A Compilation of 1960s Factory Films

https://theawesomer.com/photos/2025/06/1960s_factory_films_t.jpgEnjoy watching how things are made? British Pathé gathered 10 short clips from their film archive, showcasing how factories produced electric guitars, wallpaper, parking meters, candies, and more. It’s amazing how much handwork went into making eyeglass lenses back in the day. For more vintage factory footage, check out Pathé’s 1950s compilation.The Awesomer

Google Earth Now Has Time Travel and I’m Hooked: Try These Places

https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2025/06/google-earth.jpg

Google Earth now lets you step back in time at street level, thanks to the launch of historical Street View imagery. The feature arrives for the platform’s 20th anniversary and brings new AI-powered tools for professional users (like urban planners) in the U.S.

Explore the Past in Google Earth

Google Earth has always helped everyone see the world from above. Now, it lets you see how streets and neighborhoods have changed over the years. With the new update, you can slide through older Street View images right inside Google Earth. Want to revisit your childhood block or watch a city skyline grow? Just move the timeline slider and see how places looked in the past.

Until now, historical Street View was only available in Google Maps and the Earth Pro desktop app. This update brings it to the main Google Earth app on the web and mobile, making it easier for everyone to use.

Historical street view imagery in Google Earth follows from its popularity in Google Maps. The #somewhereonGoogleMaps trend captured our nostalgia for places past and present. Google Earth’s 20th anniversary is as good a time as any to catch up with its milestones.

A Digital Time Machine for Us

The new historical Street View feature turns Google Earth into more than just a virtual globe. Now, it’s a visual time machine. You can trace your history or see how your favorite places have evolved. It’s fascinating to watch a vacant lot become a playground, or a quiet street transform into a busy neighborhood.

For a long time, I have enjoyed watching a satellite view of my own house with Google Earth.

Now, we can satisfy our curiosity about old places by heading to places with extensive historical records. For instance, New York, London, and Paris, etc. Here are some of my favorites, which I checked out:

Freedom Tower (One World Trade Center) in Lower Manhattan, New York City: You can watch a part of modern American history as this symbolic structure rose from the rebuilding efforts at Ground Zero.

The Berlin Wall in Germany is one of the most historically significant timelapses. Watch the fall of the Berlin Wall, along with the massive urban transformation that followed German reunification.

Kennedy Space Center in Florida provides comprehensive historical imagery of NASA’s launch facilities and the evolution of the space program infrastructure. As a space buff, I head to the SpaceX Starbase in Texas, too, to watch the company’s meteoric rise.

Pompeii, Italy, and its many ancient Roman attractions like the Rectangle Theater, the Theater of Pompeii, the Temple of Apollo, the Arch of Tiberius, and the Public Square.

The World Islands in Dubai, United Arab Emirates, are artificial islands constructed to resemble a world map.

Also: Smarter Maps for Real-World Problems

It’s not about casual nostalgia and fun alone. Along with the time-travel feature, Google is adding powerful new tools for U.S. professionals. Soon, planners and researchers will see overlays that show tree canopy coverage and land surface temperatures. These AI-powered insights can help cities plan for more green spaces or tackle “urban heat islands” where temperatures rise due to a lack of trees and too much concrete.

For decision makers, knowing where trees are missing or where temperatures spike can guide smart choices. They might plant more trees in the hottest areas or design new parks where they’re needed most. These upgrades can make cities cooler, greener, and more comfortable for everyone.

MakeUseOf

Is ‘Minecraft’ a Better Way to Teach Programming in the Age of AI?

The education-news site EdSurge published "sponsored content" from Minecraft Education this month. "Students light up when they create something meaningful," the article begins. "Self-expression fuels learning, and creativity lies at the heart of the human experience." But they also argue that "As AI rapidly reshapes software development, computer science education must move beyond syntax drills and algorithmic repetition." Students "must also learn to think systemically…"
As AI automates many of the mechanical aspects of programming, the value of CS education is shifting, from writing perfect code to shaping systems, telling stories through logic and designing ethical, human-centered solutions… [I]t’s critical to offer computer science experiences that foster invention, expression and design. This isn’t just an education issue — it’s a workforce one. Creativity now ranks among the top skills employers seek, alongside analytical thinking and AI literacy. As automation reshapes the job market, McKinsey estimates up to 375 million workers may need to change occupations by 2030. The takeaway? We need more adaptable, creative thinkers. Creative coding, where programming becomes a medium for self-expression and innovation, offers a promising solution to this disconnect. By positioning code as a creative tool, educators can tap into students’ intrinsic motivation while simultaneously building computational thinking skills. This approach helps students see themselves as creators, not just consumers, of technology. It aligns with digital literacy frameworks that emphasize critical evaluation, meaningful contribution and not just technical skills. One example of creative coding comes from a curriculum that introduces computer science through game design and storytelling in Minecraft… Developed by Urban Arts in collaboration with Minecraft Education, the program offers middle school teachers professional development, ongoing coaching and a 72-session curriculum built around game-based instruction. Designed for grades 6-8, the project-based program is beginner-friendly; no prior programming experience is required for teachers or students. It blends storytelling, collaborative design and foundational programming skills with a focus on creativity and equity…. Students use Minecraft to build interactive narratives and simulations, developing computational thinking and creative design… Early results are promising: 93 percent of surveyed teachers found the Creative Coders program engaging and effective, noting gains in problem-solving, storytelling and coding, as well as growth in critical thinking, creativity and resilience. As AI tools like GitHub Copilot become standard in development workflows, the definition of programming proficiency is evolving. Skills like prompt engineering, systems thinking and ethical oversight are rising in importance, precisely what creative coding develops… As AI continues to automate routine tasks, students must be able to guide systems, understand logic and collaborate with intelligent tools. Creative coding introduces these capabilities in ways that are accessible, culturally relevant and engaging for today’s learners. Some background from long-time Slashdot reader theodp:
The Urban Arts and Microsoft Creative Coders program touted by EdSurge in its advertorial was funded by a $4 million Education Innovation and Research grant that was awarded to Urban Arts in 2023 by the U.S. Education Department "to create an engaging, game-based, middle school CS course using Minecraft tools" for 3,450 middle schoolers (6th-8th grades)" in New York and California (Urban Arts credited Minecraft for helping craft the winning proposal)… New York City is a Minecraft Education believer — the Mayor’s Office of Media and Entertainment recently kicked off summer with the inaugural NYC Video Game Festival, which included the annual citywide Minecraft Education Battle of the Boroughs Esports Competition in partnership with NYC Public Schools.


Read more of this story at Slashdot.

Slashdot

Fordow Damage Assessment

http://img.youtube.com/vi/CjQO6XH67fU/0.jpg

Suchomimus has a video up on the U.S. strike on Fordow:

  • “We have satellite imagery now confirming the US strike on Fordow nuclear enrichment facility.”
  • “I have two images for you. This first one shows two areas hit as shown by the orange circle. You can see three holes highlighting the bottom one and three in the top. So these are very accurate and precise strikes by the US Air Force, landing three bombs each around each target area.”
  • “Now the type of bomb used here penetrates deep underground before detonating. So whilst the image may not look like much damage has [been] caused, that won’t be the case, because these would have penetrated deep. And if we reach the complex below, then this facility is going to be in a pretty bad way.”
  • “This second image shows us the strikes hit the ridge line. This is important because this little schematic here shows what’s underneath this area. So you can see that this area is the hub of the facility. This graphic video was shared by Iran until a few years ago, and it shows this enrichment facility. So you can see that in the are that was targeted we have the uranium storage a pair of IR6 and then six IR1 cascade centrifuges.”
  • “American intelligence and other sources online are saying that this facility is destroyed and that the strike was successful and penetrated it.”
  • “We have the entry points highlighted. Here on the right the land caved inwards post strike, and at the bottom the tunnel entrances sealed with dirt.” The latter evidently done by the Iranians.
  • Before the strike, video shows Iranian trucks lined up at the complex entrance. But the trucks look like open-roofed earth moving vehicles, not equipment transport vehicles. These were apparently used to cover the entrances with dirt.
  • However, there were a couple more specialized vehicles that may have been used to remove enriched uranium from the site.
  • “I can’t see everything important being evacuated in a couple of days. There’s bound to have been some equipment, some important equipment, left in here. The centrifuges, for example, can feasibly be dismantled and removed by truck, but is tricky to do, because of a base’s depth and will take time. And I think it’s unlikely Iran would have had enough time to do so. But Reuters does say that the enriched uranium had already been removed.”
  • Secretary of Defense Pete Hegseth says that initial battle damage assessment showed “all of our precision munitions struck where we wanted them to strike and had the desired effect, which means, especially in Fordow, which was the primary target here, we believe we achieved destruction of capabilities there.”

    More:

    B-2 Spirit bombers dropped a total of 14 GBU-57 Massive Ordnance Penetrators, or MOPs, on two of the Iranian nuclear facility sites struck this weekend as part of “Operation Midnight Hammer,” Air Force Gen. Dan “Razin” Caine, chairman of the Joint Chiefs of Staff, told reporters on Sunday.

    President Donald Trump announced on Saturday that the U.S. military had attacked three facilities involved with Iran’s nuclear program at Fordow, Natanz, and Esfahan.

    The mission marked the first operational use of the 30,000-pound MOP, the largest B-2 bomber strike in history, and the second-longest B-2 mission ever flown, Caine said during a Pentagon news conference. In order to deceive the Iranians, a number of B-2s flew west as decoys prior to the strike, he said.

    Snip.

    Defense officials showed reporters a graphic during Sunday’s news conference that indicated that seven B-2 bombers took part in the strikes.

    A total of 125 aircraft were involved in the mission, including fighters and aerial refuelers, Caine said. The bombers and fighters dropped about 75 precision-guided munitions on two of the sites, and a Navy submarine fired Tomahawk missiles at a third.

    Possibly more later.

    Update: A more detailed Suchomimus damage assessment video:

    I had heard chatter about using a ventilation shaft to hit the facility, because surely the Iranians wouldn’t be so stupid as to to use a vertical shaft that leads directly to the bunker complex rather than a horizontal one. But that seems to be the case.

    Plus damage details for the Natanz and Isfahan sites. At least some of the 14 GBU-57 Massive Ordnance Penetrators seem to have targeted Natanz, with the Tomahawks hitting Isfahan.

    Also, U.S. graphics suggest the B-2s were actually flown from Whitman Airbase in Missouri, rather than Diego Garcia, as previously reported. Maybe that too was deception.

    Update 2 via Ed Dirscoll at Instapundit: Israel seems to think that the 60% enriched Uranium was at Natanz and Isfahan, which was hit in the strike, and now they have no way to get it to 90%.

    Update 3 via Charlie Martin at Instapundit: Ex-spy Aimen Dean doesn’t buy the “they dismantled everything” narrative:

    1. Real-Time Monitoring by the IAEA:
    Both Fordow and Natanz are under partial surveillance by the International Atomic Energy Agency (IAEA). While Iran has restricted access in recent years, many of the monitoring systems – especially CCTV cameras – were active in the past and still provided some insight until at least early 2023. In several cases, the IAEA retained knowledge of infrastructure layouts and could remotely detect large-scale activity, especially if dismantling or evacuation were attempted.

    2. The Myth of Rapid Evacuation:
    This isn’t a warehouse full of sacks of potatoes. We’re talking about highly specialized, sensitive equipment, thousands of IR-1 and advanced IR-2m and IR-6 centrifuges. For context:
    •Natanz had an estimated 15,000–20,000 centrifuges at peak capacity. Even after the JCPOA, thousands remained in use or storage.
    •Fordow, while smaller, housed over 1,000 advanced centrifuges, some enriching uranium up to 60% purity in recent years.

    These are not items that can be boxed up and trucked out overnight. Dismantling a single cascade (a chain of 164 centrifuges) safely requires days of work, if not longer. Multiply that by hundreds of cascades, and you quickly realize this isn’t a quick getaway.

    Additionally, centrifuges are connected to high-pressure uranium hexafluoride gas (UF6) lines. Improper disassembly can lead to contamination, equipment damage, or worse, leaks of radioactive gas. Such evacuations would require weeks of preparation under controlled conditions.

    3. Eyes in the Sky and on the Ground:
    Let’s not forget that the U.S. and Israel have had persistent, layered surveillance over these sites for years, satellites, high-altitude drones, SIGINT, HUMINT. Every inch of ground around Fordow and Natanz has been watched for telltale signs of activity. The idea that Iran stealthily evacuated multiple facilities without being detected is simply ludicrous.

    4. Propaganda to Salvage Prestige:
    This entire narrative is damage control, plain and simple. The regime knows its core scientific and strategic assets were hit. They can’t admit it, so they spin: “We were too smart for them. Nothing of value was lost.” But it’s hollow bravado, masking what is in reality a colossal strategic failure – yet another one – in a long line of catastrophic blunders by a leadership that has brought nothing but ruin to a once-proud civilization.

    Lawrence Person’s BattleSwarm Blog

    Yes, You Can Search the Dark Web—Here’s How

    https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2025/06/person-using-a-laptop-showing-ahmia-search-engine-opened-on-it.jpg

    For the longest time, I thought the dark web was an impenetrable, tangled mass of secret websites frequented only by hackers and criminals. I certainly didn’t know that there are several ways you can actually search the dark web for specific websites and types of content—but that’s now changed.

    How to Search the Dark Web

    You can’t just fire up Google and type in "dark web sites"—at least, not if you want to actually find them. The dark web runs on a different network, and its websites use a special domain suffix: .onion. These sites aren’t indexed by standard search engines, which is why you need specialized tools to search them.

    You need two things to search the dark web: the right browser and the right search engines. Regular browsers like Chrome or Edge won’t work here. Instead, you’ll need a browser that lets you access onion websites, the most popular of which is Tor Browser.

    Once you’re on Tor, you need a search engine designed for .onion content. Two of the most widely used are Ahmia and Torch, each offers a different level of access and safety.



    Related

    Hollywood certainly takes some poetic license when it comes to the dark web.

    Ahmia is a good place to start. It filters out illegal content and works both inside and outside of Tor. You can visit it from a regular browser at ahmia.fi, but clicking .onion links still requires Tor. Torch is more unfiltered. It returns a broader range of results, including content that Ahmia deliberately avoids.

    Dark web search engines don’t work like Google. There’s no massive, automated crawling system indexing every .onion site in real time. Instead, these tools rely heavily on manual submissions, curated lists, and user reports.

    That means their coverage is incomplete by design. Many .onion sites are temporary, private, or actively hidden. Others are taken down without notice or rotate through different addresses. Even when search engines list a site, it might already be offline or lead somewhere entirely different from what the title suggests.

    Ahmia tries to filter out illegal and harmful content, which makes it feel more curated, but also limits what it can show. You’re less likely to stumble into something dangerous, and less likely to find niche or controversial communities. Torch, by contrast, prioritizes scale over safety. It indexes far more pages but includes duplicates, inactive links, and spammy or dangerous sites.

    Spotting Legitimate Onion Sites vs. Scams

    The dark web doesn’t have many of the trust signals you’re used to. There are no padlocks, no verified checkmarks, and no guarantees that the site you’re visiting is what it claims to be. Scams and impersonations are common, especially on marketplaces and forums.

    So, how do you know which links are legit?

    Start by checking where the link is coming from. On Ahmia, each result includes a brief description and sometimes a timestamp showing when the site was last seen online. If a site hasn’t appeared active in a long time, there’s a decent chance it’s dead, outdated, or has been replaced by something shady.

    Also, check whether the .onion address is mentioned somewhere reputable. Some well-known organizations—like Facebook, the BBC, and ProPublica—list their official .onion links on their public websites or Wikipedia pages. That’s one of the most reliable ways to confirm a site’s identity. If the .onion URL you found through search matches the one listed by the organization itself, you’re good.

    If you’re dealing with smaller or unofficial sites, consider cross-checking the URL in a known .onion directory like the Real World Onion Sites Github (available on the clear web), or looking it up in privacy forums. Reddit communities like r/onions or r/deepweb sometimes share verified links and warnings about scams, but again, use discretion. The so-called Hidden Wiki was once a popular starting point for newcomers to the dark web, but it’s no longer a trusted resource.

    And finally, rely on your instincts. If a site pushes you to download something, asks for personal info up front, or looks completely different from what you expected, it’s safer to back out and look for alternatives.

    If you do choose to open a link, expect a rough experience. Many .onion sites are barebones, slow, or only partially working. That doesn’t automatically mean they’re fake or dangerous—just that they weren’t built with user-friendliness in mind. Most dark web sites are simple on purpose; it helps to compensate for the Tor Network’s slower browsing speeds. However, if you do stumble upon something useful, save the link immediately. All .onion URLs are long, alphanumeric strings that aren’t easy to remember or rediscover. Without a bookmark or secure note, you may not be able to get back to it later.

    Safety Essentials While Browsing

    You don’t need to be an expert to browse the dark web safely, but you do need to stay alert.

    Always use the Tor Browser, and make sure it’s up-to-date. Don’t open .onion links in regular browsers—they won’t load and could accidentally expose what you’re trying to access. It’s also a good idea to avoid copying links between browsers or apps where they could be logged, tracked, or leaked unintentionally.

    Stay anonymous. Don’t log in with personal emails or usernames. If a site requires an account, use a throwaway identity and password you don’t use anywhere else.

    Disable scripts in Tor’s settings. Many .onion sites work fine without them, and leaving them on increases your risk of tracking or malware.

    Avoid downloads unless you fully trust the source. Even seemingly harmless files can carry risks.

    Some people pair Tor with a VPN for added privacy, especially in restrictive regions. If you do, choose a trustworthy, no-logs VPN provider and understand that it may not always improve anonymity.



    Related

    The dark web sounds fun, but there are some important security steps you need to take first.

    And finally, understand the legal line. In most countries, visiting the dark web isn’t illegal—but what you do there might be. Accessing banned content, buying illegal goods, or even just landing on the wrong kind of marketplace could land you in trouble depending on your local laws. Know what’s legal where you live.

    MakeUseOf

    New body size database for marine animals is a “library of life”

    https://cdn.arstechnica.net/wp-content/uploads/2025/06/craig3-1152×648-1749061178.jpg

    Legend has it that physicist Ernest Rutherford once dismissed all sciences other than physics as mere "stamp collecting." (Whether he actually said it is a matter of some debate.) But we now live in the information age, and scientists have found tremendous value in amassing giant databases of information for large-scale analysis, enabling them to explore different kinds of questions.

    The latest addition is the Marine Organizational Body Size (MOBS) database, an open-access resource that—as its name implies—has collected body size data for more than 85,000 marine animal species and counting, ranging from microscopic creatures like zooplankton to the largest whales. MOBS is already enabling new research on the ocean’s biodiversity and global ecosystem, according to a paper published in the journal Global Ecology and Biogeography. The database is now available though GitHub and currently covers 40 percent of all described marine animal species, with a goal of achieving 75 percent coverage.

    "We’ve really lacked that broader persecutive for a lot of ocean life," marine ecologist Craig McClain of the University of Louisiana at Lafayette told Ars. McClain is the lead creator of MOBS. "We know about evolution and ecology for mammals and birds especially, and to a lesser extent reptiles and amphibians. We just haven’t had these big collated body size data sets for the marine groups, especially the invertebrates." The MOBS project is basically constructing a "library of [marine] life."

    Read full article

    Comments

    Ars Technica – All content

    Flip the Switch on These Plex Settings to Boost Your Privacy

    https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2025/06/plex-logo-box-with-privacy-and-security-logo-boxes.jpg

    As much as I really like Plex and depend on its features for my personal library, I don’t want to share more data than is necessary. It’s not a criticism of Plex, but I’ve changed these privacy settings, and you should too.

    6

    Go Incognito With Your Profile Privacy Settings

    I don’t care for the idea of people being able to see what I’m watching on Plex, not out of shame but because of the principles of the matter. I also don’t want my friends’ usernames exposed when someone sees my friends list, either. You can tweak these settings to be completely private:

    1. In Plex, open Settings and choose Privacy on the left-hand side, near the top.
    2. For ACCOUNT VISIBILITY & ACTIVITY SHARING, select Edit.
    3. For maximum privacy, set everything to Private.

    The only option that can’t be private is Account Visibility, so the next best option is Friends Only. Make sure to save, and you’re off to being a little more private.



    Related

    As if Plex wasn’t already great, you can use it as a hub for your favorite streaming services, too.

    5

    Unsubscribe to Those Pesky Marketing Emails

    Watching marketing emails pile up in my inbox irks me, and it’s one of the defining reasons I have two email accounts (or a great reason to use an email alias!). One is used for signing up for services (taking the brunt of the problem), while the other is for personal use. Thankfully, if you have one email, you can at least unsubscribe from Plex’s marketing emails.

    1. In Plex, go into Settings > Account.
    2. Under Preferences, click the hyperlink there to access your email preferences.
    3. In Email Preferences, uncheck every box for maximum privacy.

    When you’re done with your email preferences, complete the process by selecting Update Preferences at the bottom.

    4

    Prevent Plex From Selling Personal Data

    While you can use Plex strictly for accessing your media library, it also has ad-supported content you can stream. It’s a nice way to expand on your options if your library is lacking, though there are cheap ways to expand your Plex library. However, it’s an avenue for more data collection, so let’s put a stop to that:

    1. In Plex, open Settings > Privacy.
    2. Click the hyperlink for Privacy Preferences to access how your personal data is used.
    3. Uncheck If this box is checked, then Plex may sell your personal data as described in the Privacy Policy… and also check All No, then finish with Save Preferences.

    Now, this will prevent Plex from selling and sharing certain information, but it won’t remove the ads, even if you opt for the Plex Pass.



    Related

    These small changes to your Plex configuration will save you hours of irritating tech support.

    3

    Disable Plex’s Collection of Playback Data

    Having data on your playback performance can be used to improve Plex, but give a company an inch and they’ll take a mile. I’d rather disable it for good, just to be thorough.

    1. Sign in on Plex’s site with your account and visit Plex’s privacy policy page.
    2. Scroll down until you get to the "Your Plex Privacy Rights" section.
    3. Click on You have the right to limit what activity data is sent from your Plex Media Server to reveal a checkbox.

    Uncheck Send playback data to Plex and you’re golden. I’d give the page a refresh to double-check the new changes stuck.

    2

    Opt Out of Plex’s Free Content

    Since you can’t at all avoid the ads given to you by Plex, you can avoid the free content altogether; in fact, you can disable it from your homepage entirely and avoid the risk of accidentally watching Plex’s streaming library.



    Related

    This deal won’t last for long!

    Whether from the Plex app or from a browser, open Settings and choose Online Media Sources. Under LIVE TV and MOVIES & SHOWS, click Edit and set them to Disabled. Now the only content you’ll see is what’s in your Plex library. Perhaps now is the time to turn Plex into a streaming hub!

    1

    Request That Plex Deletes Your Data

    Even if you were to use all these tips to boost your privacy on Plex, it doesn’t help the data that’s already been collected. While you can’t do anything about it, if you were to stop using Plex altogether, you can have your data deleted on the way out. Please note that this action will permanently delete your account and all associated content.

    1. Firstly, you need to visit Plex’s Privacy Request Center site and pick your country and state.
    2. Next, choose Start Deletion Request and provide your first and last name, email, and write out any comments.
    3. Finish up by clicking Review Request.

    Should you keep Plex around, and you get curious, you can also send access and transfer requests to see what kind of data of yours has been collected.

    In my book, fewer services collecting, sending, and selling my data is a win. I may like what Plex offers in terms of features, but like most businesses, there’s no reason to horde my data like a dragon hoarding gold.

    MakeUseOf

    Apollo Landing Keypad Calculator Watch

    https://theawesomer.com/photos/2025/06/apollo_landing_calculator_watch_t.jpg

    Apollo Landing Keypad Calculator Watch

    Inspired by the guidance computer used in Apollo missions, the DSKY Moonwatch packs space-age tech into a wristwatch. Styled like NASA’s iconic DSKY interface, the watch features glowing indicators, a numerical keypad, and an OLED screen that mimics spacecraft readouts. Features include stopwatch, timer, alarm, and GPS waypoint navigation.

    The Awesomer