The Latest Scams and How to Protect Yourself

| 0

If you’re like me, you’ve seen more scams in your email and texts lately. Scammers are constantly evolving their tactics, using new technologies and psychological tricks to deceive people. Fraudsters are leveraging artificial intelligence, impersonation techniques, and digital platforms, such as social media, to target unsuspecting victims. Here’s a breakdown of the latest scams and how you can stay safe.

AI-Powered Scams

Artificial intelligence has revolutionized fraud, making scams more convincing than ever. Criminals use AI-generated voices, deepfake videos, and realistic phishing emails to trick victims into handing over personal information or money.

Deepfake is defined by the Merriam Webster dictionary as an image or recording that has been convincingly altered and manipulated to misrepresent someone as doing or saying something that was not actually done or said.

How to Protect Yourself:

  • Be skeptical of unexpected messages, even if they appear to be from someone you know.
  • Verify requests for money or sensitive information by contacting the person or organization directly. Do not use the phone numbers in suspicious emails, texts, or phone calls. Use verified numbers the person or company has provided you or you find through an online search.
  • Use multi-factor authentication to secure your accounts. This includes passcodes and passwordless accounts where available.

Imposter Scams

Scammers pose as government officials, bank representatives, or even family members in distress to manipulate victims into sending money or revealing personal details.

How to Protect Yourself:

  • Never trust unsolicited calls or messages requesting money or sensitive information.
  • Verify the identity of the caller by contacting the person or organization directly.
  • Be cautious of urgent requests that pressure you to act quickly.

QR Code Scams

QR codes are being exploited by fraudsters to direct users to malicious websites or install malware on their devices without their knowledge.

How to Protect Yourself:

  • Only scan QR codes from trusted sources.
  • Avoid scanning codes found in unsolicited emails, text messages, or social media posts.
  • Use a QR code scanner that previews the URL before opening it, especially if you weren’t expecting it.

Learn more about QR code scams from the Federal Trade Commission (FTC).

Toll Road Scams

Scammers send fake text messages claiming unpaid toll fees, tricking victims into providing payment details.

How to Protect Yourself:

  • Verify toll payments through official websites rather than clicking on links in text messages.
  • Be cautious of messages threatening immediate penalties or license suspension.

You can find out more about toll road scams from the FTC.

Job Scams

Fraudsters target job seekers with fake employment offers, often requiring upfront payments or personal information.

How to Protect Yourself:

  • Research companies before applying for jobs.
  • Avoid job offers that require payment for training or equipment.
  • Never share sensitive information like your social security number with unverified employers.

Find out more about job scams from Indeed and the FTC websites

Stay Vigilant

Scammers prey on trust and urgency, making it crucial to stay informed and cautious. Always verify unexpected requests, use strong security measures, and report suspicious activity to authorities.

For more details on the latest scams, check out these blogs from AARP, Experian, and Norton.

The Future of Authentication: Exploring Passwords, Passkeys, and Passwordless Logins

| 0

Should passwords become extinct? Previously we talked about protecting your online information with unique passwords and two-factor authentication. With the increase in phishing schemes, and the potential exploitation of two factor authentication by hackers, we are seeing a change in the way companies are looking at online security. This is giving rise to the use of passkeys and passwordless logins.

Passwords have been our guardians of our information for decades, but they do have weaknesses:

  • Weak passwords and password reuse across accounts make easy targets for hackers. Even strong passwords can be compromised in data breaches.
  • Managing dozens of unique passwords, and remembering to change them for all the accounts and applications we use can create password fatigue even when using a password manager.
  • Some people tend to choose easily guessed passwords or use personal information, increasing the potential for account compromise.

It’s becoming clear, that while passwords have served us well for years, they are no longer our best defense in protecting our data against cyber threats.

Enter Passkeys: A Modern Alternative

Passkeys offer a secure and user-friendly alternative to traditional passwords. Rooted in public-key encryption, passkeys pair a public and private key to authenticate users. The public key is shared with the service, while the private key remains securely stored on the user’s device. Here’s why passkeys are the future:

  • Enhanced Security: Passkeys are resistant to phishing attacks and database breaches since the private key never leaves the device.
  • Seamless Experience: Logging in with passkeys is effortless, often requiring just a biometric scan or device approval.
  • Cross-Platform Support: With backing from tech giants like Apple, Microsoft, and Google, passkeys are becoming a universal authentication method.

The move to passkeys represents a significant leap forward, providing stronger protection while simplifying the login process.

The Rise of Passwordless Logins

Passwordless logins go a step further, eliminating the need for passwords altogether. Instead, they rely on modern technologies such as:

  • Biometric Authentication: Facial recognition, fingerprints, or voice ID.
  • Device-Based Authentication: Trusted devices serve as the key to access.
  • Magic Links and One-Time Codes: Temporary links or codes sent to a user’s email or phone.

Passwordless logins bring several advantages:

  • Stronger Security: No stored passwords mean a reduced risk of breaches or phishing attacks.
  • Convenience: Users can authenticate with minimal effort, leveraging tools like biometrics or trusted devices.
  • Future-Proof: These methods are aligned with emerging standards like Fast Identity Online 2 (FIDO2). FIDO2 is an authentication standard based on public key encryption that is more secure than passwords and One-Time Passwords sent by SMS text.

However, challenges like ensuring widespread adoption and addressing hardware or accessibility limitations remain. Despite these hurdles, the push for passwordless systems is gaining momentum globally.

As we transition away from passwords, the adoption of passkeys, passwordless logins, and standards like FIDO2 will become the norm. These innovations promise to make our online lives more secure and convenient. While challenges remain, the direction is clear: the days of remembering (and forgetting) complex passwords are numbered.

Are you ready to embrace the passwordless revolution?

For more information:

Missouri’s BEAD Program 2025

| 0

Just a Speed Bump or Is the Broadband Bus Running on Empty?

In June 2023, the National Telecommunications and Information Agency (NTIA) announced that Missouri had been allocated over $1.7 billion through the federal Broadband Equity, Access, and Deployment (BEAD) program, to expand high-speed internet access to more than 200,000 unserved and underserved locations across the state. This was the third highest amount of set aside for any state, with only California and Texas receiving larger allocations. The  BEAD funding was part of the Infrastructure Investment and Jobs Act (IIJA) enacted back in 2021, and the amount represented a historic opportunity to close Missouri’s digital divide and stimulate economic growth especially in rural unserved and underserved communities.

However “allocating” money isn’t the same thing as distributing it … either to the state or to the ISPs that will ultimately construct and operate new internet networks that ultimately will construct and operate new internet networks. Actually getting the money to where it could be used for an internet construction project has been painfully slow. At this point no money BEAD has been committed to a broadband project in Missouri, and it is looking less likely that any will be at this year.

This Blog describes why that’s happened, and suggests some steps communities might consider as we wait for the money.

BEAD Funding …. It’s a Process.

Even though BEAD was enacted in 2021 the “roll out” almost immediately encountered a substantial delay. It took a year and a half for the FCC to put together a set a map that NTIA could use to apportion the $44.24 billion Congress made available among the states. Much of that delay occurred because the FCC refused to begin working on the maps until Congress appropriate money specifically to fund the cost of preparing maps. Once the mapping process was completed, NTIA then required states to complete a multistage process that was roughly based on requirements outlined in the BEAD statute.

NTIA’s process required states to first determine locations eligible for funding and to create a procedure for selecting which ISPs would receive BEAD money. States were required to submit this procedure to NTIA for approval (Preliminary Plan Approval). Once Preliminary Plan Approval occurred, each state had one year to actually identify project locations eligible for funding and to conduct the  competitive process to select ISPs to build the broadband infrastructure using BEAD funds. The result of this work also had to be submitted to NTIA as the state’s Final Plan, and NTIA then would have an undetermined length of time to “approve it” (Final Plan Approval). Only after Final Plan Approval would ISPs selected in the state’s competitive grant process actually be assured they actually would receive the BEAD money, once the project was completed in accordance with the grant requirements.

Missouri Receives Preliminary Approval from NTIA and the Project Selection Process Begins

It took NTIA over a year (August 2, 2024) to give Missouri “Preliminary Plan Approval.” Thereafter, Missouri’s Office of Broadband Development (OBD) made significant progress moving toward a completion of a Final Plan for NTIA’s Final Plan Approval. Last year OBD conducted a rigorous challenge process to ensure that the locations designated as eligible for BEAD funding were accurate. It prequalified ISPs to streamline the process of reviewing ISP proposals to provide service in those areas, and it completed a first round of  BEAD funding applications, receiving 519 applications covering 192,284 locations-about 90% of the sites eligible for BEAD money.

A Short Pause…Or a Substantial Multi-Year Delay?

The acronym BEAD stands for Broadband Equity Access and Deployment, and for that reason alone, it’s not surprising that the incoming Trump administration would want some changes. NTIA is part of the Commerce Department, and  Commerce Secretary Howard Lutnick has consistently criticized the BEAD program for what he describes as “woke mandates,” including labor and climate-related requirements, and a “favoritism towards fiber-optic technology” that he believed needlessly inflated project costs and delayed infrastructure deployment.

During his January 2025 Senate confirmation hearing, Secretary Lutnick declined to commit to honoring NTIA’s existing Preliminary Plan Approvals, stating he would review plans for efficiency and alignment with “lowest cost” objectives. In March 2025, he announced a 90-day review focused on  Biden-era rules, prioritizing a tech-neutral approach (including satellite and fixed wireless) and streamlining infrastructure construction. The goal of this approach he argued was to accelerate deployment and reduce taxpayer costs. That has since been followed by an across the board 90 day extension in the date States must submit their Final Plan for NTIA approval.

Meanwhile, in March, congressional Republicans introduced the SPEED for BEAD Act to codify some of Secretary Lutnick’s priorities. Key provisions of this bill include:

               •Mandating technology neutrality, removing fiber-first preferences.

               •Eliminating labor (e.g., prevailing wage) and climate resilience requirements for broadband infrastructure.

               •Restricting BEAD funds to for infrastructure deployment only, blocking states from allocating funds for digital equity or workforce programs.

               •Requiring states to prioritize cost-effectiveness in subgrantee selection.

The legislation aligns with broader GOP efforts to redirect BEAD toward “shovel-ready” projects. Undoubtedly, it also puts fixed wireless providers and satellite providers in a much more competitive position as well, as they generally are less costly, at least in the short run, when compared to fiber to the premises broadband.

Of course, there are solid arguments supporting all of these proposals, and admittedly, the speed of implementing BEAD up to this point has been discouraging. However, the prospect of forcing states to throw out the work they’ve already done, and restart the planning and approval process under a new set of guidelines, is pretty disheartening, not only for the ISPs that proposed under Missouri’s approved Preliminary Plan, but to the communities hoping to finally get internet service as well. A recent opinion piece by Missouri Representative Louis Riggs, did a good job of expressing these concerns, and frustration with the delay and the change in approach.

Missouri stakeholders—including ISPs, local governments, and bipartisan state legislators-have expressed concern about mandatory federal changes forcing states to restart or revise their BEAD plans. A letter signed by 115 state legislators from 28 states urged Secretary Lutnick to make any changes to BEAD optional rather than mandatory to avoid undermining state authority and delaying broadband deployment, but even if changes are made optional at the state level, it seems likely that Missouri officials will want to carefully consider whether to go forward with the existing grant applications, or adopt the new standards.

While nothing can be said with certainty, it seems likely that even under comparatively optimistic timeframes, Missouri now will not be able submit a Final Plan for NTIA approval until late this year, and of course NTIA approval might take many months more. If the Trump administration chooses to focus efforts on passing the “Speed for BEAD Act” it seems likely that much of what OBD did this past year will need to be redone to allow new applications and proposals for funding that allow more wireless projects, and eliminate environmental and prevailing wage requirements.

Funding Under USDA Programs Seems Uncertain.

Although funding promised to Missouri under BEAD has dwarfed other federal programs, over the past several years the Department of Agriculture (USDA) has provided funding assistance through grants and loans for many rural communities as well. Two programs in particular administered by USDA are the Reconnect and the smaller, Telecommunications Loan Program. Unfortunately things don’t look promising here either. The Trump Administration’s Director of the Office of Management and Budget (OMB) has directed that funding under both of these eliminated, because they are duplicative.

Other Broadband Funding Options for Missouri Communities

Given the uncertainty around BEAD’s timeline and rules and the probable elimination of other federal programs, Missouri communities and ISPs may want to again explore other funding avenues to continue broadband expansion efforts. Missouri law authorizes several mechanisms to finance broadband infrastructure, including issuing tax-exempt bonds for Qualified Broadband Projects, Community Improvement Districts (CIDs), Neighborhood Improvement Districts (NIDs), Tax Increment Financing (TIF), and property and sales tax exemptions for broadband projects. These are outlined in a White Paper previously published on MoBroadband. You can find the White Paper [Here].

What’s next?

Well, the short answer is we don’t know. However, it is clear that many Missourians continue to lack a connection to reliable, affordable high speed internet, and the fact that Missouri received the third highest allocation of BEAD funding (even though the state ranks 19th in population), is compelling evidence that Missouri has a much larger connectivity problem than most other states. As long as this continues, it seems likely Missouri risks underperforming our peer states in the use of internet based applications that foster economic development, telehealth, and educational opportunity.

Streaming Music Services – Choosing the Best One for You

| 0

In our last blog, we discussed how to choose the best streaming service for you. High Speed Internet is also changing the way you listen to and purchase music. While you can still purchase music via vinyl and CDs, you can also choose to download music or simply listen to music via subscription services. There are also free audio streaming services available for those that are budget conscious or do not need all the features from paid streaming services.

Let’s discuss some of the free and paid streaming services that are available and what to consider when choosing the right one to meet your needs.

If you’re looking to enjoy a wide range of music without spending any money, free streaming music services are a fantastic option. These platforms usually come with ads and occasional interruptions between songs. Here are a few popular free services:

  • Spotify Free: With a huge library and personalized playlists, Spotify Free is a hit among users. Just keep in mind, it includes ads and limits your ability to skip songs.
  • Pandora: Known for its radio-style listening, Pandora creates stations based on your favorite artists and genres. The free version has ads and limited song skips.
  • SoundCloud: A great place for indie artists and new discoveries, SoundCloud mixes mainstream and underground tracks. The free version includes ads and some skip limitations.
  • YouTube Music: YouTube’s music platform lets you explore official tracks and user-generated content for free, but it’s supported by ads.
  • iHeartRadio: Gives you access to vast libraries of free popular music.

If you’re after a listening experience without ads, plus extra features like offline listening, playlists, and higher audio quality, paid services are the way to go. Here are some top picks:

  • Spotify Premium: Offers ad-free listening, unlimited skips, offline playback, and high-quality audio.
  • Apple Music: Works seamlessly with your Apple devices, offers lossless audio, and includes exclusive content and live radio.
  • Tidal: Known for its high-fidelity sound quality and exclusive releases, Tidal is perfect for audiophiles and music lovers.
  • Amazon Music Unlimited: Provides a huge library, ad-free listening, and integrates with Alexa for voice control.
  • Deezer Premium: Offers personalized playlists, high-quality audio, and offline listening.

When choosing a streaming music service, think about these factors to find the best fit for your needs:

  • Music Library: Make sure the service has a comprehensive library that includes your favorite genres and artists.
  • Audio Quality: If you care about sound quality, look for services that offer high-fidelity or lossless audio options.
  • Device Compatibility: Check if the service works smoothly with your favorite devices, like smartphones, tablets, smart speakers, and computers.
  • Personalization: Services that offer personalized playlists and recommendations can make your listening experience even better.
  • Offline Listening: If you often listen to music on the go, choose a service that lets you download tracks for offline playback.
  • Price: Compare the subscription costs and features to find a service that offers the best value for your budget.

Having access to high-speed internet (broadband) gives us a wide variety of options not only to assist with work, but with our time at home and with our families. Picking the right music streaming service that fits your needs, and your budget can really boost your music enjoyment. Whether you go for a free or a paid service, considering the factors mentioned above will help you make an informed decision.

For more information, Check out these articles:

The Best Free Online Streaming Music Services for 2025 – PCMag – https://www.pcmag.com/picks/the-best-free-online-streaming-music-services

The Best Free Online Streaming Music Services for 2025 – PCMag – https://www.pcmag.com/picks/the-best-free-online-streaming-music-services

Spotify  – https://open.spotify.com/

Pandorahttps://www.pandora.com/

SoundCloudhttps://soundcloud.com/

YouTube Musichttps://music.youtube.com/

iHeartRadiohttps://www.iheart.com/

Apple Musichttps://music.apple.com/us/new

Tidalhttps://tidal.com/

Amazon Music Unlimited –   https://www.amazon.com/music/unlimited

Deezerhttps://www.deezer.com/us/

Selecting the Right Streaming Video Service – News, Programs, Movies, and Sports – Oh My!

| 0

We’ve moved from having 3 or 4 television stations to cable and satellite TV that give us hundreds of channels, to streaming services, which allow us to decide when we watch and where we watch shows, movies, and news.

We’ve been given more options to create the entertainment environment that we want, but this wonderful opportunity can make it hard to choose. It can also become expensive. How do we make the best choices to give us all the content we want while not breaking our budget?

What should you consider when looking at streaming options?

We recommend starting by looking at the service you currently have and the cost of your television service. Also, look at the programs and channels that you watch the most. You’ll want to stay within your budget while getting the programs you want.

If you want local content, you’ll need to find services that provide local channels. Services such as YouTube TV, Sling TV, and Hulu along with other services provide local channels plus other content, like sports. Be sure to look at which local channels they provide and what the cost is for adding the local channels.

Another option for local channels is to look at a digital antenna. These antennas can pick up the local channels you watch in many locations and allow you to choose services that give you additional programming. Digital antennas can be installed inside or outside the home. External antennas may give you the advantage of a better signal and receiving more local channels. Digital antennas can range in price from $40 to $150 but could save you money in the long run.

As another option, you may want to look at the TV offerings through your Internet Service Provider (ISP). Many ISPs offer a television service similar to cable TV via an app that you install on your smart TV, ROKU device, or Amazon Firestick. These services can provide the local channels, sports, movies, and other programming you are looking for.

You may want to look at free streaming options as well. There are services such as PlutoTV, Tubi, and channels provided for free on Smart TVs. There are also free TV channels on Roku devices and the Amazon Firestick (if you have these for other services). These options may provide news and entertainment channels you are looking for. To see what these services provide, you can do a web search for free TV services or a channel guide for your smart TV brand.

How do you decide what streaming services to buy?

Based on your current viewing habits, and interest, do some research and choose several services that might interest you. Look over their content offerings for shows and movies. You may also want to consider services that bundle with movie providers like Showtime, Starz, or other movie channels. If you want to try them out, see if they offer a free month trial. If they do not offer a trial, pay for a month, and see if you like the content. If you do, see about getting a lower price if you may for a year at a time. If you don’t enjoy the content, simply cancel the service.

Do you already have access to the content you’re looking for?

Subscription services may offer deals combining their services with streaming video services such as Walmart Plus. Similarly, if you subscribe to a service such as Amazon Prime, you already have access to Amazon Prime Video. You may want to research the services and see if they have any TV or video streaming service included that meets your viewing needs.

We have more choice for television programming than ever before because of high-speed internet service (broadband), but it also makes deciding how to continue to view what we want and stay within our household budgets harder.

Links for More Information:

The Best Free Video Streaming Services for 2025 – PCMag – https://www.pcmag.com/picks/the-best-free-video-streaming-services

Best Free TV Streaming Services – CNET – https://www.cnet.com/tech/services-and-software/best-free-tv-streaming-services/

The Best Live TV Streaming Services for 2025 –  PCMag – https://www.pcmag.com/picks/the-best-live-tv-streaming-services

The best live TV streaming services: Expert tested – ZDnet – https://www.zdnet.com/home-and-office/home-entertainment/best-live-tv-streaming-service/

The Best Digital TV Antennas for 2025 – PCMag – https://www.pcmag.com/picks/how-to-find-the-best-digital-tv-antenna

Lifelong Learning in the Digital Age

| 0

When we think about online education, we often think back to COVID and the only learning available to our youth was online through our local schools, or the ads for all the online Universities we see. However, there are a variety of online learning offerings available for youth and adults that can complement classroom lessons, teach digital, soft, and hard skills to improve job performance; help start a new career; introduce a new hobby; or expand opportunities for lifelong learning.

Online education allows you to learn on your schedule and balance the responsibilities of work, family, and other activities. For young people it allows them to balance schoolwork with sports, music, spending time with friends and other extracurricular activities. Online learning lets education fit into life and not force fitting life into learning.

Online learning allows you to access courses and training from institutions across the country and around the world. This is especially important for those that might be limited by residing in remote areas or with limited transportation options. Many platforms offer accommodations for learners with disabilities, ensuring that everyone can participate.

Modern online learning platforms have moved on from lectures to using multimedia tools and interactive elements such as discussion forums, quizzes, and virtual simulations to make learning engaging and fun. The interactive style of courses not only helps people stay interested but helps to build a sense of community with your fellow students. Using these new online methods enhances learning and allows you to build relationships and expand your professional network. These connections can lead to mentorships, new collaborations outside of the classroom, and even job prospects.

Online education allows you to learn at your own pace and tailor your educational experience to meet your needs. Personalized learning paths allow you to focus on areas where you need improvement and move through subjects you’ve already mastered. Customizing your learning path on subjects helps keep you motivated and engaged.

Online learning is also affordable. Cost for course work that can lead to a degree can be less than a traditional college and eliminates the cost for commuting, rent or residence fees, and other expenses. There are also free classes available and platforms such as Khan Academy, Coursera, edX, and others that offer a variety of content at no or low cost.

Online learning helps promote the idea of being a lifelong learner. You can stay relevant in your current career, learn new skills, or just learn about something you are interested in. For kids, it can help prepare them for a future career by allowing them to learn more about coding and other digital skills that will be important in today’s digital world. Online courses in many cases emphasize hands-on, practical, real-world learning experiences that better prepare people for their jobs or future careers. Platforms such as FutureLearn and Skillshare are great for finding courses that inspire lifelong learning. 

While online learning provides an opportunity to continue to learn while working, consideration must still be given to balancing work, family, and other obligations with your learning experience. Make sure to not to take on an online learning workload which does not allow time to take care of your family, your job, and yourself. For young people, parents will also need to work with their kids to balance their screen time with school, extracurricular activities, friends, and family. While there is benefit to online learning, there needs to be time to take care of yourself and your responsibilities both mentally and physically to avoid burning out and stay motivated to continue your online learning experience.

Sites for online learning/More information:

The Best Online Learning Services for 2025 – PCMag – https://www.pcmag.com/picks/best-online-learning-services

Khan Academyhttps://www.khanacademy.org/

Courserahttps://www.coursera.org/

edXhttps://www.edx.org/

FutureLearnhttps://www.futurelearn.com/

Skillsharehttps://www.skillshare.com/en/

Code.orghttps://code.org/

Udemyhttps://www.udemy.com/

Masterclasshttps://www.masterclass.com/

Digital Skills Libraryhttps://digitalskillslibrary.org

Denver Public Libraryhttps://denverlibrary.org/techclasses

Skillbase – Harvard – https://skillbase.hks.harvard.edu/view-all-resources

Demystifying ChatGPT and Other AI Large Language Models

| 0

March 2025

Two years ago, I sat down in front of my computer for an unusual interview—not with a person, but with an AI large language model — ChatGPT. Back then, I was curious. Could this AI really hold a conversation? Did it understand what I was asking? And most importantly, where was it getting its information? The AI answered my questions smoothly—almost too smoothly. While I was impressed, I walked away with a nagging sense of mystery. I didn’t understand how it worked—just that it did. More importantly, I largely dismissed it as a useful tool due to highly publicized examples of how it had gotten things wrong and its tendency to hallucinate. Frankly, I was skeptical. (If you’re interested, you can find the original interview here.)

The blog turned out to be popular, far more so than many others I have written over the years. Much has happened in the last two years—not just with ChatGPT, but with many other large language models –or “LLMs”. Without question, LLMs have improved significantly since my “interview” with ChatGPT . They are faster, more accurate, better at citing sources, and in some cases able to access the internet for current data. 

LLMs have also have “gone mainstream,” becoming integral to our web searches on Meta, Google, and Bing. The same technology is now embedded in tools that offer “helpful” rewrites of our emails, texts, and documents, and it is a key component of most online and telephone help desk inquiries.

But how does an LLM actually work? Why is it so good at sounding human? And what’s really going on under the hood when it generates a response?

It’s time for an updated conversation—one that does a more complete job of explaining how these AI programs work, and what are the benefits and risks of incorporating them in our daily lives  

Tokens, Parameters, and the Magic of Predicting “What Comes Next”

One of the most common misconceptions about LLMs is that they “think” like we do. They don’t. There’s no “ghost in the machine,” no digital consciousness weighing options and forming opinions. Instead, it’s more accurate to think of LLMs as sophisticated probability engines that “guess” the next word based on a mathematical model programed and modified using vast amounts of text data.

To unpack the magic of an LLM, it helps to understand two key terms: tokens and parameters. Of course, there are many more—a cacophony of technical jargon thrown around by engineers—but these two will suffice for our purposes.

Tokens

Think of a token as a chunk of text. It could be a single word (like “and,” “to,” “from”), or more likely a syllable or part of a word (like “un-“, “dis-“, “-ly”). When you type a question into an LLM, it doesn’t “see” the words in the sentence as you do. It breaks them down into tokens (words and bits of words). This is critical because, in the next step, the model must analyze token relationships using probability weightings, to generate a response.

The latest versions of LLMs can handle over 100,000 tokens in a single session. That’s impressive, especially considering that a well-educated adult has a vocabulary of about 40,000 words. This expanded token limit allows for even more complex and extended conversations, enabling models to process and generate larger pieces of text in a single interaction.

A Trillion Parameters: The “Rules” Behind the Response

However, the real magic happens when the LLM selects the next word (or series of tokens) in response to our question or request. This is done using a set of mathematical probability weightings assigned to various token combinations that comprised the question or request you typed or ask. These weightings are called parameters.

If tokens are the building blocks—the “dictionary”—then parameters are the “rulebook” that governs how an LLM constructs coherent responses. Modern LLMs have a staggering number of parameters. For example, some of the most advanced models are estimated to have nearly 1.8 trillion parameters! To put that in perspective: if you looked at each parameter for just one second, it would take over 57,000 years to examine them all! 

“Training” the LLM

These parameters aren’t something an LLM invents on its own. They are shaped by human input— and analysis of word structures from massive datasets. These datasets incorporate a large percentage of human written knowledge and literature. Human feedback and carefully designed adjustments to parameters have been added to most LLM’s to keep responses accurate and safe. Over time, the responses generated by the LLM are refined, corrected, and guided by human oversight.

These parameters enable an LLM to generate understandable responses, that are almost always correct and accurate, because relative values assigned to the words used and their order, are based on vast amounts of analyzed data. 

This is one function of the massive data centers that have emerged worldwide, where models are trained and updated on enormous datasets containing text, and in some cases, audio and video data. By examining an extensive portion of human knowledge, the LLM produces outputs that mimic human speech. Over time, as these outputs are tested, refined, and corrected and updated through reinforcement and human feedback, they become more contextually appropriate and accurate as well.

For example, the LLM determines whether the word “bank” refers to a financial institution or the side of a river based on surrounding words and user context. It can even gauge the tone of a sentence—whether a phrase is humorous, serious, or sarcastic.

Here’s an example based on a real exchange with ChatGPT:

Me: What can cows jump over?

ChatGPT: Cows are not known for their jumping abilities, but they can jump if necessary. In general:

  • Cows can jump over low fences (typically up to 4-5 feet if motivated).
  • Younger, more agile cows may jump higher than older or heavier ones.
  • If startled or frightened, cows can clear obstacles they normally wouldn’t attempt.
  • The phrase “the cow jumped over the moon” from the nursery rhyme is, of course, just a fun exaggeration.

Me: Rhyme: What do cows jump over.

ChatGPT: Cows can jump, but not too high,
A fence, a log, if they really try.
Over a ditch, across some hay,
But not the moon—no, not today!

In the first response, the LLM assumed I wanted a factual answer. In the second, my input “rhyme” triggered a different set of parameters, generating a poetic and more light-hearted response.

Limitations: When AI Gets It Wrong

Understanding how LLMs work also explains why they sometimes get things very wrong. Since they rely on predicting statistically probable next words, they can hallucinate information—confidently stating incorrect facts because they “sound right” based on training data. This is why AI-generated content should always be double-checked, especially for accuracy-sensitive topics.

A striking example of this occurred when lawyers submitted a legal brief that was generated by an LLM. The brief cited multiple legal cases that simply did not exist. The lawyers, assuming the AI’s output was correct, did not verify the cases before submitting them to the court. When the judge reviewed the citations and discovered that none of them were real, the attorneys faced serious consequences, including fines and reputational damage. 

In addition, unless an LLM has real-time access to the internet and is updated regularly, its knowledge may be outdated. The old adage “garbage in, garbage out” applies. If an LLM is trained on flawed or biased data, its responses may reflect those inaccuracies. For example, if a model is trained on outdated medical research or biased historical accounts, its responses may reinforce those inaccuracies. 

Trust But Verify

So how can you verify the accuracy and reliability of information provided by an LLM?

  • Cross-check claims against reliable sources such as academic journals, news outlets, or expert databases.
  • Ask the LLM for its sources. While it doesn’t always provide direct citations, some models can generate references or indicate the general sources of their information, offering a starting point for verification.
  • Use models that cite sources. Some LLMs, like Perplexity AI, not only restate your query to ensure proper interpretation but also provide footnoted responses with references to specific sources, allowing for greater transparency and verification of information.

Take Time to Read and Consider AI Responses

One of the best habits to develop when using an LLM, is to slow down. Humans tend to trust authoritative responses, especially when delivered with certainty. But because they are a product of statistical probabilities rather than a conscious response, AI-generated answers should be carefully evaluated against your real-world knowledge and common sense. One method that can help in engaging critically, is to ask the LLM follow-up questions, request clarifications, and challenge responses. This will not only improve accuracy but it also ensures a deeper, more complete understanding of the topic.

A Powerful Tool

LLMs are powerful tools, but they remain just that—tools. They don’t replace human reasoning, intuition, or expertise, but they can significantly enhance them. By understanding how LLMs work, we can engage with them more effectively, apply them more appropriately, and develop a balanced perspective on their strengths, limitations, and best applications. Written with the assistance of ChatGPT and Perplexity AI

Online Games – The Benefits and How to Stay Safe

| 0

One of the most popular uses of the internet is online gaming. Smart phones, gaming consoles, computers, tablets, and virtual reality devices all allow us to participate in online games alone or with others.

While gaming may seem like a waste of time to some, there are potential benefits to online gaming for everyone: 

  • Games can help develop cognitive skills through strategic thinking and problem solving.
  • First person games (where you have the point of view of your character in the game) can help improve hand-eye coordination and fine motor skills through precise movements. Others help enhance cognitive abilities like memory, attention, and spatial awareness.
  • Multi-player games provide an opportunity to connect with friends and family as well as meet new people from around the world. Online communities develop and thrive through games and help give people a sense of community, especially for those that find it difficult to socialize in person. Team-based games also help to promote teamwork, leadership, collaboration, and communication skills.
  • Gaming can provide stress relief, an escape from everyday pressures, and provide relaxation and help improve mood.
  • Gaming helps teach overcoming challenges, dealing with setbacks, and multitasking skills as gamers learn to adapt new strategies and keep trying until they succeed.
  • Some games incorporate historical settings, scientific concepts, and language to make learning interactive and fun.

While gaming can provide all these potential benefits, there are potential threats to be mindful of while enjoying online games. The threats gamers may encounter include:

  • Hacking of game accounts to steal valuable in-game items, currency, and personal information.
  • Phishing scams via email, websites, or in-game scams that trick gamers into revealing personal information, login credentials, and payment details.
  • Malware, trojans, and viruses that are often disguised as game modifications\customizations or cheat codes leading to infected systems and stolen data.
  • Cyberbullying and toxic behavior during and after game play that affect players’ mental health.
  • Deepfakes and voice cloning can lead to identity theft, misinformation, and harassment.

How can we protect ourselves when gaming online?

  • Protect your personal information. Use two factor authentication to protect your accounts along with strong password protection. Make sure that you also set up ways to recover your accounts should you forget your password, or your account is hacked. When setting up accounts, only provide the minimum personal information needed to set up your account. If games have a subscription, use a third-party payment system such as Apple Pay, Google Pay, PayPal, etc. This keeps credit card information out of your account information.
  • Parents should set up parental controls for children, making sure they have access to age-appropriate games. Set time limits on playing as well as when games can be played where possible to make sure kids spend time with friends and family outside of games. Teach your kids about online safety and that they should talk to you or another trusted adult if they feel threatened or bullied when gaming online. Help educate your kids about potential scams online and in games, and make sure they talk to you before purchasing or downloading games or in app purchases.
  • Make sure PCs, tablets, and gaming consoles are updated to the latest operating systems and gaming software. PCs and tablets should have an up-to-date antivirus program on them as well as gaming consoles where possible.
  • As gamers and parents, we should also make sure that we stay safe mentally as we game. We need to protect ourselves and our kids from cyberbullying by playing games with friends and family and only participate in gaming communities that promote positive and healthy gaming habits. Players that bully or create a toxic environment for you and other players need to be reported to the people or companies hosting the games and blocked where possible.

Gaming addiction is real, and both adults and youth need to set up ways to help reduce the possibility of gaming addiction, identify when it happens, and seek help if they become addicted to online gaming.

Avoid gaming addiction by doing these practices:

  • Set specific time slots to play games during the day. Use alarms to remind you when to take breaks from the game and engage in other activities, rest your eyes, stretch, or just take a walk.
  • Make sure to prioritize responsibilities such as work, school, chores, sports, and time with family and friends before gaming. Use gaming as a reward when specific tasks are completed.
  • To help reduce eye strain, try to follow the 20-20-20 rule. Every 20 minutes of screen time or game play, look at something 20 feet away for at least 20 seconds.
  • Make sure to engage in other activities. Balance gaming with other hobbies such as reading, sports, or creative projects. Make sure to spend time with friends and family face to face.
  • Monitor gaming habits. Keep a log of how much time is spent gaming and how that time impacts daily life. Adjust the time spent gaming to make sure you take care of yourself, and your other responsibilities. Also monitor in-game purchases and set a budget for gaming expenses.
  • Create game-free zones in the house such as the dining room or bedroom as well as non-gaming hours. Try to keep the devices you use to game out of site or at least off during non-gaming hours.

If you or someone you know is addicted to gaming, seek support from friends, family or find a professional that you or your loved one can talk to. There are support groups available to help people through gaming addiction. Check sites such as Gamming Addicts Anonymous  to see if there is a local group near you.  They also provide online meetings where local groups are unavailable.

Online gaming provides wonderful opportunities not just for fun but for learning and connecting with others. By balancing the joys of gaming with safety measures, you can ensure that online gaming experiences are both fun and secure.

For more information:

Securing Online Gaming:

Cyberbullying:

Gaming Addiction

Cyberbullying and How to Deal with It

| 0

In 2022 19.2% of students surveyed nationwide, in grades 6-12 (ages 12-18), who reported being bullied during school, about 21.6% reported being bullied online or by text, including nearly twice as many girls (27.7%) as boys (14.1%) (National Victim Survey – School Crime Supplement).

One of the many reasons people may not want to connect online or use online applications is cyberbullying. Cyberbullying can have long-term consequences for the mental health of both youth and adults. It is important to understand how to prevent and deal with cyberbullying, should it occur to you or someone you know.

What is cyberbullying?

  • Cyberbullying takes place over digital devices like cell phones, computers, and tablets. Cyberbullying can occur via texting and messaging apps, or online in social media, forums, or gaming where people can view, participate in, or share content.
  • Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. It also includes sharing personal or private information about someone else to cause embarrassment or humiliation.
  • Cyberbullying can cross the line into unlawful or criminal behavior.  Each state has different laws regarding cyberbullying.  You can learn more about the laws regarding cyberbullying in Missouri through the Cyberbullying Research Center  

How does cyberbullying occur?

It’s important to understand how cyberbullying occurs so it can be easily recognized, and we can take action to help children deal with cyberbullying. Some of the common tactics are:

  • Posting comments or rumors about someone online that are mean, hurtful, or embarrassing.
  • Threatening to hurt someone or telling them to kill themselves.
  • Posting a mean or hurtful picture or video.
  • Pretending to be someone else online in order to solicit or post personal or false information about someone else.
  • Posting mean or hateful names, comments, or content about any race, religion, ethnicity, or other personal characteristics online.
  • Creating a mean or hurtful webpage about someone.
  • Doxing, an abbreviated form of “documents”, is a type of online harassment used to exact revenge and to threaten and destroy the privacy of individuals by making their personal information public, including addresses, social security number, credit card and phone numbers, links to social media accounts, and other private data.

How can you tell if someone is possibly involved in cyberbullying?

The first step in preventing cyberbullying is to be aware of what kids are doing online. You need to know if your child is a victim of cyberbullying, witnessing cyberbullying, or is bullying other children online. Warning signs you should look for as a child uses their device include: (From stopbulling.gov)

  • Noticeable increases or decreases in device use, including texting.
  • Exhibiting emotional responses (laughter, anger, upset) to what is happening on their device.
  • Hiding their screen or device when others are near and avoids discussion about what they are doing on their device.
  • Social media accounts are shut down or new ones appear.
  • Avoiding social situations, even those that were enjoyed in the past.
  • Becoming withdrawn, depressed, or loses interest in people, hobbies, and activities.
  • Complaining about illness or physical symptoms to get out of going to school.
  • Difficulty sleeping. Almost 63% of victims report a lack of sleep as a psychological impact of being cyberbullied.
  • Talking about self-harm.

If you suspect your child may be involved in cyberbullying, take steps to investigate their digital behavior. Take the same approach as you would to any form of bullying. Make sure to provide support to the child being bullied, address the behavior of the bully or bullies involved, and make sure everyone understands that cyberbullying is taken seriously and can have serious consequences.

How can parents and youth prevent cyberbullying?

Responding to cyberbullying does require different approaches to address the issue. Some the things you can do to address the issue are:

  • Notice- Recognize if there has been a change in mood or behavior. Try to determine if these changes happen around a child’s use of their digital devices.
  • Talk – Ask questions to learn what is happening, how it started, and who is involved. Use active listening skills to get below the surface of conversations with youth.
  • Document – Keep a record of what is happening and where. Take screenshots of harmful posts or content. Most laws and policies note that bullying is repeated behavior, so records help to document it.
  • Report – Most social media platforms and schools have clear policies and reporting processes. If a classmate is cyberbullying, report it to the school. You can also contact app or social media platforms to report offensive content and have it removed. If a child has received physical threats, or if a potential crime or illegal behavior is occurring, report it to the police.
  • Support – Peers, mentors, and trusted adults can sometimes intervene publicly to positively influence a situation where negative or hurtful content posts about a child. Public intervention can include:
    • Posting positive comments about the person targeted with bullying to try to shift the conversation in a positive direction.
    • Reaching out to the child who is bullying and the target of the bullying to express your concern.
    • Rallying around a victim of cyberbullying is a highly effective defense against bullies. Bullying works by trying to isolate a victim or have them feel isolated. When friends and other youth rally around a victim, it can thwart the bullies.
    • Determining if more professional support is needed for those involved, such as speaking with a guidance counselor or mental health professional.

  • Teach internet safety. Making sure they understand about privacy, predators, phishing schemes, catfishing, and security.
  • Learn about their online friends and what they are doing online.
  • Let them know that you want to be aware of their online life and you will want to check on their online activities, friends, and files.
  • Help youth manage cyberbullying. Discuss what cyberbullying is and make sure they take any threats seriously. Teach them how to react to potential cyberbullying by ignoring or responding assertively and calmly to the person or persons doing the bullying. Identifying trusted adults that the child can speak to about potential cyberbullying.
  • Help youth build and maintain self-confidence. Having healthy self-esteem allows youth to be able to ignore or address cyberbullying.
  • Make sure youth understand you don’t approve of cyberbullying in any form and hold them accountable if they participate or witness cyberbullying.

What can youth do to help prevent cyberbullying?

  • Never respond to harassing or rude comments.
  • Save or print the evidence.
  • Talk to parents or a guardian if harassed; get help reporting this to your internet service provider, school, or local law enforcement.
  • Respect others online.
  • Only share passwords with a parent or guardian.
  • Change passwords often.
  • Password protect your cell phone.
  • Use privacy settings to block unwanted messages.
  • Think before posting or sending photos – they could be used to hurt you or someone else.
  • Contact the site administrator if someone creates a social networking page in your child’s name.

For more information on Cyberbullying:

What is Cyberbullyinghttps://www.stopbullying.gov/cyberbullying/what-is-it

School Crime Supplement– National Center for Education Statistics – https://nces.ed.gov/pubs2024/2024109rev.pdf

What is cyberbullying and how can it be prevented? – Mayo Clinic – https://mcpress.mayoclinic.org/parenting/what-is-cyberbullying-and-how-it-can-be-prevented/

Bullying – Mo Dept of Elementary and Secondary Education – https://dese.mo.gov/governmental-affairs/public-school-laws-missouri/bullying

Courage2Report – MO State Highway Patrol- https://www.mshp.dps.missouri.gov/MSHPWeb/Courage2ReportMO/index.html

Cyber-bullying: What Parents Can Do About it – The Center for Parenting Education –

Cyberbullying: Learn the Signs – American Society for the Positive Care of Children – https://americanspcc.org/cyberbullying-learn-the-signs/

How to help Kids Deal with Cyberbullying – Child Mind Institute – https://childmind.org/article/help-kids-deal-cyberbullying/

Mizzou Ed Bully Prevention Labhttps://www.mizzoubullypreventionlab.com/

Using Social Media

| 0

Social media platforms are great tools for keeping up with family and friends, making new friends across the world, creating entertaining and informative content, generating business, and exchanging ideas on subjects that are of interest to you. 

These platforms have also become trickier to navigate in today’s world of misinformation, scams, and those who want to shout down or belittle opposing points of view instead of discussing and learning from others.

To navigate any social media platform, you must create an account for the app and be sure to use two-factor authentication to login to the platform.  You’ll also want to create multiple ways to recover your account in the event you forget your password or your account becomes compromised.  Each platform will have a way for you to set up multiple options not only for authentication, but recovery.  You will also want to set your personal information to be private and/or only shared with certain groups.

Let’s talk about some of the more popular social media applications and tips to help you be successful on each of them. 

Facebook is a social media platform allowing users to create profiles, share updates, photos, videos, and connect with friends and family. The platform also offers a variety of features such as groups, pages (for communities of interest, companies, or organizations), and marketplace, making it a hub for personal, professional, and community engagement. With over 2.8 billion monthly active users, Facebook has become one of the most influential social networks globally.

Facebook posts have a maximum character limit of 63,206 characters. This allows for quite a bit of content if you need it! However, keep in mind that shorter posts often perform better in terms of engagement, as they are quicker and easier for followers to read and interact with.

Instagram is a popular social media platform primarily focused on photo and video sharing. Launched in 2010 and later acquired by Facebook, it allows users to post images and short videos; follow friends, celebrities, and brands; and discover content through hashtags and the Explore feature. Instagram also offers features like Stories, Reels, and IGTV (Instagram TV) for more dynamic content creation and consumption. With its visually driven interface, Instagram has become a key platform for self-expression, marketing, and social interaction.

X, previously known as Twitter, is a social media platform where users share short messages called “tweets.” X allows for quick, real-time updates, news, and conversations. Users can follow others, like and retweet posts, and engage with content through hashtags. Known for its 280-character limit, X emphasizes concise communication. It’s widely used by individuals, celebrities, businesses, and news outlets for sharing information and engaging with audiences. Some features for X are only available through the premium subscription which starts at $11/month.

BlueSky is a decentralized social media platform that is a potential alternative to X.  It is gaining popularity and allows the users to create their own communities and rules.  This ability to customize gives you more control over your online experience in BlueSky.  It does focus on free speech for users.  The application is new and has a small user base.

Snapchat allows users to send photos, videos, and messages that disappear after being viewed. With features like Stories, which let users share moments that last 24 hours, and filters, which add creative effects to photos and videos, Snapchat has become popular for its playful and ephemeral approach to communication. It also includes Snap Map for location sharing and Discover for exploring content from publishers and creators. Snapchat is known for its focus on privacy and fun, interactive experiences.

TikTok is a social media platform known for its short-form video content. Users can create and share videos ranging from 15 seconds to 3 minutes, often set to music, featuring various trends, challenges, and creative expressions. The platform offers a range of editing tools and effects, making it easy for users to produce engaging content. TikTok’s algorithm recommends videos based on user interests, creating a personalized and highly addictive experience. It has become immensely popular, especially among younger audiences, for its entertaining and viral nature. 

You’ve certainly read or seen in the media about the potential security concerns over the ownership of TikTok and the law in place that the application needs to be sold to an American company or be banned in the United States.  The ban was upheld by the Supreme Court; however, the incoming presidential administration has signed an executive order halting the ban for 75 days to work through options including a potential deal with 50% American ownership of the platform.  You can keep up to date by visiting the Tik Tok newsroom at https://newsroom.tiktok.com/en-us/.

While there are tips for each social media application that can help make your post more engaging, here are some tips that apply to any post on any social media application:

  • Be Respectful –
    • Treat others online as you would in person.
    • Avoid heated arguments and be considerate of different viewpoints.
  • Think Before You Post –
    • Once something is online, it’s there forever.
    • Make sure your posts reflect how you want to be perceived.
  • Verify Information –
    • With the amount of misinformation out there, always double-check facts before sharing.
  • Protect Your Privacy –
    • Be mindful of what personal information you share.
    • Adjust your privacy settings to control who sees your posts. 
    • Don’t post when you’ll be away from home or vacation photos until after you return home.  Thieves can watch social media to see when people are away.
  • Engage Positively –
    • Supportive and encouraging comments go a long way.
    • Spread positivity!
  • Avoid Oversharing –
    • While it’s great to share highlights of your life, balance it with some offline moments for yourself.
  • Be Authentic –
    • Be true to yourself rather than trying to portray a perfect image. People appreciate authenticity.
  • Keep It Short and Sweet –
    • Most people scroll quickly, so make your point clear and concise.
  • Use Visuals –
    • Photos and videos catch the eye and are more likely to be shared and liked.
  • Ask Questions –
    • Encourage interaction by asking questions or requesting opinions.
  • Tell a Story –
    • Share personal experiences or stories that resonate with your audience.
  • Be Positive –
    • Uplifting and positive content generally gets more engagement and spreads good vibes.
  • Tag Friends –
    • When relevant, tag friends to increase the post’s visibility and engagement.
  • Use Hashtags –
    • Relevant hashtags can help your post reach a broader audience.
  • Timing Matters –
    • Post when your audience is most active, typically mornings, evenings, or weekends.
  • Engage with Comments –
    • Respond to comments on your posts to foster a sense of community.

There are many social media platforms available to share your content with friends, family, and customers.  We’ve shared a few of the most popular ones with you and some tips that can help you be successful with these platforms.  Below are links that will also help you get started.

Facebook:

Instagram:

X:

BlueSky:

Snapchat:

TikTok: