Categories
Featured

Netflix movie of the day: You’ve Got Mail is powered by Tom Hanks’ and Meg Ryan’s awesome star power

[ad_1]

In the 1980s and 1990s, writer and director Nora Ephron was the queen of the rom-com: When Harry Met Sally, Sleepless in Seattle and You’ve Got Mail were huge movies both commercially and culturally. You’ve Got Mail reunites the Sleepless duo of Tom Hanks and Meg Ryan, casting them as rival bookstore owners who can’t stand each other in real life, but fall for one another anonymously online. If you were around at the time, the computer stuff will make you feel absolutely ancient (and if you weren’t, might be mildly baffling), but the movie itself has aged well and remains one of the great rom-coms from the 1990s – and makes for a great weekend watch among Netflix‘s library.

You’ve Got Mail has a star-studded cast and some killer lines

Rewatching the movie after 25 years, The Cut had some thoughts: “In 1998, it was still a little bit radical to meet your partner on the internet, especially in a chat room, but today, when rewatching You’ve Got Mail, what we really noticed feels nearly unrecognizable is the Upper West Side, the price of apartments (duh) throughout the city, and Barnes & Noble’s reputation.” And Cosmopolitan was surprised by how many familiar faces are in it: “Dave Chappelle as Hanks’ funny friend? Steve Zahn as Ryan’s co-worker? Chris Messina as a bookstore employee?”

[ad_2]

Source Article Link

Categories
Bisnis Industri

Mac running slowly? 5 reasons why you’ve got a slow Mac

[ad_1]

If your Mac is running slow, there are a few things you can do to speed it up and better understand what’s slowing it down.

It’s not just that your Mac is old — although that is an important factor. It could be that you don’t have enough memory, especially if you like to use Google Chrome. You may have a bunch of apps running in the background. There also might be dust in the vents, keeping your Mac from running nice and cool.

Check out our latest video or keep reading to learn why your Mac is slow and how to speed it up.

This post contains affiliate links. Cult of Mac may earn a commission when you use our links to buy items.

5 reasons for a slow Mac

1. Switch from Google Chrome (and other apps) to Safari

Safari is much easier on your Mac than Google Chrome, which is a notorious power drain and memory hog. The more Chrome tabs you have open, the less memory you have available for everything else.

Safari consistently comes out on top of browser speed tests. According to Apple, Safari loads pages up to 50% faster than Chrome. So, switching to Safari from Chrome is an easy way to speed up your slow Mac. (Making the switch also gives you a security boost, especially if you max out Safari’s privacy settings.)

It’s not just Google Chrome itself, either. Apps like Slack, Discord, Spotify, Microsoft Teams and many others are made using the Chrome browser engine, too. But there’s a solution to this problem: Instead of using the official versions of those apps, you can open them and sign in from Safari, then click File > Add to Dock.

Then you’ll be able to run your web apps in their own windows, just like before, but with the energy-efficient Safari powering them instead.

2. Check what apps are running in the background on your slow Mac

Background Items in macOS System Settings
Clear out the background items you don’t use.
Screenshot: D. Griffin Jones/Cult of Mac

It’s good to keep an eye on what’s running in the background, especially if your Mac is running slow. It could be that you’ve installed a bunch of apps over the years, and one of them is still churning away in the background even though you never use it.

You can find this information in System Settings > General > Login Items.

On top, you’ll see apps that launch automatically when you sign in to your Mac. You can click to select one and click the button to remove it. Below, you’ll see a list of apps allowed to run in the background. Simply uncheck them to turn them off.

Other background activities are built into macOS itself. There’s no easy way to turn them off without digging into the Terminal, but you should be aware of them:

  • If you sync your photo library to your Mac, it’ll download new pictures and videos in the background and scan through them to identify people and pets.
  • Spotlight, the universal search box that can find files, apps, messages, email and more, occasionally needs to scan your Mac to find if there’s anything new.

3. Your slow Mac is simply too old

Macs last a really, really long time — and that’s both a blessing and a curse. I used my 2015 MacBook Pro for eight years, even as its battery started swelling. Now, it’s probably a fire hazard.

Apple releases a major new version of macOS every year. And updating can make an older Mac run slowly. If you keep using an older version (while still installing Apple’s minor security updates), your Mac might run a little faster. (Or, at least, stop getting slower.) Major new releases with new features can slow down an older computer.

Toward the end of the period when Apple sold computers with Intel chips — let’s say from 2014 to 2020 — there were some pretty bad Macs. The 2014 to 2018 Mac mini is legitimately one of the worst Macs ever made. If you own one of those, I’m sorry.

The good news is that new Macs with Apple silicon chips inside are lightning-fast and relatively inexpensive. Walmart sells the M1 MacBook Air for just $699. And if you want to save more with a desktop, you can pick up an M1 Mac mini for around $500.

4. Your Mac is overheating

Spraying Mac innards with compressed air
Clean out your old Mac with compressed air.
Photo: D. Griffin Jones/Cult of Mac

If your Mac starts getting warm, it will automatically slow down (aka “throttle”) the processor to keep it from getting too hot. Normally, your Mac will only throttle itself if you’re doing something really intense, like exporting a video. It can be frustrating if your Mac slows down in the middle of your regular work.

In an older MacBook, the vents can become blocked by dust over time and cause overheating. That’s pretty easy to fix. Carefully unscrew and remove the MacBook’s bottom case. Then use a vacuum cleaner or a can of compressed air to clear out all the visible dust.

In ordinary usage, it’s rare for a newer MacBook Air with Apple silicon to be pushed to its limits, but it can still happen. Since these laptops doesn’t come with an internal fan, you can boost their performance with a cooling pad.

This model sold on Amazon costs only $25. When you’re at your desk, you can put your MacBook on top of it. The cooling pad’s fans will keep cool air blowing underneath, where a MacBook Air gets the hottest. This particular cooling pad doubles as a USB hub, so plugging it into your Mac gives you two USB ports as well.

5. You don’t have enough memory (or storage)

Most Macs made in the last 10 years start with just 8GB of memory on the base model. Upgrading to 16GB or more is one of the most important upgrades you can make when buying a Mac, but a lot of people skip it. You can upgrade the RAM on some older Macs, but not on any recent ones running on Apple silicon.

The bad news is, if you have too many apps open at once, other apps you have open will be pushed out of memory. And that can really make your Mac run slowly if you’re trying to multitask. Short of splurging on extra memory with your next Mac, unfortunately, the only solution when this happens is to quit big apps you’re not using.

This problem can be compounded if your Mac is running low on storage, too. Usually, when your Mac is running low on memory, background apps will be offloaded into storage — but if you don’t have enough storage, that can cause more problems. Here’s what to do if you need to clear up space on your Mac.

Read more about your Mac

Check out more Mac tips:



[ad_2]

Source Article Link

Categories
Life Style

So … you’ve been hacked

[ad_1]

It’s every researcher’s worst nightmare. A careless click on an e-mail and years of laboratory data are instantaneously encrypted by hackers. Or a piece of legacy lab equipment is compromised through its ancient, zero-security connection to the Internet. The machine might have been a godsend for running experiments from home during the COVID-19 pandemic, but now it’s an open door to those who wish to exploit your institutional intranet. In this viral infection, you, embarrassingly, are patient zero.

The list of hacked academic institutions, research centres and infrastructure makes alarming reading. It includes the School of Medicine at the University of California, San Francisco (UCSF); the Fred Hutchinson Cancer Center in Seattle, Washington; the Berlin Museum of Natural History; the Atacama Large Millimeter/submillimeter Array (ALMA) telescope in Chile; the Japan Aerospace Exploration Agency in Tokyo; the University of Wollongong in Australia; and the British Library in London.

But that list hardly scratches the surface — and certainly doesn’t reflect the many incursions that have been attempted. Research institutions are essentially under siege. “At the University of São Paulo, there are daily attempts to breach security protocols,” says Ildeberto Aparecido Rodello, director of the Information Technology Center at the university’s Ribeirão Preto campus in Brazil. The same goes for CERN, Europe’s particle-physics lab near Geneva, Switzerland. “We’ve been lucky in the past couple of years that we haven’t had any breaches which are worth calling a breach,” says Stefan Lueders, CERN’s head of computer security. “There are attackers outside who are constantly probing the organization for weaknesses.”

It can be hard to appreciate the scale of these operations, says James Fleming, chief information officer at the Francis Crick Institute in London. “The kind of actors who perform cyberattacks at scale are hugely efficient: they automate the vast majority of their processes,” he says. “The data our firewall collects shows that bots are trying different passwords to log onto accounts and different systems, or trying to find the vulnerabilities, tens of thousands of times a week.”

The problem is, universities and other research institutions can be soft targets. They thrive on data-sharing and openness and have a vast and highly mobile workforce, most of whom are less focused on cybersecurity than on the ability to access their systems from wherever they happen to be. “We’re here to share research and we’re open by design, which makes us weak to cybercrime,” says Sarah Lawson, chief information security officer at University College London. “Education has been heavily targeted over the last few years, and the statistics tell us that that’s on the rise.”

What’s more, she adds, universities haven’t conventionally invested in cyber defence, putting them on the back foot in what she likens to “a game of whack-a-mole”: eventually, you are going to lose. “It’s not if,” she says, “it’s when.”

Devastating consequences

When that happens, the consequences can be catastrophic. In a ransomware attack, for instance, precious files could be stolen or encrypted so that they cannot be accessed, unless the file owner pays the attacker. “You really have very few options,” Fleming says. “You can either just wipe everything and take the hit, or you can end up with a financial penalty.” UCSF took the second option after a 2020 breach of their systems, choosing to pay a ransom of US$1.14 million.

But if everything is backed up and no sensitive data have been compromised, the first option might not be too bad, Fleming says. “You hard-wipe all the machines and reformat all the hard drives, and then you do a rebuild. You maybe lose a week of productive time.”

That does depend on the scale of the attack and the preparedness of your institution, however. The British Library is now performing a “full technical rebuild and recovery” on its digital infrastructure after an October 2023 cyberattack, which occurred as the library was updating its core technology infrastructure. “The work will now be accelerated,” a spokesperson told Nature. It’s too early to say how long that will take or what it will cost, they add, but The Financial Times has estimated a price tag of around £7 million (US$9 million).

View of an atrium in the British Library with floor-to-ceiling book shelves and people reading as tables

The British Library in London has had to rebuild its digital infrastructure after a cyberattack in October 2023.Credit: Old Town Tourist/Alamy

Recovering from the attack on the ALMA observatory, which happened in October 2022, took “a bit less than seven weeks”, according to Jorge Ibsen, head of ALMA’s computing department. But the financial hit can only be guessed at, he says. “The best estimate would be 13% of the annual operational cost, which is the fraction of days within a year we could not deliver to our mission.” As for details of what the recovery entailed, and the measures taken since, Ibsen is keen to keep them under wraps. “Given the nature of this threat, we cannot further discuss details about our specific cybersecurity strategy,” he says.

Institutional cyberattacks don’t always end with a ransom payment or rebuild of digital infrastructure. For one thing, paying a ransom doesn’t necessarily preclude bad actors from weaponizing or releasing data. And there could be legal repercussions. For instance, some people who were affected by the attack at the Fred Hutchinson Cancer Center, in November 2023, have filed class-action lawsuits against the centre.

Unplug and shut down

What about the individuals who are compromised? When it happens to you, what should you do? Unanimously, these heads of cybersecurity plead that you communicate with them — after turning off and disconnecting whatever device has been hacked. “Pull out the plugs and shut it down. Close it and then seek advice,” Lawson says.

That said, prevention is always better than cure, and a properly prepared human can be a powerful firewall. “Update your software regularly; implement firewall and antivirus solutions; control access and permissions to your systems; encrypt sensitive data,” Rodello says. He even suggests engaging cybersecurity specialists to conduct regular audits and provide guidance on improving your lab’s digital safety.

After all, most academics are not trained IT professionals, and DIY solutions can be dangerous. Lawson says she can’t help but admire cybercriminals’ ability to manipulate their targets. “They’re the best psychologists in the world,” she says. “They will use every technique in the book to find the way into your money. And they’re really good at it.”

It might seem obvious, but another tip is to back up data somewhere secure — and, if possible, somewhere off-site. And don’t overlook the software you wrote yourself. “Ideally, people use proper software libraries and they run tests to make sure of its security,” Lawson says. “But we do have problems with people who don’t think about that.” Great researchers, she appreciates, are rarely focused on the fact that many criminals are out to ruin their lives.

Evolving threats

Those working in the health-care sector are at especially high risk. “The health-care system currently is one of the number-one targets for hacking because of the financial benefit that people can gain from getting a health record,” says Anthony Cartwright, an anaesthesiologist at the Cleveland Clinic in Abu Dhabi, United Arab Emirates, who has written about the cybersecurity risks in health care (A. J. Cartwright J. Clin. Monit. Comput. 37, 1123–1132; 2023).

Some vulnerabilities arose during the COVID-19 pandemic, Cartwright says, when many hospital staff began working from home. In many cases, those systems have not been updated. “They’re now accessing hospital network systems on an unsecured personal network. Often, that computer in the house will be shared between the mum, dad, brother or sister.” In other words, anything could get on there.

Such systems need to be updated, of course. But don’t overlook common-sense precautions, such as keeping passwords private. Cartwright was struck by a television segment filmed in a hospital during the pandemic. “As the camera panned around to one of the nurses at the control desk, there was a piece of paper giving the password — and you could read it on screen,” he says. “The Wi-Fi password was right there, on TV.”

That said, thanks to government initiatives such as the 1996 US Health Insurance Portability and Accountability Act (HIPAA), health-care workers are often more security-savvy than are academic researchers, reckons Anton Dahbura, executive director of Johns Hopkins University’s Information Security Institute in Baltimore, Maryland. “It’s much more top of mind and it’s been instilled in the culture.”

At the same time, however, bad actors are getting more sophisticated. Although some hacks are for sport or to advance a political agenda — hacktivists targeting scientists working on controversial research, for instance — cybersecurity professionals are increasingly concerned about state-level actors whose aim is to destabilize critical infrastructure or steal intellectual property. “Universities hold a lot of important, proprietary and sensitive information,” Dahbura says. Scientific research institutes such as genomics labs “hold information that adversaries, in particular nation states, would love to have”, he points out. “It’s no different than hacking into a research and development lab of a pharmaceutical company, except that it’s probably easier at a university.”

Whatever the motivation, no one wants to be the one who let an attacker in. Lueder offers a simple mantra: “Stop, think, don’t click!” This is how you prevent the majority of hacking attempts, he says. “The Internet has made us all so curious that we click on things without knowing what they are. The brain can be really stupid.”

[ad_2]

Source Article Link

Categories
Featured

Everything you’ve been told about mesh vs foam office chairs is probably a lie

[ad_1]

When you’re buying an office chair, pretty soon you’re going to have to choose between mesh and foam models. We’ve tested a massive range of the best office chairs, and as a rule of thumb, we recommend a mesh chair for breathability and a foam chair for extra comfort. But does that make mesh the better option for workers?

Not necessarily, according to a report by researchers at the University of California, in partnership with Secretlab, the company behind our pick for the best gaming chair. In their study, the researchers compared a high-end mesh model against the foam-covered Secretlab Titan Evo.

[ad_2]

Source Article Link