WTF Fun Fact 13341 – Parrot Video Calls

Parrots are social animals. That’s why they don’t always make the best solo pets. However, recently, researchers have given pet parrots a new way to thrive after teaching the birds to use technology to make parrot video calls.

Parrot playtime with video calls

Researchers from Northwestern University, MIT, and the University of Glasgow conducted the study. With the help of some parrot parents, the team successfully trained parrots to communicate with each other.

Over several months, participants taught captive African grey parrots to use a custom-built video-calling system. First, researchers trained the birds to use touchscreens mounted inside their enclosures with easy-to-understand symbols and icons representing different contacts. The researchers rewarded their interactions with food treats. As the birds grew more comfortable with the devices, they were gradually introduced to video calls, first with their handlers and later with other parrots.

Parrots embrace technology

The African grey parrots demonstrated a remarkable ability to learn and adapt to the use of the video-calling system. Not only were they able to initiate calls, but they also showed preferences for specific contacts, indicating that they understood the purpose of the technology and were actively seeking social interaction through the calls.

The study found that the parrots were more likely to engage in video calls when they were alone in their enclosures. This suggests that the video-calling system provided social stimulation and companionship, especially in the absence of human interaction. The introduction of video-calling technology in captive settings could potentially improve the quality of life for these intelligent and social animals.

So, it turns out parrots like to video chat with one another just like humans do, and that it makes them feel less lonely. Many birds in the study stayed on the calls for the maximum allotted time and still choose to call their buddies from the research study over a year later.

According to Northwestern University:

“The most popular parrots were also the ones who initiated the most calls, suggesting a reciprocal dynamic similar to human socialization. And while, in large part, the birds seemed to enjoy the activity itself, the human participants played a big part in that. Some parrots relished the extra attention they were getting from their humans, while others formed attachments for the humans on the other side of the screen.”

WTF fun facts

Source: “Scientists Taught Pet Parrots to Video Call Each Other—and the Birds Loved It” — Smithsonian Magazine

WTF Fun Fact 13339 – Google Traffic Maps

Have you ever wondered how Google Maps can show you if there’s a backup or accident on the road ahead of you in real time? Well, they pull the information from local Android phones. It’s anonymized and Android users can opt out, but most people don’t even know the role they play in traffic mapping by virtue of simply owning the most popular type of smartphone.

How do we get Google Traffic Maps?

Google Traffic uses anonymous location data from Android smartphones to create a real-time map of traffic conditions. This helps commuters and travelers avoid traffic delays and plan their routes. But it’s not a result of having cameras on the roads or helicopters or drones in the sky.

Google compiles traffic data using anonymous location data from Android smartphones. It’s collected through a feature called “Location History,” which is enabled by default on many Android smartphones. With this feature turned on, Android phones periodically send anonymous location data to Google, which is then used to calculate traffic conditions.

The data is anonymized, meaning Google doesn’t collect personal information, such as names or phone numbers. But you can choose to turn off Location History at any time if you’re concerned.

Turning data into warnings

Google uses machine learning algorithms to analyze the collected data and identify patterns in traffic flow. They analyze things like the speed and location of devices on the road. And they do pull in some data from sensors and cameras in the area when it’s available.

Google Traffic maps provide valuable information to casual drivers as well as transportation planners and policymakers. It can identify areas of congestion and helps cities prioritize investments in transportation infrastructure, such as new roads or public transit systems.

But there are privacy concerns, which is why Google is open about its data collection policy and allows Android users to turn off the feature.

WTF fun facts

Source: “How Google Tracks Traffic” — NCTA

WTF Fun Fact 13337 – Light Pollution

Usually, when we think about pollution, we’re worried about smelling it or ingesting it somehow. Simply seeing it isn’t thought of as dangerous. But did you know light itself could be a sort of “pollutant”? Light pollution is a growing problem that is affecting us and our planet in many ways.

What is light pollution, and how does it hurt us?

Light pollution is the use of artificial light that is excessively bright or misdirected. For example, when streetlights or buildings shine light upwards into the sky. Sure, we need a lot of our street lights to keep us safe on roads and sidewalks, but so many lights and lights that are shining so broadly or brightly can really mess up our sleep and our ecosystem.

For starters, excess and misdirected light has serious consequences for nocturnal animals. It can disrupt their migration patterns, feeding habits, and breeding cycles. And as we know, everything on earth is interconnected in some way.

But light pollution also has a direct negative effect on human health. Our exposure to artificial light at night can interfere with our circadian rhythms. So think about how much light you can still see in your room when you shut off your light fixtures. Can you still see lights from streetlamps? Billboard? Store signs? Neighbors’ holiday decorations?

Exposure to light can lead to a range of health problems, including sleep disorders, obesity, and depression. It can also disrupt our hormones.

A waste of energy

Light pollution also requires energy consumption. And as we know, this can produce greenhouse gas emissions. So by reducing light pollution, we can help our ecosystem, ourselves, and reduce the energy consumption that negatively impacts our future.

What can we do to address the problem of light pollution? One solution is “dark-sky friendly” lighting. This means using lighting fixtures that are designed to minimize the pollution. It wouldn’t involve installing all new light fixtures. Rather, it involves the use of shields or hoods that would direct light downwards (which is where we need it to see roads and sidewalks anyway) instead of upwards. Using these fixtures can reduce the amount of excess and misdirected light while keeping us safe.

Most people don’t even know about light pollution and how it affects them. But once they do, they generally take steps to reduce their own contributions to it. (And we bet the neighbors are grateful!)

Reducing your light output might mean turning off unnecessary lights at night, using lower-wattage bulbs, and making sure outdoor lights only shine downwards.

If you’re seeking some darkness in order to see the stars at night, check out the International Dark-Sky Association. It’s a nonprofit organization that works to preserve and protect the night sky, and it has designated more than 100 Dark Sky Places around the world, including parks, cities, and communities that are committed to reducing light pollution and preserving the beauty of the night sky.

WTF fun facts

Source: “Light pollution” — National Geographic

WTF Fun Fact 13334 – Getting Electricity from Mud

How can you get electricity from mud? Well, it turns out there’s a bacteria for that.

In a fascinating development that could have huge implications for the future of energy production, scientists have discovered a species of bacteria called Geobacter sulfurreducens produce tiny wires called pili that allow them to transfer electrons from mud to metals or other conductive materials.

Pulling electricity from mud

Geobacter sulfurreducens belongs to a group of organisms called electrogenic bacteria. They’re unique in that they are able to transfer electrons from organic matter to metals or other conductive materials. This process is known as extracellular electron transfer. It allows the bacteria to generate electricity using devices called microbial fuel cells (MFC).

Generating electricity from mud could be useful for powering small devices in remote areas where traditional power sources aren’t available. Since the bacteria can be easily cultivated in large quantities, the equipment needed to generate electricity from mud is relatively simple and inexpensive. That can also make it a good option for developing countries or areas where traditional power sources are unreliable.

The bacteria could also be used for environmental cleanup. It’s even an environmentally friendly technology since the bacteria consume organic waste and produce electricity as a byproduct.

A broader trend

While this may all seem beyond belief, scientists have actually been using bacteria to generate electricity for a while. They have experimented with wastewater, food waste, and even human urine. The hope is that these bacterial technologies can eventually help us address climate change, energy security, and environmental degradation.

Of course, there are some serious challenges to face before we can implement this kind of tech. For example, it requires massive amounts of bacteria to generate a decent amount of electricity. So there are valid concerns about the scalability of this technology. Then there are the obvious ethical concerns people have about using living organisms to help clean up messes humans have made.

Despite all this, the potential of bacteria-based electricity generation may play an important role in shaping our future.

WTF fun facts

Source: “Mud power: how bacteria can turn waste into electricity” — The Conversation

WTF Fun Fact 13333 – Dead Bird Drones

In a somewhat morbid turn of events, scientists are reportedly making dead bird drones. Researchers at the University of New Mexico are using taxidermy techniques to preserve dead birds in order to outfit them with drone components, such as motors, propellers, and sensors.

Why dead bird drones?

Drones have long been modeled on birds and their flight mechanics. In this sense, it’s no surprise that engineers would try to improve drone design using birds so their machines can navigate through difficult terrain and adapt to changing conditions with ease. But the zombie bird thing gives us pause.

However, the project is still in its early stages. the researchers are experimenting with different types of birds to see which ones make the best drones. So far, they have tested the concept using quails and doves.

They’ve found that bird drones can fly and maneuver in ways that traditional drones cannot. For example, bird drones are able to fly close to the ground and through narrow gaps. This could eventually be useful for tasks such as search and rescue or inspecting infrastructure.

Isn’t this morbid?

While the concept of turning dead birds into drones may seem macabre, the researchers behind the project believe that it could have important implications for the future of drone technology. For example, bird-like drones are more energy-efficient than traditional drones.

“If we learn how these birds manage … energy between themselves, we can apply (that) into the future aviation industry to save more energy and save more fuel,” said Dr. Mostafa Hassanalian, a mechanical engineering professor who is leading the project at the New Mexico Institute of Mining and Technology in Socorro.

Bird drones can also be less obtrusive than traditional drones, which may be noisy and disruptive. Since they’re quieter, bird drones could even be used for wildlife monitoring or scientific research without disturbing the animals being studied.

Of course, there are still many challenges to overcome, including the ethical considerations of taking an animal (even a dead one) and turning it into a tool.

Right now, the taxidermied prototype the engineers have built can only fly for 20 minutes.

WTF fun facts

Source: “Scientists Turned Dead Birds Into Zombie Drones to Spy on Humans” — Popular Mechanics

WTF Fun Fact 13332 – The Cost of Cybercrime

The global cost of cybercrime in 2022 was $8.44 TRILLION! That cost is only expected to rise, reaching $10.5 trillion by 2025. Studies predict that the costs will skyrocket because cyberattacks are becoming more sophisticated, and more information than ever is stored online.

What is cybercrime?

Cybercrime refers to criminal activities like hacking, phishing, identity theft, and the spread of malware or viruses. Cybercriminals use these tactics to steal private data. That might be financial information, private company data, or personal data. The goal is typically either to profit or to cause physical or reputational damage to organizations and their networks (or all of these).

Cybercrime is a growing problem since more of our personal and professional lives happen online.

Why is the cost of cybercrime so high?

A major factor driving the rise of cybercrime is the increasing interconnectedness of devices and systems. This has created what’s called a larger “attack surface” for cybercriminals to exploit. Once they get into a system, they can move into different parts of a network and gain access to everything from customer information to intellectual property.

Another factor contributing to the rise of cybercrime is the growing use of cryptocurrencies. When criminals demand ransoms in crypto, it’s easier for them to launder and stay anonymous.

The cost of cybercrime is not just financial. Cyberattacks can also result in lost productivity and legal and regulatory costs.

Responding to the next-gen crime wave

To combat the growing threat of cybercrime, organizations continue to invest in security measures like firewalls, encryption, and employee training programs. That last piece of the puzzle may actually be the most important since a lot of cybercrime starts with one employee accidentally or intentionally giving up security credentials.

That’s because cybercriminals use social engineering tactics, like phishing emails, to trick employees into divulging sensitive information or clicking on links that install malware on their devices. If an employee isn’t trained in cybersecurity best practices, they’re far more likely to fall for these schemes. And the result is putting their organization’s data and systems at risk.

Employees also unintentionally compromise security through simple mistakes. These include seemingly innocent things like using weak passwords, leaving their devices unlocked or unattended, or failing to install security updates.

WTF fun facts

Source: “Cybercrime Expected To Skyrocket in Coming Years” — Statista

WTF Fun Fact 13328 – Juice Jacking

Have you ever been out and about, only to find that your smartphone’s battery is running dangerously low? You might have felt relieved to spot a public USB charging station, ready to juice up your device. But did you know that these seemingly innocent charging points could put your personal data at risk? Juice jacking is a cyberattack that uses public charging stations to steal data and install malware on devices. The Federal Bureau of Investigation (FBI) has issued a warning about this growing threat, which you can read more about in this Snopes article.

What is juice jacking?

Juice jacking is a type of cyberattack where criminals modify public USB charging stations, allowing them to access and steal data from devices that are connected to these stations. The attackers can also install malware on your device, which could allow them to remotely control your phone or access your sensitive information.

USB charging ports carry both power and data. When you plug your device into a charging port, you may unknowingly create a connection that allows for the transfer of data. Cybercriminals exploit this connection by installing hardware or software in the charging port that can intercept the data transfer between your device and the charger. This could include personal information such as photos, passwords, or banking information.

The risks associated with juice jacking

The risks associated with juice jacking can be severe, especially if your device contains sensitive information. Some potential consequences of a juice jacking attack include:

  1. Identity Theft: Cybercriminals may steal personal information such as your name, address, Social Security number, or banking details. This data can be used to open accounts in your name or commit other fraudulent activities.
  2. Financial Loss: If your banking or credit card information is compromised, criminals can make unauthorized transactions, emptying your accounts or racking up charges on your credit cards.
  3. Data Loss: Attackers can wipe your device, resulting in the loss of important data such as contacts, messages, and photos.
  4. Malware Infection: Malware installed on your device during a juice jacking attack could give criminals remote access to your device, allowing them to track your movements, eavesdrop on your conversations, or access sensitive information.

How to protect yourself

To reduce the risk of falling victim to a juice jacking attack, consider the following safety tips:

  1. Carry a Portable Charger: Invest in a portable charger or power bank that you can carry with you, ensuring that you always have a reliable and safe source of power for your device.
  2. Use AC Power Outlets: When possible, opt for traditional AC power outlets instead of USB charging stations. By using your own charger, you minimize the risk of connecting your device to a compromised port.
  3. Use a USB Data Blocker: Also known as a “USB condom,” a data blocker is a small device that you can plug into a USB port before connecting your charging cable. It allows power to pass through while blocking data transfer, protecting your device from potential attacks.
  4. Keep Your Devices Updated: Regularly update your devices with the latest security patches and software updates to minimize the risk of malware infections.

While public USB charging stations can be a convenient solution when your device is running low on power, they may also pose a significant risk to your personal data. By being aware of the threat of juice jacking and following the tips outlined above, you can protect yourself and your devices from this growing cybersecurity menace.

WTF fun facts

Source: “How Serious Is the Security Threat of ‘Juice-Jacking’?” — Snopes

WTF Fun Fact 13323 – Helicopter Tree Trimming

Helicopter tree trimming involves the use of a helicopter equipped with a circular saw to trim tree branches. Skilled pilots and experienced arborists execute the carefully planned process of helicopter tree trimming, which can be dangerous and risky.

The wild world of helicopter tree trimming

The use of helicopters for tree trimming has become increasingly popular in recent years due to its efficiency and effectiveness. And it’s not just for giant trees. In fact, traditional methods of tree trimming, such as using cherry pickers or bucket trucks, can sometimes be too time-consuming or require crews to shut down roads and neighborhoods. With helicopter tree trimming, a team of arborists can trim several trees in a single day while minimizing disruption to the community.

Still sounds dangerous, right?

How does this process work?

Before the trimming process begins, arborists carefully examine trees and render a thorough assessment of the surrounding environment. The team obviously needs to take into consideration any obstacles or hazards, such as power lines or buildings (or people!) in the area.

Arborists identify the trees to be trimmed, then the helicopter takes off, and the pilot hovers over the target tree. An arborist then lowers from the helicopter on a line carrying a chainsaw or the pilot lowers a specially designed trimming saw to get the job done. These saws are equipped with a circular blade that can quickly and cleanly cut through thick branches.

Obviously, the arborists are highly skilled and experienced in using the saw. They need to be able to make precise cuts, avoid hitting power lines, and make sure there are no unfortunate accidents. They also need to be able to move quickly move from one branch to another as the helicopter hovers and maneuvers around the tree.

Helicopter tree trimming allows arborists to trim trees in areas that are otherwise difficult or impossible to reach. This includes steep slopes, remote areas, and densely forested regions.

It should come as no surprise that this is a risky business. The arborists work at great heights and in challenging weather conditions. They must be constantly aware of the rotor blades and other potential hazards. But with proper safety protocols in place, it is a safe and effective technique.

WTF fun facts

Source: “Aerial Saw Is Boon to Line Trimming” — T&D World

WTF Fun Fact 13319 – Solar Panel Production

As nations throughout the world work to decrease their carbon footprint and transition to renewable energy, solar panel production has increased significantly in recent years. China is one of the major players in the solar panel business thanks to its extensive production and inexpensive prices. Yet, the U.S. is making efforts to catch up and reclaim its position as a global leader in the manufacture of solar panels.

Dominance in solar panel production

China controls 80% of the global solar panel market and is now able to sell solar panels for far less than businesses in other nations. However, there has been increasing concern about China’s use of forced labor, particularly of the Uyghur population, in the production of their solar panels.

While it’s not clear how many solar panels produced in China use forced labor, given the scale of the industry and the reports of human rights abuses in the region, there have been calls for the solar industry to ensure that their supply chains are free from forced labor and other human rights abuses.

U.S. attempts to corner the solar supply chain

The United States is gradually catching up to China’s solar industry thanks to rules and incentives put in place to encourage domestic production and consumer uptake. For example, the US Bipartisan Infrastructure Bill (BIL) has set aside money for the procurement of raw materials, manufacturing, and utility-level adoption.

Additionally, American businesses are funding emerging technologies that might transform the manufacturing of solar panels so it no longer needs to rely on China for raw materials, such as polysilicon. Thin-film solar panels, for instance, which are being tested by some businesses and could bring down the price of solar panels and increase consumer access to them.

In 2021, the United States installed over 20 gigawatts of solar capacity (bringing the total installed capacity to 142.3 gigawatts), which accounted for 50% of new electricity.

WTF fun facts

Source: “Solar Panels Made in USA vs China: What’s Better?” — Go Green Solar

WTF Fun Fact 13314 – The First Stoplight

No one really enjoys sititng at stoplights, but we know they’re valuable. But do you know the history of the first stoplight?

The first stoplight

Stoplights, or traffic lights, date back to the mid-19th century. In 1868, the first traffic signal was installed outside the British Houses of Parliament in London. This signal featured a revolving gas lamp with red and green lenses and was manually operated by a police officer. The officer would signal to drivers using an arm.

However, the signals were not very effective, and it was eventually removed after only a month. It wasn’t until the 20th century that traffic signals looked like the modern traffic lights we know today.

The first electric traffic signal was installed in 1912 by a Salt Lake City police officer named Lester Wire. The signal used red and green lights and a buzzer to signal changes in traffic patterns. This device was effective in reducing the number of accidents in Salt Lake City.

The modern traffic light, with its familiar red, yellow, and green lights, was invented in 1920 by a Detroit police officer named William Potts. Potts was inspired to create the new signal after witnessing a terrible accident at an intersection.

He designed the modern three-color light operated by an automatic timer. This allowed for a smoother traffic flow and reduced accidents. Potts’ design quickly became popular, and the lights were soon adopted throughout the United States.

Today, millions of stoplights are installed around the world. Some now use sensors to detect the presence of vehicles and adjust their timing accordingly.

Another fun fact

One interesting feature of traffic lights is their use of the color yellow. While red and green have obvious meanings (stop and go, respectively), the use of yellow is less clear. In the early days of traffic lights, yellow was used to indicate that the signal was about to change.

However, over time, yellow has come to represent caution, with drivers expected to slow down and prepare to stop. Despite their importance, traffic lights can also be a source of frustration for drivers. In fact, traffic lights are one of the most common causes of traffic congestion in urban areas.

Today, new systems are being developed to improve traffic flow and reduce congestion.

WTF fun facts

Source: “A Brief History of the Stoplight” — Smithsonian Magazine

WTF Fun Fact 13312 – Hairbrush History

Who knew hairbrush history was so fascinating (and painful-sounding?). It turns out that the first mass-produced hairbrush was created in England during the 1770s. They were made of pig bristle, which was a big improvement of their predecessors. Some of those were made of porcupine quills!

Hair-raising hairbrush history

The earliest hairbrushes date back to antiquity. They were constructed out of many different materials, such as animal bones, shells, and bird feathers.

Hairbrushes were employed to style hair as well as clean up dirt and tangles. It wasn’t until the 18th century (specifically the 1770s) that the modern hair brush as we know it today appeared.

In the 1770s, pig bristles were used to make the first hairbrush that was mass-produced. It was not only more resilient, but it also made detangling hair easier.

The evolution of hairbrushes

Hair brushes became better and more advanced over time. A new kind of hairbrush with a concave form and gentle bristles was developed during the early 1800s, making it simpler to style hair. The creation of elaborate hairstyles like bouffants and beehives became popular using this design.

By the 20th century. there were many different kinds of hair brushes available, each with a distinct function. While some are used to detangle hair, others are intended to increase volume or produce a certain hairstyle. A lot of contemporary hair brushes also have features like ion-infused technology or heat-resistant bristles.

Lyda Newman was an African American inventor who was awarded a patent in 1898 for her design of an improved hairbrush. Her hairbrush was unique in that it had evenly spaced synthetic bristles that could be removed for cleaning or replacement. This design addressed the common issue of hairbrushes collecting dirt and oils, which made them difficult to clean and often resulted in hair loss. Newman’s invention revolutionized the hairbrush industry and her design is still used today.

The benefits of brushing

A hair brush can be used for more than just detangling hair. It can be used to distribute natural oils from the scalp more evenly to the ends. Brushing your hair can also help to maintain healthy, lustrous hair. It even aids in exfoliating the scalp, removing dead skin cells, and encouraging strong hair growth.

Frequent hair brushing can aid in preventing split ends and breakage by gently and evenly detangling hair. The blood flow to the scalp can be stimulated by brushing your hair. This encourages hair development and maintains healthy hair.

WTF fun facts

Source: “Antique Hair Brush History, Brands & Sophisticated Styles” — Love to Know

WTF Fun Fact 13302 – Bug Bounty Programs

Have you heard of “bug bounty programs”? No, they’re not about capturing critters in your yard. These programs are run by major tech companies. Companies like Google, Microsoft, and Facebook use these programs to incentivize hackers and security researchers to find and report vulnerabilities in their systems by offering rewards or cash bounties.

Big Tech’s bug bounty programs

Bug bounty programs allow tech companies to identify and address security weaknesses. But more importantly, they do so before the weaknesses can be exploited by cybercriminals. Some programs have paid out millions to researchers and hackers who found major vulnerabilities. For example, in 2019, Google paid out over $6.5 million in bug bounties to people around the world.

Bug bounty programs typically have guidelines and rules. These outline what types of vulnerabilities are eligible for rewards and how they should be reported. Once a researcher or hacker identifies a vulnerability, they submit it to the company’s bug bounty program. The company then verifies the bug and determines if it is eligible for a reward. If the vulnerability is valid, the company forks over the reward to the person who reported it.

Some companies may also offer other incentives, such as swag or recognition. This helps encourage participation. Some programs may even have different reward tiers for different types of vulnerabilities. For example, more critical or severe vulnerabilities earn higher payouts.

A win-win solution for cybersecurity

There are several reasons why companies use these programs. Identifying security vulnerabilities before they can be exploited by cybercriminals saves the company from potential data breaches, financial losses, and reputational damage.

The programs also allow companies to work with the security community. This helps them improve their security measures and stay ahead of emerging threats. These programs are also cost-effective. Companies discover security weaknesses, as they only pay for valid bugs that are reported.

WTF fun facts

Source: “Google paid $6.7 million to bug bounty hunters in 2020” — ZDNet

WTF Fun Fact 13287 – The First Spacewalk

On March 18th, 1965, Soviet cosmonaut Alexei Leonov made history by becoming the first person to walk in space. Leonov left his spacecraft, the Voskhod 2, and floated in space for 12 minutes and 9 seconds. The first spacewalk paved the way for future space exploration and opened up new possibilities for scientific research in space.

The Soviets made the first spacewalk

The spacewalk was a remarkable achievement for the Soviet space program, which was in competition with the United States at the time to achieve milestones in space exploration. The mission was not without its challenges, however. Leonov’s space suit had inflated in the vacuum of space, making it difficult for him to move and causing him to experience overheating.

Despite these challenges, Leonov successfully completed his spacewalk and returned to the spacecraft, where he faced another problem. The spacecraft’s automatic landing system had failed, and Leonov and his crewmate had to manually steer the spacecraft to a safe landing.

Subsequent spacewalks

Since Leonov’s historic feat, many other astronauts and cosmonauts have followed in his footsteps (or rather, lack of footsteps). Here are some quirky facts about spacewalking:

  • The longest spacewalk in history was conducted by Russian cosmonauts in 2013. They spent 8 hours and 7 minutes outside the International Space Station.
  • Spacewalks are often referred to as “EVA,” which stands for “extravehicular activity.”
  • Spacewalkers wear special suits called Extravehicular Mobility Units (EMUs). These are designed to protect them from the extreme conditions of space.
  • During a spacewalk, astronauts and cosmonauts tether themselves to the spacecraft to prevent them from floating away into space.
  • The first American to conduct a spacewalk was Ed White in 1965, just a few months after Leonov’s historic walk.
  • In 1984, American astronaut Bruce McCandless made history. He became the first person to fly freely in space without being tethered to a spacecraft.
  • The first all-female spacewalk took place in 2019. Astronauts Christina Koch and Jessica Meir conducted a 7-hour walk to replace a failed power controller.

As space exploration continues to advance, it’s likely that we’ll see even more remarkable achievements in spacewalking. But Alexei Leonov’s historic spacewalk on March 18th, 1965 opened up a new world of possibilities for space exploration.

 WTF fun facts

Source: “The First Spacewalk” — New Scientist

WTF Fun Fact 13274 – The Ubiquitous AOL CDs

From the late 1990s to the mid-2000s, America Online (AOL) CDs were a ubiquitous object in households across the country. These CDs were inescapable, as they seemed to arrive in the mail on a regular basis, and were even stocked in stores. At one point in the 1990s, around half of all CDs produced in the world were AOL CDs. For those too young to remember, this was many people’s only way to access the internet.

The history of AOL CDs

AOL, or America Online, was a pioneer of the internet in its early days. As one of the first internet service providers, it offered dial-up access to the World Wide Web through its proprietary software, which was distributed on CDs. Lots and lots of them.

AOL packaged the CDs in bright, attention-grabbing sleeves. They often came with enticing offers for free internet trials, exclusive content, and more.

The impact of AOL CDs on marketing and internet access was far-reaching. By the late 1990s, AOL began producing more than one million CDs per day, a testament to their effectiveness as a sales and marketing tool.

According to The Atlantic (cited below), AOL’s former chief marketing officer Jan Brandt told TechCrunch that the company spent over $300 million luring in customers with CD. “At one point, 50% of the CD’s produced worldwide had an AOL logo on it. We were logging in new subscribers at the rate of one every six seconds,” he said.

Copycats and landfills

These discs provide millions of Americans with access to the internet, but they were also a crucial instrument in the early days of online marketing. Companies could bundle their software, promotions, and products with the discs, providing them with unprecedented exposure to a growing audience.

Many companies followed suit, with other internet service providers conducting similar campaigns. Despite their success, AOL CDs eventually fell out of favor as the internet landscape evolved.

As broadband access became more widespread, the need for the inexpensive access provided by AOL diminished.

These compact discs were undeniably effective. But they were also an environmental nightmare since people discarded these CDs in landfills once they became obsolete.

WTF fun facts

Source: “How Much Did All of Those AOL CDs Cost?” — The Atlantic

WTF Fun Fact 13249 – ChatGPT Consequences for Creatives

ChatGPT is just a generative language model – a very fancy form of autocorrect, in some cases. And it doesn’t give answers that indicate it’s out to replace human writers. But we don’t yet know what the ChatGPT consequences for creatives are – and neither does the AI. When asked, ChatGPT spat out this answer:

“While AI-generated content may be able to produce work that is similar in style and content to that produced by humans, it is not a replacement for human creativity. There will always be a demand for unique and original human-generated content, and AI-generated content is unlikely to completely replace the work of human writers.”

The word unlikely is a bit eye-opening, but a machine can’t predict how humans may misuse it to replace other humans.

What are some of the possible consequences of ChatGPT for creatives?

ChatGPT is already impacting writers’ ability to make a living. And because it’s not a very good writer, it’s affecting people’s access to good writing.

ChatGPT produces the following argument in favor of itself:

“..there is potential for generative AI to be used in collaboration with human writers, rather than as a replacement. For example, an AI language model could be used to suggest ideas, provide inspiration, or even generate a first draft of a piece of writing, which could then be refined and edited by a human writer.”

It “suggests” that humans will learn to work around it and develop new business models to make room for everyone. Of course, it is quite frequently wrong about things.

“The toasters look like us now”

Plenty of writers are having fun with ChatGPT, however. They’ve never written articles with its help while citing it as a resource. What a way to add to your word count!

And when pressed a bit on its ability to replace humans, it recites the same old line about the potential for collaboration before producing the following paragraph:

“Overall, it is important to approach the development of AI in creative fields with caution and a recognition of the potential risks and benefits. While AI has the potential to transform the creative process in many ways, it is important to find ways to ensure that it does not have a negative impact on the livelihoods of human artists and writers.”

Of course, that last part is up to humans.  WTF fun facts

Source: “ChatGPT isn’t putting me out of a job yet, but it’s very good fun” — TechCrunch (paywalled, sadly)

WTF Fun Fact 13248 – The Wind Phone

Itaru Sasaki’s wind phone (“kaze no denwa” in Japanese) is a telephone booth located on a hill in Otsuchi, Japan. The booth is a way for people to connect with loved ones who passed away in the 2011 earthquake and tsunami devastated the area. The wind phone has become a symbol of hope, healing, and connection for people worldwide.

What’s the story behind the wind phone?

Sasaki was inspired to create the booth after he lost his cousin in a tsunami. He wanted to create a space where people could talk to their loved ones who had passed away. The goal was to help them feel a sense of connection and comfort. Sasaki constructed the phone booth on property which overlooks the Pacific Ocean and installed a disconnected rotary phone inside it.

The phone booth is designed to be a quiet, peaceful space where people can reflect and connect with their loved ones. It is open to the public. The booth has become a popular destination for people from around the world. They come to leave messages for their loved ones and to listen to the wind.

The wind phone has become a symbol of hope and healing for many people. The sound of the wind blowing through the phone is an important element. It creates a sense of connection with the natural world and the spirits of dead loved ones. People who have visited the phone have described feeling a sense of peace and comfort after leaving messages.

The legacy of the phone booth

The phone has also become a symbol of resilience for the people of Otsuchi. The 2011 earthquake and tsunami were among the worst natural disasters in Japan’s history. They caused widespread destruction and loss of life. The phone is a reminder of the power of human connection and the importance of finding ways to heal and move forward after tragedy.

The phone booth has inspired people worldwide to create their own versions of the phone booth. There are installations in the United States, Australia, and the United Kingdom.

The wind phone has also been the subject of a documentary titled “The Phone of the Wind: Whispers to Lost Families.” It explores the history and significance of the phone booth. The film includes interviews with Sasaki and people who have visited the phone and left messages for loved ones over the years.  WTF fun facts

Source: My Wind Phone

WTF Fun Fact 13244 – The Dangers of Paying Ransom

2021 study from Cybereason found that 80% of organizations targeted with ransomware attacks and that paid a ransom were later targeted by a second attack. This adds to the evidence that paying ransom may not always be worth it for companies.

Ransomware and paying ransom

According to experts at Kaspersky, ransomware attacks doubled in the first ten months of 2022 compared to the previous year. This included individuals, government entities, and businesses. They also noted that most attacks originated with phishing emails imitating legitimate agencies to access personal information or credentials.

While companies subject to ransomware attacks face enormous pressure to pay a ransom to protect customer data, this carries risks. The FBI has warned some companies that paying ransom isn’t necessarily going to protect them.

Ransom demands are also rising – in fact, the amounts have increased by 500% in the last two years. The average ransom demand from cybercriminals is now half a million dollars. And while some insurance companies offer cyber insurance, it does not make up for the private data that gets leaked on the dark web.

Cyber insurance may soon become a thing of the past since many companies seem incapable of mounting a secure defense against hackers, and lawsuits pile up as a result.

Once a company pays a ransom, they seem to be a target for new attacks. Up to 80% are targeted a second time.

As of 2021, between 50 and 75% of ransomware targets were small businesses.

The importance of cybersecurity

Recent hacks have had devastating consequences. For example, Australia’s Medibank medical insurance company was hacked in 2021. As a result, people who had sought resources for mental health and addiction had their names and data published on the dark web. Medibank now faces a class action lawsuit. It’s unclear if they considered paying ransom demands.

New Internet of Things (IoT) and mobile devices are at the center of security discussions. It appears these are popular targets for hackers. For example, many recent hacks have targeted unsecured printers that people fail to update. If these are part of a company’s network, cybercriminals can gain access to a printer and move into a company’s entire network.  WTF fun facts

Source: “Ransomware” — NAIC

WTF Fun Fact 13242 – An AI Discovery

An AI discovery stunned literature enthusiasts in early 2023. An artificial intelligence (AI) technology being used to transcribe anonymous historic works at Spain‘s National Library managed to identify a play that was actually written by Felix Lope de Vega, one of Spain’s great playwrights.

How did the AI discovery come about?

According to CNN: “The National Library said on Tuesday that experts later confirmed that the Baroque playwright — one of the most prominent names of the Spanish Golden Age — wrote “La francesa Laura” (The Frenchwoman Laura) a few years before his death in 1635.”

The manuscript in the library’s archives is a copy. However, no one knew there was an original. That may have been destroyed.

Researchers from universities in Vienna and Valladolid used AI to digitize 1,300 anonymous manuscripts and books at the library. This allowed a machine to scan the text and transcribe it without requiring years of human labor.

The algorithm was also designed to compare traits of the previously anonymous plays to known plays in order to find similarities. And that’s precisely how La francesca Laura was identified as one of Felix Lope de Vega’s plays.

The National Library said the words used in the text were “closely aligned with Lope’s, and not with those of the other 350 playwrights who were part of the experiment.”

According to CNN, “Experts then used traditional philological research resources to corroborate the findings.” In other words, they went through the known history of the author for hints that he wrote such a play.

A new classic

CNN summarized the play:

“The plot focuses around Laura, the daughter of the Duke of Brittany and wife to Count Arnaldo. The heir to the French throne is captivated by her, and although she rejects him, her jealous husband tries to poison her. Ultimately, Laura’s righteousness is proven and happiness is restored.”

The play will be published by Gredos publishing house later in 2023.  WTF fun facts

Source: “AI reveals unknown play by one of Spain’s greatest writers in library archive” — CNN