Commuting by Rocket?
Elon Musk’s newest idea is city-to-city transportation by rocket. By Musk’s estimation, it would take 39 minutes to travel from New York to Shanghai, 29 minutes to travel from London to Dubai and 24 minutes to travel from Los Angeles to Toronto.
His plan involves using the interplanetary rocket system he’s already developing for voyages to Mars and modifying it for much shorter Earth-to-Earth trips.
If his idea takes off, it would result in the fastest inter-city commuting in human history. Of course, there might be some trade-offs. The rockets would hit speeds of up to 18,000 miles per hour, which is considerably faster than most people are accustomed to traveling.
“The thought of blasting off on a rocket to space is exciting, as is the potential for adding moments of weightlessness to your trip to London or wherever. But will people actually be willing to put their bodies through these kinds of extreme stresses for the sake of shaving a few hours off their trip?” writes Sean O’Kane of The Verge.
Google’s New Chromebook Wins Praise
Wired is raving about Pixelbook, the newest Chromebook from Google.
The new computer’s 12.3-inch screen rotates a full 360 degrees, so it can be used like a traditional laptop or a tablet. It weighs about two pounds, about the same as an Apple MacBook. The Pixelbook can be purchased with a Core i5 or Core i7 processor, up to 512 gigs of memory and up to 16 gigs of RAM, giving it some serious muscle.
“Google's view of hardware is that you should have software, apps, and services that work everywhere, and the only decision you ever have to make is which screen size and input you want. The Pixelbook won't replace your phone, but it does a lot of the things your phone does, and that's a good start,” writes David Pierce of Wired.
Cyber Attackers Learn From Past Mistakes
Cyber criminals have apparently upped their game, learning from their past mistakes and developing highly sophisticated tactics to avoid being discovered.
Some of the newer attacks exploit software vulnerabilities, as opposed to older tactics relying on email phishing to infect corporate networks. Once they’re inside a company’s network, the cyber criminals wait before launching an actual attack. Waiting silently gives them the opportunity to infect more systems and devices within the network, resulting in more damage.
They’re also getting better at covering their tracks and eluding detection.
“In the past, cybercriminals would sometimes make encryption mistakes and mismanage their keys, but the more successful ransomware operations have clearly learned from those mistakes,” writes Rob Wright in TechTarget.