According to the Orlando Sentinel, sadly, manatees are dying at a record pace across Florida waters. The reasoning for these common underwater fatalities can be attributed to algae blooms, cold weather, and marine propellers.

The marine propeller market is projected to grow as much as $5 billion by 2022 at a compound annual growth rate (CAGR) of 2.2%. Allyson metals like nickel, aluminum, bronze, and metal are widely used for production and manufacturing of these underwater propellers, giving them excellent corrosion resistance and power. Aluminum bronze alloys are typically made up of between 9% and 12% aluminum and up to 6% nickel and iron.

Though these marine propellers are powerful, efficient, and even necessary, unfortunately, they can be quite dangerous to marine mammals — especially manatees.

“Manatees may join polar bears as one of the first iconic victims of extinction in the wild from climate change,” said Jeff Ruch, executive director at the Public Employees for Environmental Responsibility.

Though much needs to be done in order to fight back against the climate issues, at least there are ways to better protect manatees from dangerous underwater propellers.

Biologists have developed ways to actually track the movement of manatees underwater, enabling them to identify when the sea mammals are nearing potentially harmful propellers.

“This will allow us to track and monitor their behavior and hopefully their progress and how they’re doing in the coming months,” added Mary Stella, of the Dolphin Research Center, which is often called upon to help with manatee captures and releases. “This is important. They were only a few months old at the time of their rescue. They were dependent on their mother.”

Unfortunately, this approach can only work while the manatees are still young, and are usually removed after about four months — so more research is needed in order to protect adult manatees from the various underwater dangers.

It seems like every day, there’s another cyber attack being performed on a large corporation. For example, Google recently shut down its unpopular Google Plus feature after a leak revealed the company had failed to disclose a cyber security vulnerability that lasted for around three years. But it’s important to remember that it’s not just the big businesses that have to worry. In fact, around 55% of small- to medium-sized businesses were victims of cyber attacks within the last year. That means it’s essential to be vigilant about protecting your company, your employees, and your customers.

While female employees commit around 51% of embezzlement crimes, financial threats that come from outside your company are typically a greater concern. These threats come in various forms, and with the rapidly evolving internet, it may be hard to keep up with the latest. The FBI just released a statement warning businesses about an email scam that aims to obtain employee identification information in the hopes of stealing your directly deposited paycheck.

Phishing emails are still incredibly common, despite how long they’ve been around. Electronic payroll scams are becoming more popular with each passing year. According to the FBI, they’ve handled more than $1 million worth of cases since July through 47 different cases. In order to avoid email phishing scams, FBI officials say employee training is essential. Workers should learn to hover their mouse cursors over hyperlinks (particularly those included in emails) before clicking so they can view the actual URL first and verify whether it’s legitimate. Employees should also be taught to avoid supplying login or personal information in emails of any kind. Businesses should set up an account specifically for suspicious requests; employees should be instructed to forward any suspicious emails they receive to this account, which should be monitored by the IT or HR departments. Businesses should also take care to diversify login information. Credentials for payroll and other credentials should be completely different and should be changed regularly.

As Neil Walsh, head of global cyber crime for the United Nations, explained to “Businesses can have the best technology available in an attempt to prevent fraud, but the weakest link in any business is the human element… Where new threats emerge, technology is not able to respond quickly enough to prevent them, and this is why employees must be educated as they are typically the route in for criminals to expose a host of issues for businesses.”

IBM estimates that 95% of successful cyber attacks occur due to human error — which means that even if you have taken technological precautions, they probably won’t help if you haven’t trained your staff properly. The human component is why another cyber threat, malware, is often so devastating. The lack of employee awareness surrounding malware threats tends to have dire consequences. When sent via email, ransomware links do even more harm than phishing scams. Instead of a criminal obtaining your login info, they will convince you to unknowingly download a program that blocks your access to a computer system (or sometimes to an entire network) until a payment is made to regain access. There are also trojans, worms, rootkits, and keyloggers that can capture essential information and prohibit employees and business owners from accessing what’s rightfully theirs.

There are also malicious phone apps that masquerade as legitimate ones in both Google’s and Apple’s stores. Even scarier, some criminals are doing what are called “social engineering attacks” to find another way in.

Many workers rely on social media to do their jobs or to find them in the first place. After all, 93% of recruiters look at candidates’ social media profiles. Unfortunately, those everyday activities can make companies vulnerable to cyber onslaughts. Social engineering attacks involve deceiving individuals into providing access for confidential data and protected systems; typically, criminals will use social media monitoring combined with phishing emails to get what they’re after.

When one security company conducted a simulated attack, they needed only one week to gather the necessary information on employees from their LinkedIn profiles to contact them and pretend to be from IT. They requested these employees perform computer updates — and many employees did exactly that, except that the “updates” were actually dubious software downloads. None of the employees questioned the legitimacy of the emails from the “IT department,” showing just how easy it is for hackers to gain access to nearly all the computers within the company’s network. Notably, before this experiment, the business in question showed no signs of cyber vulnerability.

Here, employee education is a top priority, too. The network itself wasn’t vulnerable, but it was human error that allowed the security company (posing as hackers) to gain access. To protect your business against social engineering attacks and other cyber security threats, the company recommends that employees refrain from publishing company information on social media, from accepting social media requests from people they don’t know, and from posting photos of their desk or workspace online (which could reveal details about the tech you’re using and your location). The company adds that workers should never conduct updates on their work computer system, even if the caller or user claims to be from IT, nor should they turn off vulnerability scanning on their computer. Passwords should never be saved in an unencrypted format, either.

If you’ve taken the time to create a virtual fortress for your business’s cyber security, consider that the technology won’t do its job without help from us. If we aren’t as smart about protecting our data against potential threats, all those bells and whistles won’t mean much in the end.

As the plague of ride-sharing electric scooters descends on large cities across the country, many of those cities are considering new legislation to manage their popularity. But how does a controversy form from such a simple idea?

The surge of electric scooters comes from the desire for cheap, easy-to-use transportation. In large cities where commuting by car for shorter trips can be a challenge, many love the idea of simply downloading an app, finding a nearby scooter, and paying a small fee to ride it for a few miles.

In large cities where car damage happens fairly often, this can save you tons of money for your shorter trips. A deep scratch can result in up to $3,000 worth of repairs if the damage is serious. A simple scooter ride for short distances may extend the life of your car, making it a great option for many people.

The initial rental fee is only $1 and then you’re charged a measly 15 cents for every minute you ride. For a 10 minute trip, that means you only pay around $3. This is your average trip to a grocery store or your friend’s house. And when you’re finished, leave the scooter out of major walkways for the next rider to use.

Simple, right?

Not so simple. At 12 miles per hour, the scooters aren’t fast enough to keep up with the flow of traffic and they’re a little too fast to work comfortably on walkways and sidewalks. On top of that, there aren’t designated drop-off points for scooters, making them a tripping hazard and eyesore for those who aren’t using them.

It might also be detrimental for the public metro system as more riders are lost to startups like these. It’s also not feasible for snowy cities with defined seasons.

However, those who ride scooters are becoming increasingly diverse. The Segway generation consists mainly of “tech bros” and the privileged upper class. Scooter riders, on the other hand, have shown more tourists, women, and lower-income individuals taking advantage of the tech. This was determined from a survey of around 7,000 scooter riders across 10 major cities.

Right now, cities like Los Angeles, New York City, and Seattle are all trying to create legislation to determine the rules regarding rental scooter use. This could include regulating the number of scooters available in each town to stem the clutter of scooters on the sidewalk.

Artificial Intelligence has now become a priority of the Pentagon. According to the New York Times, the Pentagon is looking to strengthen its relationships with AI researchers in Silicon Valley to advance the nation’s national strategy for artificial intelligence.

The Pentagon fears the U.S. is falling behind in AI compared to other countries such as China. It’s believed AI could be the next technological game changer in warfare.

In June, the Pentagon announced the creation of the Joint Artificial Intelligence Center, or JAIC. The organization will begin next month. The Defense Department has also announced that it would be shifting $75 million of its annual budget into the new office.

Defense officials plan to use the center to facilitate dozens of AI projects. One project includes Project Maven, an effort to develop technology capable of identifying people in drone-captured videos.

However, the ideology surrounding this technology doesn’t sit well with those in Silicon Valley. Earlier this year, Google withdrew from Project Maven after thousands of Google employees protested the company’s involvement with the effort.

To some researchers, Artificial Intelligence and technology isn’t meant to be used to create robotic vehicles and robotic weapons. To create autonomous weapons, the researchers say, is to create an unusual threat for humans.

“This is a unique moment, with so much activism coming out of Silicon Valley,” said Elsa Kania of the Center for a New American Security, an organization that analyzes policy related to national security and defense.

“Some of it is informed by the political situation,” Kania said, “but it also reflects deep concern over the militarization of these technologies as well as their application to surveillance.”

Artificial Intelligence and automation have thus far been used for human entertainment and workplace innovation. For instance, the U.S. steel industry has seen significant increases in productivity since automation was introduced.

In 2017 alone, the U.S. produced 82 million metric tons of steel although 17% of the country’s steel is imported from Canada.

Approximately 13% of the world’s steel is used by the automotive industry, which has a major impact on the U.S. economy. As part of the automotive industry, the snowmobile industry brings in $26 billion annually and the global industrial brakes and clutches market is expected to reach $1.7 billion over the next 10 years.

That said, automation’s innovative impact on just one industry has a significant impact on other industries across the nation. It’s this impact that has defense officials hoping the JAIC will help close the gap between researchers and military innovators.

If small changes in AI and automation can help the steel industry, changes in AI technologies may be able to give the U.S. military a greater leg up.

Brendan McCord, a Navy veteran, will lead the JAIC. One of the biggest strengths the U.S. has, McCord says, is the innovation and talent that’s found in the nation’s academic institutions and the private sector.

The Pentagon hopes to overcome the reluctance among AI researchers. Defense officials say the JAIC will have a focus on ethics, humanitarian considerations, and AI safety.

Sophie-Charlotte Fischer, a researcher at the Center of Security Studies at ETH Zurich University, says this focus was an important step to bridge the gap between the military and Silicon Valley. But the focus on ethics may not be enough to convince researchers.

“So far, the plans remain very abstract,” said Fischer. “What kind of systems do they want to allow? Do they want to attach weapons systems to AI?”

Robert Work, the founder of Project Maven and the former deputy secretary of defense, says that the project doesn’t yet involve lethal weapons and that he worries public discussion could stunt how the military technology could evolve.

“We need to have an open debate about AI and its consequences and hear arguments from all sides,” said Work.