Posts

Showing posts from January 8, 2019

Astronomy Picture of the Day: Quadrantids

Image
Quadrantids Named for a forgotten constellation , the Quadrantid Meteor Shower is an annual event for planet Earth's northern hemisphere skygazers It usually peaks briefly in the cold, early morning hours of January 4. The shower's radiant on the sky lies within the old, astronomically obsolete constellation Quadrans Muralis . That position is situated near the boundaries of the modern constellations Hercules, Bootes, and Draco. About 30 Quadrantid meteors can be counted in this skyscape composed of digital frames recorded in dark and moonless skies between 2:30am and local dawn. The shower's radiant is rising just to the right of the Canary Island of Tenerife's Teide volcano, and just below the familiar stars of the Big Dipper on the northern sky. A likely source of the dust stream that produces Quadrantid meteors was identified in 2003 as an asteroid . Look carefull

What’s the point of a riderless motorcycle?

Image
Technology BMW's prototype will never see the streets, but tech like this could make bikes safer. A motorcycle without a rider might not seem to make sense, but BMW says that tech like this has a point. via Popular Science "http://bit.ly/2sdBVdC"

Here’s how the government shutdown could affect your health

Image
Health Some agencies that keep us healthy have run out of money, or will run out soon. The United States is rolling into the third week with a partially shutdown government, with no signs of a re-opening any time soon. Thousands of federal employees are… via Popular Science "http://bit.ly/2LWCrpk"

Steam Client Update Released

Image
A new Steam client has been released and will be automatically downloaded. General Improved Steam client responsiveness while downloading games Fixed some places where recently played games list was truncated to 5 items Fixed a rare crash if getting local network address failed on a local network connection Fixed an issue where trying to buy or sell items in the overlay could result in an empty browser window when Family View was active Windows Improved automatic discovery of HTTP proxies on some types of restrictive networks, which will allow users on those networks to download game content and other HTTP content while using the Steam client Steam Input Added support for PowerA wired/wireless GameCube Style controllers and PowerA Enhanced Wireless Controller Added support for PDP Faceoff Wired Pro Controller Big Picture Mode The Steam community header is now hidden when in Big Picture chat In-Home Streaming Re-enabled support for streaming from Mac OS X Mo

Dota 2 Update - January 8th, 2019

Image
* Added missing skirt to the Mistress of the Long Night set. Players who have already unbundled the set and own a Belt of the Long Night will be granted a corresponding Skirt of the Long Night. via Steam RSS News Feed "http://bit.ly/2CY9OFG"

Team Fortress 2 Update Released

Image
An update to Team Fortress 2 has been released. The update will be applied automatically when you restart Team Fortress 2. The major changes include: Added NewbiDuo Cup Winter 2019 tournament medals Added Streamer Cup Season 1 tournament medals Updated the localization files Updated cp_snakewater_final1 Fixed missing clip brush in RED kitchen Fixed minor clipping issues via Steam RSS News Feed "http://bit.ly/2M0aRYn"

11 things to make dirtbike camping easier

Image
Gadgets Tools to ensure a better moto experience. From an all-around utility axe, to specialty lighting, to camp mats, chairs, and even a pizza oven, these tools will help build a better moto camping experience. via Popular Science "http://bit.ly/2CYNg7z"

If you want to remember an event, don't take a picture

Image
Science Selfies could be subtly reshaping your memory. For many people, taking hundreds, if not thousands, of pictures is now a crucial part of going on holiday – documenting every last detail and posting it on social… via Popular Science "http://bit.ly/2FjGYRG"

Science T-shirts that'll get you compliments

Image
Gadgets Plus you can wear them to work (if you work at Popular Science). I own a lot of science T-shirts—but when you work at Popular Science , you have to stay on brand. Here are just a few of the T-shirts I love wearing on a daily basis. via Popular Science "http://bit.ly/2TzURyU"

The Impossible Burger 2.0 is a plant-based beef replacement that's meatier than ever

Image
Technology The new formula uses soy instead of wheat protein so it can take on new forms. Impossible Burger 2.0 isn't limited to patties thanks to a new soy-based formula. via Popular Science "http://bit.ly/2RBXRxb"

Midweek Madness - ELEX, 60% Off

Image
Save 60% on ELEX during this week's Midweek Madness*! *Offer ends Friday at 10AM Pacific Time via Steam RSS News Feed "http://bit.ly/2TAHezC"

Daily Deal - HELLION, 40% Off

Image
Today's Deal: Save 40% on HELLION !* Look for the deals each day on the front page of Steam. Or follow us on twitter or Facebook for instant notifications wherever you are! *Offer ends Thursday at 10AM Pacific Time via Steam RSS News Feed "http://bit.ly/2SIw0sB"

The three strength exercises everyone should do

Image
Health Even if you’re not trying to get swole, these movements will help you with everyday movements. Lifting weights can often seem reserved for the fittest among us, those muscle-laden guys and gals pumping iron and getting swole on a daily basis. via Popular Science "http://bit.ly/2Fjfvzy"

One day, 199 tornadoes

Image
Environment Here's what a terrifying tornado outbreak looks like. In 2011, an outbreak slammed through a large swatch of the Southern and Eastern U.S.—not of disease, but of tornadoes. via Popular Science "http://bit.ly/2GX4rKG"

Universities Beware! The Biggest Security Threats Come from Within the Network

Image
Higher Education networks have become incredibly complex. Long gone are the days where students connected desktop computers to ethernet cables in their dorm rooms for internet. Now students can access the school's wireless network at anytime from anywhere and often bring four or more devices with them on campus. Expecting to use their smartphones and gaming consoles for both school related and personal matters, they rely on constant internet connectivity. While the latest technology streamlines processes and makes the learning experience more efficient, higher education institutions' networks have not kept up with technology and cyber security requirements. Network security threats have become more common, and according to a recent Infoblox study, 81 percent of IT professionals state securing campus networks has become more challenging in the last two years. Neverthel

Universities Beware! The Biggest Security Threats Come from Within the Network

Image
Higher Education networks have become incredibly complex. Long gone are the days where students connected desktop computers to ethernet cables in their dorm rooms for internet. Now students can access the school’s wireless network at anytime from anywhere and often bring four or more devices with them on campus. Expecting to use their smartphones and gaming consoles for both school related and personal matters, they rely on constant internet connectivity. While the latest technology streamlines processes and makes the learning experience more efficient, higher education institutions’ networks have not kept up with technology and cyber security requirements. Network security threats have become more common, and according to a recent Infoblox study, 81 percent of IT professionals state securing campus networks has become more challenging in the last two years. Nevertheless, outside threats aren’t posing the biggest challenges, internal threats are. More devices, more malware IT adm

How is a rainbow formed?

Image
Science These optical illusions require a mix of the right weather, eye direction, and luck. Because of their colorful and unique display, rainbows have generated countless legends and myths throughout history. Among the most popular is the Irish folklore that… via Popular Science "http://bit.ly/2CVajQG"

IAST Technology Is Revolutionizing Sensitive Data Security

Image
Unauthorized access to sensitive data, also known as sensitive data leakage, is a pervasive problem affecting even those brands that are widely recognized as having some of the world's most mature software security initiatives, including Instagram and Amazon. Sensitive data can include financial data such as bank account information, personally identifiable information (PII), and protected health information (i.e., information that can be linked to a specific individual relating to their health status, provision, or payment). If an organization suffers a sensitive data breach, they're expected to notify authorities to disclose the breach. For example, per GDPR, the breached firm is expected to disclose the breach within 72 hours of discovery. Such an incident can result in damage to the brand, marred customer trust leading to lost business, regulatory penalties, and the org

IAST Technology Is Revolutionizing Sensitive Data Security

Image
Unauthorized access to sensitive data, also known as sensitive data leakage, is a pervasive problem affecting even those brands that are widely recognized as having some of the world’s most mature software security initiatives, including Instagram and Amazon. Sensitive data can include financial data such as bank account information, personally identifiable information (PII), and protected health information (i.e., information that can be linked to a specific individual relating to their health status, provision, or payment). If an organization suffers a sensitive data breach, they’re expected to notify authorities to disclose the breach. For example, per GDPR, the breached firm is expected to disclose the breach within 72 hours of discovery. Such an incident can result in damage to the brand, marred customer trust leading to lost business, regulatory penalties, and the organization funding the investigation into how the leak happened. Data breaches may even lead to lawsuits. As you