Protecting Lives: How Subsidence in River Deltas Increases Flood Risk for Millions

Chao Phraya River Delta

Thailand’s Chao Phraya River Delta: Rapidly Sinking

Channon Kanjanavasoonthara/Getty Images

The Chao Phraya River Delta, one of the most economically and environmentally vital deltas globally, is sinking at alarming rates, threatening millions with severe flooding. Recent satellite data analysis reveals that subsidence in river deltas is becoming a greater danger to local communities than rising sea levels.

Approximately 500 million people inhabit this delta, including some of the world’s most impoverished communities. This expansive lowland area houses 10 megacities, each boasting populations exceeding 10 million.

Manuchel Shirzai and his team at Virginia Tech researched subsidence rates in 40 global deltas, including the Mekong, Mississippi, Amazon, Zambezi, Yangtze, and Nile rivers.

Shirzaei noted, “As deltas sink, global sea levels are also rising by about 4 millimeters annually, creating a compounded risk of flooding.”

The research utilized data from 2014 to 2023 collected by the European Space Agency’s Sentinel 1 satellite radar, which can detect changes in ground distance with precision up to 0.5 mm. Across the 40 studied deltas, over one-third showed signs of subsidence, with more than half of the area affected in 38 of these regions.

“In numerous cases, land subsidence contributes more to relative sea level rise than the ocean itself,” Shirzaei asserted. “In 18 out of 40 deltas, average subsidence rates surpass sea level rise, with the impacts being significantly pronounced in areas located less than 1 meter above sea level.”

The Chao Phraya Delta, where Bangkok is situated, ranks as the most affected among 40 nations concerning subsidence rates and impacted areas. Here, the average subsidence rate reaches 8 mm per year, which is double the global average for sea level rise, with 94% of the delta sinking at rates above 5 mm per year.

As a result of combined land subsidence and sea level rise, Bangkok and the Chao Phraya Delta confront a formidable projected sea level rise of 12.3 millimeters per year. Other cities like Alexandria in Egypt and Jakarta and Surabaya in Indonesia share similar predicaments of rapid land subsidence.

The researchers analyzed three major anthropogenic pressures: groundwater extraction, sediment alteration, and urban growth to assess their impacts on delta subsidence. Shirzaei explained that upstream dams, levees, and river engineering limit sediment input, which is crucial for delta maintenance, while urban development escalates pressure on delta surfaces and heightens water demand, furthering groundwater depletion.

Among these factors, groundwater extraction poses the most significant impact overall, although specific delta areas may be more influenced by sediment shifts and urbanization, the study found.

Shirzaei emphasized, “It would be misguided for policymakers to concentrate solely on sea level rise due to climate change and overlook local land subsidence. Unlike global sea level rise, human-driven land subsidence can often be tackled locally through groundwater regulation, managed aquifer recharge, and sediment management.”

He also pointed out that water-intensive facilities, such as data centers, may exacerbate this issue. “Our findings reveal that groundwater extraction is a major contributor to accelerated land subsidence in numerous delta regions, which can worsen when such facilities depend on local water sources,” he remarked.

In already vulnerable areas like the Mekong Delta, increasing water demand may hasten land subsidence, jeopardizing drainage, flood protection systems, and the durability of crucial infrastructure. “This doesn’t suggest data centers should be avoided altogether in the delta, but they must prioritize groundwater conservation, minimize overall water use, and take land subsidence into account,” said Shirzaei.

Topic:

Source: www.newscientist.com

Protecting Your Data Post-Cyber Attack: Essential Strategies Against Cybercrime

A new cyberattack has made headlines, compromising personal information from hundreds of thousands of legal assistance applicants in the UK and Wales.

Following the recent cyber incidents that severely impacted Marks & Spencer and co-ops, reminders are circulating about the increased risk of suspicious activities.

If you’re concerned that your data may have been exposed, here are some tips to help safeguard yourself.

Update Your Password – Ensure It’s Strong

Always ensure you use a strong password and avoid reusing passwords across multiple accounts.

If you’ve interacted with a company or organization that has suffered a cyberattack, promptly change the password for that particular website or app.

“Consider using a password manager to create and securely store strong, unique passwords,” suggests the online security firm Nordvpn.

Two-factor authentication (2FA) adds an extra layer of security to your critical accounts by requiring a code sent via text or email for access. Be sure to enable 2FA on all services that offer it.

Exercise Caution with Unsolicited Emails, Calls, and Messages

Avoid clicking on links or attachments in unsolicited emails, texts, or social media messages, as they may lead to phishing sites or contain malware designed to steal your identity.

Phishing scams often leverage current events, like cyberattacks, to lure unsuspecting customers into providing sensitive information.

Scammers might possess personal details they obtained through breaches, making their communications seem more credible.

If someone claims to represent a company you use, verify their identity by ignoring their contact and checking official contact details instead.

Monitor Your Credit Report

In case your personal data gets compromised, regularly monitoring your credit report is crucial to detect any fraudulent attempts to create loans or acquire other products in your name. Several Credit Reference Institutions offer access, both free and paid.

We recommend checking your credit report periodically. You can access your credit data through the Credit Committee.

Credit Karma and Clear Score both provide free access to your credit report.

Be vigilant for signs of identity theft, such as being denied financial products unexpectedly or not receiving bank statements despite having a good credit rating. Additionally, receiving collection letters for debts you didn’t incur or items on your bank statement that you didn’t buy are clear red flags.

Most financial fraud is said to begin on social media and technology platforms. Remain cautious, as scammers may have enough information to impersonate someone you know.

The rise of “Hi Mom” scams, where criminals pretend to be relatives asking for urgent financial assistance via messaging apps like WhatsApp, has surged in recent years.

Even under pressure, take your time to verify the identity of anyone requesting money, ensuring you’re truly communicating with your loved ones.

Safeguard Your Devices

Keep your laptops and devices updated by ensuring they receive the latest software and security patches.

Only use official app stores and software update services for your downloads.

Source: www.theguardian.com

Protecting Your Data and Privacy: Opting Out with your Tesla

Welcome to opt-out. A semi-regular column that will help you navigate online privacy and show you how to say no to surveillance. The final column covered ways to protect the privacy of your phone and data at the US border. If you would like to skip to a section for specific tips, click on the “Jump to Jump” menu at the top of this article.

When you press the button, Tesla will use a feature called Summon to pull you out of the parking lot that is not behind the wheels. Use autopilot to drive yourself on the highway. Once you arrive at your destination, a feature called Sentry mode allows you to record nearby activities while parked.

To effectively operate any of these functions, your vehicle will need to monitor and collect large amounts of data about you. Most Tesla vehicles are equipped with nine internal and external cameras. Information from Tesla, delivered via location trackers, sensors, and more, can draw complex pictures of your life and movements.

“Teslas is truly a surveillance platform,” said John Davisson, senior advisor and litigation director at the Digital Rights Research Group’s Center for Electronic Privacy Information. “There are some privacy safeguards Tesla offers, which allows you to opt out of data sharing if Tesla actually follows those commitments, at least in terms of settings.”

Tesla does not only collect a substantial amount of data to enable a range of advanced features in the vehicle. Connected cars collect some information to work. Given the role of CEO Elon Musk in the Donald Trump administration, some Tesla owners are renewed interest.

These concerns are not entirely unfounded, according to Reem Suleiman, advocacy director for the Mozilla Foundation, who gave Tesla “no privacy.” Grade year In assessing the data security practices of automobile manufacturers. First, the company’s track record of protecting user data is unstable. 2023, a A Reuters investigation found Employees were sharing sensitive footage shot by the vehicle at the internal messaging forum. a Washington Post Analysis Of the transparency report published by Twitter, after Musk took over similarly, X acquiesced to X’s 20% government demands to remove content in the first half of 2024.

We spoke with privacy experts, consulted Tesla’s privacy policy, and asked Tesla’s own AI chatbot how to share the smallest amount of data with Tesla as much as possible. If you own a Tesla, you should take every precaution you can and in many cases you should take with your vehicle. However, more information: Adjust these settings to shut off access to many of the car’s features to share minimal data with Tesla.

“They say that if you choose to opt out of data collection, your car is essentially lemon,” Suleiman said. “They basically say that your vehicle can reduce functionality, serious damage, or impossibility. So, when you think about it, it’s kind of non-selection.”

Here’s what you need to know about your Tesla vehicle privacy:

What information does your Tesla gather about you?

Tesla’s privacy policy details the wide range of data the vehicle collects. Most of it is stored locally, but will also be sent to the company unless you change your settings.

According to Tesla’s AI chatbot, the information collected with you includes: “Location data (Tesla does not record or store vehicle-specific GPS information except in the case of a crash); driving habits and behaviors (speed, brake patterns, acceleration, etc.); diagnostic and vehicle usage data (Tesla product and services data and voice data and automobile) data (camera records, sensor measurements and other inputs to support advanced safety features).

The good news is that if you opt out of sharing information with the company, you can collect and store data on your vehicle’s local drive. The bad news is that law enforcement agencies have access to data if they get a vehicle in any way during a traffic stop or other situation, according to Davisson of the Electronic Privacy Information Center.

And it’s not just your car that collects information. The Tesla mobile app, which allows you to activate or summon Sentry mode, also collects location, contacts, browsing and device information. Read how to dial back how much your car is monitoring you.

Who does Tesla share your data with?

If you choose to share your data with Tesla, all data it collects may be shared with third parties, including law enforcement. In addition to sharing data with law enforcement when the company receives a valid court order, Tesla also shares data when it is “essential to protect national security or public safety,” according to the company’s privacy policy. Davisson says the language is ambiguous and opens the door to sharing video footage with law enforcement for many reasons. Recently, for example, the FBI has classified vandalism in Tesla vehicles and showrooms as “.Domestic Terrorism”.

“It’s a very short hop to think of immigration enforcement as a security issue that requires constant sharing, especially now, when everything is clearly a national emergency. Davisson is in real-time footage of ice and other law enforcement officers. “And that’s a horrible situation.”

So how do you protect your data?

Consider other vehicles

When it comes to privacy, everyone has a different risk profile. Some people may be more concerned than others about who has access to their personal information. Tesla’s exterior cameras can also collect footage of people around the vehicle, so it’s not just your own privacy that you need to be aware of.

If you’re worried about gathering information and don’t have a Tesla yet, privacy experts say you should choose a different car. If you have and want to regain your privacy, sell it. Even Tesla’s AI chatbots gave similar advice.

“If someone is deeply concerned about their privacy, they may consider alternatives such as: choosing a vehicle manufacturer with more restrictive data collection practices than 1 (this may be at the cost of reducing convenient features).

Skip past newsletter promotions

Reset your car at the factory before selling

So you already bought a Tesla and you decided to sell it. Suleiman and the Mozilla Foundation strongly recommend that you receive your car in the factory before you do so. This means your car will wipe out all its data, as if it’s off the lot.

“Just because you sold a car doesn’t mean you scrub your data,” Suleiman said. “That requires a bit of due diligence.”

Therefore, before you remove the vehicle from your Tesla account, you will need to factory reset your vehicle from your vehicle’s settings. Sit in the driver’s seat and follow these steps:

1 Go to Controls > Services > Factory Reset.

2 Enter your Tesla account username and password to confirm your credentials.

3 Make sure you perform a factory reset.

“This will erase all your personal data, including saved addresses, music favorites, imported contacts, and restore your car settings to factory defaults,” according to Tesla’s AI chatbot. The company also recommends removing “Homelink” devices. This allows you to control things like garage doors, lights, or home security systems from Tesla. You can click the Homelink icon at the top of the Controls screen to go to Homelink Settings and delete connections to other devices.

How to share the minimum amount of data with Tesla

In the vehicle and Tesla app settings, you can choose not to share your data with your company. But like I said before, be prepared to lose functionality in your car.

Opting out of data sharing in your car is pretty easy. In the vehicle,[設定]>[ソフトウェア]>[データ共有]Go to. Turn off Allow data sharing. This disables analysis, road segments, diagnostics, and sharing of vehicle usage data. Tesla’s AI chatbot recommended turning off the “Allow Autopilot Analytics” off to stop sharing of autopilot-related data.

Opt out of mobile app locations and data sharing. In the Tesla app, you will be taken to Settings (the button looks like three horizontal lines or gear icons). Next, scroll down to Security and Privacy. after that Select Turn off the location service. click Turn off analytics and stop sharing app usage data with your company. Next, revoke access to your camera, microphone, and contacts.

“By following these steps, you’ll be sharing the minimum amount of data with Tesla, while enjoying the core functionality and functionality of your mobile app,” according to Tesla AI Chatbot.

However, this will affect the functioning of your car. According to Tesla’s chatbots, data sharing affects these features.

< Source: www.theguardian.com

Protecting Mobile and Data Privacy during US Immigration.border crossing

Welcome to opt-out. A semi-regular column that will help you navigate online privacy and show you how to say no to surveillance. The final column covered what to do with the 23andMe account after the company filed bankruptcy. If you would like to skip to a section for specific tips, click on the “Jump to Jump” menu at the top of this article.

If you are a visa or green card holder who has plans to travel to the US, reports that people have been ousted at the airport for messages found on their devices may encourage you to make a second trip plan. You may ask Customs and Border Protection (CBP) if you can search for your phone, if you can opt out, and what to do to minimize the risk.

The simple answer is yes, CBP can search for devices. Constitutional protections are generally weak at US borders, including airports. You can try to opt out, but in some circumstances you may be willing to risk the potential consequences of not complying, which can include confiscation of your device.

Privacy experts say everyone needs to conduct a personal risk assessment. This should include immigration status, travel history and data on your mobile phone. Depending on your situation, data that may not be sensitive to others will not fit every solution into every solution. For example, if CBP attempts to search for a mobile phone or wants to lock down your device before heading to the airport, it could affect its rating.

Although CBP said it searched only about 47,000 devices of 420 million people crossing US borders in 2024, it was not as easy to figure out whether there is a risk of device searching, as the Guardian said border enforcement was unpredictable under the Trump administration. French officials said French scientists were recently kicked out at a Texas airport after immigration officers found texts critical of Trump on his phone.

“The ultra-conservative perspective is to assume that they are completely hinged and that even the most benign reasons for travel are targeting non-citizens in searching for these devices,” said Sophia Cope, a senior staff lawyer at the Electronic Frontier Foundation (EFF), a nonprofit digital rights group.

If you are a US citizen, you must be hospitalized in the country. That said, there are still some risks in some jurisdictions that devices are being searched for domestic reasons as CBP will allow them to work with the FBI or local police to proceed with domestic investigations.

There are steps you can take to make it difficult for CBP executives to access the device and its data. So, what should you do to protect your mobile phone data from searching? The main thing is to prepare before heading to the airport. This is what you should think about:

Before you travel, start preparing for the possibility of being drawn into a secondary screening. First, you need to determine whether immigration officers will comply with whether they ask if they can search for devices. They may request a password for your mobile phone, or you may unlock the device. Ideally, you will unlock your device yourself and will not share your password. You can decide not to give your consent, but it has its own risk.

From a Guide to the border From EFF: “This presents a no-win dilemma. If the traveler is compliant, the agent can scrutinize and copy sensitive digital information. If the traveler declines, the agent can seize the device and expose the traveler to additional questions and detention.”

If you reject a search, the officer may decide that you are not worth the trouble because you are not at high risk. They may let you go. However, on the back, the decline can lengthen the process or the border agent can confiscate the device. If they’ve confiscated your device, then you can confiscate your device so that they can document that they have your device when you try to get it back, and that they can document that they have your device when you try to get it back. Without giving up the password, immigrant staff can unlock it themselves using a variety of tools on their devices. You can also try to guess your password, so make sure you have a strong, long password.

There are many reasons why you might not want to risk being suppressed or confiscated from your device for longer than you have already done.

If you plan to adhere to phone searches to avoid further complications, you can search your phone manually or with forensic tools. It’s worth preparing for both types of searches.

Turn off your phone and ID before entering the US

EFF recommends turning off your device completely before entering the US. This could potentially bring your phone or laptop back to an enhanced security state, which could make it difficult for anyone to break the encryption on their devices.

Privacy advocates also recommend that you ensure that your device requires a password to decrypt or unlock it. For example, if you are using a Face ID or fingerprint to unlock your phone, it will allow executives to use it to access the device.

Please do not wipe the phone

You may think that the most protective option is to wipe your phone completely before traveling, use a burner without a phone, or travel. However, EFF’s COPE said it could actually raise doubts.

“If people do that, they’ll feel bad and they’ll just ignore them,” Coop said. “If you cross a border without data on your device, you can in itself consider it suspicious.”

Instead, we suggest selectively delete that information, rather than wiping the entire device, if there is data or text that appears to be cooperative but you don’t want to access, instead of wiping it all out.

Skip past newsletter promotions

Encrypt your data and use strong passwords

The most important step to take before you travel is to encrypt the data on your device. This is different from using encrypted messaging services such as signals. Device encryption makes it difficult for CBP executives to access files on their phones or laptops or recover deleted files, even if they confiscate their devices and submit to sophisticated forensic tools.

Fortunately, All recent models Full device encryption will automatically be turned on for both iPhones and most Android phones. On Android, the “Security” menu is[詳細設定]Double check that yours is turned on in the tab. As CBP cannot walk through the front door of the device, you need to choose a strong password that is not easy to guess. Here is Good primer How to create a strong password.

“This encryption is as good as the encryption passphrase someone uses on their devices,” said Bill Buddington, senior staff technician at EFF. “So the best advice is to choose a powerful 9-12 random (or 4-5 words) passphrase for your device and make sure that biometric unlocks like face ID and touch ID rotate. off You can confiscate any device when passing through sensitive areas such as checkpoints or anywhere else. ”

On the other hand, laptops don’t come with all device encryption. Some encryption tools can be used to encrypt your data. MacOS has a tool called FileVault that can be accessed by searching in the top right corner of the screen. Some Windows computers come with a tool called a bitlocker that can be used to encrypt devices. EFF has a complete list of tools that can be used on various operating systems here.

For those traveling with devices owned by their employer or someone else, you should have conversations with them before you travel to make sure your devices are well protected.

How to safely delete data

In addition to encrypting your device, you should not want to delete certain text, apps, photos, etc. that you think are sensitive or show it to government agents.

To safely delete this data, there are several steps and limitations. If you haven’t wiped your phone completely, you may choose to delete certain files as there may be suspicion. That more practical option may be effective for manual searches and rough searches, but may not be sufficient if more sophisticated searches occur with US immigrant personnel. The files may not be completely deleted, or there may be references to these files that are still on your device.

In addition to ensuring that your device is encrypted, you must also make sure you have deleted the files from the Trash. For example, in iMessage, clicking Filter in the top left corner will find the “Recently Deleted” folder. Make sure you cleared the text from there. On iPhone, there is one file It has been deleted Both the main Imessage interface and the “recently deleted” file are permanently deleted, according to the company.

Cope recommends preemptively deleting apps you don’t want to search for. This protection method is incomplete as advanced searches may reveal that the app is installed, but for example, in manual searches, it is a way to avoid searching for WhatsApp messages.

Go to the cloud storage server

During a search for law enforcement within US boundaries, cloud storage servers are less protected than devices. However, at the border, there is currently a policy in place that prohibits CBP from searching for online cloud services. In reality, that means that immigration officers need to go into plane mode before searching for their mobile phones.

“They specifically say that executives are only allowed to consider data that they are "resident on the device,"” Cope says. “It’s data that’s actually on your phone, laptop, or camera hard drive. If it’s an internet-connected device, you’re supposed to be disconnected from the internet.”

If for some reason there is data that cannot be permanently deleted or cannot be deleted, you can delete it from your device and save it to cloud storage such as iCloud, Google Drive, or Microsoft One Drive.

This is a high-level guide that may not touch on the details of your situation. A complete comprehensive guide on how to protect your device with Electronic Frontier Foundation.

Source: www.theguardian.com

CEOpromotes Child Protecting parents from worrying about kids Roblox games

The platform’s CEO advises parents concerned about their children using Lobras not to allow them to use it.

Reports of bullying and grooming have surfaced, making the site the most popular among UK gamers aged 8 to 12, raising fears of exposure to explicit or harmful content.

David Basizakki, co-founder and CEO of Roblox, told BBC News that the platform is committed to safeguarding users and that millions have had positive experiences on the site.

However, he emphasized the importance of parental comfort and empowerment in making decisions regarding their children’s use of Roblox, mentioning the platform’s vigilance against negative behaviors and its collaboration with law enforcement when necessary.

Justin Roberts from Mumsnet highlighted the challenge parents face in monitoring their children’s online activities, especially with multiple children, expressing how managing their children’s Roblox use is a common struggle among forum users.

Roblox, a US-based company, boasts a large user base, surpassing the Nintendo Switch and Sony PlayStation combined, with over 80 million daily players in 2024, 40% of whom are under 13 years old.

The platform enforces consequences for misbehavior, utilizes advanced AI systems to detect problematic behaviors, and limits certain features for younger users to enhance safety.

Baszucki emphasized a zero-tolerance policy towards inappropriate content and shared that Roblox follows strict age-rating guidelines based on content and game titles.

Skip past newsletter promotions

Baszucki and Cassel founded Roblox in 2004, initially opening it to the public in 2006 after realizing its potential beyond educational use.

As the platform’s popularity grew, safety measures were introduced, marking a significant turning point when the digital currency Robux was launched, propelling Roblox to a $41 billion valuation.

Robux is used by players to acquire items and unlock content, with content creators earning a percentage of the fees and pricing adapting dynamically based on popularity.

Baszucki envisions Roblox as the future of communication, focusing on creating metaverse-style experiences where users interact through avatars in a virtual world, aiming to engage 10% of global gamers.

Source: www.theguardian.com

Musiciansal Performance Society (MPS) emphasizes protecting artists’ rights in AI copyright discussion

The MP’s two cross-party committees are urging the government to prioritize ensuring fair rewards for creators for their creative work and to facilitate the training of artificial intelligence models.

Lawmakers are advocating for more transparency in the data used to train generative AI models and urging the government not to implement plans that require creators to opt out of using such data.

The government’s proposed solution to the AI-copyright law tension includes exceptions for AI companies to train models with copyrighted work under “text and data mining,” while providing creators the option to opt out of the “rights reserve” system.

Caroline Dinage, chairman of the Culture, Media and Sports Committee, expressed concern over the response of the creative industry to the proposal, highlighting the threat to artists’ hard-earned success from unauthorized use of their work.

She emphasized the importance of fair treatment for creators and the need for transparency in data used to train AI models to ensure proper rewards for their work.

The Culture, Media, Sports Commission, Science, Science, Innovation and Technology Commission responded to government consultations on AI and copyright after a joint evidence session with representatives from AI startups and creative industries.

Letter to the Minister will enhance government transparency about training data, protect opt-out copyright holders, and empower consumers to make informed choices about AI models.

Failure to address these issues could disproportionately impact smaller creators and journalists operating under financial constraints, according to the letter.

Concerns among celebrities and the creative industry about government AI proposals have led to protests, with musicians releasing silent albums in protest.

Skip past newsletter promotions

The letter also highlighted the need for transparency in training data for AI models, citing examples from the EU and California which have introduced requirements for detailed technical records on training data.

The government is considering revenue-sharing models for AI developers to address copyright concerns and is urged to conduct full impact assessments on proposed options.

The letter cautioned against AI developers moving to jurisdictions with more lenient rules and emphasized the need for compliance, enforcement, and remedies for copyright issues.

Source: www.theguardian.com

Protecting Your Eyes: A Comprehensive Guide

Next month, people across the continental United States will have the opportunity to witness a partial or total solar eclipse. However, it is crucial for them to take precautions to prevent eye damage during this rare astronomical event.

On April 8th, the moon will pass between the Earth and the sun, causing a temporary blockage of the sun’s light. This will result in a darkening of the afternoon sky along a path approximately 160 miles wide across Mexico, parts of the United States, and parts of eastern Canada.

Those outside of this path will be able to observe a partial solar eclipse, where only a portion of the sun is obscured by the moon.

To safely view the eclipse, special glasses or a pinhole projector can be used. It is important to note that regular sunglasses or other tools like telescopes should not be used to observe the eclipse even while wearing special glasses.

Here are some key points to keep in mind:

How to select the right eclipse glasses

The only safe way to directly view a solar eclipse is by using glasses specifically designed for this purpose. These glasses should be equipped with an ISO 12312-2 filter to prevent photothermal damage to the retina, as advised by Dr. Nicole Bajic from the Cleveland Clinic Cole’s General Ophthalmology Institute.

Eclipse glasses are significantly darker than regular sunglasses, making them safe for solar viewing.

Failure to take precautions while observing a solar eclipse can result in permanent damage to the eyes, known as solar retinopathy, which affects the retina’s ability to transmit light into electrical signals for vision.

When and how to use glasses

According to NASA, it is only safe to view a solar eclipse directly without glasses during the brief period of totality when the moon completely obscures the sun’s bright face. Before and after totality, eclipse glasses must be worn to protect the eyes.

Totality, when the sun is completely covered, lasts approximately three and a half to four minutes and can vary by location.

For those observing a partial solar eclipse, wearing eclipse glasses throughout the event is essential. Additionally, using tools like binoculars or cameras without solar filters can cause serious eye damage.

Ensuring the safety of your glasses

While NASA does not endorse specific solar viewers, it is recommended to choose reputable options from sources like the American Astronomical Society to avoid counterfeit or substandard products.

If you saved your eclipse glasses from the 2017 event, they can be reused as long as the lenses are undamaged. However, if there are any scratches, holes, or wrinkles on the lenses, it is advisable to purchase new glasses.

Creating and using a pinhole projector

In the absence of proper glasses, a pinhole projector can be made to safely view the solar eclipse without looking directly at the sun. This device captures sunlight through a small hole, projecting it onto a surface to create a safe image of the sun.

To make a pinhole projector, cut a hole in a piece of paper, cover it with aluminum foil, poke a small hole in the foil, and use another piece of paper as a screen for the projected image. Adjusting the distance between the projector and the screen will change the size of the image.

Other household items like a colander or a cereal box can also be used to create a pinhole projector for eclipse viewing.

Alternatively, stand under a shady tree during the eclipse to observe the crescent-shaped shadow cast on the ground.

Source: www.nbcnews.com

Protecting the entire power grid from outages by rainproofing 1% of power lines

Damage from storms like Hurricane Harvey caused severe power outages to the Texas power grid.

Mark Ralston/AFP via Getty Images

Simulations suggest that storm sheltering just 1% of the power lines in a power grid can reduce the likelihood of a hurricane-induced power outage by a factor of five to one in 20. The demonstration, conducted on a mock version of the Texas power grid, could help improve the resiliency of power transmission systems around the world.

“The importance of different power lines to the overall system becomes clear only when studying the partial disruption of the power grid as the storm progresses,” he says. frank hellman at the Potsdam Institute for Climate Impact Research, Germany.

To identify the critical power lines most in need of protection, Hellman and his colleagues investigated how the power grid responds to widespread damage over time. They focused on the large-scale “failure cascade” that occurs after the initial storm damage. When power plants and transmission lines shut down to protect against further damage, secondary power outages can occur and increase the impact of a hurricane.

Researchers have determined that wind-related storm damage, such as damaged pylons and fallen tree limbs from gusts, and resulting damage to Texas during seven historic hurricanes between 2003 and 2020. simulated both a series of power outages that occurred on the power grid.

Rather than trying to predict individual power line failures, which can be caused by fallen trees or lightning strikes, researchers set each power line's probability of failure based on local wind speeds during each storm event. assigned. Their model maintains the same 20 critical transmission lines, where initial storm damage can cause a series of secondary line failures, even if they randomly vary the probability of failure for each line and rerun the simulation. Consistently identified electrical wires.

This experiment synthetic network model of the Texas Grid, which was previously developed by a team at Texas A&M University. It is not an exact replica of the actual physical grid, but represents the overall behavior of the grid. “None of the power lines in that grid are real power lines,” he says. adam burchfield at Texas A&M University. “Therefore, to see if these results hold true for the real Texas grid, we need to perform the study on at least a model of the real Texas grid.”

Power grid operators themselves can run this simulation with their own detailed power grid models, although independent researchers typically do not have access to such models for security reasons. Once you identify which specific lines are weak points, you can weatherize critical components of your grid.

Beyond Texas, such simulations can also model grids in other locations where similar storms have occurred. It says it “may provide an opportunity to validate the model and results.” Chuan Yi Ji from Georgia Tech in Atlanta was not involved in the study.

Hellman acknowledges that wind damage models have limitations. It does not take into account the possibility of further damage from flooding or how precautions grid operators can take to prevent power outages.

Still, Burchfield said the study's use of “different scenarios” to check the probability of outages in a realistic grid model further emphasized the study's main findings. “I think grid strengthening is a key element in making the grid more resilient,” he says. “And this paper shows that strategically choosing which transmission lines to strengthen is important to have the greatest impact on resiliency.”

topic:

Source: www.newscientist.com

Florida Senate approves bill prohibiting local regulations protecting workers from heat-related hazards

The Florida Senate has passed a bill that would prevent cities and counties from enforcing mandatory water breaks or other workplace safety measures for extreme heat.

With a 28-11 vote along party lines, the Republican-controlled Senate approved Senate Bill 1492, which would prohibit local governments from setting workplace heat standards higher than federal requirements. This means that cities and counties would no longer have the authority to mandate water breaks or shade breaks for workers during the day.

The legislation was introduced in response to the record-breaking heat in 2023, which resulted in prolonged heat waves and high temperatures in the southern United States. Climate experts attributed the extreme heat to global warming.

Proponents of Senate Bill 1492 argue that uniform regulations are necessary to avoid inconsistent rules across the state.

However, labor organizations argue that workplace heat standards are vital for protecting workers, particularly those in industries like construction and agriculture that require outdoor work.

Similar to a law in Texas, the bill in Florida would prevent local governments from implementing ordinances that mandate outdoor workers to take breaks for water or shade.

According to the National Weather Service, heat-related incidents cause more deaths in the U.S. than any other weather event, with outdoor workers at higher risk. The bill would also prohibit local heat protection measures such as training programs and record-keeping related to heat exposure.

While companies must adhere to OSHA’s general workplace safety regulations, there are currently no specific federal guidelines addressing extreme heat hazards.

The bill is pending final approval in the House of Representatives before reaching Governor Ron DeSantis. If signed, it will take effect on July 1st.

Source: www.nbcnews.com