Jump to content


ResidentialBusiness

Administrators
  • Posts

    7,111
  • Joined

  • Last visited

Everything posted by ResidentialBusiness

  1. The devastating California wildfires have led to a number of benefit events, from concerts to comedy shows, with the intention to fundraise for wildfire recovery efforts. The team at Critical Role, meanwhile, is going to do what they do best: play Dungeons & Dragons. Critical Role announced a special live one-shot D&D adventure titled “Freaky Thursday,” featuring Bells Hells, the characters from its third D&D campaign. The charity event stars Ashley Johnson, Marisha Ray, Taliesin Jaffe, Travis Willingham, Sam Riegel, Laura Bailey, and Liam O’Brien, with game master Matthew Mercer. “Let’s do some chaotic good,” wrote O’Brien on X, sharing the announcement. The Freaky Thursday adventure will be livestreamed on Critical Role’s membership service Beacon, as well as its Twitch and YouTube channels, on Thursday, January 30, at 7 p.m. PT. Fans, affectionately known as “Critters,” will be able to make donations or purchase rewards to shape the story through Tiltify. The group has set an ambitious goal of raising $180,000 with the livestream. Each milestone will unlock in-game surprises like “new allies, unexpected adversaries or even character sheet swaps, ensuring an unpredictable and exciting adventure shaped entirely by the community’s contributions,” Critical Role said. Story elements with the most donations will take center stage in the game. Where the money will go Donations will be split between the California Community Foundation Wildfire Recovery Fund, the Latino Community Foundation, and the Los Angeles Fire Department Foundation. The company added that 10% of each donation will be “stashed into our overall emergency fund, which allows [our foundation] to send help quickly in the event of a future unforeseen natural emergency.” Through its Critical Role Foundation (CRF) nonprofit arm, the company has already contributed $30,000 from its emergency fund to the California Community Foundation’s Wildfire Recovery Fund. Even before the launch of the CRF in September 2020, Critical Role and its network of Critters have been active in raising money for a range of causes, including 826LA and First Nations Development Institute. Critical Role Foundation is just one of the many ways that Critical Role has expanded into new areas in recent years. Aside from its core show, one-offs, and spinoff web series, the group has also branched into comics and books, an animated series, and their own subscription-based streaming platform, Beacon. It’s impressive work from what began as a show that highlighted the joy of playing Dungeons & Dragons with friends. You can donate and learn more here. View the full article
  2. I’m at the age where I have a pre-written packing list for whenever I travel, and the very last item on the list, though certainly not the least, is entertainment. I almost see it as a reward for myself. When I’ve got all my clothes and medications packed away, I get to sit down with my iPad and download my favorite shows to watch on the plane. The problem is that, after awhile of manually downloading episode by episode, it stops being fun. That’s where Netflix’s newest feature for iPhone and iPad comes into play. Now, after updating your app, the display pages for your favorite shows will show a “Download Season” button next to the share icon. Android users already had this button, but now Apple users can take advantage of it, too. It looks like a downward-pointing arrow with two curved lines underneath it, and tapping it will immediately start downloading an entire season at once, complete with a progress indicator. In addition to saving you from multiple taps, this also lets you get up and go do something else while your show downloads, rather than having to wait for one episode to finish downloading before you start downloading the next. It’s worth pointing out that while you technically already could download multiple episodes at once by simply tapping the download button next to each episode in quick succession, I’ve found that this tends to create errors. Luckily, I got no such errors while downloading season 2 of Squid Game using the new button, and it even seemed to download faster, probably due to the efficiency of sending Netflix’s servers one request as opposed to seven. Netflix didn’t make any mention of what happens if downloading a whole season would put you over your download limit, but after testing, I found that you can still press the “Download Season” button, but it will only download as many episodes as you have remaining while refusing to download the rest. View the full article
  3. “What’s more motivating than a punch card?” That’s the simple idea behind a recent so-called “punch party” that creator @emiliamariehome hosted with friends. On January 24, @emiliamariehome posted a video on TikTok of her group of friends creating punch cards (think: loyalty cards) as a Galentine’s day activity. It quickly went viral, gaining over 1.5 million views. Because whether it’s scoring a free cappuccino at your local coffee shop or a fresh loaf of bread at an independent bakery, the satisfaction from punching that final hole in a punch card is unmatched. Now, social media users are hacking that dopamine hit to achieve their own goals, from dating to reading. In @emiliamariehome’s video, each friend picked a goal and a reward for finishing punching all the holes on their card. One of her friends used their card as motivation to try new flower arrangements. Once they punched all four holes, they would allow themselves to buy one new vase. Another wanted to try 10 new recipes before buying another cookbook. A third promised themselves 10 croissants if they went on 10 dates (“10 croissants are needed after 10 hinge dates,” the creator joked in the comments). In the spirit of January, the celebrated month of goal-setting, the punch cards have quickly taken off. “Love this idea,” one person commented. “Especially as someone that struggles to celebrate her wins.” Another added, “this is ridiculously cute. I am doing it.” The New Year period is traditionally when millions take stock of how they live and set ambitious goals for the year ahead, often in terms of numbers. How many books will you read? How many exercise classes will you take? How many new recipes will you try? A recent YouGov poll found 31% of Americans said they would be making New Year’s resolutions or setting goals for 2025. But skip forward to the end of January, and a good number of those will already have given up on their goals set just a few short weeks ago. However, small lifestyle changes can often be transformative if you keep at them. And while there are a number of habit trackers that attempt to help us do that, from Apple watches and Oura rings to meticulously planned spreadsheets and Notion templates, punch cards may be a gentler way to keep yourself accountable in 2025. View the full article
  4. Legoland Florida plans to lay off 234 workers, primarily performers, in an effort to be more competitive in central Florida’s thriving theme park market, company officials said. The theme park resort in Winter Haven, Florida, said in a notice to the state of Florida last Friday that the permanent layoffs would start at the end of March and last through the beginning of April. Three-quarters of the workers cited for layoffs were performers, and another fifth also was involved in the entertainment side of the theme park, according to the notice. The theme park resort, whose workers are nonunion, has about 1,500 employees. The theme park resort is owned by Merlin Entertainment. Merlin spokeswoman Julia Estrada said in an email Wednesday that the change would allow it to operate more flexibly in a competitive market by using an outside company to provide some of the entertainment while maintaining a core in-house entertainment team. “We will continue to have a core in-house entertainment offering, which we will scale up to meet our brand and guest experiences during the year,” Estrada said. Besides the Lego-themed park, the resort has a Peppa Pig-themed park, a water park and a soon-to-open aquarium. Winter Haven is located between Tampa, home to Bush Gardens Tampa Bay, and Orlando, home to Walt Disney World, Universal Orlando Resort and SeaWorld Orlando. View the full article
  5. Two years ago, Volkswagen debuted a prototype of its ID.7, the sixth model in its lineup of electric vehicles, at the Consumer Electronics Show in Las Vegas. The automaker said it was planning to launch the EV in three primary markets: Europe, China, and North America. But now, after a series of delays, VW has canceled its plans to sell the ID.7 in North America. “Due to the ongoing challenging EV climate, Volkswagen has decided to no longer offer the ID.7 to the North American market,” a Volkswagen spokesperson said. “Despite this, electric vehicles continue to be a core part of Volkswagen’s long-term product strategy, and new electric models will continue to be introduced for this market.” EV sales in the U.S. have been growing. They jumped more than 15% in the last quarter of 2024, compared to the year prior, setting a new quarter sales record. Sales for the entire year reached 1.3 million in the U.S., a more than 7% increase compared to 2023, according to data from Cox Automotive. But the Trump administration has already made the EV climate more “challenging.” Moments after being sworn in this week, Sean Duffy, Donald Trump’s new Transportation Secretary, signed a memorandum to roll back fuel economy standards with the aim of “eliminat[ing] the electric vehicle mandate.” This follows an executive order by Trump promising to do the same, though no such mandate to force Americans to purchase EVs actually exists. What Trump is actually targeting are the EV tax credits of up to $7,500 that are part of the Inflation Reduction Act and Biden’s goal to have EVs make up 50% of new vehicle sales by 2030. [Photo: Volkswagen] Some automakers were already scaling back their EV plans. Ford announced in August 2024 that it was canceling some electric SUVs in favor of hybrid models as a way to improve profits, though said it was still planning to roll out new all-electric vehicles in the future. Volkswagen’s ID.7 was first planned for 2024, but last year the automaker announced an indefinite delay due to changing “market dynamics.” The ID.7 has already launched in both Europe and China. Despite solid sales for 2024, automakers are now on edge as the EV industry in the U.S. faces an uncertain future. Trump’s anti-EV agenda and plans for tariffs pose a threat to EV sales. The legality of Trump’s actions are yet to be seen, however. And even still, analysts do expect EV sales to grow in 2025. Cox Automotive’s 2025 outlook predicted that one out of every four vehicles sold in 2025 will be electrified. “The market is gaining momentum, economic fundamentals are improving, and consumer sentiment is pointing in the right direction,” Cox Automotive Chief Economist Jonathan Smoke said in a statement. “We are ready for what 2025 might bring.” View the full article
  6. Spirit Airlines has rejected a merger offer with Frontier as it prepares to exit bankruptcy. Wednesday, Frontier made its second offer to merge with the bankrupt Spirit Airlines, but Spirit rejected it on the grounds that it was financially insufficient. In 2022, Frontier offered to acquire Spirit for $2.9 billion, but the offer was ultimately rejected when Spirit chose to accept a higher offer from JetBlue (which was later blocked for antitrust concerns). Frontier Airlines put forward its current merger offer in hopes of creating a strong, low-fare airline together. “We have long believed a combination with Spirit would allow us to unlock additional value-creation opportunities,” said Barry Biffle, CEO of Frontier, in a statement. In a joint letter to Spirit’s chair and CEO, Biffle and Frontier’s chair of the board added that they believe the transaction “generates more value for all Spirit stakeholders” than Spirit’s current plan filed to the Bankruptcy Court. But Frontier’s offer was lower than the amount the two parties had discussed in 2022, Raniero D’Aversa, an attorney and market-leading practitioner in bankruptcies, out-of-court restructurings, and creditors’ rights controversies, tells Fast Company. In Frontier’s offer, debt holders would receive $400 million in new debt and 19% of Frontier’s common equity. It would also require stakeholders to invest $350 million in equity, which they were “not willing to do,” according to a regulatory filing. “The offer appears to be too little, too late,” D’Aversa says. In its rejection of the offer, Spirit said that the board believes Frontier’s proposal is “so insufficient as not to merit a counter.” Accepting or considering this offer could also interfere with the airline’s plans to exit bankruptcy, which it had filed for in November. Spirit Airlines is “on a fast track to exit,” D’Aversa says. “Any serious consideration of the Frontier offer would derail the whole bankruptcy process, which is overwhelmingly supported by its constituents.” The airline has a February 13 court date to finalize its exit plan. While a company and its board have a fiduciary obligation to consider any deal for the benefit of its constituents and equity holders—and in the case of bankruptcy, its creditors—they’re under no obligation to actually accept it. Although Spirit has operated normally during its bankruptcy, the airline has cut 200 jobs and sold some Airbus planes in order to raise millions of dollars. D’Aversa compares the situation to the classic “a bird in the hand . . . ” idiom. Spirit is lined up to come out of bankruptcy imminently, and it appears the airline is ready to fight through its final month rather than merge. View the full article
  7. President Donald Trump‘s budget office on Wednesday rescinded a memo freezing spending on federal grants, less than two days after it sparked widespread confusion and legal challenges across the country. The Monday evening memo from the White House Office of Management and Budget sparked uncertainty over a crucial financial lifeline for states, schools and organizations that rely on trillions of dollars from Washington and left the White House scrambling to explain what would and wouldn’t be subject to a pause in funding. The reversal was the latest sign that even with unified control of Washington, Trump’s plans to dramatically and rapidly reshape the government has some limits. The White House confirmed that OMB pulled the memo Wednesday in a two sentence notice sent to agencies and departments, but said that Trump’s underlying executive orders targeting federal spending in areas like diversity, equity and inclusion and climate change, remained in place. Administration officials said the notice to halt loans and grants was necessary to conduct a review to ensure that spending complies with Trump’s recent blitz of executive orders. Agencies had been directed to answer a series of yes or no questions on each federal program by Feb. 7. The questions included “does this program promote gender ideology?” and “does this program promote or support in any way abortion?” Still, the vaguely worded memo, combined with incomplete answers from the White House throughout the day, left lawmakers, public officials and average Americans struggling to figure out what programs would be affected by the pause. Even temporary interruptions in funding could cause layoffs or delays in public services. The freeze was scheduled to go into effect at 5 p.m. Tuesday, but was stayed by a federal judge until at least Monday after an emergency hearing requested by nonprofit groups that receive federal grants. An additional lawsuit by Democratic state attorneys general was also pending. “The Executive Orders issued by the President on funding reviews remain in full force and effect and will be rigorously implemented by all agencies and departments,” White House press secretary Karoline Leavitt said, blaming the confusion on the courts and news outlets, not the administration. “This action should effectively end the court case and allow the government to focus on enforcing the President’s orders on controlling federal spending.” Administration officials insisted that despite the confusion, the order still had its intended effect by underscoring to federal agencies their obligations to abide by Trump’s executive orders. Although Trump had promised to turn Washington upside down if elected to a second term, the effects of his effort to pause funding were being felt far from the nation’s capital. Organizations like Meals on Wheels, which receives federal money to deliver food to the elderly, and Head Start which provides early childcare in lower income communities, were worried about getting cut off. On Tuesday, Trump administration officials said programs that provide direct assistance to Americans, including Medicare, Social Security, student loans and food stamps, would not be affected. But they sometimes struggled to provide a clear picture. Leavitt initially would not say whether Medicaid was exempted from the freeze, but the administration later clarified that it was. Democratic critics of the order moved swiftly to celebrate the action. “This is an important victory for the American people whose voices were heard after massive pressure from every corner of this country—real people made a difference by speaking out,” said Sen. Patty Murray, D-Wash. “Still, the Trump administration—through a combination of sheer incompetence, cruel intentions, and a willful disregard of the law—caused real harm and chaos for millions over the span of the last 48 hours which is still ongoing.” Senate Democratic leader Chuck Schumer of New York said that “Americans fought back and Donald Trump backed off. —Chris Megerian and Zeke Miller, Associated Press View the full article
  8. If your Garmin watch is showing a blue triangle, you’re not alone—Garmin has acknowledged that other users are experiencing this, and has published instructions for fixing it. The issue affects several models of watch, including Fenix, Epix, and Forerunner watches. As of January 29, they say the issue has been resolved (but your watch may still need a hard reset to make use of the fix.) The company initially told me in an email: “Garmin is researching reports of devices displaying a blue triangle when starting a GPS activity. A reset by pressing and holding the power button may restore functionality. We will provide more information on a permanent fix when available.” Garmin has since updated the message on their website to say: "We have resolved the underlying issue causing some devices to be stuck on the start up screen or a blue triangle. If you are still experiencing this, please visit support.garmin.com for steps to resolve the issue." Click that link for instructions on how to restart your watch if it's stuck on that blue triangle boot screen. What is the problem?Users have reported that their watch will go into a “boot loop,” where it keeps rebooting but never managing to fully start up. The watch displays a blue triangle, as shown in this Reddit post. Epix, Fenix, Forerunner, Venu, and Vivoactive watches seem to be affected, according to comments in various Reddit posts. The page that Garmin linked with reset instructions also mentions Edge bike computers, and Instinct and Approach watches. Only some models are affected; for example, the Vivoactive 4 is mentioned on that support page, but the Vivoactive 5 is not. The blue triangle issue may have been triggered by starting a GPS activity, which Garmin acknowledged in its initial statement, but the company has not confirmed whether this is the precise cause. Some users noticed it happened after logging a non-GPS activity, and one says it started when they scrolled over a “weather app/widget.” Reddit users are speculating that the issue may have been caused by a faulty GPS file. According to this theory, it doesn’t matter when your watch was last updated, or whether you are in the beta program (which grants early access to new features). Rather, the corrupted file would be synced to your watch during normal use. That would explain why it started affecting so many people at once. That said, I wasn’t able to reproduce this issue on a Vivoactive 5 or a Forerunner 265. On both, I started and finished a GPS "Walk" activity several times and the watch stayed functional. I also did a non-GPS strength activity on a Forerunner 265S. Perhaps I missed the window of time when the corrupted file was live; in any case, not all users experienced this issue. How to fix the issue (maybe)Garmin's official advice is on this page. The fix varies by model, but to give an overview of what's needed for each device: Fenix 8 and Lily 2: Power down the watch by holding in the power/light button, then turn it on again, and sync the watch to your phone or computer. Approach S70, Forerunner watches, Venu 3, Vivoactive 4, Vivoactive 5: Perform a factory reset. D2, Epix gen 2, Enduro gen 2, Fenix 7, Quatix 7, Tactix 7, Instinct 3: Connect the watch to a computer with a power/data cable and use Garmin Express to sync the watch. Edge cycling computers: Connect the device to a PC running Windows, and delete the CPE.bin file. If this doesn't resolve the issue, do a master reset. For detailed instructions on those steps, check this support page. Note that a factory reset will delete some data, like your Wallet setup and some of your Body Battery and step count data. Once you do that reset, you'll need to reconnect your watch to your phone. Redditors came up with an alternate solution while waiting for this one, recommending that users connect the watch to a PC with a data/charging cable, and deleting a specific file from the watch. Here is the Reddit comment describing this procedure, but note that Garmin only recommends this for Edge computers. View the full article
  9. On Tuesday, President Trump issued a sweeping freeze on federal funding that drew widespread confusion before later being rescinded. But it was quickly followed by another pronouncement that could have major ripple effects across the federal government. In a move that echoed Elon Musk’s proposal to Twitter employees back in 2022—down to the email subject line—the Trump administration made a surprising offer to two million federal workers. If they voluntarily resigned, they would receive full pay through the end of September; otherwise, they would risk being furloughed or reclassified as at-will employees. Those who stayed would also have to abide by the new return-to-office policy, which would require them to come in daily. Workers were told they had just over a week to consider and accept the offer. The bold announcement was, again, teased by Musk (and Vivek Ramaswamy) last year in an op-ed in the Wall Street Journal about plans for the Department of Government Efficiency (DOGE). “Requiring federal employees to come to the office five days a week would result in a wave of voluntary terminations that we welcome,” they wrote at the time. But Trump’s “deferred resignation” offer has elicited more questions than answers among federal workers and observers who have questioned whether it is legally sound. How will the buyouts work? Many federal workers were reportedly confused about whether they would be expected to continue working if they moved forward with the offer. Some workers were also unsure if the offer even applied to their roles, given the exemptions for those in certain roles across national security and immigration enforcement. In its memo, the Office of Personnel Management (OPM) said workers should send an email with the subject line “Resign” if they wished to leave. But the deferred resignation letter they were asked to accept suggested that being placed on leave was only one potential outcome. “I understand my employing agency will likely make adjustments in response to my resignation including moving, eliminating, consolidating, reassigning my position and tasks, reducing my official duties, and/or placing me on paid administrative leave until my resignation date,” the letter read. In an FAQ section, however, the OPM noted that “Except in rare cases determined by your agency, you are not expected to work.” Multiple posts on X from Elon Musk and the official DOGE account confirmed that information, and a senior White House official also told Axios that workers would not have to keep working if they accepted the offer, aside from taking care of customary tasks like returning work devices. Still, the American Federation of Government Employees (AFGE)—the union that represents hundreds of thousands of federal workers—has instructed its members not to accept the terms of the resignation offer. (In fact, many workers seem more emboldened to stay put following the proposal.) In a statement, AFGE president Everett Kelley said Trump’s ploy to cut millions of federal workers would have “vast, unintended consequences that will cause chaos for the Americans who depend on a functioning federal government.” The AFGE has also pushed back on the characterization of this offer as a buyout, arguing that it does not guarantee an employee’s resignation will be accepted or that they will receive the benefits being promised. “This offer should not be viewed as voluntary,” Kelley added. “Between the flurry of anti-worker executive orders and policies, it is clear that the Trump administration’s goal is to turn the federal government into a toxic environment where workers cannot stay even if they want to.” (The OPM did not respond to a request for comment.) Is any of this legal? Beyond the question of whether federal employees who resign will be expected to work in any capacity, it’s not clear whether the Trump administration can legally make an offer of this scale. Federal workers are not typically allowed to be on paid administrative leave for more than 10 days in a given year, and Trump has not received budget authorization from Congress for the buyouts. Some federal employees have already expressed concerns that they won’t see the money that Trump has promised. The AFGE and Democrats such as Senator Tim Kaine have also cautioned that federal employees who quit may not be guaranteed months of pay. “There’s no budget line item to pay people who are not showing up for work,” Kaine said on the Senate floor this week. “If you accept that offer and resign, he’ll stiff you.” View the full article
  10. We may earn a commission from links on this page. Two years ago, I discovered that clean smarties around the Internet were using their handheld steamers to clean their homes and I thought that was brilliant, so I started doing it right away, too. Professional steam cleaners are awesome because they heat up so much that they can even disinfect surfaces—and while I've never been totally convinced my little garment steamer from Amazon is quite as powerful as all that, I've still found a lot of ways to use it around the house. Here is the steamer I have, which retails for about $26 and comes with a brush you can stick on the front. I try to avoid using the brush when I'm cleaning, just so I don't accidentally transfer any messy gunk onto my clothes when I use the steamer for its intended purpose, but in a pinch, it does come in handy. Handheld Garment Steamer $26.99 at Amazon /images/amazon-prime.svg $29.99 Save $3.00 Shop Now Shop Now $26.99 at Amazon /images/amazon-prime.svg $29.99 Save $3.00 I steam any stain of dubious originFirst up, if I find a stain anywhere and I don't know exactly what it is, I steam it. Granted, you can steam any kind of stain, since the heat loosens it and the little bit of moisture helps draw it out, but I especially like this technique for messes that I can't quite explain, since I feel better knowing my first line of attack against them is germ-killing heat. Today, I moved a bunch of stuff near my sink and discovered some marks underneath it all. I couldn't be sure what caused the streaks, but I could be sure that I was attacking them with heat and power. Besides its potential for germ-destroying, steam is fantastic for quickly loosening any stuck-on grime. I've used my steamer to get baked-on food off of oven racks, for instance. Of course, you can use oven cleaner or hot, soapy water, but that takes a lot longer. Blasting caked-on goo with steam loosens it fast and lets you move on to the soapy, more serious disinfecting quicker. The steamer blasting through some streaks by my sink. Credit: Lindsey Ellefson Just a few seconds into the steaming of the streaks by my sink, they disappeared. Of course, I went back in with cleaning solution after that, but I was feeling pretty smug by that point. They came right up and off without me having to do so much as scrub (plus I never had to touch anything gross). I steam my dirty dishesIf you do your dishes right away, food doesn't have time to get stuck on them. Blah, blah, I know. But sometimes I'm busy. Sometimes I'm lazy. What I'm saying is that food gets stuck on my dishes and I hate scrubbing it off with a sponge, but not enough to ever learn a lesson about washing them in a speedier fashion. This is where my steamer comes in. I don't have a dishwasher because I live in a small apartment, so I can't toss them in there and let the heat do its job. What I can do is blast those bad boys with the steamer for a second or two, which makes the task of cleaning them off so much faster than if I let them sit in hot water or, God forbid, just got to work scrubbing. Stuck-on food besmirching my spoon before getting annihilated by the steamer. Credit: Lindsey Ellefson I like making quick work of the dishes and, of course, that the heat tackles some germs even before I get at them with the dish soap. Today, there was a spoon in the sink that had a very stuck-on line of food in its bowl (likely from a cheap microwavable soup, I'm sorry to say) but the steamer dislodged it like it was nothing. I did try a little with my fingernail and a sponge before blasting it, just to see how bad it was, and neither made any impact—but the steamer sure did. From there, I soaped the whole thing up, dried it, and went on with my day. I steam my mirrors, tooWhile on my steam-cleaning mission today, I did not need to clean my mirrors (humble brag) because I already did that recently. What I can't provide in photographic evidence I'll make up for in testimony: I love steaming my mirrors because it works so fast and leaves them streak-free. Windex is fine and all, but you have to really wipe to clear out those streaks. Steam is much easier to wipe off and leaves behind no chemicals. I also really like it because one of the main mirrors in my apartment is backlit and relies on electricity. I try to avoid getting it wet, to the extent possible, so the minimal amount of moisture provided by the steam machine is far preferable to the direct wetness of a spritz of window cleaner. The steam quickly destroys water stains and other splotches, although I caution that you may need to go two or three rounds with hairspray that's stuck to your glass. It takes me a few passes to break all the way through setting spray, hair spray, and other sticky chemicals the likes of which you use in front of the mirror. Other than that, this technique works great on shower glass, tile, ceramic, or any other smooth surface where you have water stains or other buildups. You don't need chemicals or a bunch of tools as long as you have your steamer and a rag to wipe everything down with. View the full article
  11. Well, well, well—look who suddenly wants a word with the sheriff in the fair-use Wild West landscape of artificial intelligence. As Bloomberg reports, Microsoft and its partner company OpenAI are investigating the white-hot Chinese startup DeepSeek after Microsoft security researchers allegedly discovered people linked to DeepSeek withdrawing large amounts of data through the company’s API last fall. Elsewhere, White House AI czar David Sacks told Fox News on Tuesday that there is “substantial evidence” that DeepSeek “distilled” knowledge from OpenAI’s AI models. These allegations align with other suspicious aspects of the new AI. For instance, when a Fast Company editor took DeepSeek for a test run earlier this week, the chatbot insisted it was made by Microsoft. Perhaps the Chinese company—which built its new model in a matter of months with shockingly little funding and computing power—violated the law by using OpenAI’s output to develop its tech. Or maybe it operated entirely within a legal gray area. Either way, it’s ironic that a company whose entire business model is predicated on repurposing copyrighted material is now crying foul over another company repurposing its material. Ever since OpenAI’s ChatGPT normalized generative AI in 2022, creators have accused it of essentially being a plagiarism machine. Large language models (LLMs) like ChatGPT require for their training immense sums of information about the world. That info often comes from the copyrighted work of human creators, many of whom did not sign off on their material being used for this purpose. Sometimes, the material is sourced and linked to; other times, not. But the direct use of copyrighted material is just standard AI. A February 2024 report from plagiarism detector Copyleaks found that 60% of ChatGPT’s output contained some form of plagiarism. Lawsuits, litigation, and legal gray areas It should come as little surprise that all this plagiarism has kept Microsoft and OpenAI entangled in nonstop litigation over the past two years. The companies have faced class-action lawsuits from a group of nonfiction authors led by Julian Sancton and class-action lawsuits from such novelists as Jonathan Franzen and Jodi Picoult. Comedian Sarah Silverman, who is also an author, jumped in on yet another of these lawsuits, accusing not only OpenAI but also Meta of using copyrighted work “without consent, without credit, and without compensation.” And while publications such as the Wall Street Journal, Vox, and The Atlantic have entered into if-you-can’t-beat-‘em-join-‘em partnership deals with Microsoft and OpenAI, the New York Times Company sued both companies for alleged copyright infringement in December of 2023. As of now, most of these cases are still ongoing, and the rules for fair use in training LLMs remain in flux. What’s illuminating in light of OpenAI’s allegations against DeepSeek, however, is how OpenAI has defended its use of copyrighted material. During trial arguments earlier this month in the NYT Company case, OpenAI claimed (as ever) that its output is covered by the fair use doctrine, which permits the use of copyrighted material to create something new, as long as it doesn’t compete with the original work. OpenAI’s attorneys characterize ChatGPT as not actually storing copyrighted material, but merely relying on the aftereffects of material passing through its models during the training process. According to Digiday’s reporting on the hearing, an attorney representing OpenAI claimed, “If I say to you, ‘Yesterday all my troubles seemed so . . . ,’ we will all think ‘far away’ because we have been exposed to that text so many times,” alluding to the lyrics of “Yesterday” by the Beatles. “That doesn’t mean you have a copy of that song somewhere in your brain.” (It should be noted here that former Beatle Paul McCartney has also been quite vocal in his criticism of AI repurposing the work and creativity of human artists.) By OpenAI’s own logic, maybe DeepSeek simply allowed output from a U.S. competitor to flow through its model during the training process. At this point, we don’t know. (Microsoft declined to comment on what’s alleged in the Bloomberg report. Fast Company also reached out to OpenAI and will update this post as needed.) For years now, authors, journalists, artists, and all sorts of creators have been screaming at the top of their lungs, in and out of court, that AI platforms should either find a more ethical approach to their mission or abandon it altogether. Now that the entire American AI industry is reeling from a $1 trillion stock hit because a small startup allegedly gave them a taste of their own medicine, it’s no wonder that the response on social media has been a schadenfreude bonanza. Live by the fair use doctrine, die by the fair use doctrine. View the full article
  12. Subscribe to Work LifeGet stories like this in your inbox Subscribe 5-second summary Time management strategies are specific frameworks or systems to maximize your time and energy We’ve gathered five time management strategies that put you in the driver’s seat of your tasks, schedule, time, and energy, each in a different way. Take our one-minute quiz to find out which strategy will be the biggest difference-maker for you. Where the heck did the day go? Time slipped right through my fingers. Next week, things will calm down. Every single one of us has had those exact thoughts about our workdays. But here’s the harsh truth: You won’t magically find or manufacture more time. Not tomorrow. Not next week. Not when that big project is wrapped up. So, according to the laws of physics, you need to make the most of the time you already have. That’s where time management strategies come into play. These models go beyond the daily war with your to-do list, helping you execute meaningful work in an efficient and fulfilling way. Jump to the quiz How do time management strategies help? Time management strategies are specific frameworks or systems to maximize your time and energy. Put another way, they help you overcome several common time management roadblocks. Multitasking: Research shows that the human brain is incapable of doing more than one thing at once (unless you count autonomous tasks like breathing). When you think you’re multitasking, you’re actually context switching – rapidly jumping between various tasks. While it might make you feel like you’re dominating your to-do list, this constant switching of gears is a drag on your productivity. Time management strategies help you stop juggling and start focusing. Fires and emergencies: You know the feeling. Your intentions for your workday are quickly sidetracked by the latest three-alarm emergency that lands in your inbox. While time management strategies won’t keep these red alerts off your desk entirely, they will help you better discern what actually deserves your immediate attention, rather than continuing to play inbox whack-a-mole. Information overload: Meetings. Emails. Notifications. Calls. Documents. Requests. Day in and day out, you’re inundated with information. That cognitive overload (which is what happens when the volume or complexity of incoming information exceeds your ability to absorb it) causes us to be less effective by seeking out low-value tasks, overlooking important details, and overall just feeling stuck. The right time management strategy can help you filter through the relentless noise to find your starting point. Energy depletion: Everything we’ve already mentioned – from the last-minute requests to an information avalanche – quickly drains your tank. Time management strategies allow you to be more mindful of not only your time but also your energy levels. With the right approach in your toolbox, you’ll be better equipped to schedule work more strategically and avoid running yourself ragged. There are plenty of hurdles that time management strategies will get you over, but they’re not a fix-all. If you’re struggling with an unmanageable workload, bona fide burnout, or other mental health challenges, the right time management hack probably isn’t your answer. Those more complex issues require conversations with your company leadership and/or a trusted mental health professional. The fundamentals: 13 time management best practices that always hold water There are several specific time management strategies you can use to make better use of your work hours. We’ll get to those frameworks in a minute. But, regardless of which of those you try, there are a few general time management best practices that are always a good idea – and a good place to start. Audit your time: Want to make better use of your time? You need to know where you’re starting. Whether you use an automated time tracker or a simple notepad, keep track of your work hours and what you get done. Do this for at least a couple of weeks so you can spot trends and identify improvement areas. Set goals: Your ultimate objective is to manage your time better, but that can feel broad and intangible. Instead, set time management-related SMART goals to encourage and monitor your progress, such as signing off every weekday by 5PM, or spending the first 15 minutes of every morning making a to-do list. Stop procrastinating: Procrastination is one of the biggest culprits eating away at your precious work hours, but it can be tough to overcome. Set a timer, enlist an accountability buddy, or find another hack that nudges you to just get started. Break down big tasks: Intimidation could be behind your persistent procrastination. So, break that big undertaking down into more manageable tasks and milestones. It’ll feel less daunting and also give you regular intervals to recognize and celebrate your progress. Incentivize yourself: When you reach a milestone or cross off another task, treat yourself. Whether you go for a quick walk or grab your favorite snack, even small, seemingly insignificant rewards can encourage you to keep moving forward. Prioritize: Time management is about focusing on your most important work. To do so, you need to parse out the meaningful from the mundane. Strategically ordering your work based on criteria like impact, deadlines, and effort required serves as a good foundation for any time management strategy. Schedule breaks: Even the most productive people need adequate time to rest and recharge. No time management system should be synonymous with constant, dogged work. Your brain quite literally needs breaks – brain activity research says so. Limit distractions: Even the best time management strategy will suffer if you’re consistently waylaid by pings, pushes, and drop-bys. Try your best to minimize distractions, especially during times when you’re doing deep work. Check your environment: Your work environment has a direct impact on your productivity. Sitting on your couch in the dark while hunched over your laptop isn’t conducive to peak focus. Find or create a quiet space with some natural light and at least a somewhat ergonomic setup to support your best work (and, you know, your back). Get organized: Searching for what you need isn’t the most efficient use of your time. Get a decent organization system in place so that, when you’re ready to work, you can jump right in. Avoid multitasking: Even if you think you’re a whiz at doing several things at once, you’re doing your brain a disservice by trying to multitask. Instead, pick one task to focus on at a time. You’ll get it done better – and faster – than if you had simultaneously juggled it with two other to-do’s. Understand your peaks and valleys: You know you best, so think about how your energy tends to ebb and flow throughout the workday. Paying attention to when you’re most focused and energized will help you make the most of those energetic hours, like saving your morning for deep work and cleaning out your inbox after lunch. Delegate: You can only do so much with the hours you have. But there’s good news: You don’t have to do it all alone. Knowing what you can delegate (whether you hand tasks off to technology or another person) is one of the best ways to buy yourself more time and reserve your focus for your most meaningful and impactful work. Related Article Night owl or early bird? Discover your circadian personality By Tracy Middleton In Productivity 5 time management strategies to maximize your time and energy Now that you’re schooled on the basics, let’s take a look at four widely used time management frameworks. 1. Eisenhower Matrix What it is: A four-quadrant chart that helps you categorize all your tasks based on their urgency and their importance or impact How it works: Draw a square and separate it into four even quadrants. Along the y-axis, label those boxes with “important” and “not important.” On the top x-axis, label those boxes with “urgent” and “not urgent.” Next, categorize each task on your to-do list. Is that slide deck important and urgent? It goes in the top left box. Is your expense report not important but urgent? It goes in the bottom left box. Once everything is sorted, you can approach each category like this: Urgent and important: Do these first! Urgent and not important: Delegate these if you can. Otherwise, tackle them next. Not urgent and important: Schedule time for these in the coming weeks. Not urgent and not important: These can fall off your to-do list entirely. Also called a “prioritization matrix,” this handy tool helps you filter through a lengthy task list and pull out the items that require your immediate attention. From the PlaybookAllthethings Prioritization Matrix Run the Play 2. 80/20 Rule What it is: A principle positing that 80% of your results come from only 20% of your efforts. How it works: Since time management is about getting the most meaningful work done, this strategy (also called the Pareto Principle) focuses on finding the highest-impact tasks on your list – with the idea that those will generate the biggest outcomes for your workday. You’ll likely be drawn to the low-hanging fruit and quick wins on your to-do list, but this guiding principle forces you to look at your tasks through a new lens: Which ones will have the biggest impact? Cleaning up your inbox probably won’t lead to a substantial result. However, compiling all the data that another team has been waiting on for days will. 3. Time blocking What it is: A method that involves splitting your day into segments of time and dedicating each one to a specific task. How it works: Remember when you were in school and you knew what to expect during every moment of your day? At 11am you’re in chemistry class, at noon you have lunch, and so on. Time blocking is a lot like that. You’ll create blocks of time on your calendar and assign certain tasks or groups of tasks to that specific spot on your schedule. For example, maybe you’ll address your emails from 8am to 9am, meet with the design team from 9am to 9:30am, and draft copy for a project from 9:30am to 11:30am. It might feel overly prescriptive or rigid. But this level of detail helps you take a more proactive approach to your workday, rather than letting emails, requests, and other people control your entire schedule. 4. Pomodoro Technique What it is: A strategy that breaks your workday into smaller chunks of time (usually 25 minutes) separated by five-minute breaks. How it works: Your workday might feel daunting, but you could likely do pretty much anything if you knew it’d only take 25 minutes, right? That’s the concept behind the Pomodoro Technique. The gist is that you’ll set a timer and work for a period of 25 minutes. When the timer goes off, you take a five-minute break. After doing that cycle (called a “pomodoro”) four times, you take a longer break of about 20 minutes. It’s helpful for a few reasons. For starters, it can amp up your focus by instilling a greater sense of urgency. Most of us are naturally competitive, so you’ll likely challenge yourself to get as much done as you can in that 25-minute chunk before your timer goes off. Plus, the Pomodoro Technique has built-in breaks. As counterintuitive as it seems, those regular opportunities to step away can give a major boost to your energy and productivity. 5. Not-to-do list What it is: A documented list of time-wasting tasks and negative behaviors you’ll consistently and reliably avoid How it works: You’re familiar with a to-do list, but this is the exact opposite. Rather than making a list of all of the things you want to get done, you’ll write a list of the things you won’t do. What are the vices or bad habits that consistently distract you from your work? Or the tasks that you’ve supposedly delegated but still manage to find you anyway? Or the things you know you should say “no” to but have a hard time resisting? Those are the types of things that go on your not-to-do list. While it might sound like a silly exercise, writing things down is powerful. This simple activity can help you gain clarity about the areas where you need to be careful and resist falling into old, unproductive patterns and routines. Which time management strategy should you try? These five time management strategies put you in the driver’s seat of your tasks, schedule, time, and energy, each in a different way. But that doesn’t mean you should roll out all of them at once. You’ll see better results if you pick one. Not sure how to figure out which one will be the biggest difference-maker for you? This one-minute quiz will point you in the right direction. Once you know which time management strategy is best suited to you and your goals, test it out and see if it makes a noticeable difference. If it’s the right fit, you shouldn’t just get more done – you should feel more fulfilled and energized by what you’ve accomplished. Subscribe to Work LifeGet stories like this in your inbox Subscribe The post Quiz: Which time management strategy is right for you? appeared first on Work Life by Atlassian. View the full article
  13. Subscribe to Work LifeGet stories like this in your inbox Subscribe 5-second summary Time management strategies are specific frameworks or systems to maximize your time and energy We’ve gathered five time management strategies that put you in the driver’s seat of your tasks, schedule, time, and energy, each in a different way. Take our one-minute quiz to find out which strategy will be the biggest difference-maker for you. Where the heck did the day go? Time slipped right through my fingers. Next week, things will calm down. Every single one of us has had those exact thoughts about our workdays. But here’s the harsh truth: You won’t magically find or manufacture more time. Not tomorrow. Not next week. Not when that big project is wrapped up. So, according to the laws of physics, you need to make the most of the time you already have. That’s where time management strategies come into play. These models go beyond the daily war with your to-do list, helping you execute meaningful work in an efficient and fulfilling way. Jump to the quiz How do time management strategies help? Time management strategies are specific frameworks or systems to maximize your time and energy. Put another way, they help you overcome several common time management roadblocks. Multitasking: Research shows that the human brain is incapable of doing more than one thing at once (unless you count autonomous tasks like breathing). When you think you’re multitasking, you’re actually context switching – rapidly jumping between various tasks. While it might make you feel like you’re dominating your to-do list, this constant switching of gears is a drag on your productivity. Time management strategies help you stop juggling and start focusing. Fires and emergencies: You know the feeling. Your intentions for your workday are quickly sidetracked by the latest three-alarm emergency that lands in your inbox. While time management strategies won’t keep these red alerts off your desk entirely, they will help you better discern what actually deserves your immediate attention, rather than continuing to play inbox whack-a-mole. Information overload: Meetings. Emails. Notifications. Calls. Documents. Requests. Day in and day out, you’re inundated with information. That cognitive overload (which is what happens when the volume or complexity of incoming information exceeds your ability to absorb it) causes us to be less effective by seeking out low-value tasks, overlooking important details, and overall just feeling stuck. The right time management strategy can help you filter through the relentless noise to find your starting point. Energy depletion: Everything we’ve already mentioned – from the last-minute requests to an information avalanche – quickly drains your tank. Time management strategies allow you to be more mindful of not only your time but also your energy levels. With the right approach in your toolbox, you’ll be better equipped to schedule work more strategically and avoid running yourself ragged. There are plenty of hurdles that time management strategies will get you over, but they’re not a fix-all. If you’re struggling with an unmanageable workload, bona fide burnout, or other mental health challenges, the right time management hack probably isn’t your answer. Those more complex issues require conversations with your company leadership and/or a trusted mental health professional. The fundamentals: 13 time management best practices that always hold water There are several specific time management strategies you can use to make better use of your work hours. We’ll get to those frameworks in a minute. But, regardless of which of those you try, there are a few general time management best practices that are always a good idea – and a good place to start. Audit your time: Want to make better use of your time? You need to know where you’re starting. Whether you use an automated time tracker or a simple notepad, keep track of your work hours and what you get done. Do this for at least a couple of weeks so you can spot trends and identify improvement areas. Set goals: Your ultimate objective is to manage your time better, but that can feel broad and intangible. Instead, set time management-related SMART goals to encourage and monitor your progress, such as signing off every weekday by 5PM, or spending the first 15 minutes of every morning making a to-do list. Stop procrastinating: Procrastination is one of the biggest culprits eating away at your precious work hours, but it can be tough to overcome. Set a timer, enlist an accountability buddy, or find another hack that nudges you to just get started. Break down big tasks: Intimidation could be behind your persistent procrastination. So, break that big undertaking down into more manageable tasks and milestones. It’ll feel less daunting and also give you regular intervals to recognize and celebrate your progress. Incentivize yourself: When you reach a milestone or cross off another task, treat yourself. Whether you go for a quick walk or grab your favorite snack, even small, seemingly insignificant rewards can encourage you to keep moving forward. Prioritize: Time management is about focusing on your most important work. To do so, you need to parse out the meaningful from the mundane. Strategically ordering your work based on criteria like impact, deadlines, and effort required serves as a good foundation for any time management strategy. Schedule breaks: Even the most productive people need adequate time to rest and recharge. No time management system should be synonymous with constant, dogged work. Your brain quite literally needs breaks – brain activity research says so. Limit distractions: Even the best time management strategy will suffer if you’re consistently waylaid by pings, pushes, and drop-bys. Try your best to minimize distractions, especially during times when you’re doing deep work. Check your environment: Your work environment has a direct impact on your productivity. Sitting on your couch in the dark while hunched over your laptop isn’t conducive to peak focus. Find or create a quiet space with some natural light and at least a somewhat ergonomic setup to support your best work (and, you know, your back). Get organized: Searching for what you need isn’t the most efficient use of your time. Get a decent organization system in place so that, when you’re ready to work, you can jump right in. Avoid multitasking: Even if you think you’re a whiz at doing several things at once, you’re doing your brain a disservice by trying to multitask. Instead, pick one task to focus on at a time. You’ll get it done better – and faster – than if you had simultaneously juggled it with two other to-do’s. Understand your peaks and valleys: You know you best, so think about how your energy tends to ebb and flow throughout the workday. Paying attention to when you’re most focused and energized will help you make the most of those energetic hours, like saving your morning for deep work and cleaning out your inbox after lunch. Delegate: You can only do so much with the hours you have. But there’s good news: You don’t have to do it all alone. Knowing what you can delegate (whether you hand tasks off to technology or another person) is one of the best ways to buy yourself more time and reserve your focus for your most meaningful and impactful work. Related Article Night owl or early bird? Discover your circadian personality By Tracy Middleton In Productivity 5 time management strategies to maximize your time and energy Now that you’re schooled on the basics, let’s take a look at four widely used time management frameworks. 1. Eisenhower Matrix What it is: A four-quadrant chart that helps you categorize all your tasks based on their urgency and their importance or impact How it works: Draw a square and separate it into four even quadrants. Along the y-axis, label those boxes with “important” and “not important.” On the top x-axis, label those boxes with “urgent” and “not urgent.” Next, categorize each task on your to-do list. Is that slide deck important and urgent? It goes in the top left box. Is your expense report not important but urgent? It goes in the bottom left box. Once everything is sorted, you can approach each category like this: Urgent and important: Do these first! Urgent and not important: Delegate these if you can. Otherwise, tackle them next. Not urgent and important: Schedule time for these in the coming weeks. Not urgent and not important: These can fall off your to-do list entirely. Also called a “prioritization matrix,” this handy tool helps you filter through a lengthy task list and pull out the items that require your immediate attention. From the PlaybookAllthethings Prioritization Matrix Run the Play 2. 80/20 Rule What it is: A principle positing that 80% of your results come from only 20% of your efforts. How it works: Since time management is about getting the most meaningful work done, this strategy (also called the Pareto Principle) focuses on finding the highest-impact tasks on your list – with the idea that those will generate the biggest outcomes for your workday. You’ll likely be drawn to the low-hanging fruit and quick wins on your to-do list, but this guiding principle forces you to look at your tasks through a new lens: Which ones will have the biggest impact? Cleaning up your inbox probably won’t lead to a substantial result. However, compiling all the data that another team has been waiting on for days will. 3. Time blocking What it is: A method that involves splitting your day into segments of time and dedicating each one to a specific task. How it works: Remember when you were in school and you knew what to expect during every moment of your day? At 11am you’re in chemistry class, at noon you have lunch, and so on. Time blocking is a lot like that. You’ll create blocks of time on your calendar and assign certain tasks or groups of tasks to that specific spot on your schedule. For example, maybe you’ll address your emails from 8am to 9am, meet with the design team from 9am to 9:30am, and draft copy for a project from 9:30am to 11:30am. It might feel overly prescriptive or rigid. But this level of detail helps you take a more proactive approach to your workday, rather than letting emails, requests, and other people control your entire schedule. 4. Pomodoro Technique What it is: A strategy that breaks your workday into smaller chunks of time (usually 25 minutes) separated by five-minute breaks. How it works: Your workday might feel daunting, but you could likely do pretty much anything if you knew it’d only take 25 minutes, right? That’s the concept behind the Pomodoro Technique. The gist is that you’ll set a timer and work for a period of 25 minutes. When the timer goes off, you take a five-minute break. After doing that cycle (called a “pomodoro”) four times, you take a longer break of about 20 minutes. It’s helpful for a few reasons. For starters, it can amp up your focus by instilling a greater sense of urgency. Most of us are naturally competitive, so you’ll likely challenge yourself to get as much done as you can in that 25-minute chunk before your timer goes off. Plus, the Pomodoro Technique has built-in breaks. As counterintuitive as it seems, those regular opportunities to step away can give a major boost to your energy and productivity. 5. Not-to-do list What it is: A documented list of time-wasting tasks and negative behaviors you’ll consistently and reliably avoid How it works: You’re familiar with a to-do list, but this is the exact opposite. Rather than making a list of all of the things you want to get done, you’ll write a list of the things you won’t do. What are the vices or bad habits that consistently distract you from your work? Or the tasks that you’ve supposedly delegated but still manage to find you anyway? Or the things you know you should say “no” to but have a hard time resisting? Those are the types of things that go on your not-to-do list. While it might sound like a silly exercise, writing things down is powerful. This simple activity can help you gain clarity about the areas where you need to be careful and resist falling into old, unproductive patterns and routines. Which time management strategy should you try? These five time management strategies put you in the driver’s seat of your tasks, schedule, time, and energy, each in a different way. But that doesn’t mean you should roll out all of them at once. You’ll see better results if you pick one. Not sure how to figure out which one will be the biggest difference-maker for you? This one-minute quiz will point you in the right direction. Once you know which time management strategy is best suited to you and your goals, test it out and see if it makes a noticeable difference. If it’s the right fit, you shouldn’t just get more done – you should feel more fulfilled and energized by what you’ve accomplished. Subscribe to Work LifeGet stories like this in your inbox Subscribe The post Quiz: Which time management strategy is right for you? appeared first on Work Life by Atlassian. View the full article
  14. If there words or phrases you want to remove from you vocabulary, but can't seem to shake, there's a helpful trick I have learned over the years: Set up your computer and phone to automatically replace the word when you type it. I've written about Mac computers for a long time, which among other things means I mention the menu bar—that strip at the top of the screen with text menus and icons—multiple times a week while writing. For a long time, I combined those two words, writing "menubar," even though that is technically incorrect. A former editor of mine hated that I did this. Like, really hated it. He got so sick of it that he told me to go into my Mac's settings and set up my computer to automatically replace the word "menubar" with the words "menu bar." From that point on, anytime I typed "menubar," my Mac would not only replace it but make a sound letting me know it replaced it. Eventually, I stopped typing it incorrectly. Now, my use case here is admittedly niche. But you can do so much more than annoy editors less with this technique. Maybe you're trying to swear less—you could set up your device to replace curse words with cutesy alternatives, thus embarrassing yourself into re-writing your sentences. Maybe you'd like your word choices to be more gender inclusive—you could set up your devices to replace words like "guys" with "everyone." Or maybe you're trying to use less wishy-washy language at work—you could set up your computer to change phrases like "kind of" with "I'm not sure." The specifics here don't matter—the idea is to think of the things that you, yourself, would like to change about the way you talk. How to set up text replacements on any deviceApple devices come with this feature built in. On a Mac, you just need to open System Settings and head to Keyboard. On an iPhone or iPad, you can open Settings and head to General > Keyboard, and you'll see the Text Replacements option. Here you can add as many words to replace with other words as you like. Android has a similar feature buried in the settings. Assuming you're using GBoard, the default keyboard app, open the settings for your keyboard and go to Dictionary. Open your current dictionary and hit the plus button to add a Text Shortcut. Add the word you want to replace as the "Shortcut" and the word you want to replace it with in the main text field. Credit: Justin Pot Windows, sadly, doesn't have a dedicated tool for this. The good news is that you've got options. Espanso is an open source text expansion tool I wrote about last year—it takes some time to set up but works great. If you'd prefer something made specifically for Windows, you can check out Beeftext, which is also free and open source. View the full article
  15. Hours after being sworn in as the new U.S. Secretary of Transportation, Sean Duffy took aim at the main way the federal government regulates miles per gallon for cars and pickup trucks — also a principal way that it regulates air pollution and addresses climate change. Duffy ordered the federal agency in charge of fuel economy standards to reverse them as soon as possible. The standards have been in place since the 1970s energy crisis and were intended to conserve fuel and save consumers money at the gas pump. Here are five reasons why the action matters. What is the Trump administration doing exactly? Duffy ordered his chief of the National Highway Traffic Safety Administration to “propose the rescission or replacement of any fuel economy standards” necessary to bring the rules in line with Trump’s priority of promoting oil and biofuel. The order came in a DOT memorandum Tuesday night. Duffy said the rules need to better align with the administration’s overarching agenda because “the existing CAFE standards promulgated by NHTSA are contrary to Administration policy.” What does this mean for consumers and the climate? Duffy says eliminating the rules will increase Americans’ access to the full range of gasoline vehicles they need and can afford. Others disagree. “This will raise consumer’s costs at the pump, increase tailpipe pollution and jeopardize U.S. automakers’ future, and no one voted for any of it. The only beneficiaries will be oil executives and China’s auto industry, which will be happy to sell electric vehicles around the world with little U.S. competition,” said Dan Becker, director of the Center for Biological Diversity’s Safe Climate Transport Campaign. In recent years, automakers have been producing gasoline cars that get significantly better mileage, which lowers the cost of driving and means lower sales for oil companies — both refineries and producers. Transportation was the largest contributor to U.S. greenhouse gas emissions in 2022, according to the Environmental Protection Agency. Every atom of carbon pumped into a car’s gas tank comes out the tailpipe and many combine with oxygen to make carbon dioxide which holds onto extra heat for more than a century. Why does Trump want to repeal fuel efficiency rules? Duffy’s action aligns with a number of President Trump’s promises, notably to end an “electric vehicle mandate” — referring to former President Joe Biden’s target for 50% of new car sales to be electric by 2030. Duffy wrote “These fuel economy standards are set as such aggressive levels that automakers cannot, as a practical matter, satisfy the standards without rapidly shifting production away from internal-combustion-engine vehicles to alternative electric technologies.” The new Secretary said “artificially high” standards force car manufacturers to phase out gasoline powered vehicles, making cars more expensive for buyers and “destroying consumer choice at the dealership.” There is no requirement for automakers to produce or consumers to purchase electric vehicles. The fuel economy standards work in sync with EPA limits on carbon dioxide from vehicle tailpipes to address climate change, which Trump also rejects. Duffy said CAFE rules are supposed to establish realistic rules for fleets “that run on combustible liquid fuels like gasoline and diesel fuel.” He also cited the nation’s vast oil reserves, biofuel feedstocks and refining capacity as reason to establish lower standards. Trump has issued a series of orders including an energy emergency declaration, and has said the U.S. will “drill, baby, drill.” What’s the idea behind American fuel economy standards? CAFE, or Corporate Average Fuel Economy, rules date back to oil shocks Americans suffered in 1974 and 1980. The first ones went into effect in 1978. They are intended to help drivers use less fuel by requiring automakers’ fleets to meet average mile-per-gallon targets that initially increased with each model year, until progress stalled in the 1980s. Americans then saw no appreciable improvement in miles per gallon for around two decades. In recent years, automakers have offered car-buyers plenty of internal combustion engine — meaning gasoline-powered — cars with much better mileage, and that is largely due to increasingly stringent standards. What were the latest fuel economy rules going to do? The latest standards set under the Biden administration required automakers to average about 38 miles per gallon of gas by 2031. That’s in real-world driving. In every model year from 2027 to 2031, the rules are supposed to increased fuel economy 2% per year for passenger cars, while SUVs and other light trucks are set to increase by 2% a year from 2029 to 2031. An earlier proposal had even higher requirements. The standards aligned with tighter Biden-era EPA limits on pollution from passenger and commercial vehicles, and the former president’s broader support for incentivizing electric vehicle manufacturing and purchases. The Biden administration said when it made the rules they would save almost 70 billion gallons of gasoline through 2050. The Associated Press’ climate and environmental coverage receives financial support from multiple private foundations. AP is solely responsible for all content. Find AP’s standards for working with philanthropies, a list of supporters and funded coverage areas at AP.org. —Alexa St. John, Associated Press climate solutions reporter View the full article
  16. Processes benefit businesses, enterprises and the field of project management, and one of the most important aspects of a successful process is seeing the process flow drawn out. A process flow diagram is a great tool to outline and clarify that process to everyone involved. But what is a process flow? We’ll explain, including the process flow diagram symbols and different types. Then, to further illustrate the advantage of using one, we’ll provide a couple of examples and throw in a free template to download. What Is a Process Flow? A process flow is a visual representation or diagram that shows the steps involved in a particular process. It outlines the sequences of tasks, actions or events and how they are connected or related to one another in the overall workflow. Process flow diagrams are commonly used in various fields, such as business operations management, manufacturing, software development and project management. They help improve one’s understanding of the process, better communicate it to others and increase its efficiency. All this adds to the clarity and understanding of complex processes, increases accountability by defining clear roles and responsibilities and helps with decision-making. From there, project management software is needed to streamline project planning and scheduling. ProjectManager is award-winning project and portfolio management software with powerful Gantt charts that allow project managers to map out the entire project on a visual timeline. The tool displays tasks but also links all four types of task dependencies to avoid costly delays. The critical path can be easily found by filtering the Gantt chart and setting a baseline track progress in real time. Get started with ProjectManager today for free. /wp-content/uploads/2024/03/Manufacturing-gantt-chart-light-mode-costs-exposed-cta-e1712005286389.jpgProjectManager has Gantt charts to visualize task sequences. Learn more. Components of a Process Flow A process flow typically consists of several components that help define, organize and communicate the steps involved in a particular process. These components are often represented visually in process flow diagrams, such as flowcharts, to ensure clarity and easy understanding. Here are the key components of a process flow. Inputs: Resources, data or material required to initiate or complete a task or process. They are what one starts with and needs to move through a particular step in the process. Steps/Activities: Represent individual tasks or actions that must be completed in the process. Each step typically transforms inputs or moves the process forward towards completion. Decisions: A point in the process flow where a choice or judgment must be made. The process may follow different paths based on evaluating certain conditions or criteria. Outputs: The results or products produced by the process. These are the outcomes generated by completing the steps or activities. Entities: Represent the people, departments, systems or external factors involved in or impacted by the process. They are the actors or resources that either perform tasks, provide inputs or receive outputs. Flow Paths: The directional arrows that connect the different components of the process, illustrating the sequence and flow of activities, decisions, inputs, outputs and interactions between entities. /wp-content/uploads/2025/01/Process-flow-diagram-featured-image.jpg Get your free Process Flow Diagram Template Use this free Process Flow Diagram Template to manage your projects better. Download File Common Types of Process Flow Different types of process flows are designed to manage and streamline operations in various industries and sectors. Below are descriptions of some common types of process flows. Business Process Flow This refers to the sequence of activities and tasks a company or organization follows to achieve a specific business objective or outcome. It can encompass both operational and strategic processes within a business. Business process flows help organizations optimize workflows, improve efficiency and ensure consistent and high-quality outputs in business operations. Examples include the sales process flow, customer support process flow and employee onboarding process flow. Manufacturing or Production Process Flow These are the sequence of steps involved in creating a product, from raw material acquisition to final product delivery. This type of process flow is used in industries like manufacturing, assembly and production to streamline operations, optimize resources, minimize waste and ensure product quality and consistency throughout the manufacturing process. This can be seen in automobile manufacturing, food processing and electronics assembly. Procurement Process Flow This describes the steps an organization takes to acquire goods or services. It involves identifying needs, selecting suppliers and managing contracts to ensure the organization obtains the required resources at the best value. It ensures that businesses acquire the necessary goods and services efficiently and cost-effectively, minimizing delays and maximizing value. For example, it’s used in office supplies procurement, IT equipment procurement and raw materials procurement. What Is a Process Flow Diagram? A process flow diagram (PFD) is a graphical representation of a process or workflow. It visually depicts the steps, tasks or activities involved in a particular process and how they are interconnected. Process flow diagrams are commonly used in various industries to communicate processes, identify inefficiencies and design or improve workflows. There are different types of process flow diagrams. The simplest is a basic flowchart, which shows straightforward processes with a clear sequence of steps. A cross-functional flowchart or swimlane diagram includes different lanes for each department, role or entity involved, showing how each interacts with the process at each step. A specialized flow diagram that focuses on the data flow through a system, often used in software design or information systems is called a data flow diagram (DFD). Then there’s a workflow diagram, which focuses on tasks and decision-making in a workflow. This is commonly used for business processes. Process Flow Diagram Symbols In process flow diagrams, standardized symbols represent different elements of the process. These symbols make it easier to communicate complex workflows and processes, and they help ensure consistency and clarity. Below are the common process flow diagram symbols and their meaning. Oval: Represents the start and end points of the process Rectangle: Represents an action or process step that transforms inputs into outputs Diamond: Indicates a decision point in the process, where a yes/no or true/false condition directs the flow Parallelogram: Represents inputs or outputs in the process, such as data or materials entering or leaving the process Rectangle with a wavy bottom edge: Denotes a document created or used within the process Cylinder: Represents a database or data storage when the process involves storing or retrieving data from a database Circle: Used to connect different parts of the diagram, especially when a process flow diagram spans multiple pages or when connecting disconnected parts of the process Arrow: Indicates the direction or flow path of the workflow from one step to the next Double-line arrow or fork/join nodes: Represents simultaneous processes or tasks that can occur in parallel, called parallel mode or concurrency D-share (half circle): Signifies a delay or waiting period in the process flow Process Flow Diagram Examples We’ve written a lot about process flow, what it is and how it applies to different industries, as well as the symbols that are used when making a process flow diagram. To better understand how one works, let’s explore two process flow diagram examples, one for business and the other for manufacturing or production. Business Process Flow Diagram The below process flow diagram is for a specific business process, the customer service process flow. It starts with the input of a customer contact list, which leads to the output of details and issues around those customers. /wp-content/uploads/2024/12/Process-flow-diagram-example-customer-service-business-process.png Customer inquiry is logged, unique case IDs generated and a decision is made on whether a case requires specialized handling. In our process flow example, it does and is routed to the appropriate team. The problem is solved and customer feedback is collected by issuing a feedback form. Manufacturing or Production Process Flow Diagram Now, let’s see what a manufacturing or production planning process flow diagram looks like. As illustrated below, it begins with the input of a production request, which leads to the output of a material requirement plan. /wp-content/uploads/2024/12/Process-flow-diagram-example-manufacturing.png Next, suppliers are identified and inventory availability is checked. This leads to the question of whether materials are in stock. They are not. Therefore, a purchase order to suppliers is issued. If they are in stock, a production plan and schedule will be created, resources allocated and production starts. Process Flow Diagram Template Rather than building one by hand, download this free process flow diagram template for PowerPoint. It has a slide that shows and defines all the symbols needed to create a unique process flow diagram. /wp-content/uploads/2024/12/Process-Flow-Diagram-Template.png Then use arrows to connect the flowchart symbols to represent a process flow diagram. This template is fully customizable and can be used repeatedly to illustrate process flow to work more efficiently and communicate more effectively. How ProjectManager Helps Manage Process Flow While process flow diagrams can map out and illustrate processes for businesses, projects and more, they’re not going to plan, schedule and manage that work. For that, project management software is required. ProjectManager is award-winning project and portfolio management software with multiple project views that allow managers to plan, teams to execute and stakeholders to stay informed on tools that are appropriate for their needs. But once plans and schedules are made, there’s still work to be done to manage process flow. Monitor Time, Cost and Progress To keep work moving forward as planned requires regular monitoring of progress and more. Once the baseline is set on the Gantt chart, there are multiple ways to track project metrics. Project managers get a high-level overview of one or many projects with real-time project or portfolio dashboards. They automatically capture live data and display it on easy-to-read graphs and charts that show time, cost, workload and more. For more detail, customizable reports can be filtered to get into the weeds or summarize progress and share with stakeholders to keep them informed. Plus, secure timesheets do more than streamline payroll and provide data on how far team members are in completing their tasks, it also tracks labor costs to help keep projects on budget. /wp-content/uploads/2024/05/timesheet-lightmode-good-version-lots-of-tasks.png Manager Resources and Workloads Process flow doesn’t help much in terms of the resources needed to execute what it’s mapping. Gantt charts can schedule both human and nonhuman resources, then managers can set team availability, including PTO, vacation and global holidays as well as skill sets, to help when making assignments. Color-coded workload charts show resource allocation so managers can quickly see who is overallocated or underutilized and balance the team’s workload to keep everyone working at capacity without risking burnout. There’s also a team page that provides a daily or weekly overview of the team, which can be filtered by progress, priority and more. /wp-content/uploads/2024/04/Team-summary-better-data-light-mode-home-screen-dashboard.png Related Process Management Content Process flow is only a small part of the larger process management. For those who are curious and want to learn more, below are several links to recent articles about the subject. Business Process Management Software Business Process Improvement: Steps & Methodologies How to Make a Process Improvement Plan (Free Template) Process Implementation: A Quick Guide Process Optimization: Get More From Your Processes A Quick Guide to Business Process Mapping ProjectManager is online project and portfolio management software that connects teams whether they’re in the office, out in the field or anywhere in the world. They can share files, comment at the task level and stay updated with email and in-app notifications. Join teams at Avis, Nestle and Siemens who use our software to deliver successful projects. Get started with ProjectManager today for free. The post Process Flow Management Basics (with Examples and Template) appeared first on ProjectManager. View the full article
  17. The former CEO of the Broker Action Coalition left that post after 10 months following that group's split from the Association of Independent Mortgage Experts. View the full article
  18. Compromised passwords are a leading reason for data breaches. In fact, more than 80% of hacking-related breaches are caused by password-related issues. A strong password policy can help ensure everyone in your business uses strong passwords. So, what is a password policy? How can you create a standard password policy? And what are password policy best practices? Let’s find out below. What Is a Password Policy? A password policy is a set of guidelines to make everyone in a company create a strong password and use them properly to enhance computer security and online security. A standard password policy includes what users need to consider and what they should avoid when creating, changing, storing, or sharing passwords. For example, your password policy can dictate that users must create longer passwords, including a certain number of special characters. Depending on your organization’s needs, you can make your password policy advisory mandatory. Why are Password Policies Important? A password policy can help you enforce the practice of using strong, unique passwords in your business to enhance password security. Here are key reasons why implementing a strong password security policy is critical for your business: Password reuse is a security blunder. A password policy can quickly rule out password reuse practice A strong password policy with a clause of multi-factor authentication helps you minimize various security risks to a great extent Everyone in your company will start creating complex passwords and storing them safely. As a result, your passwords will be safe from brute force attacks and other password-related attacks A strong password policy signals to your customers and vendors that you are taking strict measures to safeguard passwords. This can help build trust with them Last but not least, a password policy cultivates a cybersecurity culture that is of utmost importance in today’s world, as small businesses are increasingly becoming the target of various types of cybersecurity attacks. How to Create a Standard Password Policy The following is a step-by-step process to create a strong password policy: Set Password Complexity Requirements System administrators or IT departments should set password complexity guidelines to ensure strong password creation. Here are the key password requirements to incorporate into your password policy, aimed at helping users prevent the creation of weak passwords: Passwords should be at least ten characters long (Longer is better) Users must include uppercase letters, lowercase letters, and special characters in passwords Including misspelled words is a good tactic for creating complex passwords Take into account not only the use of different character types but also the need to avoid common substitutions (for example, “Pa$$w0rd!” remains a weak choice). Encourage the use of passphrase-based passwords, which are longer and can be easier to remember, such as a line from a favorite song or book, with modifications to incorporate complexity. Brute force attacks and dictionary attacks can crack simple passwords. So your password policy must have complexity requirements to encourage users to create hacker-proof passwords. Create a Password Deny List In addition to having what users should do, your password policy should also state things users must avoid when creating passwords. A password deny list can include the following: Person-related information such as name, date of birth, place of birth, job title, etc. Telephone numbers, house numbers, or street number Name of spouse, children, or loved ones Reusing the same password on multiple accounts Regularly update the deny list with passwords exposed in recent breaches, utilizing resources like “Have I Been Pwned” to stay current. Include commonly used passwords by attackers in automated login attempts, even if they’re not personal information but often guessed passwords like “admin” or “password1”. As a thumb rule, your password policy’s deny list should include any type of personal information or a simple pattern (like QWERTY to 123456). Set a Password Expiration Period The primary purpose of establishing a password expiration period is to ensure that hackers cannot determine if the passwords obtained from an old data breach are still valid. For example, your password is disclosed in a two-month-old data breach incident. And you change your password every month. Hackers will not be able to gain access to your account using that leaked password. Ideally, the password expiration period should be set to three months. But you can adjust this period, depending on the needs of your business. Also, you should ensure that your employees don’t reuse the same passwords for other accounts. Balance security with user convenience by considering the use of longer expiration periods for systems with additional security measures (e.g., accounts protected by multi-factor authentication might have longer expiration periods). Implement user-friendly notifications and guides for password changes to encourage compliance without causing frustration. Enforce Multi-factor Authentication Multi-factor authentication (MFA) can increase the security of accounts in your business. This is because hackers won’t be able to gain access to accounts even if they get hold of logins and passwords for those accounts. Therefore, your password policy must make it mandatory for users to implement MFA for all accounts that allow this feature. Provide training and resources to ensure users understand the importance of MFA and know how to use it effectively. Offer options for MFA methods (e.g., mobile app-based, SMS codes, hardware tokens) to accommodate different user needs and preferences. Include Account Lockout Threshold The account lockout threshold allows user accounts to be locked after a specified number of unsuccessful login attempts. This feature safeguards your accounts against Brute Force attacks and dictionary attacks. Ideally, you can set the account lockout threshold to five failed login attempts. This includes implementing an account lockout period of 15 minutes. Implement a progressive increase in lockout duration for repeated lockout triggers to deter attackers while minimizing inconvenience for legitimate users. Offer a secure, user-friendly process for account recovery to reduce the workload on IT support and minimize user downtime. Have Guidelines on How to Store Passwords Do you know that 55 percent of employees save passwords in sticky notes? How your employees store passwords impacts password security. Storing passwords in email, note app on a phone, paper notes, and documents on a computer is a bad practice. Doing so weakens the security of passwords, even if the passwords are long and complex. Therefore, your password security policy must include clear guidelines for storing passwords securely. One way to do it is to use a password manager, which keeps your password encrypted and stored securely behind the master password. Though most browsers these days have a feature to store passwords, using a password manager to store passwords is a more secure option. A password manager also offers secure ways to share passwords among different users. Recommend and, if possible, provide access to enterprise-grade password managers for secure password storage and sharing. Educate users on the risks associated with insecure password storage methods and the benefits of using a password manager. Set Consequences for Policy Violators You have created a password security policy to secure computers and online accounts. So everyone should follow it religiously. Setting some consequences for those who frequently violate the policy can be a good idea to encourage all users to abide by the password policy, However, you should devise creative ways to make password policy violators feel they have made mistakes. Any harsh punishment can turn them into an inside threat. Provide policy violators with more awareness training sessions and encourage them to follow the password policy. But if someone repeatedly makes mistakes despite many warnings, letting them go can be the best option, as they’re risking your business. Develop a tiered response to policy violations that includes education and retraining for first-time violations and escalates for repeated non-compliance. Incorporate a feedback mechanism for employees to report difficulties in adhering to the policy, allowing for adjustments and accommodations. Update Your Password Policy Regularly Your password policy should not be something set in stone. Instead, you should review your password policy from time to time and check if it is successful: Ensuring that users create long, complex passwords Preventing users from creating new passwords that are easy to hack Encouraging users to change passwords frequently, as recommended in the policy Preventing users from using the same password for multiple accounts Schedule regular reviews of the password policy in response to emerging threats and advancements in password security practices. Involve users in the review process to gain insights into practical challenges and perceptions, ensuring the policy remains both effective and user-friendly. Adjusting your password policy based on insights gained from regular password audits enables you to develop a strong password policy that improves password security within your business. Password Policy Best Practices The following are the best practices to maximize the success of your password policy: Have an Easy-to-access Password Policy A comprehensive password policy is essential, but its effectiveness lies in its accessibility and user-friendliness. Users should find the guidelines easy to understand and follow, with clear delineations between critical sections like those for generating passwords and safely storing them. By offering both a printed guide and a digital version, you cater to individual preferences and needs, ensuring everyone, regardless of their tech-savvy, can refer to the policy at any given time. Adopt a Password Management System In today’s interconnected digital world, an individual is often juggling multiple accounts, leading to potential password fatigue. The challenge of creating and remembering unique passwords for every account can be daunting. By integrating a robust password management system into your organization’s digital infrastructure, employees can bypass this challenge. These systems not only auto-generate strong passwords but store them securely, reducing the chances of breaches. Making the adoption of such systems mandatory significantly boosts an organization’s cybersecurity posture. Forbid Insecure Password Sharing Password sharing, while convenient for collaborative projects, can become a significant security loophole if not managed correctly. Often, employees might resort to insecure sharing methods, such as sending passwords through easily intercepted channels like emails or text messages. Promoting secure sharing methods is essential. Many leading password managers offer features that enable encrypted password sharing, allowing team members to share access without jeopardizing security. Implement Login Time Restrictions Unrestricted access to organizational systems is akin to leaving the front door unlocked. Employees should be conditioned to log in only when they’re actively using certain accounts or systems and to promptly log out afterward. This minimizes the window of opportunity for unauthorized access, especially in scenarios where a workstation might be left unattended. A stringent password policy will reinforce the importance of this practice, highlighting the risks of prolonged, unnecessary logins. Do Regular Password Audits Simply having a password policy isn’t enough; its real-world effectiveness needs to be gauged regularly. Through systematic password audits, an organization can assess employee adherence levels and the policy’s overall efficiency. These audits serve a dual purpose: they help pinpoint potential vulnerabilities, and they offer insights into areas where the policy might need revisions or updates. This proactive approach ensures that the organization’s cybersecurity measures evolve in tandem with emerging threats. Password Policy Do’s and Don’ts Do'sDon'ts Create passwords with at least ten charactersUse personal information like name, DOB, job title Include uppercase, lowercase letters, & special charactersUse easily guessed patterns like QWERTY or 123456 Use misspelled words for complexityReuse the same password on multiple accounts Set a password expiration periodStore passwords in emails, note apps, or sticky notes Enforce Multi-factor Authentication (MFA)Share passwords via text, email, or instant messages Use a password manager for secure storageKeep systems logged in when not in use Update your password policy regularlyIgnore password policy guidelines What Are the NIST Password Guidelines? The National Institute of Standards and Technology (NIST) guidelines have evolved over the years to reflect a more user-centric approach. Among their recommendations, users should create passwords that are a minimum of eight characters in length. Instead of forcing users to incorporate complicated symbols and characters, NIST emphasizes password length over arbitrary complexity. They advise against mandatory periodic password changes unless there’s evidence of a breach. NIST also suggests allowing the ‘show password’ option to help users avoid mistakes when entering their password. Moreover, they highly recommend implementing two-factor or multi-factor authentication to add an extra layer of security. Are Complex Passwords As Important as Minimum Password Length? While complexity in passwords (such as including symbols, numbers, and both uppercase and lowercase letters) certainly helps against brute-force attacks, recent trends in cybersecurity suggest that length is a more critical factor. A longer password naturally increases the total number of potential combinations, making it exponentially harder to crack. However, an undue emphasis on complexity often results in users resorting to predictable patterns or writing passwords down. If feasible, users should be encouraged to use longer passphrases that are easy to remember but hard for automated systems to guess. When using a password manager, which takes the burden of memory off the user, combining both length and complexity is ideal. How Often Should Passwords Be Changed? Conventional wisdom once dictated that regular password changes (e.g., every 60 or 90 days) were essential. However, NIST’s revised guidelines suggest avoiding routine password changes unless there’s a specific reason, like a suspected security breach. Changing passwords too frequently can result in weaker passwords, as users may choose slight, predictable variations of their old passwords or even reuse them across different platforms. Nonetheless, it’s crucial to be proactive. Using password managers with breach notification capabilities can alert users if their passwords are compromised, prompting timely changes. Should Small Businesses Use a Password Manager? Absolutely. Cybersecurity should never be an afterthought, even for small businesses. Password managers provide many advantages, including the ability to generate strong, unique passwords for every account and securely store them in encrypted vaults. Furthermore, they facilitate secure password sharing, which is especially useful in collaborative environments. By centralizing password management, businesses can maintain tighter control over access to sensitive information, thereby mitigating risks. What Is the Ideal Password Policy? The ultimate password policy should strike a balance between user convenience and robust security. It would emphasize the creation of long, unique passwords or passphrases, ideally without forcing arbitrary complexity rules. Secure storage practices, such as using encrypted databases or reliable password managers, are essential. Promoting the use of unique passwords for each account helps ensure that a breach on one platform does not compromise others. Regular monitoring for breaches and compromised passwords, paired with an understanding of when (and when not) to change passwords, can round out a comprehensive, effective policy. YOU MIGHT ALSO LIKE: Sharing Business WiFi Passwords Doesn’t Have to Be Hard, Use QR Codes Like This Image: Envato Elements This article, "What is a Password Policy and How to Create One?" was first published on Small Business Trends View the full article
  19. We may earn a commission from links on this page. Deal pricing and availability subject to change after time of publication. Open-ear design earbuds have been getting popular, likely because active noise-canceling tech has gotten so good that people have forgotten what nature sounds like. The Ultra Open Earbuds are Bose's attempt at the trending tech, and they're decent. But at their current price of $179.99 (originally $299.99) from Woot, they are a steal. These earbuds have never been below the $200 mark on Amazon, but you can get them "unopened" (which is exactly what it sounds like) from Woot for the lowest price they've ever been, according to price tracking tools. Woot only ships to the 48 contiguous states in the U.S. If you have Amazon Prime, you get free shipping; otherwise, it’ll be $6 to ship. Bose Ultra Open $179.99 at Woot $299.99 Save $120.00 Get Deal Get Deal $179.99 at Woot $299.99 Save $120.00 Open-ear designs are not for everyone—especially audiophiles. They have the same downside as bone conduction headphones, they let noise pollution in, and the bass and some mids are weak. But you can hear if a cyclist is about to hit you because you're running on the bike path. The Bose Ultra Open are not waterproof, but they are water-resistant with an IPX4 rating, meaning they can take some splashes, but don't put them under a running faucet. There is a wireless charging case you can get separately if you don't want to use the USB-C connection to charge it. You'll get about 7.5 hours of juice if you have the Immersive Audio feature off, and about two charges with the case for a total of around 27 hours. While these earbuds don't have multipoint connection, they do have a feature to pair two devices simultaneously and switch between them by pressing a button on the earbud—acontrolled multipoint connection of sorts. They are compatible with Bluetooth 5.3 and work with the AAC, AptX Adaptive, and SBC codecs, so Android devices will get better audio than Apple users. Both users will be able to customize the EQ on the app and use features that you can read more about in CNET's review. View the full article
  20. A year after the launch of the short-lived Coca-Cola Spiced, Coke is adding another new flavor to its lineup. Coca-Cola Orange Cream is scheduled to go on sale Feb. 10 in the U.S. and Canada. It will be sold in regular and zero sugar varieties. Atlanta-based Coca-Cola Co. said Monday that it developed the soda, which mixes cola with orange and vanilla flavors, in response to growing consumer demand for the comforting, nostalgic flavor. Orange cream — first introduced with the Creamsicle ice cream bar in 1937 – has enjoyed a recent renaissance. Olipop, a probiotic soda, introduced an orange cream flavor in 2021. Carvel reintroduced its Orange Dreamy Creamy ice cream last year for the first time since 1972. Wendy’s also debuted an Orange Dreamsicle Frosty last spring. Coca-Cola has been experimenting with new flavors to help keep customers engaged with its signature product. In 2022, it launched Coca-Cola Creations, a series of limited-edition Coke flavors in colorful cans and bottles. Coke added hints of coconut, strawberry and even Oreos to the drinks. The company introduced raspberry-flavored Coca-Cola Spiced last February, saying the offering would be a permanent addition to its lineup. But the company abruptly pulled Coca-Cola Spiced off the market in September, saying it would be replaced with a new flavor this year. Coke said Coca-Cola Orange Cream won’t be a permanent flavor but would remain on sale at least through the first quarter of 2026. In an interview last year, Coca-Cola’s North American marketing chief, Shakir Moin, said it used to take the company at least a year to develop a new product. But it’s trying to move more quickly. “Consumers are moving faster. The market is moving forward faster. We’ve got to be faster than the speed of the market,” he said. —Dee-Ann Durbin, Associated Press View the full article
  21. On Tuesday, Rep. Rich McCormick (R-Ga.), suggested that kids who benefit from federally funded free lunch programs, like Head Start, should consider getting jobs to pay for their own lunches. The comments were made during an interview with CNN’s Pamela Brown, after the congressman was asked about Trump’s order to pause federal grants, loans, and other assistance programs, while the administration reviews how the funds are being allocated. “Who can actually go and actually produce their own income? Who can actually go out there and do something that makes them have value and work skills for the future?” McCormick said. “Before I was even 13 years old, I was picking berries in the field before (the) child labor laws that precluded that. I was a paperboy, and when I was in high school, I worked my entire way through.” The congressman continued. “You’re telling me that kids who stay at home instead of going to work at Burger King (and) McDonald’s during the summer should stay at home and get their free lunch instead of going to work? I think we need to have a top-down review.” Brown pushed back, urging McCormick to acknowledge that many of the children who receive free school lunches are elementary schoolers, and therefore well below legal working age. The terms of Trump’s executive order were laid out in an Office of Management and Budget (OMB) memo from Matthew J. Vaeth, Acting Director, Office of Management and Budget. It explained that federal funds should be “dedicated to advancing Administration priorities, focusing taxpayer dollars to advance a stronger and safer America, eliminating the financial burden of inflation for citizens, unleashing American energy and manufacturing, ending ‘wokeness’ and the weaponization of government, promoting efficiency in government, and Making America Healthy Again.” After releasing the memo, OMB sent a document to around 2,600 agencies that receive federal funds, including school meals for low-income students, U.S. Agency for International Development foreign assistance, the WIC nutrition program for pregnant women and infants, a reintegration program for homeless veterans, and others, asking for explanations on what exactly the programs do. In her first White House press briefing on Tuesday, press secretary Karoline Leavitt tried to quell worries by insisting the freeze was only a “temporary pause” to make sure these organizations receiving funds don’t conflict with the new administration’s policies. Leavitt also said that she would provide a list of the organizations affected and emphasized that eliminating funding to Diversity, Equity, and Inclusion programs (DEI), or other “woke” programs are a priority of the administration. Head Start, which provides pre-school funding for low-income children, told CBS that the freeze has the “potential to severely disrupt the ability for Head Start programs to serve nearly 800,000 children and their families nationwide.” Last year, the U.S. Department of Agriculture announced that students eligible for free or reduced price school meals cannot legally be charged processing fees starting in 2027. Trump’s executive order was later temporarily blocked by U.S. District Judge Loren L. AliKhan until Feb. 3, after a lawsuit brought by the National Council of Nonprofits, the American Public Health Association, the Main Street Alliance and SAGE advocates for LGBTQ+ told the court the impacts of the freeze would be “catastrophic.” At least six other attorneys have filed similar suits. At a news conference Tuesday, Letitia James, New York Attorney General called out Trump’s executive order, saying, “This policy is reckless, dangerous, illegal and unconstitutional.” View the full article
  22. We may earn a commission from links on this page. Welcome to “Cookbook of the Week.” This is a series where I highlight cookbooks that are unique, easy to use, or just special to me. While finding a particular recipe online serves a quick purpose, flipping through a truly excellent cookbook has a magic all its own. I’m always happy to see new cookbooks on the scene, but in truth, most weeks I’m flipping through my archives; revisiting older books I’ve picked up along the way. Some cookbooks I keep because they’re a treasure trove of reliable recipes (like this one), and others I keep because there are a few dishes in there that I’ve always loved. One of the latter is Miette. This week’s cookbook comes from the eponymous bakery in San Francisco. I bought this cookbook of sweet treats many years ago, when I worked at Borders bookstore—before I went to culinary school, before I had ever been to San Francisco, and before I knew how baking would shape my life. The vintage cake designs, scalloped edges of the pages, and classic recipes like walnut brownies, shortbread cookies, and salted caramels drew me in, and in these pages I could sense that baking would be a tool of comfort and meditation for me. A bit about the bookMiette first published in 2011, and comes from Meg Ray, the chef and founder of Miette bakery in California. Like many cookbooks that hit the market, it all starts with a popular restaurant or bakery, and if all is going well then a cookbook is sure to follow. I get the appeal. The bakery’s offerings are European in backbone but have a distinctly retro American look. The desserts are classic, and true to how the bakery produces their products. That means you end up seeing recipes that are simple, like the shortbreads, and others that take patience and a bit of know-how. Keep in mind that you’re looking for the most recent version. The 2011 cover features their three layer Tomboy cake. You’ll want to grab the 2023 updated edition here, which has their single layer Old Fashioned Cake on the cover. The newest edition includes corrections of errors that were in the first publication. A great cookbook for someone who bakes for othersI admit that I don’t use all of the recipes in this cookbook (I have other cookbooks I rely on for excellent cake recipes), but I love the small, packable recipes in Miette because they make beautiful gifts for my friends and family. Among many things, I’m a sucker for giving gifts, and if it’s something I’ve baked then I enjoy sharing it even more. This book is great for bakers who ship cookies out every holiday season, the person who drops off treats to their neighbors just because, and the coworker who brings in peanut butter cookies to share with his colleagues when they all go into the office on Thursdays. The cookies are often cut to have fluted edges, the brownies can be baked individually in cupcake pans, and the caramels can be wrapped like miniature gifts of their own. These treats were born to be gifts. The dish I made this weekThis week I was completely torn between the walnut brownies and the thumbprint cookies. If you’ve come across my hallongrottor post then you’re aware that I have a severe dependency on jam-filled baked goods. After a few back and forths, I marked the page for thumbprints. The recipe is very simple and that’s what I like about many of the cookie recipes, like the graham crackers or peanut butter cookies—Miette is not reinventing the classics. This thumbprint recipe has everything you might expect, flour, sugar, egg, butter, baking powder, and extracts. Solid. Credit: Allie Chanthorn Reinmann The instructions lean toward how they do production in their bakery, so you’ll mainly see mixing methods that use stand mixers. However, when cookie batches are small for home production I’ll often just do it by hand. This recipe was one of those that work just fine in a bowl with a wooden spoon. I mixed, I scooped, I rolled, and I thumbprinted. (Well, I use an old wine cork, actually—corks are superior to thumbs, here). This recipe, unlike many others, has the jam go in the imprint after the bake instead of before. It’s a little bit of a different vibe, but the jam stays glossy and doesn’t become a chewy disk after baking. Credit: Allie Chanthorn Reinmann The cookie was exactly as I hoped: pudgy and round with a dollop of sweet raspberry. A classic thumbprint cookie perfect for serving to friends or dropping off to your grandkids. The dough includes a healthy dose of vanilla extract, which I questioned at first, but not for very long. The cookie reminds me of raspberry vanilla ice cream and I’m not mad about it. How to buy the book The hardcover of Miette is available online or as an ebook. I highly recommend supporting your local brick and mortar bookstores by asking them to order it to their location if they don’t already have it in stock. Miette: Recipes from San Francisco's Most Charming Pastry Shop (Sweets and Dessert Cookbook, French Bakery) $18.21 at Amazon /images/amazon-prime.svg $34.99 Save $16.78 Shop Now Shop Now $18.21 at Amazon /images/amazon-prime.svg $34.99 Save $16.78 View the full article
  23. This post was written by Alison Green and published on Ask a Manager. A reader writes: This is not a current issue, but it’s something that has been eating at me for a long time. I’m trying to figure out if I unwittingly helped someone embezzle money. I believe the statute of limitations has passed for this (potential) crime in the state that it took place in. It has been 15+ years now. My mother has always been a little shady with business her practices. I do not believe she has any qualms about “bending” the law. She is also very charismatic and I suspect would be quite an effective cult leader (i.e., good at talking people into things, frequently nefarious). I’m only mentioning this because it seems like important context to have. She was the CEO and one of the owners of a small business (35-50 employees) that no longer exists. She had two other business partners who helped her start the company. This was a corporation so none of their personal finances should have been directly tied to the company. She put me on the payroll at 13. I helped out at the office probably 3-5 times total between the ages of 13 and 16, so I was not a regular employee. I did things like cleaning and filing. I don’t recall seeing paychecks for anything during that time, though it was quite a long time ago and my memories of this are a little fuzzy. I do remember one incident pretty clearly though. When I was 18, I was given a paycheck and asked to sign it over to her. I had not done any work for this company for quite some time. And I certainly wouldn’t have made the amount the check was written for. I believe it was just under the amount that would have been reported to the government on taxes (I think $10,000 is the threshold). I did see the check and this was definitely a paycheck from the business. She said the money was going to be used for a personal expense. She specifically told me that it was all legal, so I did what she asked. So, is any of this actually legal? Additionally, could she have been doing this while I was underage? Are there any details that would change the legality of the situation? I’m wondering if she found some sort of loophole that may not have been ethical but still legal. Even though I was told it was legal, it felt off to me and I made excuses not to do it again. She was Very Not Happy when I wouldn’t do it again, which adds to my suspicion. The situation is over now, and I am no longer in contact with her. I doubt anything would come back to bite me at this point, but I still wonder if I could have gotten into legal trouble. It almost definitely wasn’t legal. If you own a private business with no fiduciary responsibility to anyone else, you can pay someone for any “job” you want, including one that does no work at all. However, if you’re doing it just so they can sign over their paychecks to you, now you’re committing tax fraud. This can be nuanced and I’m neither lawyer nor tax expert, but in general: Since the income was reported as a payment to you and you weren’t earning enough to pay taxes yourself, that money wasn’t taxed … and even if you were earning enough to need to file a tax return, it’s likely that your mom would have had been in a higher tax bracket than you, since you were a teenager. Either way, that’s tax fraud. Interestingly, there’s a rule that taxes a child’s unearned income at the parent’s tax rate in order to prevent exactly this. But if your mom was classifying it as “earned” when it wasn’t earned through work, we’re back at fraud. I’m also curious whether she paid the business’ portion of the payroll taxes on the wages you received. (If she was paying you as a contractor, not an employee, then this wouldn’t be required. It also isn’t required when paying one’s own children when they’re under 18, but you were 18 for at least part of it.) Additionally, by fraudulently “paying” you, your mom was lowering the business’s taxable income — another problem. It’s possible there were other legal problems too, like if your “cost” was expensed to another entity. And if your mom’s business partners didn’t know what she was doing, she may have been violating laws about her fiduciary duties. If the business were a sole proprietorship, that would change some of this, but it wasn’t. However, your mom was the one committing fraud, not you. It’s extremely unlikely that any of this could ever have come back to bite you — but if your mom had been audited, it definitely could have bitten her. View the full article
  24. This post was written by Alison Green and published on Ask a Manager. A reader writes: This is not a current issue, but it’s something that has been eating at me for a long time. I’m trying to figure out if I unwittingly helped someone embezzle money. I believe the statute of limitations has passed for this (potential) crime in the state that it took place in. It has been 15+ years now. My mother has always been a little shady with business her practices. I do not believe she has any qualms about “bending” the law. She is also very charismatic and I suspect would be quite an effective cult leader (i.e., good at talking people into things, frequently nefarious). I’m only mentioning this because it seems like important context to have. She was the CEO and one of the owners of a small business (35-50 employees) that no longer exists. She had two other business partners who helped her start the company. This was a corporation so none of their personal finances should have been directly tied to the company. She put me on the payroll at 13. I helped out at the office probably 3-5 times total between the ages of 13 and 16, so I was not a regular employee. I did things like cleaning and filing. I don’t recall seeing paychecks for anything during that time, though it was quite a long time ago and my memories of this are a little fuzzy. I do remember one incident pretty clearly though. When I was 18, I was given a paycheck and asked to sign it over to her. I had not done any work for this company for quite some time. And I certainly wouldn’t have made the amount the check was written for. I believe it was just under the amount that would have been reported to the government on taxes (I think $10,000 is the threshold). I did see the check and this was definitely a paycheck from the business. She said the money was going to be used for a personal expense. She specifically told me that it was all legal, so I did what she asked. So, is any of this actually legal? Additionally, could she have been doing this while I was underage? Are there any details that would change the legality of the situation? I’m wondering if she found some sort of loophole that may not have been ethical but still legal. Even though I was told it was legal, it felt off to me and I made excuses not to do it again. She was Very Not Happy when I wouldn’t do it again, which adds to my suspicion. The situation is over now, and I am no longer in contact with her. I doubt anything would come back to bite me at this point, but I still wonder if I could have gotten into legal trouble. It almost definitely wasn’t legal. If you own a private business with no fiduciary responsibility to anyone else, you can pay someone for any “job” you want, including one that does no work at all. However, if you’re doing it just so they can sign over their paychecks to you, now you’re committing tax fraud. This can be nuanced and I’m neither lawyer nor tax expert, but in general: Since the income was reported as a payment to you and you weren’t earning enough to pay taxes yourself, that money wasn’t taxed … and even if you were earning enough to need to file a tax return, it’s likely that your mom would have had been in a higher tax bracket than you, since you were a teenager. Either way, that’s tax fraud. Interestingly, there’s a rule that taxes a child’s unearned income at the parent’s tax rate in order to prevent exactly this. But if your mom was classifying it as “earned” when it wasn’t earned through work, we’re back at fraud. I’m also curious whether she paid the business’ portion of the payroll taxes on the wages you received. (If she was paying you as a contractor, not an employee, then this wouldn’t be required. It also isn’t required when paying one’s own children when they’re under 18, but you were 18 for at least part of it.) Additionally, by fraudulently “paying” you, your mom was lowering the business’s taxable income — another problem. It’s possible there were other legal problems too, like if your “cost” was expensed to another entity. And if your mom’s business partners didn’t know what she was doing, she may have been violating laws about her fiduciary duties. If the business were a sole proprietorship, that would change some of this, but it wasn’t. However, your mom was the one committing fraud, not you. It’s extremely unlikely that any of this could ever have come back to bite you — but if your mom had been audited, it definitely could have bitten her. View the full article
  25. Chinese tech company Alibaba on Wednesday released a new version of its Qwen 2.5 artificial intelligence model that it claimed surpassed the highly-acclaimed DeepSeek-V3. The unusual timing of the Qwen 2.5-Max’s release, on the first day of the Lunar New Year when most Chinese people are off work and with their families, points to the pressure Chinese AI startup DeepSeek’s meteoric rise in the past three weeks has placed on not just overseas rivals, but also its domestic competition. “Qwen 2.5-Max outperforms … almost across the board GPT-4o, DeepSeek-V3 and Llama-3.1-405B,” Alibaba’s cloud unit said in an announcement posted on its official WeChat account, referring to OpenAI and Meta’s most advanced open-source AI models. The Jan. 10 release of DeepSeek’s AI assistant, powered by the DeepSeek-V3 model, as well as the Jan. 20 release of its R1 model, has shocked Silicon Valley and caused tech shares to plunge, with the Chinese startup’s purportedly low development and usage costs prompting investors to question huge spending plans by leading AI firms in the United States. But DeepSeek’s success has also led to a scramble among its domestic competitors to upgrade their own AI models. Two days after the release of DeepSeek-R1, TikTok owner ByteDance released an update to its flagship AI model, which it claimed outperformed Microsoft-backed OpenAI’s o1 in AIME, a benchmark test that measures how well AI models understand and respond to complex instructions. This echoed DeepSeek’s claim that its R1 model rivalled OpenAI’s o1 on several performance benchmarks. DeepSeek versus domestic competitors The predecessor of DeepSeek’s V3 model, DeepSeek-V2, triggered an AI model price war in China after it was released last May. The fact that DeepSeek-V2 was open-source and unprecedentedly cheap, only 1 yuan ($0.14) per 1 million tokens – or units of data processed by the AI model – led to Alibaba’s cloud unit announcing price cuts of up to 97% on a range of models. Other Chinese tech companies followed suit, including Baidu, which released China’s first equivalent to ChatGPT in March 2023, and the country’s most valuable internet company Tencent. Liang Wenfeng, DeepSeek’s enigmatic founder, said in a rare interview with Chinese media outlet Waves in July that the startup “did not care” about price wars and that achieving AGI (artificial general intelligence) was its main goal. OpenAI defines AGI as autonomous systems that surpass humans in most economically valuable tasks. While large Chinese tech companies like Alibaba have hundreds of thousands of employees, DeepSeek operates like a research lab, staffed mainly by young graduates and doctorate students from top Chinese universities. Liang said in his July interview that he believed China’s largest tech companies might not be well suited to the future of the AI industry, contrasting their high costs and top-down structures with DeepSeek’s lean operation and loose management style. “Large foundational models require continued innovation, tech giants’ capabilities have their limits,” he said. —Eduardo Baptista, Reuters View the full article
×
×
  • Create New...