A deer taken down by a Tennessee hunter in November will likely be declared a world record in 2019.The Tennessee Wildlife Resources Agency said after letting the antlers from the deer Stephen Tucker killed in November dry out for 60 days, it has been measured and it is a 47-point buck.”When I turned around and see him, I was coaching myself because I got upset the first two times I seen him and I can’t let it get me this time,” Tucker said in November after shooting the deer. “Who would have thought anything like that would have come out of Sumner County, Tennessee.”Before it will be declared a world record there is a two-year wait.The Boone and Crockett Club has to officially measure it before it can be declared a world record. The club only measures every two years, so it won’t be official until 2019.
Daily Archives: January 14, 2017
After 146 years, the curtain is coming down on “The Greatest Show on Earth.” The owner of the Ringling Bros. and Barnum & Bailey Circus told The Associated Press that the show will close forever in May.The iconic American spectacle was felled by a variety of factors, company executives say. Declining attendance combined with high operating costs, along with changing public tastes and prolonged battles with animal rights groups all contributed to its demise.”
There isn’t any one thing,” said Kenneth Feld, chairman and CEO of Feld Entertainment. “This has been a very difficult decision for me and for the entire family.”The company broke the news to circus employees Saturday night after shows in Orlando and Miami.Ringling Bros. has two touring circuses this season and will perform 30 shows between now and May. Major stops include Atlanta, Washington, Philadelphia, Boston and Brooklyn.
The final shows will be in Providence, Rhode Island, on May 7 and in Uniondale, New York, at the Nassau County Coliseum on May 21.The circus, with its exotic animals, flashy costumes and death-defying acrobats, has been a staple of entertainment in the United States since the mid-1800s. Phineas Taylor Barnum made a traveling spectacle of animals and human oddities popular, while the five Ringling brothers performed juggling acts and skits from their home base in Wisconsin. Eventually, they merged and the modern circus was born. The sprawling troupes traveled around America by train, wowing audiences with the sheer scale of entertainment and exotic animals.By midcentury, the circus was routine, wholesome family entertainment. But as the 20th century went on, kids became less and less enthralled. Movies, television, video games and the internet captured young minds.
The circus didn’t have savvy product merchandising tie-ins or Saturday morning cartoons to shore up its image.”The competitor in many ways is time,” said Feld, adding that transporting the show by rail and other circus quirks – such as providing a traveling school for performers’ children- are throwbacks to another era. “It’s a different model that we can’t see how it works in today’s world to justify and maintain an affordable ticket price. So you’ve got all these things working against it.”The Feld family bought the Ringling circus in 1967. The show was just under 3 hours then. Today, the show is 2 hours and 7 minutes, with the longest segment – a tiger act – clocking in at 12 minutes.
Facebook wants to know your deepest, darkest thoughts. In April, the site revealed the existence of a new division, known only as ‘Building 8’ which is dedicated to creating ground-breaking products at the intersection of hardware, software, and content.And a new job advert posting suggests that the mysterious division could be working on mind-reading technology.
Mark Zuckerberg has previously made his ambitions to create a telepathy system very clear, calling it the ‘ultimate communication technology’WHAT IS BUILDING 8?
According to Facebook: ‘Building 8 is focused on building new hardware products to advance our mission of connecting the world.’We bring together world-class experts to develop seemingly impossible products that define new categories. ‘We drive innovation in augmented and virtual reality, artificial intelligence, connectivity and other important breakthrough areas. ‘Our teams move fast, with aggressive and fixed timelines. ‘We extensively create and leverage partnerships with universities, small and large businesses, and set clear objectives for shipping products at scale.’
Facebook posted the adverts on its job site, which can be accessed by the public.One advert is for a ‘brain-computer interface engineer’ to work on a ‘2-year B8 project focused on developing advanced BCI technologies.’Details on what the job will involve are limited, but the advert adds that one of the key responsibilities will be applying ‘machine learning methods, including encoding and decoding models, to neuroimaging and electrophysiological data.’
The Sault Ste. Marie and Area Local Immigration Partnership (LIP) is proud to launch the ‘Take the Pledge against Racism and Discrimination’ campaign.Visit discoverthesault.ca to ‘Take the Pledge’ and print your certificate.By taking this online pledge, supporters are making a personal commitment to understand, stand against, and act to eliminate racism and discrimination.“It only takes a few seconds to go online and fill out the form. When you click submit, your pledge is added to a running count of those who’ve also taken the pledge. There are so many different cultures in Canada; we face the challenges of acceptance and inclusion every day,” states Danny Krmpotich, Program Coordinator – Local Immigration Partnership.”We hope this campaign will draw attention to what we as a society can accomplish when we stand together. Through the ‘Take the Pledge’ campaign we are working to make the world a more welcoming place where we appreciate all people, all cultures, and the talents they bring to our communities.”
For students of official propaganda, manipulation of public opinion, psychological conditioning, and emotional coercion, it doesn’t get much better than this. As Trump and his army of Goldman Sachs guys, corporate CEOs, and Christian zealots slouch toward inauguration day, we are being treated to a master class in coordinated media manipulation that is making Goebbels look like an amateur. This may not be immediately apparent, given the seemingly risible nature of most of the garbage we are being barraged with, but once one understands the actual purpose of such official propaganda, everything starts to make more sense.
Chief among the common misconceptions about the way official propaganda works is the notion that its goal is to deceive the public into believing things that are not “the truth” (that Trump is a Russian agent, for example, or that Saddam had weapons of mass destruction, or that the terrorists hate us for our freedom, et cetera). However, while official propagandists are definitely pleased if anyone actually believes whatever lies they are selling, deception is not their primary aim.
The primary aim of official propaganda is to generate an “official narrative” that can be mindlessly repeated by the ruling classes and those who support and identify with them. This official narrative does not have to make sense, or to stand up to any sort of serious scrutiny. Its factualness is not the point. The point is to draw a Maginot line, a defensive ideological boundary, between “the truth” as defined by the ruling classes and any other “truth” that contradicts their narrative.
Google’s Chrome Media team has announced a new open source project called “Draco” designed for 3D graphics. For those unfamiliar, Google has always been an important contributor to the open source community.Draco is a library for compressing and decompressing 3D geometric meshes and point clouds. In other words, it radically reduces the size of 3D graphic files without any substantial visual impact to the person viewing. It is also intended to enhance the storage and transmission of 3D graphics.
Explaining Draco, Jamieson Brettle and Frank Galligan, from Chrome Media Team, Google said, “Draco was designed and built for compression efficiency and speed. The code supports compressing points, connectivity information, texture coordinates, color information, normals, and any other generic attributes associated with geometry. With Draco, applications using 3D graphics can be significantly smaller without compromising visual fidelity. For users, this means apps can now be downloaded faster, 3D graphics in the browser can load quicker, and VR and AR scenes can now be transmitted with a fraction of the bandwidth and rendered quickly and look fantastic.”
An Illinois woman is jailed on a felony theft charge after she was caught stealing 31 boxes of Trojan condoms from a supermarket, according to cops who said that the combined price of the purloined prophylactics exceeded $300.According to court records, Shaearion Davis, 25, was arrested Tuesday afternoon following the condom heist at a Schnucks market in Swansea, an Illinois community about 15 miles east of St. Louis, Missouri.Supermarket employees dialed 911 after they saw Davis swiping the condoms (and they tailed her after she left Schnucks). When Davis spotted the arriving cops, she ditched the Trojans and sought to flee.
Bars around the world are serving up a secret code that could help women who feel threatened or uncomfortable on a date. A growing number of bars and restaurants have installed signs in women’s restrooms that give customers instructions for how to discretely ask employees for help. The most recent sign was spotted at a Hooters in South Africa.”Is your Tinder or Plenty of Fish date not who they said they were on their profile?” the sign reads. “Do you feel unsafe, or even just a little bit weird? We’re here to help. Just go to the bar and order an angel shot.” If the shot is ordered neat, bartenders know to escort the customer to her vehicle. If ordered with ice, the bartender will call an Uber or Lyft. And, if the customer orders an angel shot with lime, the bartender will call the police.
The preferred method for compromising your systems starts with a phishing attack. For those that have been living under a rock, a phishing message is one that appears to come from a legitimate organization, but is false. The message tries to get the recipient to click on a link or open an attachment. Phishing attacks can be targeted or just generic transmissions. Targeted attacks are pretty scary since the attacker typically does some advanced reconnaissance in order to gather valid information. This could include real names, nick names, project names, opposing parties in a legal case, etc.
The largest risk in a phishing attack is the human being. Are your employees (or even you) capable of recognizing a phishing attempt?Training is a big part of protecting yourself from phishing attacks. There are a lot of ways to train employees, but giving them a phishing test is pretty standard. Can you recognize a phishing message?
There are several free testing sites at OpenDNS or SonicWall.E-mail: email@example.com Phone: 703.359.0700Digital Forensics/Information Security/Information Technologyhttp://www.linkedin.com/in/johnsimekhttps://amazon.com/author/johnsimekhttp://www.senseient.com
What do households on food stamps buy at the grocery store?The answer was largely a mystery until now. The United States Department of Agriculture, which oversees the $74 billion food stamp program called SNAP, has published a detailed report that provides a glimpse into the shopping cart of the typical household that receives food stamps.The findings show that the No. 1 purchases by SNAP households are soft drinks, which accounted for about 10 percent of the dollars they spent on food. “In this sense, SNAP is a multibillion-dollar taxpayer subsidy of the soda industry,” said Marion Nestle, a professor of nutrition, food studies and public health at New York University. “It’s pretty shocking.”For years, dozens of cities, states and medical groups have urged changes to SNAP, or the Supplemental Nutrition Assistance Program, to help improve nutrition among the 43 million poorest Americans who receive food stamps. Specifically, they have called for restrictions so that food stamps cannot be used to buy junk food or sugary soft drinks.But the food and beverage industries have spent millions opposing such measures, and the U.S.D.A. has denied every request, saying that selectively banning certain foods would be unfair to food stamp users and create too much red tape.
A woman in Switzerland has been refused a passport because her “annoying” vegan campaigning has rubbed her neighbours up the wrong way.Nancy Holten, 42, is a vegan and an animal rights activist who was born in the Netherlands, but has lived in Switzerland since she was eight years old. She’s fluent in Swiss German and her kids are Swiss citizens.Holten has twice tried – and failed – to get a Swiss passport, because other residents in the community of Gipf-Oberfrick, in the canton of Aargau, don’t like her outspokenness on animal rights issues.In Switzerland, locals often get a say in a person’s passport application – and Holten’s neighbours have given her a thumbs down, The Local reports.READ MORE:* Chef Gianfranco Vissani compares vegans to a sect* Irish eatery bans vegans amid online spat* ‘I’m sorry you can’t be vegan’Her opposition to local traditions, like hunting, piglet racing and cows wearing bells, and her complaints about the village church bells, have seen her branded “annoying” by locals.In 2015, her first attempt at naturalisation was approved by authorities, but 144 out of 206 village residents rejected it.
Imagine a squad of Army Rangers prepping to capture a high-value subject barricaded inside a three-story building. The Rangers decide send in a small camera drone to check for IEDs — but there’s a problem: the enemy has begun putting its booby-traps on the ceiling, where the downward-facing drones can’t see them. If only those little gizmos had cameras on the top…?
A new project by the U.S. Army Research Laboratory and Georgia Technical Institute just might help. It aims to give soldiers the ability to 3D-print swarms of mini-drones to specific specifications within 24 hours. Its creators call this approach “aggregate derivative approach to product design,” or ADAPT. “A soldier with a mission need uses a computer terminal to rapidly design a suitable [drone],” says a poster by project chief engineer Zacarhy Fisher. “That design is then manufactured using automated processes such as laser cutting and 3D printing. The solution is sent back to the soldier and is deployed.”
German trauma surgeons advised the public on Wednesday to walk like penguins to avoid slipping on pavements with freezing temperatures forecast nationwide over the next few days.An advisory published on the website of the German Society of Orthopaedics and Trauma Surgery said that walking like the aquatic birds involves leaning the torso forward so that the centre of gravity is on the front leg.A drawing attached to the advisory explains that when humans walk normally, body weight is split almost evenly over both legs, which the surgeons say increases the risk of losing one’s balance and falling on slippery surfaces.Municipal authorities in Berlin were criticized over their failure to sprinkle the capital’s pavements with rock salt in January 2014 despite warnings of a freeze from meteorologists.
Tokyo (AFP) – Could flashing the “peace” sign in photos lead to fingerprint data being stolen?Research by a team at Japan’s National Institute of Informatics (NII) says so, raising alarm bells over the popular two-fingered pose.
Fingerprint recognition technology is becoming widely available to verify identities, such as when logging on to smartphones, tablets and laptop computers.Bu the proliferation of mobile devices with high-quality cameras and social media sites where photographs can be easily posted is raising the risk of personal information being leaked, reports said.
Beauty giant L’Oreal has launched a “smart” internet-connected hairbrush that analyzes users’ hair type and recommends products accordingly.Sensors on the hairbrush count strokes, determine whether the hair is dry or wet and analyze the force used when brushing. It even includes a microphone that listens to the sound of hair brushing, to provide “insights into manageability, frizziness, dryness, split ends and breakage,” L’Oreal said in a statement on its website.The brush will send information via Wi-Fi or Bluetooth to a mobile app, and will also take into account humidity, temperature and wind, and will produce a quality score, ranking hair for damage, breakage, tangling and dryness. It will then provide hair tips and recommend L’Oreal’s Kérastase products.
© / RuptlyA Bangladeshi man who made headlines because of an extremely rare skin condition has undergone 16 operations to remove countless growths from his hands and feet and doctors now believe he’s been cured.Abul Bajandar was dubbed the “tree man” because of the large, wood-like warts on his body. The warts are caused by an incredibly rare genetic condition called epidermodysplasia verruciformis (EV). Doctors at Dhaka Medical College Hospital have removed five kilos (11 pounds) of growths from Bajandar since they began treating his condition a year ago.They believe if the warts do not grow back, Bajandar will be the first person ever to recover from the genetic disease which predisposes sufferers to widespread wart infections and carcinomas.
A new type of attack should make Tor users – and countless dogs around the world – prick up their ears. The attack, revealed at BlackHat Europe in November and at the 33rd Chaos Computer Congress the following month, uses ultrasounds to track users, even if they are communicating over anonymous networks.
The attack uses a technique called ultrasound cross-device tracking (uXDT), which made its way into advertising circles as early as 2012. Marketing companies running uXDT campaigns will play an ultrasonic sound, inaudible to the human ear, in a TV or radio ad, or even in an ad delivered via a computer browser.
Although the user won’t hear it, other devices such as smartphones using uXDT-enabled apps will be listening. When the app hears the signal, it will ping the advertising network with details about itself. What details? Anything it asks for the phone for, such as its IP address, geolocation Coleman’s, telephone number and IMEI (SIM card) code.