Archive for November 27, 2022

Ozzfest Flops in the Metaverse

Ozzy Flops in the MetaverseThe reviews are in for the recent Decentraland MetaverseMetaverse Music Festival 2022,” by Ozzy Osbourne. They are not good. The legendary IRL hard-rocking concert series Ozzfest looked like “a slideshow running on a PlayStation 2,” in the digital space according to one review

Ozzy Osbourne in the metaverseThe Metalverse show featured “performances” by metal legends Skid Row, Megadeth, Motorhead, and Ozzy Osbourne. The Prince of Darkness performance turned out to be digital facsimiles of Ozzy stiffly “performing” on stage. No backing band, just the legendary performer’s virtual avatar looking “stiff as hell” in one review.

Metaverse mosh pit

There was a sparse crowd of player avatars just kind of standing there and maybe shuffling their feet in a goofy, lifeless dance. One review called the concertgoers “a phantasmagorical array of avatars.” (rb- I don’t know what that means – but I’m sure its not good) Not exactly the sweaty, blood-pounding experience of the Ozzfest mosh pit of my youth.

Metaverse Music Festival 2022

As you can see in the video, the visuals were bad. They were described as having the “set design and visual appeal that would fit better in Guitar Hero.” There were hokey banners shouting things like “Welcome to the Metalverse” and “rock your fucking heads.”  The show backdrop featured an advert for NFTs. It sounds like the “corporate capitalist hellscape” that we have come to expect from social media not a show from the Black Sabbath frontman.

What is the metaverse

metaverseIn plain language, the metaverse is an interactive, 3D version of today’s internet. The pipe dream is for people to travel through virtual spaces.  We’ve (kind of ) seen this fad before. Second Life was the virtual world du jour in the early 2000s.

Launched in 2020, Decentraland is described as a virtual social world powered by the Ethereum blockchain. It claims to be the first decentralized metaverse. Within the Decentraland platform, users can create, experience, and monetize content and applications as well as socialize and attend events like Ozzfest. 

Not many visitors

The Decentraland Metaverse isn’t exactly teeming with people. Despite a metaverse valuation of over $6.5 billion dollars, users just don’t care. There are reports that Decentraland only had 38 “active users” over a period of 24 hours. This a very low number, especially considering the company has a market cap of a $1.2 billion. These numbers really amount too much, given the amount of money being poured into metaverse platforms like Decentraland. One expert said,

Anyone telling you that there’s a metaverse today that has worked is lying through their teeth

rb-

A cow wearing VR gogglesI get it – the metaverse is a new crypto-enabled sales channel. It is being used to promote new music, drive NFT sales, or perform in the metaverse with new audiences.But I am highly skeptical of any of these projects by the techbros to upload everything into the new-agey singularity metaverse.

I sure hope this is not the future. Where some unknown person on the intertubes can exploit and make even more money off of dead musicians and bands that no longer exist. Can you imagine a Kiss farewell 2040 show made up of deep-fake technology viewable only with a virtual reality headset rig?

I don’t want to go to a pretend concert in a pretend location.

I would rather be on the hill at Pine Knob during a June evening hearing real sounds, real sights, real smells, and real emotions, from real musicians with real fans.

Pine Knob

 

How you can help Ukraine!

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Happy Thanksgiving 2022

What does a one-legged thanksgiving turkey say? …

… Wobble wobble!  

Enjoy this festive pilgrim hat

Happy Thanksgiving


…during Turkey Day 2022.

 

How you can help Ukraine!

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Clippy Christmas Sweater from Microsoft

Clippy Christmas Sweater from MicrosoftRemember Clippy? Well the annoying animated Microsoft Office virtual assistant is back for the holidays! The paperclip would pop-up at just the wrong time to offer suggestions that were only slightly useful. Microsoft has brought back Clippy in a an ugly Christmas sweater available from the X-Box store for $74.99.

The sweater includes the annoying dialog boxes that would interrupt your work that “helpfully” assisted users if they were typing up a Word document, making a PowerPoint, or working on an Excel Spreadsheet seemingly the exact second you were working on something important.

Windows Ugly Sweater: Clippy Edition

According to The Verge, Clippy first popped into Word document in  offered its assistance from 1997 until 2001. Those were the Windows XP days over 20 years ago. More recently, Clippy has shown up in Microsoft Teams. Clippy has also returned to replace the standard paperclip emoji in Windows 11.

How you can help Ukraine!

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

6 Things to Never Save on Your Mobile Phone

6 Things to Never Save on Your Mobile PhoneTwo out of every three people are addicted to their mobile phone. The average user touches their smart phone 2,617 times a day. It is no wonder that most people view their cell phone as detailed summary of their personal life. This convenience comes at a price. A recent from report from Kensington found that 70 million smartphones are lost each year, with only 7 percent recovered.

dangerous to your privacy and your walletThere are things you should never store in your cell phone. Readers Digest says that keeping valuable info on your mobile is dangerous to your privacy and your wallet. You open yourself up to an invasion of privacy, identity theft and straight-up theft. Here are some things you should not keep on your phone.

Your passwords

If you keep your passwords on your mobile, you are putting you privacy at risk. Even if you keep them in a note, a document or even in auto-fill on your mobile, you’re putting your data at risk. The article says if you lose your phone, someone might easily see your “cheat sheet.”  Because everyone snoops through mobile phones. Even if you store your passwords on your mobile phone they can end up stored in the cloud, still putting your accounts at risk. Instead consider a password manager such as Keeper, or LastPass. That way all of your passwords can be accessed by you using one strong master password.

Your face and fingerprints

don’t use biometrics to open your phoneIf you really want to keep your cell phone secure, don’t use biometrics to open your phone (or any of its apps or accounts). There are many reasons why biometrics like fingerprints don’t make you more secure. Facial recognition apps are more dangerous that using a password. The author says the simple fact is that a phone that requires a password to unlock it requires more steps to unlock. That makes the mobile phone more secure.

Your private photos and videos

You may have cleaned up your Facebook account, but what about your phone? What photos and videos do you store on your phone? If you have photos you wouldn’t want your spouse, children, or boss to see, then you shouldn’t store those photos on your smartphone according to the article. Media stored on your phone is saved in the cloud outside of your control.

Your naughty photos are one problem. Another is any photos containing private information. While photos of credit cards and ID can help you keep track of “what’s in your wallet,” they can also leave your information vulnerable to hacking. Again the photos are stored on the cloud. As with your naughty photos, Readers Digest suggests you store your pictures ID on a PC that only you have access to in a password-protected album.

Anything on your work phone

Do not save anything personal on an employer-provided mobileDo not save anything personal on an employer-provided mobile. There’s no such thing as a free lunch. The phone you were issued by your employer comes at a steep price: your privacy. You should have no expectation of privacy for anything you do on that phone. For your personal life the article recommends using a separate phone and phone number. One budget-minded option is a burner phone.

Your online bank account

Digital banking in the US is expected to grow from 197 million users in March 2021 to 217 million by 2025. But the convenience online banking affords—the ability to bank anywhere, anytime— comes at a cost: your privacy. Carrying your bank account with you on your phone means that you’re risking losing control of it in the event you lose your phone…or even lose track of an old phone that you no longer use they warn.

To manage the risk, you might consider avoiding doing your online banking on your phone. Instead, do it on a computer that never leaves your home. If you find that you simply must take your online banking with you wherever you go, just be sure to use a strong, unique password to unlock your banking app.

Your home address

Storing your home address in navigation app like Waze or Google Maps makes getting home from anywhere super-easy. But it can also leave you vulnerable. If a thief ends up with your phone, they can simply click on “home,” or “work,” and see what you’ve stored, and pay you a visit.

If you lose your mobile phone that are some steps you need to take according to Consumer Reports. As soon as you get your new mobile phone.

Use strong password protection on your mobile phone

Use strong password protectionThis is your first and strongest line of defense. You need a strong password, because one that’s easy to guess could unlock your phone and allow someone to override the biometric safeguards.

Skip the simple 4-digit PIN and instead create a strong password that contains a string of at least eight characters that include some combination of letters, numbers, and special characters that don’t form recognizable words or phrases, especially those that could be associated with you.

Password protection comes with another safeguard according to Consumer Reports. After several unsuccessful tries to enter a passcode, some phones will lock your device for a short period of time. This slows down attempts to access your phone. There’s also a setting on the latest Android phones that automatically erases all of your personal data after 10 unsuccessful log in attempts. Here’s how to activate it. Go to:

  • Settings | Lock Screen | Secure Lock Settings | and toggle the Auto Factory Reset option to switch it on. (The labels may vary slightly on other Android models.)

Enable location tracking

You must turn on the global positioning settings (GPS) in order to find a missing phone on a map. To enable this setting on an Android phone go to:

  • Settings | Security | Find My Device and toggle Find My Device.

Back up your photos and videos

Consider using a carrier-neutral service to back up your mobileConsider using a carrier-neutral service to back up your mobile. Apple’s iCloud or Android’s Google Drive may make it easier to retrieve your memories should your next phone be from a different carrier. Phone carriers, phone makers, and operating systems also offer free over-the-air backup for photos, settings, and more. These options can limit you if you select a new carrier for your next mobile phone.

Write down your phone’s unique ID number

Smartphones have a unique serial number known as an IMEI (International Mobile Equipment Identity) or MEID (Mobile Equipment Identifier). Unlike other information stored on the phone’s removable SIM card, these numbers are etched into its circuits and are difficult to alter. Your carrier already has this number and can use it to put the phone on a missing phone list. Some police departments ask for either of these numbers when you report a stolen phone. With the numbers they’ll be able to return a phone to you if it’s recovered. To find your phone’s unique IMEI or MEID number, use any of the following steps:

  • Dial *#06# from your phone. The number may pop up on your screen.
  • On an Android phone go to: Settings | About Phone. The number should be on that screen.

After the phone is gone, the sooner you act, the better your chances of retrieving your phone and securing your data. Here are key actions to take according to CR.

Seek and (possibly) destroy your mobile phone

erase the data on yourphoneIt is important that the minute you learn your phone is missing, you send it commands you think are appropriate. Time is of the essence because these next steps requires your phone to be on and have some battery life left.

As soon as possible, call or text your phone from another device. That might be all it takes if your phone is just misplaced nearby.

Then log on to your Find My Phone service from a secure device. For an Android phone, go to Google’s Find My Device in a browser. Use the service to make your phone play a sound. You can also lock the screen and display a message for someone who finds your phone. An honest person may come across your device and notify you via the contact info on the screen. If you think the bad guys have your phone, you can erase the data on it using Find My Device.

Report the Loss to Your Service Provider

Inform your mobile carrier that your phone has been lost or stolen. It can suspend service to prevent anyone from using the device on its network. They may also mark the phone as unusable even on a new carrier or with a different SIM card. Note that your device will still be usable over WiFi. You can notify your provider by going to one of its stores, calling, or logging on to its website.

  • AT&T: Call 800-331-0500 or go to AT&T’s Suspend page.
  • T-Mobile: Call 800-937-8997 or go to My T-Mobile, and in the My Line section click on your device name to find the Report Lost or Stolen option.
  • Verizon: Call 800-922-0204 or go to the Suspend or Reconnect Service page in My Verizon and follow the prompts.

Change Your Important Passwords

Once you realize your phone is in danger, go to a secure PC,  log in to every account you had on your phone (banking, shopping, email, etc.) and change your passwords. Start with your email account. Then change the financial and shopping accounts that have your credit card on file, such as Amazon or your bank. Next move on to social networks. If you’ve set up a password manager, this task will be easy.

Report the Loss to the Police and File an Insurance Claim

Notify the police. This not only launches an official recovery attempt but also helps speed up the process of making an insurance claim (if your covered). You might also need a police report to dispute fraudulent credit card charges, and some credit card issuers will reimburse you for a stolen phone.

Wipe your mobile phone anyway

malicious app or spywareIf you recover your phone You never know what malicious app or spyware someone may have installed while the phone was out of your hands. To be on the safe side, reset the phone to factory settings. If you see an option to erase everything, make sure you select it. Before you nuke the phone, check your backups to make sure that you have copies of all the photos and videos that were on your phone.  On an Android phone, go to:

  • Settings | System | Advanced | Reset Options | Erase All Data (factory reset).

 

How you can help Ukraine!

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

 

What to do with Your Twitter Account

What to do with Your Twitter AccountThe world’s richest man has control of Twitter (TWTR). Sure, all social media platforms are outlets for doomscrolling, bullying and misinformation. But in the short time Elon Musk has been the “Chief Twit,” some events have take place on the platform that raise concerns about the “hellscape” the new Twitter could become. Some examples include:

Mr. Musk has grand ambitions to morph Twitter into some vaguely defined metaverse hole that could collect more personal info. He tweeted in October, “Buying Twitter is an accelerant to creating X, the everything app.” It is a good time to review your Twitter account. USA Today published a handy guide to getting as much control as possible over your account.

How to secure your Twitter account

You should have already secured you Twitter account. Make sure you are using a unique and complex password. Set up two-factor authentication. Both steps make it harder to get hacked. It’s also a good time to back up your tweets. You should backup the photos, DMs, and other 280 character snippets of life you might want to remember later. It’s easy to do, although time-consuming, to download your Twitter data.

Don’t feed the trolls

There are plenty of people on Twitter who want nothing more than to spew hate and make everyone else’s day miserable. Blocking people might seem like the best way to get those trolls to disappear, but the author says there’s a wrinkle.

When you block someone – they won’t be able to send you tweets or tag you in posts, and you’ll never see them again unless you decide to unblock them in the future. The wrinkle is that they’ll immediately know that you’ve blocked them, and if they’re bent on harassing you, they can easily make a new account and start the cycle over again.

The article suggests that muting a user is sometimes even more effective. By selecting “Mute @User” in the menu on their tweet  you’ll never see their messages again. They won’t know that you’ve muted them. They can keep on being jerks, and you can move on with your day.

Spammers, scammers, and bots, oh my!

Many accounts on Twitter aren’t real. Bot accounts seek out people to harass, advertise to, or scam through sketchy tweets and messages. To combat bots, go to Twitter’s Settings > Notifications > Filters and make sure “Quality Filter” is turned on.

It’s also a good idea to block direct messages from anyone who doesn’t follow you. Do this by heading into Settings > Privacy and Safety > Direct Messages and ensuring that the “Allow message requests from everyone” is turned off. Also, enable “Filter low-quality messages” to protect against spam.

You can also lock down your tweets to make sure only people who follow you see them. To do this, go into your Settings > Privacy and Safety> Audience and Tagging, then select Protect Your Tweets.

Filter your feed

TwitterIf you plan to continue using Twitter as you always have but don’t want to hear about certain topics, it’s easy to filter those topics by blocking words and phrases. Go to Settings > Privacy and Safety > Mute and Block and then click “Muted Words” to begin adding words to your mute list. If someone you follow tweets or retweets a message that includes that word, the entire tweet will be blocked from your timeline.

So, for example, if you’re tired of hearing about Donald Trump add “Donald Trump,” “Donald,” and “Trump” to the list. That will cover all the uses of his name and dramatically cut down the number of tweets you see about the big lie. You can do this with any news story, topic, or event you’re just fed up with.

If you are going to stay on Elon Musk’s $44 Billion dollar play thing, you should periodically clean up your tweets. USA Today recommends Semiphemeral to automatically purge you tweets.

How to delete Twitter on Android

If Mr. Musk’s antics are too much and you are going to quit Twitter, there a several steps to take before you delete the app from your phone. First, make sure you’ve downloaded a copy of your data first. You must request a copy of your files before deactivating your account.

Be sure to revoke any third-party access to Twitter you have granted. Otherwise your account count could magically gets reactivated by a third-arty app.

In order to delete your Twitter account, you have to deactivate it first. To deactivate you Twitter account, login to your account from Twitter App and go to Settings and Privacy.

  1. Click Account.deactivate you Twitter account
  2. Now, click Deactivate your account.deactivate you Twitter account 2
  3. Click Deactivate.deactivate you Twitter account 3
  4. Enter your password to confirm your identity.

Now you can delete the account. To delete your Twitter account:

  1. Tap on the menu icon or profile photo in the upper left-hand corner and select Settings and Privacy from the dropdown.delete your Twitter account
  2. Tap on the Your account tab.delete your Twitter account 2
  3. Scroll down until you find the Deactivate Account tab and tap on it.delete your Twitter account 3
  4. Read the information provided and then scroll down and tap on Deactivate.delete your Twitter account 4
  5. You will have to confirm your password to complete the process.delete your Twitter account 5
  6. The app will once again ask you to confirm that you want to deactivate your account. Twitter will then confirm your decision.

If you don’t access your account for 30 days it will be permanently deleted from Twitter.

Some things to remember

Your Twitter information might still appear on search engines. You have to follow up with them to have that data removed. Also, once your account is deleted, someone else can sign up using your name.

 

How you can help Ukraine!

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.