Posts

Showing posts from January 4, 2019

Astronomy Picture of the Day: Yutu 2 on the Farside

Image
Yutu 2 on the Farside On January 3 , the Chinese Chang'e-4 spacecraft made the first successful landing on the Moon's farside . Taken by a camera on board the lander, this image is from the landing site inside Von Karman crater. It shows the desksized, six-wheeled Yutu 2 (Jade Rabbit 2) rover as it rolled down lander ramps and across the surface near local sunrise and the start of the two week long lunar day. Ripe for exploration, Von Karman crater itself is 186 kilometers in diameter. It lies within the Moon's old and deep South Pole-Aitken impact basin with some of the most ancient and least understood lunar terrains. To bridge communications from the normally hidden hemisphere of the Moon, China launched a relay satellite, Queqiao , in May of 2018 in to an orbit beyond the lunar farside. January 05, 2019 via NASA https://go.nasa.gov/2QlqLgA

Why some coastal regions flood more easily than others

Image
Nexus Media News Sea levels are rising, but it's happening unevenly. Some coastal regions are more at risk of flooding than others. That's because sea waters are rising unevenly. via Popular Science "http://bit.ly/2Qq3ytw"

Maybe we should all be using Facebook Messenger Kids

Image
Technology Limited apps are often better apps. Less is more when it comes to apps. via Popular Science "http://bit.ly/2LQRvou"

Zero is just 1,500 years old. Before it, there was nothing.

Image
Science How humans invented zero—and why some tried desperately to do without it. Life without zero is unimaginable. But the concept is only 1,500 years old. via Popular Science "http://bit.ly/2sb0iIP"

Do you really want to know what's in your baby's genome?

Image
Health It's unclear how much information is helpful, and how much is hurtful. In the age of readily available genetic testing, there are a lot of questions about how—or if—an in-depth test might help or hurt the health of a baby… via Popular Science "http://bit.ly/2GU5IlD"

Daily Deal - Redout: Enhanced Edition, 80% Off

Image
Today's Deal: Save 80% on Redout: Enhanced Edition and its DLCs!* Look for the deals each day on the front page of Steam. Or follow us on twitter or Facebook for instant notifications wherever you are! *Offer ends Sunday at 10AM Pacific Time via Steam RSS News Feed "http://bit.ly/2SBkOOz"

Where to find self-driving cars on the road right now

Image
Technology Autonomous cars seem futuristic, but they’re already on the streets. A roundup of what's going on, and where, in the world of autonomous vehicles. via Popular Science "http://bit.ly/2VusqnP"

Seven snow-clearing tools to get you through winter

Image
Gadgets The best offerings, both handheld and motor-powered. Seven tools to assist in clearing snow after a snow day, from handheld tools to motored machines. via Popular Science "http://bit.ly/2EXXOCU"

Toads on a python, and five other animals hitching rides on bigger animals

Image
Animals Giddy up! This week, heavy rains and flooding in Australia flushed a small army of cane toads out of their burrows. In an attempt to escape rising waters, 10 of those toads… via Popular Science "http://bit.ly/2F8CE8h"

The best way to pack up your holiday decorations so your future self doesn't hate you

Image
DIY Avoid detangling duty next year. If you simply toss your holiday decorations in a closet, you’ll have to detangle them next Christmas. Here’s how to pack them neatly and simplify setup for next year. via Popular Science "http://bit.ly/2CPnwKK"

Unlocking the Power of Biometric Authentication with Behavior Analytics

Image
There are three common types of authentication: something you know (like a password), something you have (like a smart card), and something you are (like a fingerprint or another biometric method). Modern best practices recommend that you use at least two of these in parallel to be able to truly secure your identity as you logon to digital resources -- a practice otherwise known as two-factor authentication (2FA). Biomerics exploded onto the scene in 2013 with the introduction of Apple's iPhone 5S Touch ID fingerprint scanning technology. In 2017, Apple pushed facial recognition into the mainstream with its Face ID technology, introduced as the latest authentication feature in its iPhone X model. While common in many circles for years, Biometric technologies have now become widely recognized as more secure forms of authentication over the traditional password or token for a wid

New Year’s Resolution for 2019: Cybersecurity Must Be the Top Priority for the Board

Image
In the year ahead, organizations must prepare for the unknown so they have the flexibility to endure unexpected and high impact security events. To take advantage of emerging trends in both technology and cyberspace, businesses need to manage risks in ways beyond those traditionally handled by the information security function, since innovative attacks will most certainly impact both business reputation and shareholder value. It is recommended that businesses focus on the following security topics in 2019: The Increased Sophistication of Cybercrime and Ransomware The Impact of Legislation Smart Devices Challenge Data Integrity The Myth of Supply Chain Assurance  The Increased Sophistication of Cybercrime and Ransomware Criminal organizations will continue their ongoing development and become increasingly more sophisticated. Some organiza

What muscles do squats work?

Image
Muscle Month Like deadlifts, squats exercise way more than the obvious bits. Unbeknownst to the bros who skip leg day, squats are an incredible exercise for many reasons. via Popular Science "http://bit.ly/2VrNJ9r"

New Year’s Resolution for 2019: Cybersecurity Must Be the Top Priority for the Board

Image
In the year ahead, organizations must prepare for the unknown so they have the flexibility to endure unexpected and high impact security events. To take advantage of emerging trends in both technology and cyberspace, businesses need to manage risks in ways beyond those traditionally handled by the information security function, since innovative attacks will most certainly impact both business reputation and shareholder value. It is recommended that businesses focus on the following security topics in 2019: The Increased Sophistication of Cybercrime and Ransomware The Impact of Legislation Smart Devices Challenge Data Integrity The Myth of Supply Chain Assurance  The Increased Sophistication of Cybercrime and Ransomware Criminal organizations will continue their ongoing development and become increasingly more sophisticated. Some organizations will have roots in existing criminal structures, while others will emerge focused purely on cybercrime. Organizations will also strugg

Unlocking the Power of Biometric Authentication with Behavior Analytics

Image
There are three common types of authentication: something you know (like a password), something you have (like a smart card), and something you are (like a fingerprint or another biometric method). Modern best practices recommend that you use at least two of these in parallel to be able to truly secure your identity as you logon to digital resources -- a practice otherwise known as two-factor authentication (2FA). Biomerics exploded onto the scene in 2013 with the introduction of Apple’s iPhone 5S Touch ID fingerprint scanning technology. In 2017, Apple pushed facial recognition into the mainstream with its Face ID technology, introduced as the latest authentication feature in its iPhone X model. While common in many circles for years, Biometric technologies have now become widely recognized as more secure forms of authentication over the traditional password or token for a wider range of technology needs. But while we do all have a unique face, fingerprint, and irises, even basic b

The End (of 2018) Is Near: Looking Back for Optimism

Image
Prognostication is risky business. Just days after I originally put together my list of 2019 predictions for the cybersecurity world of 2019, Marriott, Dell, Dunkin’ and Quora trashed my carefully crafted analysis. This is further evidence that predicting events and issues based on unpredictable human behaviors is like picking your spouse on a blind date. Sure, you might be right, but you are just as likely to make a disastrous choice. This time last year, I gazed deeply into my company’s Crystal Ball, read the tea leaves in my cup, and boldly predicted five circumstances. Three of them came true in full force: Government regulations would drive behaviors. The reaction to GDPR, NY DFS , CaCPA , CaSCD and serious talk of a US federal privacy law is proof that institutional behaviors are changing and will continue to do so.   Patching will be the Achilles heel of applications. Known CVEs continued to the root cause of cyberattacks.   More of the same problems as in previous y

The End (of 2018) Is Near: Looking Back for Optimism

Image
Prognostication is risky business. Just days after I originally put together my list of 2019 predictions for the cybersecurity world of 2019, Marriott, Dell, Dunkin' and Quora trashed my carefully crafted analysis. This is further evidence that predicting events and issues based on unpredictable human behaviors is like picking your spouse on a blind date. Sure, you might be right, but you are just as likely to make a disastrous choice. This time last year, I gazed deeply into my company's Crystal Ball, read the tea leaves in my cup, and boldly predicted five circumstances. Three of them came true in full force: Government regulations would drive behaviors. The reaction to GDPR, NY DFS , CaCPA , CaSCD and serious talk of a US federal privacy law is proof that institutional behaviors are changing and will continue to do so.   Patching will be t