Posts

Showing posts from March 28, 2019

Team Fortress 2 Update Released

Image
An update to Team Fortress 2 has been released. The update will be applied automatically when you restart Team Fortress 2. The major changes include: Improved how vote kicks work in matchmaking to reduce potential for abuse Fixed a case where vote-kicked players could rejoin a match Added Asian BBall Cup tournament medals Updated model/materials for the Rasslabyxa Cup Helper medal Updated RETF2 Retrospective finalist medals to be paintable Updated localization files via Steam RSS News Feed "https://ift.tt/2HWD0ja"

Earth's most invasive species is a frog-killing fungus

Image
Environment The international pet trade has helped a fungal infection spread to 501 species of amphibians. A new study, published Thursday in Science quantified the global death toll of the amphibian-killing fungus, chytridiomycosis, which has infected at least 501 distinct… via Popular Science "https://ift.tt/2TG033O"

The president wants NASA back on the moon by 2024—a risky and unrealistic request

Image
Space We'll need more money, more time, or both. At the fifth meeting of the National Space Council, and nearly 50 years after the Apollo 11 moon landing, Vice President Mike Pence said a 2028 deadline for another moon… via Popular Science "https://ift.tt/2U0nv0O"

Rising temperatures will help mosquitos infect a billion more people

Image
Nexus Media News "Plain and simple, climate change is going to kill a lot of people." New research indicates that climate change could result in one billion new cases of infectious diseases globally by century's end. via Popular Science "https://ift.tt/2UZDIQc"

How to pick the perfect seat in a movie theater for sound and picture

Image
Technology You paid a lot to get into the theater, make sure it's worth the price of the ticket. If you want Thanos to look and sound just right, pick your spot carefully. via Popular Science "https://ift.tt/2I3GvUK"

Weekend Deal - Kingdom Come: Deliverance, 50% Off

Image
Save 50% on Kingdom Come: Deliverance as part of this week's Weekend Deal*! *Offer ends Monday at 10AM Pacific Time via Steam RSS News Feed "https://ift.tt/2uz3hvP"

Daily Deal - Dakar 18, 50% Off

Image
Today's Deal: Save 50% on Dakar 18 !* Look for the deals each day on the front page of Steam. Or follow us on twitter or Facebook for instant notifications wherever you are! *Offer ends Saturday at 10AM Pacific Time via Steam RSS News Feed "https://ift.tt/2I0jnGP"

Daily Deal - Visage, 20% Off

Image
Today's Deal: Save 20% on Visage !* Look for the deals each day on the front page of Steam. Or follow us on twitter or Facebook for instant notifications wherever you are! *Offer ends Saturday at 10AM Pacific Time via Steam RSS News Feed "https://ift.tt/2uy8Uuh"

Now Available on Steam Early Access - Risk of Rain 2

Image
Risk of Rain 2 is Now Available on Steam Early Access! The classic multiplayer roguelike, Risk of Rain, returns with an extra dimension and more challenging action. Play solo, or team up with up to four friends to fight your way through hordes of monsters, unlock new loot, and find a way to escape the planet. via Steam RSS News Feed "https://ift.tt/2UhWdCu"

This woman's genetic mutation shields her from pain and anxiety

Image
Health Her case could help researchers find new ways to alleviate depression. When a 66-year old woman at Raigmore Hospital in Inverness, Scotland, told her doctor that her severely arthritic hand was painless both before and after her operation,… via Popular Science "https://ift.tt/2FGxH5Z"

Picture This: Caught Our Eyes: Solving a Stork Mystery

Image
Caught Our Eyes: Solving a Stork Mystery By Barbara Orbach Natanson Perhaps it's the impending arrival of April 1, but my first thought upon looking at this photo, placed on our "Caught Our Eyes" sharing wall by reference librarian Jon Eaker, was that it was an April Fool's joke. [Photo captioned "Congressional Speaking Class"]. Photo by Harris & Ewing, ca. 1939. https://ift.tt/2JN613f As is sometimes the case with photos in our Harris & Ewing collection, where captions range from very fulsome to non-existent, the photo is somewhat of a mystery. The title that came with caption data received with the collection, "Congressional Speaking Class," seems to have very little to do with this leggy stork. There are other photos with a similar title in the collection that seem to show just what the title suggests. For example: Congressional

The extra lenses in your smartphone's camera, explained

Image
Technology Dual-lens? Triple-lens? Do more lenses matter? The differences between ultrawide, telephoto, and depth explained—and how many lenses are too many. via Popular Science "https://ift.tt/2TFwbo4"

What will it take for humans to trust self-driving cars?

Image
Cars They're coming—but are we ready to let a computer take the wheel? Autonomous cars could prove safer than fickle human drivers. There's just one problem: we have to be willing to hand over control. via Popular Science "https://ift.tt/2HXVAas"

Grabbing hold and letting go: The exploding bolts that bring us to space

Image
Space The story of heroic fasteners that will get us to the moon and back. It'll take millions of pounds of rocketry to get humans back to the moon, but only 20,000 will return home. We'd get nowwhere without a group of exploding bolts. via Popular Science "https://ift.tt/2CFRhxe"

Through the Executive Lens: Prioritizing Application Security Vulnerabilities

Image
It’s an old axiom in the security business that your security is only as good as your weakest link. Today, as the number of security threats and attack vectors continues to grow, so too does the number of tools security teams have at their disposal to find and block them. Also growing is the pile of data that security teams must sift through to identify where their systems might be vulnerable. Given all the data, how do you prioritize your efforts? First, a couple of statistics. According to Tim Clark, SAP contributor to Forbes, 84 percent of all cyber-attacks are happening on the application layer. The 2018 Verizon Data Breach Investigations Report (DBIR) states that web application attacks were responsible for 38 percent of data breaches. And an IBM white paper states that “the costs of discovering defects after release are significant: up to 30 times more than if you catch them in the design and architecture phase.” Conclusion: Start by focusing on your application security init

Through the Executive Lens: Prioritizing Application Security Vulnerabilities

Image
It's an old axiom in the security business that your security is only as good as your weakest link. Today, as the number of security threats and attack vectors continues to grow, so too does the number of tools security teams have at their disposal to find and block them. Also growing is the pile of data that security teams must sift through to identify where their systems might be vulnerable. Given all the data, how do you prioritize your efforts? First, a couple of statistics. According to Tim Clark, SAP contributor to Forbes, 84 percent of all cyber-attacks are happening on the application layer. The 2018 Verizon Data Breach Investigations Report (DBIR) states that web application attacks were responsible for 38 percent of data breaches. And an IBM white paper states that "the costs of discovering defects after release are significant: up to 30 times more than if you c