatic updates are effective for managing these systems. Encrypt Your Data Customer information must be encoded to ensure its security. In fact, small businesses should encrypt all of their data. You can utilize either private key encryption or a combination of private and public keys that are interconnected. Maintain Back-Ups of Your Data Backing up company data is one way to bounce back from cyber attacks. There’s a 3-2-1 rule to follow. Make three copies. Put two in different local locations. And store one off-site. Backing up critical data is one surefire way to make your company cyber-resilient. Cloud computing has led to cloud storage. Your data is safe even if a fire destroys your office. Restrict Access to Your System You’re less likely to suffer through a data breach when you control access to systems and even the entire network. Consider removable media like USB memory sticks. Regularly Purge the System Former employees can pose significant risks. Therefore, it is essential to eliminate any unnecessary data. Sensitive information could be at risk of theft. It’s important to note that approximately 30% of employees switch jobs. Before purging, make sure to standardize data. Hide Your Wi-Fi Network Any wireless access point on a Wifi network can allow for what’s called backdoor access. There are different attacks like The Evil Twin, where a system duplicates yours. Change the default passwords using two-factor authentication. These types of authentication tools make a difference. Have Separate Logins for Staff Not everyone should have access to store and customer data. Separate logins should all have a minimum password length. Use a Virtual Private Network (VPN) Sensitive data is safer on an internal network. These create a safe way to give remote workers access to internal data. Perform Penetration Testing These simulate cyberattacks. Gather info on your mail servers and domain name before you start. Think Outside of the Box Don’t forget to consider alternative approaches to prevent breaches. Traditional methods, such as multi-factor authentication, are effective. Additionally, facial recognition software also contributes to security. These methods are all viable options for how to prevent cyber attacks. Build Some Redundancy into Your Infrastructure. Keeping extra switches and routers on hand works. Outsource Cybersecurity. Here’s a great way to prevent one of these attacks. Make sure they handle updates for anti-virus software. And security for social media platforms. Another workaround for cybersecurity problems is buying more bandwidth. So your SMB can ride out DDoS attacks. Create Incident Response Plans Reacting to security problems is part of the process. You’ll need to notify the right people when necessary, like law enforcement. Perform Regular Audits of Procedures Cyber attack prevention is a big part of cyber security. Look for items like weak passwords and unused software patches. Look for signs of items like domain name system attacks. What to Do After a Cyber Incident Any small or medium-sized business (SMB) can fall prey to cybercrime, as criminals can steal data with malicious intent at any moment. For guidance on how to prevent cyber attacks, the Infrastructure Security Agency is a good resource. And you can follow these tips: File a report with the local police if you’ve been the victim of identity theft. Communicate with your customers via phone or video. File a complaint with the FBI. READ MORE: What is Cybersecurity Cybersecurity Terms You Should Know Types of Cybersecurity Attacks The Average Cost of a Cyber Attack on a Small Business is More than $25,000 Image: Envato Elements This article, "How to Prevent Cyber Attacks" was first published on Small Business Trends View the full article
-
Cyberattacks are constantly evolving. Almost all of the breaches (95%) are caused by people. That’s why implementing preventative measures is so important. Latest Emerging Network Security Attacks Here are some of the cyber attacks to watch for. Remember even outbound traffic needs to be filtered through a firewall. Artificial intelligence: AI can spot employee behavior patterns that lend themselves to social engineering attacks. And it can spot other vulnerabilities leading to cybercrime events. Man in the Middle attacks: Another emerging threat, this is basically digital eavesdropping. Hackers steal personal data. SQL injection attacks: Attackers can view user lists, get admin rights or even delete tables. These use harmful code to get into the backend database. Crypto-Malware: This is also called crypto-mining malware. Hackers steal cryptocurrencies. Typosquatting: This is another significant issue. Users are often deceived by common misspellings of URLs, leading them to unknowingly visit harmful websites. IP theft or unauthorized access: One can lead to the other. Unauthorized access (a hack) can lead to the theft of inventions and ideas. Phishing attacks: Hackers dupe people into opening a malicious link. And fool them into giving up information. One way to stop these malicious actors and their malicious software is user authentication. READ MORE: What is Cybersecurity? Why Preventing Cyber Attacks is so Important Malicious code that infects or steals business data can disrupt your small business operations. To avoid legal issues, it is essential to protect your network system from attacks. READ MORE: The Average Cost of a Cyber Attack on a Small Business is More than $25,000 How a Cyber Attack Occurs These attacks take different shapes. They can access mobile phones and other connected devices like personal computers. A malware attack can destroy your finances. They start with an infected attachment. Or someone being duped into giving up info. Or even all-out assaults through denial of service attacks. Top Cyber Security Vulnerabilities Most cyber-attacks are financially motivated. Remote work, cloud-centered technologies, and VPNs are especially susceptible. Here are vulnerabilities to pay attention to: Unused Patches. Keep your software up to date. Encryption Matters. If your communications are encrypted, you leave usernames and passwords open for hackers. Old Software. Increased risks of a breach include dated user authentication. That results in cyber criminals finding a way in. Unrestricted Access. It’s not just about a victim’s device being hacked. Unlimited accounts increase cyber threats. READ MORE: Small Business Cybersecurity Concerns Amid Russia-Ukraine Crisis How to Prevent Cyber Attacks and Data Breaches Secure systems make for good business. Avoid a distributed denial of service attack and others with these tips. Create Strong Passwords and Change Them Often Passwords help to prevent data breaches. Set up two-step authentication with the security software. Good password security logins change frequently. Create a Cybersecurity Policy A good cyber security policy can help you keep customers and sensitive data safe. Cyber risks are in the cloud, too. Outline who can migrate data to the cloud from your company. Install Firewalls and Top Antivirus Software Look for products that offer the best VPN and firewall protection together. Choose a product that can handle most viruses. Here’s a list to sort through. Use Endpoint Protection Software This software protects mobile devices as well as laptops and desktops plus tablets. These can cover a total network. Store Data Securely First, it’s important to limit how much information you share online. Being proactive means addressing concerns. Like Baiting and scareware. Give User Training This is another proactive step to help employees spot and report suspicious activity. Look for a company that complies with HIPAA, ISO, and Cyber Essentials, to name a few. They should have categories for email protection and password policies. And how to recognize social engineering. Update and Patch Software and Systems Regularly Hackers seek out vulnerabilities in web browsers and operating systems. Additionally, software weaknesses provide an avenue for malicious actors to install malware and gain unauthorized access. Update and apply patches on your phones, laptops, and tablets. Automatic updates are effective for managing these systems. Encrypt Your Data Customer information must be encoded to ensure its security. In fact, small businesses should encrypt all of their data. You can utilize either private key encryption or a combination of private and public keys that are interconnected. Maintain Back-Ups of Your Data Backing up company data is one way to bounce back from cyber attacks. There’s a 3-2-1 rule to follow. Make three copies. Put two in different local locations. And store one off-site. Backing up critical data is one surefire way to make your company cyber-resilient. Cloud computing has led to cloud storage. Your data is safe even if a fire destroys your office. Restrict Access to Your System You’re less likely to suffer through a data breach when you control access to systems and even the entire network. Consider removable media like USB memory sticks. Regularly Purge the System Former employees can pose significant risks. Therefore, it is essential to eliminate any unnecessary data. Sensitive information could be at risk of theft. It’s important to note that approximately 30% of employees switch jobs. Before purging, make sure to standardize data. Hide Your Wi-Fi Network Any wireless access point on a Wifi network can allow for what’s called backdoor access. There are different attacks like The Evil Twin, where a system duplicates yours. Change the default passwords using two-factor authentication. These types of authentication tools make a difference. Have Separate Logins for Staff Not everyone should have access to store and customer data. Separate logins should all have a minimum password length. Use a Virtual Private Network (VPN) Sensitive data is safer on an internal network. These create a safe way to give remote workers access to internal data. Perform Penetration Testing These simulate cyberattacks. Gather info on your mail servers and domain name before you start. Think Outside of the Box Don’t forget to consider alternative approaches to prevent breaches. Traditional methods, such as multi-factor authentication, are effective. Additionally, facial recognition software also contributes to security. These methods are all viable options for how to prevent cyber attacks. Build Some Redundancy into Your Infrastructure. Keeping extra switches and routers on hand works. Outsource Cybersecurity. Here’s a great way to prevent one of these attacks. Make sure they handle updates for anti-virus software. And security for social media platforms. Another workaround for cybersecurity problems is buying more bandwidth. So your SMB can ride out DDoS attacks. Create Incident Response Plans Reacting to security problems is part of the process. You’ll need to notify the right people when necessary, like law enforcement. Perform Regular Audits of Procedures Cyber attack prevention is a big part of cyber security. Look for items like weak passwords and unused software patches. Look for signs of items like domain name system attacks. What to Do After a Cyber Incident Any small or medium-sized business (SMB) can fall prey to cybercrime, as criminals can steal data with malicious intent at any moment. For guidance on how to prevent cyber attacks, the Infrastructure Security Agency is a good resource. And you can follow these tips: File a report with the local police if you’ve been the victim of identity theft. Communicate with your customers via phone or video. File a complaint with the FBI. READ MORE: What is Cybersecurity Cybersecurity Terms You Should Know Types of Cybersecurity Attacks The Average Cost of a Cyber Attack on a Small Business is More than $25,000 Image: Envato Elements This article, "How to Prevent Cyber Attacks" was first published on Small Business Trends View the full article
-
I took my first foray back into AI video generators when the first version of this article came out in mid-2024. I was pretty impressed with what was on offer at the time, but my initial assessment was that, while there were some helpful AI-driven features in the world of video, nothing could really change the game for me just yet. As I updated this article in 2025, let me tell you — I’ve just had my socks knocked off by some absolutely incredible AI video generators and tools. What's pretty cool, too, is that there is a huge spectrum of functionality when it comes to AI video generators, too. The artificial intelligence tools on this list can do everything from helping you remove a couple of "ums" to complete video creation — think entire fantasy worlds from scratch. Which is incredible because, let's be real: Creating enough video content to satisfy the TikTok, YouTube, or Instagram algorithm is not easy. Scripting, filming, editing — video requires multiple steps. Plus, all these tasks involve very different skill sets. Just because you’re great at talking to a camera doesn’t necessarily mean you’re great at editing video, and vice versa. But thanks to the ever-growing list of AI video tools, you might not have to. I spent hours testing every AI video generator and tool I could get my hands on — my computer's fan is still recovering, but don't worry, I had a great a time — and I've pulled together a pretty diverse list of some of the best. They're not ranked from best to worst — they're all really different, so direct comparison isn't really possible. Instead, I've arranged them in order of ease of use. So, whether you're a content creator, marketer, or just someone who wants to make better videos, there's something here for you. ⚡To help compare the AI video generators and tools a little better — and create videos a marketer or creator would actually be able to use in their day-to-day work — I asked all the tools with AI video generation capabilities to create a video based on the same prompt: "A young woman working on her laptop in a home office."1. CanvaBest AI video tool for generating simple AI videos without a learning curve You already know Canva for its graphic design capabilities — but did you know it also has an AI-powered video editor? Canva's Magic Studio offers AI-generated video editing tools, including text-to-video, auto-visual effects, and even AI avatars. If you’re already using Canva for design, it’s a smooth addition to your workflow. In terms of text-to-video, I was really impressed with Canva's built-in AI video generator. It worked fast, and the video clips were realistic — surprisingly so when it came to human faces and hands (AI generators' usual nemeses). Of course those AI animations on typography and other graphics are a huge timesaver, too! Fun fact: I used this feature to animate a static design for the intro to Buffer Chat: The Podcast. Canva pricing: Free with limited features; Pro plans start at $12.99/month. 🎬Looking for a more straightforward video editor? Here’s our list of the best video editing tools (free and paid) of 2025 →2. VeedBest AI video tool for speeding up your workflow with AI features Veed is probably the best AI video maker for generating a complete video with AI, including voiceovers, music, and the footage itself. It even boasts an AI avatar video generator. The AI features slot into the workflow so seamlessly, too. Veed walks you through the process step-by-step rather than relying on you to add every possible detail to the prompt. This is a really nice touch, particularly for folks who don't use AI often. For example, when I fed Veed my "woman in office prompt," it followed up by asking what style I'd like for my video ("old film," "realistic," "hand-drawn," and "Lego" were some of the options), with some helpful examples. Beyond the text-to-image AI video generator, Veed really shines in helping you create entire videos from scratch. For example, I fed it a video script I had for a planned clip about the best time to post on TikTok. From there, I asked it to create a video with a voiceover that featured video clips of people using their phones. The result was a really great foundation for editing. I could choose my own AI voice and easily swap out some of the stock footage and background music the AI had chosen for me. Veed pricing: Free with limited features (videos will have a watermark, too); Pro plans start at $12.99/month. 3. SoraBest AI video generator for creating more complex scenes OpenAI's latest creation is taking the internet by storm, and for good reason. Forget brief clips — its AI video generator, Sora, can generate entire scenes from simple text prompts. This is thanks to its clever ‘storyboard’ feature, where you’ll create a prompt for each frame, and Sora will keep the scene consistent and coherent (unless you ask it to shift gears.) I used it to generate multi-part AI videos that were uncannily realistic — if you can forgive a wonky finger or two. Sora struggles with a few things, such as the aforementioned fingers. While the AI video generator's landscapes and abstract scenes look breathtaking, human and animal movements can still look a bit weird. The women in the above videos, for example, pulled their coffee cups right out of their laptops. But as an AI video generator for creating dreamy, atmospheric content? Sora is phenomenal. Sora pricing: Sora is available as part of ChatGPT Plus subscription at $20/month. 4. Hailuo AIBest AI video generator for experimenting with emerging AI video tech While not quite at the level of Sora or Runway (below), Hailuo is a fun way to take a no-strings-attached foray into AI video creation. The AI video generator offers decent-quality output and some unique features, like subject reference (using the same character across different videos) and advanced camera movement control. The barrier to getting up and running with Hailuo AI is really low, and you get new generation credits for free, every single day, on their free plan. I'd argue it's the best free AI video generator out right now. If you're keen to play around here, a pro tip: explore Hailuo's mindblowing user gallery of AI-generated videos to see how others have prompted the tool for the best results. Hailuo pricing: Generous free plan, with paid options starting at $14.99 per month 5. DescriptBest AI video tool for transcript-based editing Descript doesn't have AI video creation features like most of the other options on this list. It’s really just a video editor — but it does that exceptionally well. Descript is the answer to the question: "What if we could edit video like we edit text?" Instead of dragging clips around on a timeline, you edit the transcript. Cut a sentence from the text, and the corresponding video disappears. Once you get the hang of the video editor — because it definitely comes with a learning curve — it's surprisingly intuitive and incredibly powerful. On top of that come the nifty AI features. There’s a green screen editor, a surprisingly smooth eye contact corrector (you read that script, my friend!) and even a studio sound feature that uses “regenerative AI” to remove noises and enhance voices. That said, the real magic happens with Descript's filler word removal. Those pesky "ums," "likes," and awkward pauses? Gone with a single click. While other tools offer similar features, Descript does it best. One caveat: if your videos don't involve much talking, you won't get the full benefit of the tool. But for podcasters, interviewers, or anyone working with dialogue-heavy content, it's a game-changer. Descript pricing: A free starter plan is available, with paid plans beginning at $12/month. 6. SynthesiaBest AI video generator for creating your own AI avatar Need a talking head but don't want to be on camera? Synthesia offers over 70 AI avatars and 120 voices in its starter plan (with more than 140 avatars in higher tiers). While the avatars aren't quite ready to replace real humans in close-up shots, they're pretty effective for training videos or product tutorials. You can even create an avatar of yourself, though it's a bit of a process — you'll need to film specific video clips and wait up to 10 days for the AI magic to happen. The voice dubbing can be hit or miss, so it's worth experimenting with different AI avatar and voice combinations to find a good match. Synthesia pricing: Plans start at $22 per month billed annually. 7. RunwayBest AI video generator for advanced generative AI Can you imagine it — and come up with a really thorough, detailed prompt for it? Then Runway can create it. While Runway requires a bit more technical know-how than Sora, this AI video generator packs some seriously powerful features that can turn your wildest imaginings into reality. The platform's Gen-3 Alpha model can generate videos from text prompts, bring still images to life, and even create lip-syncing avatars from voice recordings. There are practical features baked into this AI video creator, too: You can remove backgrounds, create super-slow motion footage, and generate subtitles with just a few clicks. A bit of a drawback for casual users is that Runway's Gen-2 model isn't as great at creating humans (my prompt yielded some pretty creepy Tim Burton-esque figures). The Gen-2 model is the only one you'll have access to on the free plan, but you can still use the still-image-to-video feature for free (which is exceptional). Fair warning: there's definitely a learning curve with this video generator. I spent hours exploring the web version to create videos and barely scratched the surface of what it can do. But, if you're willing to put in the time and pay for a premium plan, Runway could become your entire AI video production studio. Runway pricing: Free plan available with 125 one-time credits. Standard plan starts at $15/month, unlocking Gen-3 Alpha, 625 monthly credits, no watermark, and higher export quality. 🤖Looking for more AI tools to help lighten the load? Here are 7 of the Best AI Image Generators, 28 AI Marketing Tools, and 9 of the Best AI Writing Tools.AI video generators won’t do all the work for you — yetMany of these AI video generators have simplified parts of my video editing workflow (and they’re incredibly fun to play around with). But, as powerful as the latest and greatest tools are, none of the options out there are going to eliminate the need for human creativity (and tenacity?) required for brainstorming, filming, and editing engaging video content. Which, if you think about it, is pretty great. There’s really no replacement for you. Still, they can certainly help lighten the load by simplifying some of the frustrating work that comes with video creation, freeing you up to focus on the creative process. More AI video tools to try?As is the case with all other AI tool niches, it feels as though there is a new AI video generator dropping every day — so if I haven’t featured your tool of choice here, do let me know! Please comment below or tag @buffer or @bufferapp on all major social channels, and I’ll put your favorite tool to the test. View the full article
-
Is LinkedIn the new TikTok? Short-form video is now the fastest-growing category on LinkedIn, growing at twice the rate of other post formats on the platform. According to LinkedIn, total video viewership surged 36% in the first quarter of 2025. Now, LinkedIn is doubling down on video with new features to boost discovery and engagement. The full-screen vertical video experience, first launched on mobile, is now coming to desktop. Users can tap a video, swipe through more, and explore a new video tab for TikTok-like scrolling. Videos are also getting front-and-center placement on the platform. Now, when you search a topic, relevant videos will appear in a swipeable carousel. A bigger follow button in the full-screen player makes it easier to keep up with creators, and viewers can check out a quick profile snapshot and other videos without leaving the player. For users looking to capitalise on the video push, LinkedIn has also launched nano-learning courses on topics including video hooks, editing, repurposing content, and LinkedIn Live. “Across LinkedIn, we’re seeing our members have widespread success when it comes to posting short-form video,” Laura Laurenzetti, executive editor of LinkedIn News tells Fast Company. “From small business owners to CEOs to Gen Z creators and more, video on LinkedIn is the new frontier for professional success—which is why we’re excited to be rolling out a suite of new tools that make the video creation and viewing experiences on LinkedIn even stronger.” While LinkedIn might not be the first place people go to doomscroll, it’s quickly becoming a powerful tool for creators, entrepreneurs, and businesses. Since March 2024, LinkedIn has been pushing hard to attract video creators, launching a TikTok-style vertical feed filled with career advice, industry news, and other content. The move seems to be paying off with video uploads jumping 34% year-over-year in Q4 2024, according to LinkedIn. LinkedIn creators are also seeing the results. Top executives are jumping in, with CEO video posts rising 23% in the past year. Deeptech VC Alex Leigh recently reported two million impressions a week after just three months posting consistently three times a day on LinkedIn. Last month, content creator Piper Phillips saw 13.8 million views on a video made on her phone in 10 minutes. “I missed the opportunity to be an early adopter of TikTok and Reels,” she wrote in a post. “I do ~not~ intend on making the same mistake for LinkedIn video.” View the full article
-
This post was written by Alison Green and published on Ask a Manager. It’s five answers to five questions. Here we go… 1. Should we give everyone the day after the Super Bowl off? I live in Chiefs territory and run a small business. My colleagues have requested that I close the office the day after the Super Bowl. I’m not inclined to grant this request, as our leave policies are very generous. I think everyone has plenty of time to take off if they choose. How common are Super Bowl office closures? Not very common. It’s certainly a nice thing if you want to do it, but it’s perfectly reasonable to expect people to use PTO if they want the day off. Related: is my employee lying about using sick time for the Super Bowl? 2. I was asked out on LinkedIn I had a perfectly pleasant conversation with someone at a cafe I frequent near my workplace. We traded names and a few quips, and then my food was ready and I popped out after saying I’d see him around. I thought I heard him ask the cashier if I was single as I trotted out the door but shrugged it off, thinking it was for the best to not be too vain and I could have misheard (and I’ve never seen him before, despite the two of us apparently both being regulars). I’ve got a good rapport with the staff and figured there was no way I hadn’t mentioned my long-term partner at some point over the last two years I’ve worked in the neighborhood. Someone would tell him, right? I proceeded to not think about it for the rest of the weekend, checked my email bright and early Monday morning, and found a very flirtatious message attached to a LinkedIn invite. That’s when I remembered I was wearing my branded work jacket that day. Heck. Do I ignore it? Delete it? Take a hiatus from my favorite cafe and hope I don’t see him around the neighborhood? I can do all these things, I’ll just be depressed to take a hiatus from the best cappuccino in the neighborhood. I know it’s not a crime for someone to shoot their shot, but … agh! That’s my professional LinkedIn! Yeah, it’s not great for someone to use a business networking site that way — especially if he did hunt you down via your branded work jacket. But it happens, and the social/work line on LinkedIn has been getting awfully blurry for a while. There’s no reason you need to stop going to your favorite cafe. He took a shot, he missed, and one hopes he can handle that with a reasonable amount of maturity. If he’s in any way creepy or harassing to you, you should feel free to inform the cafe where you’re both regulars, but you’ve got decent odds that won’t happen and you don’t need to plan on avoiding him just in case it does; cross that bridge if and when you have to. As for the message itself: if you prefer to ignore it, you can. Plenty of people don’t check their LinkedIn often or ever. That said, unless he’s given you a reason to think you would be better off not engaging at all (which doesn’t sound like the case), I’d figure it’s worth investing in a quick “no thanks,” so that if you do run into him again that will already be out of the way. 3. Company is trying to make low-performing coworkers job harder so they’ll quit I was recently in a meeting with a senior manager. Although I’m not in management, the work I do requires working with them regularly and requires a certain level of confidentiality. Something that was mentioned outside of our work scope really bothered me: I had mentioned that I’d heard an employee a few levels below them was struggling. They told me that yes, that person’s manager was told to make their job difficult so they would quit. Hence why they were struggling. This really bothered me from an ethical standpoint. And it’s actually the second time I’ve heard it, although there were some extenuating circumstances with the first person. Is this a normal thing to do? Is this just bad management practice? I’ve managed people in the past and would not feel comfortable with this. To date this company has been great, but they do have a track record of not firing people despite years of repeated poor performance. You have to almost break the law for then to consider firing you. But this? It just feels wrong on so many levels. Yes, it’s wrong, and it’s terrible practice. It’s terrible practice because it’s unethical and inhumane, and because it’s a fundamental dereliction of duty; managers are responsible for giving clear and actionable feedback, letting people know when they’re falling short, working to help them improve, and then letting them go if after that they’re not performing at the level needed. It’s not at all surprising that an organization that won’t fire people would resort to this; both of those things (never firing, no matter how warranted, and mistreating someone until they leave on their own) are symptoms of management that’s incompetent and unable to appropriately exercise authority. (Also, what if the employee digs in and never leaves? Their manager will just accept bad performance forever, no matter how severe?) You should be very, very wary of a company that operates like this. 4. Coworker is opening mail and packages addressed to me Is it okay for a coworker to open work-related mail and packages that I have ordered and have my name on them? If it were me, I would just put the unopened package on the coworker’s desk but maybe I’m overreacting. It depends on your company’s practices. From a legal standpoint, it’s fine; postal regulations say that mail delivered to an organization, even if addressed to a specific person, is delivered to the organization itself, and the organization can decide how to distribute it from there. But is this person charged with opening and distributing mail for your company or are they just being nosy? If they are charged with it, you can try asking them to simply deliver your mail unopened, although it’s possible they’ve been specifically told they need to open things. On the other hand, if they’re just being nosy, you can ask them to stop. 5. The sleep shifts I depend on for income have been taken away I have recently been covering in a different location due to the area needing a team leader. I work in care and often need to do sleep shifts (shifts where you sleep on-site so you are available in case of emergency). These sleep shifts have been a regular source of income for the past five years, and I depend on them to get by. When my boss first approached me about covering in the new area, they made a verbal promise that I would still get my sleep shifts. But now, three months later, my sleep shifts are non-existent and I am losing wages that I desperately need. My sleeps cover my car expenses and, as I am covering in a different area that requires me to drive there to work, I am afraid that when I get paid next I will be unable to get anywhere due to not being paid my promised sleeps. This would mean resigning, as I would not be able to travel to the area I am covering. The area I am covering in is 100 miles away from my normal place of work. Because this is no fault of my own, would I be able to take my boss to court for lost earnings and essentially being forced out of a job due to my boss going back on their promise and making me quit due to my wages being severely cut through no fault of my own? I have a young family and this unexpected wage cut is going to severely affect me and my children. There is another team leader who is also covering in the same area as me and is still getting there sleep shifts, so why have my sleep shifts been taken away and theirs haven’t? It feels like a personal attack, favoritism, and I am being set up to fail. I have approached my boss several times over this issue and I just get fobbed off each time. There’s no legal cause of action unless (1) your sleep shifts were taken away for a discriminatory reason (like because of your race, gender, disability, or other protected characteristic) or as retaliation for exercising a legally protected right (like reporting harassment), or (2) you have a written employment contract promising those shifts for a specific period of time (although most U.S. workers don’t have contracts and I’m guessing you would have mentioned it if you did). I know you said you’ve approached your boss about the issue, but have you spelled out explicitly that you literally can’t stay in the job without the sleep shifts? If not, it’s worth making that clearer (as long as it’s really true — you don’t want to say that if in reality you’d stay until you find something else). View the full article
-
Meta has introduced an expanded labeling system for advertisements created or significantly edited using its in-house generative AI tools. The company says this initiative is part of its ongoing effort to increase transparency and accountability in digital advertising. The labeling system applies to ads featuring images or videos that have been significantly modified by Meta’s AI-powered marketing tools. Depending on the level of AI involvement, labels will either appear in the three-dot menu of an ad or directly next to the “Sponsored” label. Meta outlined a multi-pronged approach to determining when to apply these AI labels: If an advertiser uses Meta’s generative AI tools but makes only minor modifications to an image or video, no label will be applied. If significant edits are made, a label will be placed in the three-dot menu or next to the “Sponsored” label. If the AI tools generate a photorealistic human, the AI label will always appear next to the “Sponsored” label. This labeling system was gradually introduced last year and will continue rolling out throughout 2025. Meta also plans to expand its transparency efforts by addressing ad images made or modified using non-Meta generative AI tools. The company says it will refine its approach in collaboration with experts and stakeholders as expectations and AI technologies evolve. Meta emphasized that this labeling initiative is only the beginning of its broader AI transparency strategy. Users will continue to have access to tools such as the “Why am I seeing this ad?” feature, which provides insights into ad targeting methods and allows users to adjust their ad preferences. As generative AI technology advances, Meta says it remains focused on ensuring responsible AI use while giving users greater visibility into how AI-generated content appears in their advertising experience. Image: Meta This article, "Meta Expands AI Transparency in Advertising with New Labeling System" was first published on Small Business Trends View the full article
-
Meta has introduced an expanded labeling system for advertisements created or significantly edited using its in-house generative AI tools. The company says this initiative is part of its ongoing effort to increase transparency and accountability in digital advertising. The labeling system applies to ads featuring images or videos that have been significantly modified by Meta’s AI-powered marketing tools. Depending on the level of AI involvement, labels will either appear in the three-dot menu of an ad or directly next to the “Sponsored” label. Meta outlined a multi-pronged approach to determining when to apply these AI labels: If an advertiser uses Meta’s generative AI tools but makes only minor modifications to an image or video, no label will be applied. If significant edits are made, a label will be placed in the three-dot menu or next to the “Sponsored” label. If the AI tools generate a photorealistic human, the AI label will always appear next to the “Sponsored” label. This labeling system was gradually introduced last year and will continue rolling out throughout 2025. Meta also plans to expand its transparency efforts by addressing ad images made or modified using non-Meta generative AI tools. The company says it will refine its approach in collaboration with experts and stakeholders as expectations and AI technologies evolve. Meta emphasized that this labeling initiative is only the beginning of its broader AI transparency strategy. Users will continue to have access to tools such as the “Why am I seeing this ad?” feature, which provides insights into ad targeting methods and allows users to adjust their ad preferences. As generative AI technology advances, Meta says it remains focused on ensuring responsible AI use while giving users greater visibility into how AI-generated content appears in their advertising experience. Image: Meta This article, "Meta Expands AI Transparency in Advertising with New Labeling System" was first published on Small Business Trends View the full article
-
Adobe has introduced new generative AI capabilities in Acrobat AI Assistant aimed at simplifying contract analysis for businesses and consumers. The enhancements allow users to quickly understand complex terms, compare multiple agreements, and verify contract details with greater efficiency. AI-Powered Contract Intelligence Contracts play a crucial role in daily business operations and consumer transactions, yet they often contain dense language that can be difficult to interpret. A survey conducted by Adobe Acrobat found that nearly 70% of consumers have signed contracts without fully understanding the terms, while 64% of small business owners have avoided signing agreements due to a lack of confidence in their comprehension. “Customers open billions of contracts in Adobe Acrobat each month and AI can be a game changer in helping simplify their experience,” said Abhigyan Modi, senior vice president of Adobe Document Cloud. “We are introducing new capabilities to deliver contract intelligence in Adobe AI Assistant, making it easier for customers to understand and compare these complex documents and providing citations to help them verify responses, all while keeping their data safe.” Key Features of Acrobat AI Assistant The new AI-driven contract intelligence features in Adobe Acrobat include: Automated contract recognition: The AI Assistant identifies contracts, including scanned documents, and generates summaries and highlights of key terms. Straightforward explanations with citations: AI-generated summaries include clickable citations for users to verify contract terms directly within their documents. Version comparisons: Users can analyze up to 10 different contracts simultaneously to detect discrepancies, inconsistencies, and critical changes. Secure sharing and e-signatures: Contracts can be reviewed and signed within the same platform, streamlining collaboration and approval workflows. Adobe emphasized that Acrobat AI Assistant adheres to strict data security protocols. The company does not train its AI models on customer data and prohibits third-party language models from using Adobe customer data for training purposes. The AI Assistant supplements large language models (LLMs) with proprietary AI and machine learning technologies, enhancing its ability to accurately interpret document structures and content. Acrobat AI Assistant, which launched in February 2024, has gained rapid adoption, with customer interactions in the app doubling quarter over quarter by the end of 2024. The contract intelligence capabilities are available across desktop, web, and mobile platforms in English, with support for additional languages forthcoming. The AI Assistant is available as an add-on for both free Adobe Reader and paid Acrobat users at a subscription price of $4.99 per month. Image: Adobe> This article, "Adobe Expands Acrobat AI Assistant with Contract Intelligence Features" was first published on Small Business Trends View the full article
-
Adobe has introduced new generative AI capabilities in Acrobat AI Assistant aimed at simplifying contract analysis for businesses and consumers. The enhancements allow users to quickly understand complex terms, compare multiple agreements, and verify contract details with greater efficiency. AI-Powered Contract Intelligence Contracts play a crucial role in daily business operations and consumer transactions, yet they often contain dense language that can be difficult to interpret. A survey conducted by Adobe Acrobat found that nearly 70% of consumers have signed contracts without fully understanding the terms, while 64% of small business owners have avoided signing agreements due to a lack of confidence in their comprehension. “Customers open billions of contracts in Adobe Acrobat each month and AI can be a game changer in helping simplify their experience,” said Abhigyan Modi, senior vice president of Adobe Document Cloud. “We are introducing new capabilities to deliver contract intelligence in Adobe AI Assistant, making it easier for customers to understand and compare these complex documents and providing citations to help them verify responses, all while keeping their data safe.” Key Features of Acrobat AI Assistant The new AI-driven contract intelligence features in Adobe Acrobat include: Automated contract recognition: The AI Assistant identifies contracts, including scanned documents, and generates summaries and highlights of key terms. Straightforward explanations with citations: AI-generated summaries include clickable citations for users to verify contract terms directly within their documents. Version comparisons: Users can analyze up to 10 different contracts simultaneously to detect discrepancies, inconsistencies, and critical changes. Secure sharing and e-signatures: Contracts can be reviewed and signed within the same platform, streamlining collaboration and approval workflows. Adobe emphasized that Acrobat AI Assistant adheres to strict data security protocols. The company does not train its AI models on customer data and prohibits third-party language models from using Adobe customer data for training purposes. The AI Assistant supplements large language models (LLMs) with proprietary AI and machine learning technologies, enhancing its ability to accurately interpret document structures and content. Acrobat AI Assistant, which launched in February 2024, has gained rapid adoption, with customer interactions in the app doubling quarter over quarter by the end of 2024. The contract intelligence capabilities are available across desktop, web, and mobile platforms in English, with support for additional languages forthcoming. The AI Assistant is available as an add-on for both free Adobe Reader and paid Acrobat users at a subscription price of $4.99 per month. Image: Adobe> This article, "Adobe Expands Acrobat AI Assistant with Contract Intelligence Features" was first published on Small Business Trends View the full article
-
Global leaders recently gathered at the World Economic Forum (WEF) in Davos, under the theme of “Collaboration for the Intelligent Age.” What exactly is the “Intelligent Age” and, more importantly, how can we ensure that everyone can participate in this new age? WEF defines the Intelligent Age as a transition away from the Industrial Age to a new phase of human civilization. It’s a clear and compelling definition. But what is much less clear is the conversation about the importance of equity and how to approach it. There are many ways leaders can consider equity as they build and adopt AI and other frontier technologies: clear global policies, reaching new markets, financial incentives and disincentives, and the moral imperative. At UNICEF USA, we believe that the relatively simple ingredients of collaboration and information can drive better solutions for everyone in Intelligent Age. Deepening collaboration across business, government, and civil society can usher in more equitable approaches. The benefits of this type of collaboration will reach a wider range of people and create a more powerful and sustainable Fourth Industrial Revolution. Here are several ways that UNICEF is approaching these collaborations. Responsible tech development Companies play an essential role in responsible innovation. And many are already successfully embracing that role. For example, UNICEF cofounded the Responsible Innovation in Technology for Children (RITEC) project with the LEGO Group, supported by the LEGO Foundation. RITEC aims to make child rights and well-being a primary consideration in the design and development of digital technology. The project is delivered in partnership with university and child-focused organizations such as the Joan Ganz Cooney Center, the University of Sheffield, and the Australian Research Council Centre of Excellence for the Digital Child. We need to include children’s views on decisions that directly affect them; children disproportionately face opportunities and risks from emerging technologies. Think about it: Companies that cater to children and families need to consider their users. We know that consumers are paying attention as safety and inclusivity matter to them: 78% of consumers and 86% of teens believe digital experiences have a positive impact on their lives, but 64% said they would consider switching technology providers if an incident breached their trust. As part of the RITEC project, there is a free toolbox for the gaming industry to advise them on how to design digital play experiences with children’s well-being in mind. The toolbox builds on research with children in 18 countries and collaboration with designers from 35 online gaming companies of different sizes, and from 15 countries. Job-relevant skills Many of today’s youth are not able to keep up with skills, hindering social and economic progress. Passport to Earning, a global program developed by UNICEF’s Generation Unlimited, includes support from cross-sector partners and founding members including consulting companies like Accenture and PwC, but also government and philanthropic organizations including the Ministry of Foreign Affairs of the Netherlands and Al Ghurair Foundation (supporting Arab and Emirati youth. The program runs on Microsoft’s Community Training, a cloud-based learning platform, so young people aged 15-24 can access content local to their communities, even in low-bandwidth areas. The next phase will partially focus on integrating an AI-skills curriculum onto the program’s offerings, to help ensure young people have the right skills to thrive in an AI-powered economy. It sounds simple but this is revolutionary because it means that young people—even those who are not in school, in any type of skills training programs, or can’t always access the internet—can still gain free and relevant skills that will position them for quality jobs. By 2027, Passport to Earning aims to train and certify 8 million youth in AI and digital skilling. AI has the potential to contribute $15.7 trillion to the global economy by 2030 and be a driver in finding new and innovative solutions to issues that have long prevented children from equitable access to resources. Other initiatives In education, we are working with philanthropic and finance partners to convene disability and AI experts to fast-track accessible digital textbooks development, bridging barriers to learning by including sign language, narration, interactivity, and translation for people with disabilities. We and our partners also work hard to make sure that technology’s benefits of don’t come at the expense of human rights, like privacy and equality. Sharing best practices on how to empower and protect children is critical to preventing harm today that would have life-long negative impacts. There is not only a responsibility for companies to ensure their policies and products respect children’s rights, but there also is an opportunity for more innovative collaboration between the private and public sectors. As the world navigates quickly evolving technologies, I encourage companies to collaborate with the public sector and civil society to ensure equity. At the same time, open the door to opportunities that foster innovation and collaboration, enhancing a competitive edge through global workforce development, and improving children’s lives and their futures. Michele Walsh is executive vice president and chief philanthropy officer of UNICEF USA. View the full article
-
There are times when fear is good. It must keep its watchful place at the heart’s controls. —Aeschylus MANY people view fear as a negative, crippling emotion. However, it can act as a potent stimulus that enhances performance if we take the time to understand – and modulate – its power. The Sweet Spot of Fear Table tennis Olympian Amy Wang has had plenty of practice performing in the face of fear. She’s won the US National Table Tennis Championships in age categories of nine, ten, eleven, and thirteen before winning multiple open women’s national titles. Wang does, indeed, get scared when playing before a large crowd or on a big international stage. “But I need some kind of fear to boost my adrenaline to help me get ready,” she explains. In fact, Wang has a preferred level of “nervousness” while playing a match. On a one-to-ten scale, “Five to seven is the best for me,” she says. “If I’m not feeling any nerves before the match, it means I don’t care. I relax and don’t focus properly.” Wang’s coaches can easily tell when she’s overly nervous during a match. Usually, it’s enough to remind her to loosen up and take one point at a time to bring her back down to her preferred range. And when she’s not nervous enough? A sort of self-correcting mechanism kicks in. “If I’m too chill during a match, my opponent will start catching up, which will eventually increase my nervousness level,” she says. “But it’s better to start off at the right place.” It’s Only Human Fear is a natural human emotion, and it exists for a reason. It causes adrenaline to surge through our bodies, increasing heart rate and flow to the brain and muscles to help us escape predators or defend ourselves against rivals. It’s in our DNA. Luckily, we don’t need to run from saber-toothed tigers in the twenty-first century. Nonetheless, we still encounter stressful situations, mental or physical. And yet, our hormonal stress response – pumping out adrenaline and cortisol – has not evolved. In fact, the human biological alert system can’t tell the difference between a saber-tooth tiger encounter, a critical table tennis match at the US Open, or a high-stakes sales presentation. So, denying fear or trying to block it out is futile. And unnecessary. Once we learn to harness the energy of fear and minimize its dark side, we can enhance our performance in the direst of times. Five Methods to Optimize Your Performance in the Face of Fear Throughout decades of intense competition and various business challenges, I’ve researched, collected, and experienced many ways of channeling fear. Here are some practical tips to not only perform, but excel, in fearsome situations. • De-fang fear. Preemptively tell it, Come in, fear. The door is open. I’ve been expecting you. This simple, welcoming stance can lessen fear’s sharp bite from the beginning. It sounds deceptively simple, but I’ve benefited from doing this for many years now. Without the heavy dread, fear loses its discomforting emotional grip, but still transfers its biochemical power to fuel clarity of thinking and quickness of movement. Throughout decades of intense competition and various business challenges, I’ve researched, collected, and experienced many ways of channeling fear. Here are some practical tips to not only perform, but excel, in fearsome situations. • Switch modes. When needed, remove yourself from primal fight-or-flight mode – where your sympathetic nervous system causes shallow chest breathing and elevates your heart rate and blood pressure. Calm your primal brain by literally looking to your right, and your left, and confirming that there is no threat from a predator. You are not being chased by a lion or getting threatened by a cave dweller with a club. Then take several deep belly breaths – imagine pulling a string tied to your belly button, straight out in front of you. This activates your parasympathetic nervous system, engaging a calming, “rest and digest” mode. As you exhale, tell yourself: I am safe, I am warm, I am relaxed… (repeat this until it sinks in). The reverse works, too: Pump up your excitement levels by puffing up your chest to breathe deeply and rapidly. Throughout decades of intense competition and various business challenges, I’ve researched, collected, and experienced many ways of channeling fear. Here are some practical tips to not only perform, but excel, in fearsome situations. • Create your own “reset” switch. Our brain can “change itself constantly by creating new neural pathways,” wrote neuroscientist Dr. Tara Swart in Forbes. Rewiring the brain simply requires “practice of a new behavior which will sufficiently challenge the brain to think in a new way.” Focusing on a favorite word or mantra (e.g., “I’m just grateful to be here” or “I was born for this moment”) can instantly connect you with a certain empowering memory or confident mindset. Repeat this as needed before, during, and after stress-inducing situations. Throughout decades of intense competition and various business challenges, I’ve researched, collected, and experienced many ways of channeling fear. Here are some practical tips to not only perform, but excel, in fearsome situations. • Give yourself a “freak-out” period. A law school professor of mine once talked to us about the stress of final exams. Yes, there can be a lot riding on them. If you’re the type of test-taker who starts to sweat and freeze up from fear when the blank test lands on your desk, do the counter-intuitive: go ahead and (quietly) panic. Allow yourself one minute to imagine the worst, failing out of law school, fainting during the exam, whatever. Let the fear rush through your head and body for the full minute. Then let it wash away as you breathe deeply three times and relax. You’ve used up your immediate anxiety quotient, and can still tap into a deeper well of adrenaline to boost your mental activity. Now it’s time to simply start, calmly, on the first question of the test. And then the second, and third. Throughout decades of intense competition and various business challenges, I’ve researched, collected, and experienced many ways of channeling fear. Here are some practical tips to not only perform, but excel, in fearsome situations. • Finally, don’t worry about your zit – everyone else is worried about their own zit. That’s Gary Vaynerchuk’s advice, which I love. We all have an inner voice adept at pointing out our insecurities. Our blemish. Our accent. An unusual presentation style or unconventional backhand stroke. And when we’re consumed by self-consciousness, we operate at a fraction of our potential. But here’s the liberating truth: everyone else is too busy wrestling with their own demons to fixate on yours. Instead, shift from self-scrutiny to valuable service. Focus 100% on listening, contributing, and participating with others in the moment. The fear will start to fade, replaced by genuine confidence born of purpose. When you learn to accept fear as part of the success equation, you’ll stop spending energy trying to fight it. Then, you can leverage the super-power of focus and energy it brings. This leads you and others on the path to bravery and accomplishment. Justin Bookey is an award-winning marketing strategist, former lawyer, and competitive table tennis player who has won medals at the US Open and the US national championships. He has collaborated with leaders at prominent companies like Disney, Sony, Honda, Qualcomm, and XPRIZE. His accomplishments include Emmy-nominated feature documentaries and Telly, Viddy, and ADDY award-winning digital marketing campaigns. He also founded PongFit, a nonprofit promoting fitness and community through ping pong. His new book is Ping Pong Leadership: 18 Principles to Succeed at Any Table in Business, Sports, and Life (Amplify Publishing, 2024). Learn more at Ping Pong Leadership. * * * Follow us on Instagram and X for additional leadership and personal development ideas. * * * View the full article
-
This week, President Trump adviser Elon Musk’s newly formed Department of Government Efficiency (DOGE) seems to have gained full access to the Department of Treasury’s payments system responsible for processing trillions of dollars of spending, and containing sensitive personal data about hundreds of millions of Americans including bank accounts, tax data, Social Security numbers, tax refunds, Medicare benefits, and home address. If this concerns you, you’re not alone. Judging from social media, many Americans are overwhelmed with the sheer volume of changes coming from the Trump administration, and are worried about what is happening with our federal government. In short, “people are creeped out,” according to Senator Ron Wyden, the ranking Democrat on the Senate Finance Committee, who along with Senator Elizabeth Warren called on the Government Accountability Office (GAO) to investigate Secretary of the Treasury Scott Bessent’s decision to grant Musk and DOGE access to sensitive government payment systems. “It is difficult to know all the things that Elon Musk is doing inside the Treasury Department because of a lack of transparency,” Barbara McQuade, who served as U.S. attorney for the Eastern District of Michigan under President Barack Obama, told Fast Company. Now, DOGE, whose staff has largely operated in secret, communicating through encrypted messages on Signal, according to the Wall Street Journal, is starting to rack up legal challenges. On Monday, a coalition of labor unions and the Alliance for Retired Americans filed a lawsuit suing the Treasury Department, Treasury Secretary Scott Bessent, and the Bureau of the Fiscal Service to halt the “unlawful ongoing, systematic, and continuous disclosure of personal and financial information” to Elon Musk and other members of DOGE, or to any other person. The lawsuit alleges all three defendants illegally allowed the coalition’s members’ records to be shared with Musk’s DOGE. The Alliance for Retired Americans and the labor unions, which include the American Federation of Government Employees and the Service Employees International Union, are represented by lawyers from Public Citizen Litigation Group and State Democracy Defenders Fund. What is DOGE and what kind of authority does it have? Trump created DOGE through an executive order on his first day in office, creating a temporary government organization with a mandate to “moderniz[e] Federal technology and software to maximize governmental efficiency and productivity.” But there are many questions about who actually works for DOGE, if the agency is hiring existing government employees or employees from Musk’s various companies, and if DOGE staff are overstepping their legal authority. (Wired recently reported a 25-year-old engineer at DOGE now has administrative privileges over the code that controls Social Security payments, tax returns, and more.) DOGE was originally a joint project that Musk would run with Vivek Ramaswamy (who ran against Trump in the Republican presidential primary before endorsing him), along with Bill McGinley, who was named DOGE’s legal counsel. Both Ramaswamy and McGinley have since left, which some have suggested could signal infighting and perhaps a disagreement over how DOGE would function among the group. Musk, meanwhile, was recently classified as a “special government employee,” which basically allows him to work at the White House for some 130 days before he’s required to file the necessary financial disclosure forms required of White House employees. This is concerning for a number of reasons, as he hasn’t been properly vetted yet, and because as CEO of Tesla and SpaceX, which both rely on government contracts, Musk potentially has a number of conflicts of interest. View the full article