Weekly Web Harvest for 2017-02-19
- Theft: A History of Music
- Competitive Eating Was Even More Disgusting in the 17th Century | Atlas Obscura
Among the suggested meals to give the “most exorbitant paunchmonger” were a wheelbarrow full of tripe, as many puddings as would stretch across the Thames, and an entire fat calf or sheep.
Mens Agitat Molem – Futility Closet In 2010 Jeremy Wood walked around the campus of the University of Warwick with a GPS device to “draw” a map at 1:1 scale. Altogether he covered 238 miles in 17 days. Web Maker – A blazing fast & offline web playground data warning’s a bit scary sounding but this is pretty much your own personal next-level codepen The Difference Between URLs and URIs Actually, that’s called a URI, not a URL… The response to this correction can range from quietly thinking this person needs to get out more, to agreeing indifferently via shoulder shrug, to removing the safety clasp on a Katana. This page hopes to serve as a simple, one page summary for navigating the subtleties of this debate. AMD shares are soaring: Ethereum miners are renting Boeing 747s to ship graphics cards to mines — Quartz “Time is critical, very critical,” in mining, Marco Streng, chief executive of Genesis Mining, a major ethereum miner, told Quartz. “For example, we are renting entire airplanes, Boeing 747s, to ship on time. Anything else, like shipping by sea, loses so much opportunity.” John Popper From Blues Traveler Will Not Stop Posting Aerial Pictures of My House That’s when a Blues Traveler fan threatened to send the Mexican mafia to Rutherford’s house. qrpike/Web-Font-Load: Install all […]
Candace Jean Andersen on Twitter: “Hey Twitter I’m on a mission: The woman in this photo was an attendee at a 1971 International Conference on Biology of Whales. She is the only woman, & the only one captioned “not identified” in the article I found the p Pretty wild to watch this kind of research play out on Twitter. Temporary Autonomous Zone – Wikipedia It is composed of three sections, “Chaos: The Broadsheets of Ontological Anarchism,” “Communiques of the Association for Ontological Anarchy,” and “The Temporary Autonomous Zone.” –h/t Doug Belshaw MOSQUITO attack allows to exfiltrates data from Air-Gapped computers via leverage connected speakersSecurity Affairs Once again the team demonstrated that separating the computer networks from the Internet is not enough to protect them from attackers. In the past, the same group of researchers demonstrated that it possible to listen to private conversations by reversing headphones connected to a previously infected computer. The MOSQUITO technique establishes a covert ultrasonic transmission between two air-gapped computers using speaker-to-speaker communication. In Britain’s Playgrounds, ‘Bringing in Risk’ to Build Resilience – The New York Times — Ever feel like everything is just a stupid cycle of doom? Educators in Britain, after decades spent in a collective effort to minimize risk, are now, cautiously, getting into the business of providing it. Four years ago, for instance, teachers at […]