Area libraries receive grant money from the state

Photo: Sentinel/Clark Brooks
The Urbana Free Library to receive over $56K to improver technology infrastructure through a Public Library Per Capita Grant from the state.

SNS - Libraries in Champaign, Urbana, and Oakwood in the 52nd Senate District will receive a combined $196,330 in grants to improve resources for patrons and programming.

Illinois Secretary of State and State Librarian Alexi Giannoulias announced this week that the Champaign Public Library would receive $131,128 and the Urbana Free Library would receive $56,928. The Oakwood would receive $8,274 in funding from the state. Danville, Rantoul, and Westville would also be recipients of grant money.

The grants were distributed statewide to assist libraries most in need of upgrading their technology infrastructure.

“I am truly delighted by the additional funding allocated to enhance library technology and accessibility here in our home of Champaign-Urbana, made possible by the recent budget I supported this Spring,” said State Representative Carol Ammons (103rd District—Urbana). “Both the Champaign Public Library and Urbana Free Library will receive just over $180,000, which will enrich library experiences and services for community members of all ages, young and old. Literacy unlocks wonder and curiosity in all of us, and I’m pleased that this funding will become a reality for my community.”

Libraries in the district serve over 185,000 people.

“Libraries throughout the state must have the resources and financial support they need to provide high-quality materials and programming to Illinois residents,” Giannoulias said. “Libraries serve as centers for lifelong learning and are critical to providing opportunities for children and adults to enrich their lives.”

The Public Library Per Capita Grants are awarded annually to support local public library services. This year, public libraries received just under $1.50 per person in their service area. Public libraries can use this funding for operational needs, including purchasing materials for their library collections and making capital improvements to their facilities.

Under the new technology grant initiative, eligible public libraries were determined by a review of their local tax base in comparison to the population that is served and also the poverty level of the community.

"Libraries are more than just a place for books—they offer engaging programs and are essential for learning and success at every stage of life," said State Senator Paul Faraci (52nd District—Champaign). "By investing in our libraries, we're investing in our students, adult learners, and the entire community."

Libraries have a two-year window to utilize technology grants for various purposes. These include acquiring hardware and software, expanding online collections and e-resources, purchasing digital devices and mobile apps, enhancing Wi-Fi capacity and internet accessibility, implementing patron self-checkouts, ensuring ADA compliance for library websites, and procuring adaptive technologies to meet the service needs of individuals with disabilities.


Cybercriminals are targeting rural communities, more cybersecurity pros needed

Illustration: HarshAhars/Pixabay

BrandPoint - Cybercriminals are increasingly attacking rural hospitals across America, posing a direct threat to patients. For many Americans living in rural areas, the nearest emergency room may be miles and miles away – and in an emergency, every second counts. Cyberattacks can disrupt the essential operations of hospitals, leaving people at risk.

These attacks are increasing in number: In 2023, the healthcare sector reported more ransomware attacks than any other critical infrastructure sector, and attacks involving ransomware against the healthcare sector were up nearly 130%.

Cybercriminals are also increasingly targeting rural communities, where digital defenses may not be as robust due to resource constraints. These attacks can be devastating, particularly to smaller, independent hospitals with limited means of protecting themselves.

When a rural hospital falls victim to a cyberattack, it’s not just the institution that suffers; the entire community feels the ripple effect. Just last year, an Illinois hospital permanently shut its doors partly due to a devastating ransomware attack. NBC News reported that because of the hospital closure, some residents are now more than thirty minutes away from emergency services.

Here are three ways people in rural communities can help:

1. Strengthen rural hospital cybersecurity

Hospitals need tools to protect themselves. That’s why the White House along with cybersecurity experts like Microsoft, are providing free and low-cost resources available to every rural hospital across the nation. This includes advanced security products along with free cybersecurity assessments and free training for frontline and IT staff. Rural hospitals can sign up for the program or learn more at nonprofits.TSI.microsoft.com/security-program-for-rural-hospitals.

2. Explore a cybersecurity career

America is facing a cybersecurity skills crisis. There simply aren’t enough people with the skills to defend against cybersecurity attacks: There are nearly half a million job openings requesting cybersecurity skills, but there are only 85 cybersecurity workers available for every 100 cybersecurity jobs demanded by employers, according to Cyberseek.

Anyone, anywhere can take advantage of the opportunity and start a career in cybersecurity. Building the skills necessary is easier than ever, especially given the free classes and tools available. For example, the Career Essentials in Cybersecurity learning path from LinkedIn and Microsoft allows you to earn professional certification in the field.

3. Protect yourself

Rural communities can protect themselves by strengthening vital infrastructure and hiring cybersecurity professionals, but the most important step is personal. Whether you work in a hospital or elsewhere, it’s critical to understand cybersecurity threats and prepare yourself.

Cyberscams are a pervasive threat in our increasingly connected world, and no one is immune to their risk. These scams, often disguised as tech support, prey on the unsuspecting, exploiting trust and causing harm. It’s essential to be vigilant and informed to protect yourself and your loved ones on how you can identify these online con artists. By staying aware and cautious, you can defend against the tactics of cybercriminals and keep your digital life secure.

Learn more about the threats to rural hospitals at nonprofits.TSI.microsoft.com/security-program-for-rural-hospitals.

Can an AI therapist help you through the day?

by Ben Rein

Would you let an AI chatbot be your therapist?

A recent study wanted to know if this would work, so they asked AI about 200 questions from the “Ask the Doctors” page on Reddit. Then they put those answers next to responses from real human doctors and asked healthcare providers to judge which was better, without knowing which one was AI. What do you think happened? They rated the chatbot’s answers as better 78% of the time and found that they were more likely to be empathetic.

But this raises a key point: empathy.

Everybody knows that ChatGPT can’t feel emotions. Therefore, it’s not capable of empathy, because it can’t really understand what you feel. And some scientists think that this is where AI loses: Chatbots will never work as therapists because humans won’t accept or appreciate empathy from a robot.

@dr.brein Can an AI chatbot really be your therapist? ________ This video was supported by the Pulitzer Center through the Truth Decay Grant Initiative, in collaboration with OpenMind Magazine. To read more about this topic, check out the accompanying article on OpenMind’s website, found in my bio 🔗. #PulitzerCenter #neuroscience #AI #therapy #empathy ♬ Mysterious and sad BGM(1120058) - S and N

When a real company, Koko, tried using chatbots, it didn’t work because people knew they were chatbots. The patients didn’t care when the chatbot said, “I understand how you’re feeling” because they knew it was an empty, emotionless statement.

But it makes me wonder, if chatbots continue gaining in use and acceptance, and we come to respect them more, this could change. And I’m curious how you’d feel about that.

If 100 years from now, AI chatbots are considered trained psychiatrists, would this be good or bad for society? It might seem ridiculous, but it’s real life. Right now, we essentially hold that decision in our hands. We are the first humans to coexist with these large language models, and we actively vote as consumers—with our clicks and our wallets—to determine the future of AI. In what capacity will we come to embrace AI? Where do we draw the line? It’s something to think about as we navigate this new virtual world. Thank you for your interest, and please follow for more science.


This story originally appeared on OpenMind, a digital magazine tackling science controversies and deceptions.

Building an app can help you grow your business, here's how to do it right

man typing on a smartphone
Photo: relexahotels/Pixabay

StatePoint - In today’s world, apps are crucial for business growth and customer experience. They enable shopping, appointment setting and customer service interactions. In fact, around three-quarters of U.S. adults say they buy things online using a smartphone, according to Pew Research, which means if you don’t have an app for your business, you’re leaving money on the table. However, if building one sounds daunting, experts say there is good news -- artificial intelligence can help.

“AI enhances app development through code generation, chatbots, process optimization, content creation, user stories and prototype generation. Anyone, even with little to no experience, can quickly and cost-effectively develop an app using AI,” says Sachin Dev Duggal, founder and chief wizard at Builder.ai, an AI-powered composable software platform that allows every business and entrepreneur to become digitally powered.

Despite the relative ease of developing an app harnessing today’s AI tech, it’s nevertheless important to get your app right. With over 77% of users uninstalling an app within the first three days after download, according to WifiTalents, you’ll want to ensure your app provides your users with real value.

So, before building your app, first consider how it will help customers, and how it will help you solve your short- and long-term business objectives. Asking yourself these questions can give you clarity on the type of app you need, how you will fund and maintain your app, and how it will function.

When you are ready to begin development, here are the benefits you can anticipate by using AI to meet your objectives:

  • Rapid development: AI-driven platforms significantly reduce development time.
  • Unlimited customizations: AI app development platforms offer pre-built, customizable modules.
  • High performance: AI creates high-performance apps with fast load times and smooth user experiences.
  • Cost efficiency: AI reduces the need for extensive developer hiring, lowering costs.
  • Error reduction: Around 66% of software projects fail. The primary cause? Human error.
  • Seamless articulation: New AI technology allows you to speak directly with the development platform, enabling you to convey your ideas and instructions effortlessly, making app development more intuitive and efficient.

So, how do you actually use AI to build your app? In the case of Builder.ai, it’s as simple as following these simple steps:

1. Choose and customize a base template.
2. Review and finalize features.
3. Identify the app’s platform (Android, iOS, desktop) and build a timeline.
4. Establish a payment plan.
5. Match with a product expert for guidance.
6. Review and monitor the app’s progress.
7. Launch your app.
8. Leverage data from your app to optimize business.

To learn more about developing your app with Builder.ai, visit https://www.builder.ai/.

“AI automates repetitive tasks, code generation, bug detection and testing, resulting in shorter development cycles and reduced costs while maintaining high quality. By giving everyone, regardless of their tech knowledge the power to build applications, we’re removing the barriers that have traditionally stopped individuals and business owners from unlocking their potential,” says Duggal.

Smart light combats screen eye strain from screen time

The ScreenBar Halo offers tech-driven eye comfort for computer users by supplying real-time auto-dimming light to soothe digital eye strain. Attach the device with a clamp, adjust lighting with the wireless controller, and enjoy the immersive illumination from the back light feature.
Photo: NAPSI

NAPSI - Research shows that remote workers spend over half of their day—13 hours on average—looking at screens. This much time spent looking at a computer can produce digital eye strain, also known as Computer Vision Syndrome (CVS).

It’s estimated that digital eye strain affects 60 million people worldwide, and over 70% of computer users. Resulting symptoms include headaches, blurry vision, neck and eye pain, double vision, delay in shifting focus, and more.

Sound familiar? If you’re experiencing digital eye strain from spending countless hours in front of a screen, you will be glad to know, BenQ’s tech-driven smart lights can offer a solution. 

Digital eye strain is often caused by differences in light—screen glare, light reflection, screen brightness and contrast are all contributing factors. Renowned for its pioneering lighting solutions—including the world’s first monitor light bar, the ScreenBar—the company boasts a full line of smart lights that help reduce digital eye strain. Designed based on extensive research by a team of optical professionals and backed by EU IEC/IR 62778 and IEC/EN 62471 dual certifications for blue light hazards, these smart lights bring tech-driven eye comfort to computer users everywhere. 

For someone needing a portable solution to mitigate insufficient computer light, BenQ’s new LaptopBar (https://bit.ly/4arLWb2) is ideal. This compact light bar attaches to your laptop via a non-damaging magnetic patch, and through an innovative process involving 20 million beam simulations, creates a CIRCUM-Light™ 3D-surrounding illumination that brings together central brightness and ambient light to alleviate eye strain.

The light bar also offers:

  • A personalized auto-dimming feature, which remembers your specific lighting preferences and intelligently adapts to changes in environmental light.
  • A foldable arm offering height adjustability for your smart light, letting you choose between a limited or wide field of light. 
  • Weighing less than an iPhone 15 Pro, the LaptopBar is easy to transport and intuitive to use. A built-in battery can maintain 100 minutes of operation at 100% brightness and 160 minutes at 50% brightness, so you can use it anywhere. 

    An innovator of eye-comforting light for your monitor, BenQ’s ScreenBar Halo securely clamps onto most monitor models to distribute light around your workspace. It features:

  • BenQ’s first immersive back lighting mode, which lets you switch among three lighting modes to balance any contrasting light between your computer screen and its surroundings.
  • An ASYM-Light™ asymmetrical optical design that prevents reflected glare on the screen and reduces digital eye strain; and a real-time auto-dimming feature with a built-in light sensor detects ambient lighting and supplements illumination of the desktop as needed.
  • The wireless controller lets you switch lighting modes from your desktop and customize the lighting for a range of environments. 

    You can take care of your eyes by supplying the light relief they need. Your screen time likely won’t be decreasing any time soon, but with smart lighting solutions like BenQ’s LaptopBar and ScreenBar Halo, you can decrease eye strain and promote eye comfort no matter how much time you spend in front of a screen. 

    For additional information and resources on improving eye health, visit: https://www.benq.com/en-us/lighting.html.


    Sign up for the Sentinel

    Gift-giving platform makes dreams and wishes come true

    BPT - Young adventurer Yuval has always dreamt of exploring the world. In fact, travel is the #1 way he and his mother, Avital, bonded. However, he had to put his adventures on hold when he became sick.

    When he was 7 years old, Yuval's mom found a lump on his neck that turned out to be lymphoma.

    "I was heartbroken and lost," said Avital. "I couldn't take one breath of air without pain all over my body."

    However, the brave little adventurer faced aggressive cancer treatment with determination. Today, there's no evidence of his disease. And he got to celebrate his travel wish with the help of Make-A-Wish and its donors.

    Yuval's greatest wish was to ski and explore Alaska. He got to do that and more! During his adventure in the Alaskan wilderness, he not only skied but also snowmobiled, snowshoed and even had the opportunity to go dog sledding. Best of all, he got to do it all with his best friend, Chase. With this adventure under his belt, Yuval is ready to continue to explore more of the world around him and reclaim the time he lost when fighting illness.

    Donors make dreams possible

    Turning Yuval and other children's dreams into reality wouldn't be possible without the help of Make-A-Wish sponsors like Snappy. This year, Snappy - the leading gifting company - hit a huge milestone, donating $2 million to Make-A-Wish.

    Snappy is an all-in-one gifting company that spreads joy, shares gratitude and takes the guesswork out of gifting. The company connects people and cultivates meaningful relationships through the power of gratitude and gifting. Its "recipient-picks" experience ensures gift-givers send the perfect gift every time, for everyone, on every occasion. It even allows recipients to donate the value of their gift to a charity of their choice.

    Businesses can use the online platform to purchase gifts for employees, business partners, clients. It's these gift recipients who opted to donate the value of their gift to help support the transformative wishes of children with critical illnesses that have made Snappy's significant achievement possible.

    "At Snappy, we are so grateful to witness the profound impact of individual generosity," said Hani Goldstein, Snappy co-founder and CEO. "When members of our community choose to donate their gift's value to Make-A-Wish, they create a cascade of positivity. The philanthropic potential of our platform has made us deeply thankful for the kindness of our gift recipients and the wishes they've made possible for these children and their families."

    Wishes aren't just fun activities. When a child's wish is granted, it can create hope even in the most challenging situations.

    "A wish creates an immediate turning point in a child's treatment and recovery, and partnerships like Snappy's make more of these life-changing wishes possible," said Leslie Motter, president and CEO of Make-A-Wish America. "There's a gap between the number of wishes we're granting and the number of wishes waiting, and we're thrilled for Snappy's support to help us close that gap."

    This holiday season and beyond, help Make-A-Wish and Snappy fulfill more wishes while also finding meaningful gifts for those in your life. To learn more about how you can help make a child's wish come true, visit Wish.org.


    Turn TikTok from social media to a learning tool

    phone with tiktok loading
    Did you know that short, digestible TikToks are making it easier than ever to learn to play music or learn a new language?
    Photo: Olivier Bergeron/Unsplash

    StatePoint Media - While TikTok often gets a bad rap as a time-waster, in reality, there are thousands of influencers on the app sharing content designed to inspire, educate and encourage creativity.

    It’s no wonder then that a recent survey by Study.com found that 1 in 4 Americans use TikTok to enrich their education, with over half doing so because it’s easier to understand. So, rather than tell your kids to stop scrolling, here are three ways to leverage TikTok to enhance your children’s learning outside the classroom:

    1. Music-making: Did you know that short, digestible TikToks are making it easier than ever to learn to play the piano online? From @gray_toven, who offers quick tutorials of trending music to @thepianopath, who provides time-strapped prospective piano players tips for getting started, there is an array of content to suit the needs of students looking for instruction and motivation. Just be sure to pair these resources with a great keyboard. The CT-S1, the spiritual successor to the original Casiotone CT-201, allows anyone to make music, regardless of skill level or budget. A stylish, ultra- portable keyboard offering great sound quality, it’s an ideal musical partner for beginners and seasoned players alike. Plus, it connects to the free Casio Music Space app, which acts as digital musical score, music teacher, live performance simulator, and all-round tool to enjoy learning and playing music.

    2. Language learning: The best way to get fluent in a new language is to hear it spoken aloud and to have actual conversations. Fortunately, there are plenty of TikTok accounts making it easy to pick up new vocabulary, absorb grammar, learn common phrases and even connect with a community of students. Check out @yospanishofficial, which in addition to quick TikToks packed with tips and short lessons, also offers a weekly role play on Zoom so that students can practice conversational Spanish with others on the same mission. Or, to get familiar with Chinese words and phrases you’ll need in common scenarios, such as ordering food in a restaurant or asking for a Wi-Fi password, @chinesewithyan is a great place to start.

    3. Homework help: Students no longer need to do their math homework alone. TikTok “tutors” abound that help guide students through their lessons, often in unique and creative ways. For example, @melodiesformath explains important math concepts through songs, whereas @your.bummy.math.tutor dishes tips for saving critical time on tests and acing important exams, like the SAT. TikTok tutors are also familiarizing students with their scientific or graphing calculator, so they can arrive at the answer quickly and easily with their device. Pair these virtual lessons with the latest in calculator technology, such as the fx-991CW ClassWiz, which can store and recall up to nine variables that can contain integers, computations and functions. The variables will remain in the calculator’s memory between sessions. Plus, by partnering the ClassWiz with an internet-capable mobile device, solutions can be graphed and visualized through ClassPad.net, a free online workspace for computation, graphing, geometry, statistics and more, by scanning a QR code on the calculator’s screen.

    While TikTok may not seem like a learning tool, by digging a little deeper, you’ll find complicated concepts and information explained in bite-sized chunks on a familiar and fun interface.

    Turn your passion into online profit

    business man
    Photo: Jopwell/PEXELS
    NewsUSA - Have you ever shopped at someone’s personal online store and thought, “I could do that”? In the wake of the pandemic, more people are reinventing their work lives and choosing to follow their passions. And the ever-expanding world of e-commerce makes it easier than ever to turn your pastime into a profit.     

    Launching an online business can seem daunting, especially if you lack a background in technology, computer programming, or website building, but it doesn’t have to be. The right website host and store builder platform can make setting up the online business of your dreams a seamless process.     

    Nexcess, a company dedicated to ecommerce entrepreneurship, offers several tips for how to get your ecommerce business off the ground, whether you are selling physical products, digital products, or online services ranging from consulting to yoga classes. Key considerations when launching any ecommerce business include:     

    - Sales. The most efficient ecommerce platforms keep it simple with automated sales and performance tools. Nexcess also has a membership website builder that allows you to add subscriber-only content for even more sales.     

    - Management. Setting up an online store should be simple. Platforms such as Nexcess StoreBuilder include intuitive features that let you design a beautiful online storefront with no need for coding or a website designer.     

    - Mentorship. The best platforms for online businesses have fast speed, strong security, inherent scalability, and, last but not least, competent and responsive tech support for any problems and questions that arise. Nexcess managed hosting provides live chats with a website hosting advisor to help you get started and make a plan for success.     

    If you have an existing online store or website that you want to upgrade, Nexcess offers free website migration to or among any of its website hosting platforms, with 24/7 support that kicks in immediately.     

    Also, many ecommerce entrepreneurs miss the importance of a business location when establishing online. The business may be in cyberspace, but location still matters for taxes and other administrative purposes.     

    Some states are more appealing than others for ecommerce business owners. According to a new ecommerce study, Florida is the number-one state for ecommerce businesses, based on criteria including tax climate, economic outlook, financial resources, and infrastructure.     

    Rounding out the top ten states for ecommerce businesses are Utah, North Carolina, Texas, South Dakota, Nevada, Montana, Colorado, Indiana, and Tennessee. The great thing about an ecommerce business is it can launch from any state with a website and a good idea.


    Top concerns for data and file recovery from a crashed hard drive

    NewsUSA -- It's alarming every time your computer glitches in the middle of working on a crucial project -- alarm that rapidly turns to agitation and panic when you can no longer access important files on the hard drive. Whether the files are business-related or a personal cache of photos, music and blog posts, most everyone has felt the pain -- losing drafts for proposals, contracts, grants or financial data, the list is literally endless.

    So, where do you turn to recover your hard work -- and possibly save your job?

    "It's frustrating and disappointing because a lot of areas of the computing industry are really well developed," explains Nick Johnson, executive of HardDriveRecovery.com -- a Los Angeles-based business looking to fill gaps in the world of data recovery. "You'd think that with such a crucial part of the computing system being corruptible, they would develop an adequate service to resolve it when it comes up."

    A crashed hard drive is worse than the spiderweb cracks across the face of a busted iPhone 5. No matter what is stored on a device, if the majority of data is unrecoverable, a crashed hard drive unleashes a wave of panic.

    Depending on the damage and source of the problem, there is a variety of data recovery software. But, DIY data fixes can lead to worse problems.

    "You risk further corruption of the data," says Johnson. "That's probably the biggest concern out there because there's so many points of potential failure that if you don't have extensive experience, you don't know how to address it. There are a lot of instances that require a great deal of finesse, and that's where having an expert is a real benefit."

    The risks of an inexperienced or anonymous technician recovering private files can be huge. What if the drive is wiped clean entirely? Can you trust them with your data? Will they overcharge you?

    In many cases, Johnson says these are valid concerns. "One of biggest problems we found is the price schemes," he says. "Because it's unknown what the actual price will be. Oftentimes, companies will give an estimate that's hundreds, sometimes thousands, of dollars less than the actual bill they give you when the work is complete. That's why it's important to find a reputable company to do your hard drive recovery."

    According to Johnson, the best way to prepare yourself is by equipping computers with up-to-date antiviral software. But regardless of the hardware or brand, there's always potential for failure. Learn more at www.harddriverecovery.com.

    Online platform helps indies and gig workers take control of key aspects of their venture

    NewsUSA -- Even before the COVID-19 pandemic swelled, the ranks of work-from-home employees, freelancing was on the rise as workers across a range of fields sought more flexibility and control over their work lives, enabled by the latest advances in technology. In 2020, there were 59 million people doing freelance work in the United States. This is an increase from 2014, when there were about 53 million people freelancing according to Statista, a leading provider of market and consumer data.

    The demonstrated success of working remotely means that independent workers will be key to the future of work, even as many people return to in-person office settings.

    To thrive both professionally and personally, independent workers need support and tools to promote their skills and manage their business.

    New app helps independent workers and freelancers stay organized and in contact with clients.
    Photo: Yan Krukov/Pexels

    An online platform known as Indy provides these features and more. Indy offers a complete productivity suite that helps independent workers take the management of their businesses to the next level, with tools and guidance for creating contracts, generating invoices, and everything in between. Additionally, their blog, The Independent Worker, is focused on addressing topics of interest to freelancers, ranging from business development to managing burnout.

    "We proudly empower today's 'Indies' - including solopreneurs, freelancers, consultants, contractors, microbusinesses and side hustlers - to streamline the most time-consuming parts of operating their businesses. We help them work smarter, get paid faster, and thrive," says Sebastian Gyr, CEO and co-founder of Indy.

    The Indy app offers freelancers a suite of tools designed to help them own three key aspects of their business: :

    • Marketing. Indy provides templates for proposals, project briefs, and profiles to help you organize your pitches, and showcase your unique skills.
    • Organization. Time tracker and task management tools help you keep everything organized, and Indy also offers a chat feature that freelancers can use for quick communication with clients.
    • Business management. Templates for legally-binding contracts and non-disclosure agreements take a lot of the effort and stress out of contract creation, so you can get right to work and invoicing tools will let you quickly and easily send highly professional invoices to the client directly to be paid either electronically or the old-fashioned way - via a check in the mail.

    Indy takes pride in empowering an inclusive and diverse community of freelancers, including the LGBTQ community, Black Americans, BIPOC, and workers with disabilities, who are often underserved in the workplace despite the recent rise in equity initiatives. Leaning into these tenets, Indy recently launched a new, digital series called 'Miss Independent' featuring a Black drag queen who offers short videos commenting on freelancing and the freelancing life.

    "We're spotlighting what's currently missing for today's virtual workforce and are boldly embracing the opportunity to drive conversations and narratives around equitable pay, diversity, and inclusion, by enabling the success of all workers, especially those from underserved communities," according to the company.

    "We celebrate the uniqueness of those human beings that we serve by providing the products, services, space, and the megaphone for them to be their authentic selves, shine, and thrive."

    Visit weareindy.com for more information and to create an account for free.

    Boosting your online security, tips from a convicted hacker

    Photo: Tima Miroshnichenko/Pexels
    Ngô Minh Hiếu was once a fearsome hacker who spent 7 1/2 years incarcerated in the U.S. for running an online store that sold the personal information of about 200 million Americans. Since leaving prison, Hiếu has become a so-called white hat hacker, attempting to protect the world from the sorts of cybercriminals he once was.

    These days, Hiếu said, it doesn’t take much hacking to access sensitive details about Americans. Companies and governments routinely leave databases exposed online with little or no protection, as we’ve reported, giving cybercriminals an easy way to harvest names, emails, passwords and other info. While in prison, Hiếu wrote an online security guide for the average internet user. As he and others have pointed out, it’s impossible to create an impenetrable shield. But here are some of his tips for how you can mitigate your risks, along with some other practical online security advice.

    1. Stop reusing passwords

    Make 2022 the year you finally stop reusing passwords. Once a password is exposed in a data breach, as routinely occurs, cybercriminals may use it on other websites to see if it grants them access and lets them take over an account or service. To help you generate lengthy, difficult-to-guess passwords without having to commit them to memory, use an encrypted password manager such as 1Password or LastPass. These services, which typically charge $3 to $4 per month, also monitor databases of breached passwords, like Have I Been Pwned, which can identify some passwords that have already been made public.

    2. Delete unused accounts

    Another benefit of using a password manager is that every time you create a new account at a website, you can log it in your password app. The app will track when you created a password and when you last modified it. If you notice that you haven’t used a website in a few years, and you don’t think you’re likely to use it again, delete your account from that website. It will mean one less place where your data resides.

    3. Add an additional layer of security

    Use multifactor authentication — which requires a second, temporary code in addition to your password to log in to a site or service — whenever possible. Some services send a six-digit code via text message or email. But the most secure method is to use an app that generates a numerical code on your phone that’s in sync with an algorithm running on the site. To make the process easier, you can download an app like Authy that, like a password keeper, helps you generate and manage all your multifactor authentications in one spot.

    4. Manage your apps’ privacy settings

    A lot of the data about us that gets leaked consists of information we don’t even realize apps and services collect. To limit that risk, check the privacy settings for any new app that you install on your computer, smartphone or other device. Deselect any services you don’t want the app to have access to, such as your contacts, location, camera or microphone. Here are some guides on how to manage your apps’ privacy settings for iPhone and Android devices.

    5. Think before you click

    Clicking on a link from a text message, an email or a search result without first thinking about whether it’s secure can expose you to phishing attacks and malware. In general, never click on any links that you didn’t seek out and avoid unsolicited emails asking you to open attachments. When in doubt, hover your cursor over a hyperlink and scrutinize the URL. Avoid it if it would lead you to somewhere you don’t expect or if it contains spelling errors like a missing or extra letter in a company’s name. And for safer online browsing, consider paying for an antivirus tool like Malwarebytes that helps you avoid suspicious URLs online (or sign up for a free browser guard extension).

    6. Keep your software up to date

    Whether it’s your web browser or the operating system on your computer or smartphone, it’s always a good idea to download and install the latest software update as soon as it’s available. Doing so fixes bugs and helps keep your systems patched against the latest security threats. To make sure you don’t forget, turn on notifications for new updates or enable autoupdate settings if they’re available.

    7. Limit what you’re sharing online

    Some of the large collections of personally identifiable information that have been floating around online weren’t hacked or stolen: They were simply scraped from social media websites like LinkedIn or Facebook. If you don’t want a particular piece of info about you out there, don’t put it on your social media profile. Scrub anything you don’t want exposed in your profiles, and check the platforms’ privacy settings to see who can access whatever is left. You can also pay for a service like DeleteMe, which helps centralize and pursue requests to delete your personal information from various data brokers.

    8. Secure your SIM

    One technique that has become increasingly common in recent years is SIM swapping: A cybercriminal tries to dupe your mobile carrier into switching your number from a SIM (the memory card that tells your phone it’s yours) that you control to a SIM that they control. The goal is to commandeer your phone so they can get around multifactor authentication settings that protect your financial accounts. To guard against SIM swaps, contact your carrier to establish an account PIN, or follow these directions if you’re with Verizon, AT&T or T-Mobile. And if you switch carriers, change your PIN.

    9. Freeze your credit reports

    If you’re afraid that a scammer might use your identity to open a fraudulent credit line in your name, consider placing a freeze on your report. A freeze will restrict access to your credit report, meaning that no one (not even you) will be able to open a new credit line while it’s in place. If you decide to apply for a loan or a new credit card, you can always unfreeze your credit later on. Freezing and unfreezing your credit is free, but you have to contact each of the three major credit bureaus separately to do it. Here’s a guide on how to get started.

    10. Back up your data

    Don’t assume that you’ll always have access to all your files and folders. Backing up your data can help you guard against virus infections as well as hard drive failure and theft or loss of your computer. You could use well-known cloud storage providers such as Dropbox or Google Drive to save copies of your data or buy a subscription to an online cloud backup service that automatically saves your files and lets you restore them if anything happens. All such services offer encryption, but if you’re afraid of storing your data in the cloud, keep an encrypted copy on a separate hard drive.

    ProPublica is a Pulitzer Prize-winning investigative newsroom. Sign up for The Big Story newsletter to receive stories like this one in your inbox.

    Joining the tech workforce is easier than you might think

    (StatePoint Media) -- More than 12 million people are currently employed in tech-related occupations in the U.S., either as information technology (IT) professionals or employees of technology companies. Yet employer demand for tech workers is still strong in many markets and industries, including technology, financial services, manufacturing, retail, healthcare, government and education.

    Tech jobs in Champaign County are plentiful at the moment. Technology Services at the University of Illinois at Urbana-Champaign is currently accepting applications for three positions on their Managed IT Services teams. Four days ago, Revature was seeking software developers and Niemann Foods advertised an opening for a Network Administrator with a starting pay at $40K annually.


    Most people assume that tech jobs require the ability to write computer or application code. Companies are looking for employees who can solve problems creatively as well as help businesses operate more efficiently and profitably.
    Photo:ThisIsEngineering/Pexels


    The County of Champaign Forest Preserve in Mahomet posted an opening for an part-time IT Technician on April 1. Jeld-Wen in Rantoul recently had an opening for a Senior IT Business Operations Specialist who would support training, data and other technical needs for the company and its business partners.

    Unfortunately, misperceptions about tech occupations persist. People assume that in such jobs, you’re relegated to working alone writing software code or that you need to be a math genius or have an advanced academic degree to even get your foot in the door. These misperceptions can discourage qualified candidates from exploring career options in the IT field.

    "Today’s IT professional plays a leading role in virtually every business and industry, identifying innovation and technologies that can determine the future of an organization," says John McGlinchey, executive vice president for global certification with CompTIA, a nonprofit association for the IT industry. "Companies are eager to hire people who communicate effectively, are comfortable working as part of a team and are creative in identifying how to use technology to make a business more efficient and profitable."


    If you don’t believe technology is a viable career choice, consider all of the things you’ve done today that are made possible by technology

    In fact, 62% of executives surveyed for CompTIA’s "Workforce and Learning Trends 2020" report ranked soft skills such as relationship building, persuasion, integrity and confidence with equal importance to hard technical skills when it came to hiring for their tech workforce.

    For anyone thinking about a career in tech, the best first step is to learn more about the technologies of today and tomorrow, and the occupations associated with these innovations. Many free resources are available. Here are three examples:

    The Future of Tech (www.futureoftech.org) is a growing library of resources on what’s new and what’s next in the world of technology. Topics such as artificial intelligence, augmented and virtual reality, big data and the internet of things are highlighted on the site, which is designed for anyone interested in learning more about technologies that are shaping the way we live and work.

    The IT Career Roadmap (www.comptia.org/content/it-careers-path-roadmap) offers insights into a variety of career paths, including tech support, networking, cybersecurity, data and software and web development.

    The IT Salary Calculator (https://www.comptia.org/content/it-salary-calculator) allows you to explore salary estimates for different tech occupations at different levels of expertise. The calculator includes salary data from 400 different metropolitan areas covering 85% of the U.S. population, from an IT support specialist in Portland, Maine ($52,750) to a cybersecurity analyst in Portland, Ore. ($101,530).

    "If you don’t believe technology is a viable career choice, consider all of the things you’ve done today that are made possible by technology -- from the car you drive and the streaming entertainment channels you enjoy to a telehealth visit with your doctor and the ease and efficiency of online banking," says McGlinchey.

    The IT field is no longer a world of pocket protectors and motherboards. With more people using more devices than ever before to stay connected to one another, industry experts say that today’s IT workforce is open for business for anyone with great curiosity, creativity, personality and versatility.

    5G connectivity and the future; what it possible can do for you

    StatePoint Media
    By now, you’ve heard about 5G or might have access to it on your smartphone, but do you know what it is, how it works or what it can do for you?

    5G is the next generation of wireless technology, building on its predecessors 2G, 3G and 4G, and is available on today’s smartphones to make and receive calls, run applications and send and receive data.

    This fifth-generation technology is a massive leap into what is possible in wireless. 5G is expected to deliver faster speeds and enhanced connectivity, giving businesses and consumers alike the potential to develop and experience new, innovative technologies.

    Photo: Aneta Pawlik/Unsplash

    Under development as you read this are systems that will help farming become even more profitable through targeted weed and pest control, real-time soil moisture monitoring for irrigaton systems and livestock tracking. 5G opens the door wider for "precision farming" where farmers can react to real-time data to deliver just right about of water or fertilizer to a specific are in their fields. Feeding entire herd while on vacation will be as easy as a few swipes on a smartphone or watch.

    In a decade or so from now, tilling, planting and harvesting will all be done from the comfort a farmer's command center in the shed or his or her home office thanks 5G and the automation of dozens of manual tasks. Hauling grain from the field to an elevator will be done by driverless trucks thanks to the significantly faster network speeds.

    Here are five things you may not know about 5G:

    1. 5G improves overall wireless coverage: 5G can deliver better, more efficient coverage in both breadth and depth. Depending on where it’s deployed by wireless operators, it can reach cities and towns that were previously lacking wireless access. Providers like T-Mobile are committed to providing 5G access to rural America, and already cover more than 287 million people across more than 1.6 million square miles.

    2. Different types of 5G can support where you live: Providers deploy different levels of wireless spectrum – low, mid and high – with the ability to provide coverage and capacity whether you live in the city, the suburbs or a rural community. For 5G, low-band spectrum provides far-reaching coverage outside, and reaches indoors with speeds that are slightly better than LTE; mid-band provides blanket coverage across large areas with fast speeds, making it the “goldilocks” of spectrum; and, high-band – typically available in select urban areas – provides super-fast speeds over short distances, but needs line of sight to the device and doesn’t pass through physical obstructions.

    3. 5G will create "smarter cities": From monitoring pollution or traffic levels to optimizing energy use or self-driving transportation, 5G can enable applications that urban cities and small towns alike can use to live smarter.

    4. 5G unlocks technology developments for industry: With 5G connectivity, and new applications to support certain industries, businesses and industries can evolve to meet the needs of a connected world. Imagine farmers utilizing sensors and drones to enhance the agriculture community, or businesses using real-time language translation, or even enhanced location services to improve first responder times to save lives.

    5. Virtual and augmented reality or holographic scenarios: 5G gives us the ability to transform where and how we experience our lives. Imagine having virtual reality access to live concerts and sports games, using holographic telepresence to be a part of your family’s birthday party in another state, or having real-time driving data like traffic or road conditions displayed on your car’s windshield as you drive.

    The possibilities with 5G are endless and will offer individuals and businesses the ability to do and experience the world around them in ways they couldn’t before.

    From 5G-enabled smartphones to the latest connected devices, check with your wireless provider to see how you can get the most out of 5G technology where you live.

    A casual stroll by the mysterious deep web


    Guest Commentary by Lakhijyoti Deka

    The "dark web" - sounds like mysterious! Doesn't it?

    Yes, I think your gut feeling says it is, but here I will make you aware how it works, what really happens on the dark web, and how you can check it out for yourself.

    Computer network
    Photo: Matthew Henry/Burst
    As you know, the internet comprises of servers, computers, and other devices connected together form networks inside of larger networks. It is divided into two parts, namely the clear web or surface web and the deep web.

    The surface web is that portion of the Internet most people are familiar with. The surface web pages are searchable in Google. While the deep web comprises the majority of the web, the surface web makes up a tiny portion of all the content on the web that accessible through a standard web browser.

    The Deep Web is the full body of the iceberg and the surface web is just like the tip of the iceberg. And finally the dark web is a very small and hard-to-access section of the Deep Web.

    The dark web is a piece of the internet that isn't indexed by conventional search engines. The dark web is decentralized network of websites make users as mysterious as possible by routing all their communications through multiple servers. It is used for keeping internet activity anonymous and personal, which may be helpful in both legal and illegal applications. Like, anyone can buy master card numbers; counterfeit money, online market place of various drugs, guns, stolen subscription credentials, hacked accounts, password and software that help anyone forced an entry into other people’s computers.


    Dark web browser:

    You may think that navigating the dark net is very easy. But it isn’t. To accessing the dark net it requires a browser known as Tor (“The Onion Routing” project) browser.


    If you have a legitimate need to access the dark web, make sure that you stay safe using it.

    Tor browser provides users access to reach the websites with the “.onion” registry operator. Browsers with the appropriate proxy can reach dark web sites, but others can’t. These web sites use a scrambled naming structure that creates URLs that are impossible to remember often.

    This browser was originally developed by the United States Naval research laboratory. An early version of Tor was created to cover spy communications. Sooner or later, the framework was repurposed and has since been made public just like the other browser we all know today. Anyone can download it free of cost. Tor browser uses a random path of encrypted servers referred to as "nodes" which enables users to connect to the deep web without worrying of their actions being tracked.


    Dark web versus deep web:

    The dark web and the deep web are also often mistakenly used interchangeably. At first glance, the dark web and the deep web seem similar as both are difficult to get to through the web search and require either clicking a direct link to the page or to typing the address into the browser you want to access.

    The deep web refers all the pages or content that you cannot find with a search engine. Deep web content requires sign-in credentials, such as online banking, medical records, pay sites, membership websites, and confidential corporate web pages etc. The dark web is one small portion of the deep web.

    The deep web is so large that it is impossible to discover exactly how many pages or websites are active at one point of time. While comparing the deep web with dark web, deep web consisting of mostly harmless and digitized data and the dark web is better known for illegal and sometimes disturbing content. But, not all the dark web is used for illicit purposes. The websites in the Dark Web are categorized by their use of encryption software that makes their users and their locations unsigned. 


    Enabling mechanisms of the dark web:

    Apart from the tor there are two key elements that serve practical purposes in enabling the dark web. Those two are the Hidden Wiki and Bitcoin, which provide a solution that enables the dark web to be accessible and usable.

    Though the hidden Wiki offers some assistance to content on the dark web, but it also includes some illegal websites.

    Hidden wiki site contains a listing of all the Dark internet sites that are presently operating, user feedback on those sites, and knowledge about what are often accessed through each site. Bitcoin is the crypto-currency which enables two parties to conduct a trusted transaction without knowing each other’s identity. The dark web has been a big factor in the expansion of bit coin and vice versa.


    Advantages of the dark web:

    The legality of dark web is based on how a user engages with it. Some might fall to the edge of legal lines for many reasons and some may act in ways that are illegal for the safety and security of others. Using of the dark web usually means you're attempting to interact in activity that you simply couldn't perform within the limelight.

    Not everything is illegitimate in the dark web. It has a legitimate side also. Privacy is much more concern for many people threatened by stalkers and other criminals. In this case dark web helps people to take care of privacy and freely express their views.

    On the dark web, users can seek out the benefits of the user anonymity, ability to take illegal actions for both users and providers and the virtually untraceable services and sites. In fact, a lot of people use it in countries where internet access is criminalized. As an anonymous communications channel the Tor network serves an important function in helping individuals communicate in environments which are hostile to free speech.

    One of the foremost advantages of the dark web is the difficulty of blocking it. Common forms of censorship do not work with encrypted overlay networks. The dark web is more challenging to surveillance by governments and Internet service providers. Many organizations including journalists, political dissidents, abuse and persecution victims, human Rights and other professionals support the use of and access to the dark web to communicate sensitive information.


    Disadvantages of the dark web:

    The dark web is the den to the criminal activities.

    The most important portion of dark web traffic is child abuse. The vast of traffic to hidden dark sites via Tor is for screening and distributing images of child abuse, illicit pornography and buying illegal drugs. Using the dark web one can make it easier to commit a number of of the worst crimes.

    The grouping of the dark web and crypto currencies supposedly makes it much easier to hire someone to commit a murder or some other illegal activities. While some uses the dark web for their privacy concern and for others it may be the violation to their privacy as the private photos, documents, financial records have been stolen from the dark web.

    The subject that is most commonly associated with the dark web is drug trafficking which is an integral and largest part of dark web marketplaces. Silk Road was one of the largest and most infamous dark web marketplaces till 2013. But the shutdown of Silk Road was not the end of dark web marketplaces. Replacements have sprung up to fill the vacuum selling anything that traders want to put online.

    By nature, the dark web is anonymous and incompetent of discriminating between criminals and common users. There are many dark web sites set up by scammers to avoid the rage of their victims. Many e-commerce sites even exist for a while and suddenly disappear with the money they are holding on behalf of customers.

    Enforcement officials must address this issue by campaigning that maintains the privacy of the typical user while unmasking the criminal. They are getting better at finding and prosecuting owners of sites that sell illegal goods and services. User can easily utilize the Tor in an attempt to pirate copyrighted content from the dark web and share illegal pornography, or engage in cyber terrorism.

    The two specific grey areas of dark Web activity are whistleblowing and hacktivism. Those are not categorized as entirely beneficial, but have some commendable characteristics.



    computer and coffee
    Photo: Sajjad Hussain M/Burst
    If you have a legitimate need to access the dark web, make sure that you stay safe using it. For safe access to the dark net you have to trust your intuition. You have to separate your online role from real life, employ active monitoring of identify and financial theft and you have to avoid downloads of dark web files. You should consider using a secondary non-admin local user account for all daily activities and always restrict access to your Tor-enabled device.

    Be sure to educate yourself on the risks of the dark web before you get mislaid in the dark underbelly. It is smart to be selective about the websites you access if you willing to venture to the dark web. Rather than finding the illegal users one has to find the illegal sites.

    The debate on the dark web is by no means over.

    There are many things in the dark web yet to be known. It is still in progress. As policy-makers move forward, they need to monitor vigilantly the evolution of the dark Web and make sure that enforcement agencies have the resources and legal support to police successfully the dark web. Dark web policy must be thoughtful to strike the balance between the requirements of privacy-minded users and the government’s responsibility to prevent criminality.

    It is always preferable to practice safe internet habits with necessary precautions to protect yourself from the illicit world.


    Lakhijyoti Deka is computer engineer in New Delhi, the capitol city of India. In her free time she likes recite poetry, sing and gathering information latest technology.

    Free technology training program offered by UIUC Research Park

    The University of Illinois Research Park and American Family Insurance have partnered together to create a free part-time technology training program for people looking to expand their knowlegde or migrate to a more technology based career.

    ILLINOIS REBOOT is a coding pre-academy that will introduce students to fundamental skills needed in programming and database management. Participants will gain a strong foundation in data science literacy while being introduced to UNIX, SQL, Python, GitHub, and Agile project management principles.

    The training, which starts in February, will be taught in two-hour blocks. There are eight required classes and four elective courses incorporated in the program which runs through March 9.

    Upon successful completion of curriculum and program requirements, participants will be awarded a University of Illinois Research Park Tech Badge certificate.

    No previous programming experience is necessary. Participant must have access to an Internet-capable computer with a major operating system and reliable WiFi. For those without access to reliable connection, EnterpriseWorks incubator will also be an option for onsite use for participants who need dedicated service. Tablets, phones and other mobile or smart devices are not usable for completing assignments.

    Participant in the program must also have the ability to download and install software on the workstation. While programming skills are not required, a technical aptitude or experience working with digital or computer technology is recommended.

    For more information prospective student can email Rebecca Motley at motley1@illinois.edu. To apply for the program, complete the online application located here no later than January 13, 2021.


    Photos this week


    Photos from St. Joseph-Ogden's November 2022 playoff football game against Olympia. Despite a solid team effort against a high-powered offense and much-improved football program, SJO's football season came to an unfortunate end after a 60-28 road loss to the Spartans.