Blood-sucking flies might be the newest way to identify emerging infectious diseases in wild animals before they spread to humans.
A team of researchers have discovered that these flies can act as ‘flying syringes’ because pathogens such as malaria are preserved in the blood meals of flies.
These blood meals could be used as an indirect, non-invasive way of studying the circulation of pathogens in wild animals, improving scientists’ ability to identify and control the global outbreak of new and re-emerging infections including the Ebola and Zika viruses.
There are seven new pathogens identified worldwide each year and that number is predicted to reach 15 to 20 annually by 2020 due to increased human contact with wildlife species that are potential reservoirs of disease.
Despite significant scientific advances, researchers are unable to predict where, when and how epidemics arise.
“This is a huge public health issue that urgently requires new tools for the active monitoring of outbreaks and rapid diagnosis of the pathogens involved,” senior author and evolutionary geneticist Franck Prugnolle, from the National Center for Scientific Research (CNRS) in Montpellier, France, said in a statement. “We wanted to investigate whether blood-feeding insects could act as a sampling tool out in the wild environment, allowing us to monitor the presence and emergence of infectious disease.”
The successful use of small drones as weapons by terrorists in Middle Eastern war zones is raising concerns among U.S. security agencies that homegrown extremists will utilize them for domestic attacks.
As millions of light-weight drones flood the consumer market and the federal government struggles with monitoring the devices, counter-terror agencies now see a possibility that they could be used in the U.S. to carry explosives or as surveillance platforms, according to officials at a security conference in Washington on Wednesday.
“They are doing all sorts of innovative and experimental things,” John Mulligan, deputy director of the U.S. National Counterterrorism Center, said. “We’ve seen them using them in surveillance. We’ve seen them using them in weapons delivery. We can rest assured that they will continue to fine tune their capabilities in this regard.”
A Northern Arizona University student lost credit on an English paper for using the word “mankind” instead of a gender-neutral alternative.
Cailin Jeffers, an English major at NAU, told Campus Reform that she received an email from one of her professors, Dr. Anne Scott, informing her that she had been docked one point out of a possible 50 on a recent paper for “problems with diction (word choice)” related to her use of the word “mankind” as a synonym for “humanity.”
“The words we use matter very much, or else teachers would not be making an issue of this at all.”
“I would be negligent, as a professor who is running a class about the human condition and the assumptions we make about being ‘human,’ if I did not also raise this issue of gendered language and ask my students to respect the need for gender-neutral language,” Scott explained. “The words we use matter very much, or else teachers would not be making an issue of this at all, and the MLA would not be making recommendations for gender-neutral language at the national level.”
Scott then offered to let Jeffers revise the paper to earn additional points in five categories, including diction, but noted that she is under no obligation to do so.
Nearly one-fifth of mobile phones and one-quarter of video game consoles shipped abroad are fake, according to a report by the the Organisation for Economic Co-operation and Development (OECD).
The Trade in Counterfeit ICT Goods report, published ahead of the 2017 OECD Global Anti-Corruption and Integrity Forum this month, identified a growing trend in fake goods.
Smartphone batteries, chargers, memory cards, magnetic stripe cards, solid state drives and music players are also increasingly falling prey to counterfeiters.
On average, 6.5 per cent of global trade in ICT goods is in counterfeit products, according to analysis of 2013 customs data, that is up from 2.5 per cent of overall traded goods found to be fake in a 2016 report.
China is the primary source of fake ICT goods, and US manufacturers are the worst affected by lost revenue and erosion of brand value, the report said. Almost 43 per cent of seized fake ICT goods infringe the IP rights of US firms, followed by 25 per cent for Finnish firms and 12 per cent for Japanese firms.
There’s a new shocking revelation to the man whom Schenectady Police claim faked his own hate crime.It turns out he may not even be Jewish as he claimed to be.“I looked and said, ‘what the hell is going on here?’”That was Andrew King during a NEWS10 ABC interview in February. He showed the messages of hate, swastikas spray-painted on the front of his Schenectady home.As he adjusted his yarmulke, the proud man of faith expressed deep fear.“I didn’t know, maybe they are going to do more than that, maybe from spray paint to trying to harm me.”
Source: Man arrested for spray painting swastikas on his home not believed to be Jewish
European Commission President Jean-Claude Juncker said Thursday he would promote the independence of U.S. states if Donald Trump continues to encourage EU countries to follow the U.K.’s example and leave the bloc.At a meeting of leaders of the center-right European People’s Party in Malta, Juncker said Brexit would not be the end of the European Union — even if some people, such as Trump, would like that outcome.In response to White House claims that Trump was “a leader on Brexit,” Juncker declared: “If that continues, I’ll call for Ohio to be independent and Texas to leave the United States.”Juncker’s remarks came a day after Britain formally notified the EU that it intended to depart.“Brexit should be the beginning of something new, something better,” Juncker said. “We need to continue.”Juncker added that there was much for the 27 remaining EU members to do, including strengthening security and defense policy. “A chicken coop is a close combat formation compared to Europe’s common defense,” he said, speaking in German. ALSO ON POLITICOWhite House: Trump was a leader on BrexitCYNTHIA KROET
Source: Juncker threatens to promote Ohio independence after Trump’s Brexit backing – POLITICO
WikiLeaks has published hundreds more files today which it claims show the CIA went to great lengths to disguise its own hacking attacks and point the finger at Russia, China, North Korea and Iran.The 676 files released today are part of WikiLeaks’ Vault 7 tranche of files and they claim to give an insight into the CIA’s Marble software, which can forensically disguise viruses, trojans and hacking attacks. WikiLeaks says the source code suggests Marble has test examples in Chinese, Russian, Korean, Arabic and Farsi (the Iranian language).
It says: ‘This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese.’
This could lead forensic investigators into wrongly concluding that CIA hacks were carried out by the Kremlin, the Chinese government, Iran, North Korea or Arabic-speaking terror groups such as ISIS.
Source: WikiLeaks says CIA disguised hacking as Russian activity | Daily Mail Online
A hobby farmer near Sault Ste. Marie, Ont. made a surprising discovery last week when he went to collect his chicken’s eggs.
One of Dennis Goslow’s hens has laid an egg that is 180 grams. That’s heavier than a major league baseball and the size of a large apple.
“[The egg] seems to be a little bit warped,” Goslow said from his home in Echo Bay, Ont. “You can imagine, the poor thing coming out. It looks like an egg, but it’s a little rough.”
“It was warm when I picked it up,” he said.
Modern desktop printers come in two types; network connected printers, and standard printers. A network connected printer can connect to your WiFi or Ethernet network and receive print jobs from other devices on the network. A standard printer can only receive print jobs from a desktop. This kind, a standard printer, is more common in homes. It’s still in use in many work places as well. A standard printer requires a desktop in order to work. That alone is a major restriction but it also can’t receive print jobs from a mobile device. In terms of hardware, there is just no easy way to bridge that gap. In terms of software though, you can print from your phone to a desktop printer if you have a few things set up via Google Cloud Print. Here’s what you need to do.
What You Need
To print from your phone to a desktop printer, you need;
- A properly installed desktop printer. You should be able to print to this printer from your desktop without running into any hiccups.
- The Chrome web browser installed on your desktop
- A Google account added to Chrome under Chrome>Settings
Add Deskrop Printer To Google Cloud Print
As mentioned in the introduction, software is what bridges the gap between a smartphone and a standard printer. Specifically, we’re talking about a service; Google Cloud Print. Google Cloud Print connects with both network and standard printers. For our purpose, we need to add a standard printer.
Turn your printer on and connect it to your desktop. While not necessary it’s best to connect it to avoid problems.
Open Chrome on your desktop and go to chrome://devices/. Click on ‘Add Printers’.
A pack of wild monkeys helped a Chilean tourist who’d been separated from his tour group survive in the Amazon rainforest for more than a week by dropping fruit in his path and leading him to water and safety every day, National Geographic reports.
Less than a month ago, 25-year-old Maykool Coroseo Acuña inexplicably abandoned the Max Adventures campgrounds in the Bolivian rainforest. Dozens of park rangers looked night and day for Acuña, and his family even flew in to help the search effort. Eventually, Acuña’s sister found him after hearing him scream in anguish through the rainforest leaves on day nine.
Nobody is quite sure why Acuña suddenly took off and ran into the brush by himself, but he left without a trace.
And yet, that’s not a shocking figure.
Everyone has played “Would You Rather” before, as it is usually a game that finds itself in conversation when everyone is drunk and lying down in the living room, talking about life and how much they hate each other. And of course, the game usually ends up pitting two gross things against each other, and you have to choose one. But the lovely folks at Dr. Ed decided to push the envelope a tad more.
Dr. Ed asked 2,000 Americans and Europeans this question: “How important is sex to them, and what would and wouldn’t they give up for it?” And some of the answers were pretty crazy,
It takes a feast of facial imagery to teach a machine how to recognize an individual person.
This is why computer scientists so often use the faces of Hollywood celebrities in their research. Tom Hanks, for example, is in so many publicly available photographs that it’s fairly easy to build a Hanks database for algorithm-training purposes.
Depending on a researcher’s needs, there are many other available databases of human faces—some featuring tens of thousands of images. These collections of faces draw from public records like mugshots, surveillance footage, news photos, Google images and university studies.
It’s entirely possible your face is in one of these databases. There’s no way to say for certain it isn’t.
Your face is yours. It is a defining feature of your identity. But it’s also just another datapoint waiting to be collected. At a time when cameras are ubiquitous and individual data collection is baked into nearly every transaction a person can make, faces are increasingly up for grabs.
Sushi is a loved dish around the world, there are many types of sushi and we wrote about a few of them in the past like the rainbow sushi or the burger sushi, but this one really takes the cake, meet the Sushi Donut!
The person behind these new food obsession is a girl named Sam, she is a vegan food creatrix who came up with this genius idea and posted it to her Instagram profile and her followers did the rest. By the way, if you think her name is familiar you’re right! Sam was the one behind the amazing Galaxy donuts we wrote about a while back.
The sushi donuts are made by greasing a donut mould with some coconut oil and than adding the cool sushi rice to it and decorating the donut with some black sesame,wasabi,ginger, avocado and everything else you want to make it yummy and beautiful.
Creator of popular card game “Cards Against Humanity” Max Temkin vowed that if Congress voted to attack net neutrality, that he would purchase Congress’ browser history and publish it.
The vote ultimately decided that Internet Service Providers will be permitted to sell off their customers’ private data to advertisers.
Or, perhaps, to companies whose founders want to humiliate those responsible for this massively unpopular decision.
Rather than donating to crowdfunding efforts hoping to inflict similar humiliations, Temkin has encouraged citizens to save their money. He plans to purchase and release the data himself.
- Augmenting body cameras with facial recognition is not a hypothetical or a research and development target–it is already available in several body camera products.
- Biometric data is weakly regulated in US police forces, meaning there might be nothing standing in the way of law enforcement integrating it into existing body cameras.
- Current facial recognition technologies are just accurate enough to pick out faces from low-resolution images, but not accurate enough to ensure proper identification.
A new report by the Intercept warns that the unsettlingly realistic prospect of facial recognition programs being deployed as an augmentation to police body cameras could have grave repercussions on the privacy of citizens. What makes the intrusiveness of this potential policing technology particularly serious is the combination of lax existing biometric data policies in police forces and nascent, error-prone facial identification software.
To begin with, the piece reveals that the technical capacity for integrating facial recognition programs into body cameras already exists. Almost a quarter of body camera manufacturers offer facial detection and identification capabilities with their products, according to a joint study by the Department of Justice and Johns Hopkins University. Correspondingly, new facial recognition algorithms, such as that of the startup compnay NTechLab, are able to be installed to body cameras. Even more concerning, this new generation of facial recognition products offers a quantum leap in capabilities, such as, in addition to real-time processing, the ability fetch location history, criminal history, and immigration status.
All browsers have a neat export feature for bookmarks. You can export your saved bookmarks to an HTML or XML file from your browser. You can import the file in any browser. As far as bookmarks go, browsers tend to play nice with each other. Browsers have reasonably well equipped bookmarks managers, for the most part. If a browser’s bookmarks manager is missing a feature, an extension or an add-on will likely make up for it. This is true in most cases but there will be exceptions. For example, you can’t export a single bookmarks folder. You have to export them all, or nothing. Likewise, you can only import all bookmarks saved in an HTML or XML file, and not just select ones. There is no extension or add-on that fills this gap so we have to make use of a work-around. Here’s what you need to do.
This little work around to export a single bookmarks folder works in all browsers that have an export bookmarks feature. It is easier to use in Chrome but the good news is, it works between browsers too. For example, you can export a single bookmarks folder from Firefox to Chrome.
FedEx is making you an offer you can’t afford to accept. It’s offering to give you $5 (actually, it’s a discount on orders over $30) if you’ll just install Adobe Flash on your machine.
Nobody who knows anything about online security uses Flash anymore, except when it’s absolutely necessary. Why? Because Flash is the poster child for the “security-vulnerability-of-the-hour” club — a group that includes another Adobe product, Acrobat. How unsafe is Flash? Let’s put it this way: seven years ago, Steve Jobs announced that Flash was to be forever banned from Apple’s mobile products. One of the reasons he cited was a report from Symantec that “highlighted Flash for having one of the worst security records in 2009.”
Flash security hasn’t gotten any better since.
These days, Flash is considered so unsafe that Chrome 56 only loads flash on an “opt-in” basis, and both Mozilla Firefox and Windows’ Edge browsers plan to quit supporting it in the near future. If Microsoft thinks it’s a security nightmare, you can be sure that “nightmare” is too soft a description.
In what’s thought to be the first decision of its kind, a Texas grand jury has decided that a GIF can be a deadly weapon.
On Friday, police arrested John Rayne Rivello, 29, of Salisbury, Maryland, for allegedly sending a seizure-inducing GIF via Twitter to an epileptic journalist. The target, Kurt Eichenwald, is a senior writer at Newsweek and a contributing editor at Vanity Fair.
Eichenwald suffered a seizure when he viewed the flashing strobe image.
Rivello was charged in Texas on Monday with one count of aggravated assault with a deadly weapon. The charge carries a hate-crime enhancement due to an alleged anti-Semitic bias associated with the crime.
Apple has come under fire for its decision to pull an app that tracks US drone strikes from its App Store, after the controversial app was briefly accepted after 12 rejections.
The decision has sparked outrage and inspired accusations of censorship.
Data artist and developer Josh Begley created the app five years ago, which sent push notifications each time a US drone strike was reported by the media.
Apple rejected the app, then called Drones+, saying it was “excessively objectionable or crude content.” Begley continued to submit the app to the online store over the years, in an effort to see whether Apple’s rules had changed.
March Madness is underway and a new study shows there is actually a loss, to the tune of $2 billion, in productivity in the workplace.
However, one type of business welcomes this time of year to boost revenue. Many urologists see a double digit increase in the amount of men coming in to get a vasectomy. It is a quick procedure that keeps men off of their feet and on the couch for a couple of days.
“I imagine my wife would have a hard time with me watching four straight days of basketball, but I kinda have an excuse now,” Rob Myklebust said.
Myklebust’s excuse is that he’s recovering from the elective surgery. A vasectomy, which prevents men from having kids or more kids.
“For two days post procedure men don’t do anything at all. They literally lay around and use ice to keep the swelling down,” Dr. Todd Waldmann with the Idaho Urologic Institute said.
It’s now illegal in Ohio for people to engage in sexual conduct or related acts with animals; the state didn’t have anti-bestiality laws until the change took effect last week, the AP reports. According to the Dayton Daily News, the measure gained enough votes to pass in December when it was incorporated into a bill that bars local jurisdictions from raising the minimum wage or regulating pet stores. Offenders could face up to 90 days in jail and have the animal seized and impounded. They also could be ordered to undergo psychological evaluation or counseling. “It’s a crime that defies explanation to the rational person,” said Mark Kumpf, director of the Montgomery County Animal Resource Center. “We’re dealing with a different species.”
While the FBI’s Stay-Behind network in Alaska has been previously explored – including how it was partially driven to spite the CIA – the Agency’s role in the Cold War contingency has largely been kept secret. Previously classified records reveal that the military specifically sought to get the CIA involved in the earliest months of the program.
The extent of the Agency’s involvement remains unclear, as does whether or not the Agency ever interacted with the FBI on the project. Given Bureau’s animus towards the Agency – including, but not limited to the Alaskan project – it seems unlikely that the FBI would have reached out if they could have avoided it, though documents released in the CREST mention that it was “discussed informally.”
While the Bureau had been discussing programs to create “sleeper agents” in Alaska since as early as January 1950, it seems that CIA may not have been consulted until March. A memo with the subject “United States Armed Forces Underground Intelligence Activities in the event of Enemy Occupation of Alaska” from the Air Force’s Chief of Staff solicited the opinions of both the CIA and FBI Directors. The memo sought to establish a policy for the program in order to avoid duplication of effort or interference between the various agencies.
Cancer can be caused by tobacco smoke or by an inherited trait, but new research finds that most of the mutations that lead to cancer crop up naturally.
The authors of the study published Thursday poked a hornet’s nest by suggesting that many cancers are unavoidable.
The provocative findings by Bert Vogelstein and Cristian Tomasetti at the Johns Hopkins Kimmel Cancer Center, have stirred up a heated scientific debate that started two years ago, when they published a report along similar lines.
Back then, critics said they were undercutting important messages about cancer prevention. So when these scientists had new results to report, Vogelstein addressed that concern head-on.
A northern Idaho woman who hit a deer while driving on U.S. Highway 95 told police she was distracted after getting a glimpse of a sasquatch in her rearview mirror, according to the Associated Press.
The woman, 50, was driving near Potlatch last Wednesday when she told sheriff’s officials there that she saw a sasquatch chasing a deer on the side of the road. She checked a rearview mirror to get another look. Seconds later, the deer ran in front of her vehicle, the AP said.
Authorities did not report any evidence of finding the elusive Bigfoot.
Manny Ramirez hasn’t played professional baseball since 2014, but you’d never know it by looking at his new contract with Japan’s Shikoku Island League.
The former MLB outfielder, who played in 12 All-Star games and won two World Series Championships throughout his major-league career, will reportedly be entitled to unlimited sushi as part of his new contract with the Kochi Island Fighting Dogs.
Ramirez, 44, first reached an agreement with the Fighting Dogs in January, but certain details of his contract were not made public until they were published online over the weekend.
In addition to Ramirez’s all-you-can-eat sushi, his contract also entitles him to several other perks, reports Yakyubd.com, via The Boston Globe. The swankiest among them include the use of a Mercedes, along with a driver, a private hotel suite during road games– and the option to skip practices whenever he wants.
Boing Boing just hipped me to these unusual women’s animal-themed underwear with ears! They’re adorable in an odd sort of way. I’m not sure they’d be everyday underwear.They come in a variety of different animals such as cats, foxes, pigs (my personal favorite), raccoons and squirrels.You can get them here for around $8.99 each. It looks like there’s limited stock on a few of these, so you may want to hurry if you just gotta have ‘em!
Source: 3D animal print underwear with EARS! | Dangerous Minds
People will use Siri to find almost anything. She just might not give them the right directions.
Apple’s voice-activated search function has been directing Toronto users who ask about prostitutes to a Little Italy bar that, owners say, is definitely not a place to find them.
Alvin Acyapan, co-owner of Meltdown eSports Bar on College St. near Ossington Ave., says he began receiving mysterious late night calls shortly after the establishment’s grand opening in November 2016.
Each time Acyapan answered, there was a voice on the other end, asking for an escort.
“I thought people were getting the wrong number or maybe it was a prank by someone listing our phone number on some unscrupulous website,” said Acyapan, whose personal cell phone doubles as the business’s main phone line.
Finally, on Sunday, a caller asking after “prostitutes” revealed that Siri had given him Acyapan’s number.
We can control a smartphone using our voice, why not the hackers? You might have read about voice commands neatly stuffed into YouTube videos can be used to take down a smartphone. They can do it in other different ways going beyond software. And their control powers are not limited to smartphones, but it can include Fitbit, toys, cars, or other things that house an accelerometer sensor.A team by Kevin Fu at the University of Michigan has devised a way to agitate the spring-suspended capacitive MEMS accelerometer of a device to make it think the device is in motion.Using correctly curated sound waves emitting from a speaker, they can control any app on the smartphone or another device. During their experiments, they made a FitBit band count steps while it was sitting peacefully at one place. They were also able to make a Galaxy S5 spell out the word WALNUT in the graph readings.
Source: Hackers Use $5 Speakers To Control Smartphone And Fitbit Using Sound Waves
Police in Poland have arrested 14 men and women who slaughtered a sheep and stripped naked at Auschwitz.
Their identities have not been confirmed, though it has been established that the activists comprised both Poles and foreigners. It’s been suggested they were protesting against the conflict in Ukraine.
According to reports, the men and women draped a white banner with the red text “love” over the gate and filmed the exercise with a drone.
Guards at the site, which is now a museum, immediately intervened and police said that all those involved had been detained. The museum was temporarily closed.
The remaining contestants on a reality television series have emerged after surviving 12 months in the Scottish wilderness — fending off hunger, infighting and fatigue — only to learn that the show stopped broadcasting after four episodes, the last of them in August.The show, “Eden,” was billed as a unique social experiment in which 23 men and women living in isolation “would take on the challenge of building a new life and creating a society from scratch,” according to a statement promoting the show.The contestants were taken to a 600-acre estate on the remote Ardnamurchan peninsula on the west coast of Scotland, which is known for its forests, lochs and beaches.But “Eden” proved to be anything but paradise.Over time, all but 10 contestants quit the show, The Press and Journal of Aberdeen, Scotland, reported. Those who left cited concerns about health and safety, boredom and swarms of tiny biting insects called midges.
A disrobed Maryland judge who ordered a bailiff to remotely shock a defendant in court with a 50,000-volt charge is now being sued on allegations of civil rights violations. While facing a weapons charge, the defendant was acting as his own attorney when then-Charles County Circuit Court Judge Robert Nalley ordered a deputy to remotely engage the man’s ankle-bound “stun cuffs” for about five seconds.
Courtroom video shows Delvon King—who despite the judge’s orders won’t stop talking—falling to the ground and screaming in pain during a hearing about what questions should be submitted to prospective jurors. According to the video of the 2014 episode, the judge told the courtroom deputy, “Mr. Sheriff do it, use it.”King then hit the floor and screamed in agony, according to the video.”All right we’re gonna take five and I’ll be back,” the judge said before he left the courtroom. All the while, King was on the ground and moaning.
Source: Judge who ordered man remotely shocked in court faces $5 million lawsuit | Ars Technica
When Boston plow truck drivers get to work clearing snow during tomorrow’s big storm, they’ll have some help—from Pornhub.
Pledging to assist anyone who “wants to get plowed,” the adult entertainment site says it is sending out a fleet of branded trucks to clean the city’s streets and parking lots for free.
“The Pornhub team understands that by this time of year, most cities have run up their budget in snow removal,” Pornhub Vice President Corey Price tells Boston, “and we thought we’d lend a hand in getting our fans plowed.”
The cheeky service, which is only being offered in Boston and New Jersey, is slated to begin when the flakes start falling overnight and continue for the duration of the storm, Price says. Each of the trucks—he says there are more than two dozen of them—will have the porn website’s black, white, and orange logo on their plows and doors.
Prosecutors are trying to pull data from 100 locked phones seized during arrests made in Washington on Inauguration Day, according to court papers filed Wednesday.The officials said they have search warrants to extract data from the phones, which were taken by law enforcement officers on Jan. 20 from 214 individuals arrested on felony rioting charges related to demonstrations protesting the inauguration of Donald Trump, according to a BuzzFeed report.The filing suggests that even though the phones are locked, prosecutors have copied data from them, although it doesn’t describe their methods. Prosecutors said in the filing they expect to “produce all of the data from the searched [phones] in the next several weeks.”Wednesday’s filing comes amid a mounting war of words between tech companies and policy makers, who contend that terrorist groups are benefiting from encryption, the technology that jumbles communications and files so that only the intended recipient can read them. Tech companies have become increasingly diligent about including encryption in products and services in the wake of revelations about US government surveillance programs from documents leaked by former NSA contractor Edward Snowden.
Source: Prosecutors hack phones seized in inauguration protests – CNET
Dogs are all honest, loyal and obedient, right? Well, not always. Our pets can be sneaky and manipulative when they want to maximise the number of tasty treats they get to eat.Marianne Heberlein, who studies dog cognition at the University of Zurich in Switzerland, wanted to test the animals’ ability to use deception to get what they want from humans.She got the idea to study doggie deception from watching her own dogs. One occasionally pretends to see something interesting in the backyard to trick the other into giving up the prime sleeping spot. “This sort of thing happens quite often, but it is not well studied,” she says.To see if dogs would deceive humans too, Heberlein and her colleagues paired various pooches with two partners – one who always gave the dog treats and another who always kept the treats.
Source: Dogs use deception to get what they want from humans (a sausage) | New Scientist
You can password protect an archive or zipped file. WinRAR, the go-to compression app for Windows users supports password protection. You can add a password to an archive when you create it. When you extract the archive, you will have to enter the password before you can get to the files inside. If you want to add a password to an existing WinRAR archive, you might think it’s impossible. The obvious way to add a password to an existing archive is extract and compress it again. You can add the password when you compress it. There is however a much easier way to add a password to an existing archive using WinRAR. You don’t need to extract it or anything. Here’s what you need to do.You need WinRAR installed on your system. Right-click an archive and select ‘Open with WinRAR’ from the context menu. Go to Tools>Convert archives. Alternatively, you can just tap Ctrl+Q.
Source: How To Add A Password To An Existing Archive
A company in the United Kingdom can transform chemicals found in oranges into the coveted flavor of grapefruit. By mixing the orange compounds with molecules made by living organisms, Oxford Biotrans creates natural flavors without having to ever crack open a grapefruit.And they’re not the only people using biology to make one natural ingredient out of another. Other companies are using microbes to forge scents and flavors normally found in roses and other plants or animals.“There’s a growing consumer preference for natural-labeled products,” says Jason King, CEO of Oxford Biotrans. “Companies want to be able to put goods on a shelf saying this product uses all natural flavorings.”Using biotechnology can meet some of this demand. But how does it work, and when can scientists do it? And what are natural flavors, anyway?
Source: What are the “natural flavors” in your food? Biotech is making the answer more complicated. | Popular Science
Easy Bake Ovens have changed a lot since you burnt down your house by installing a 100 Watt light bulb inside one. Now, Easy Bake Ovens are [bigclive] material. It’s a piece of nichrome wire connected through a switch across mains power. Part of the nichrome wire is a resistor divider used to power a light. This light assembly is just a LED, some resistors, and a diode wired anti-parallel to the LED.
This is a device designed for 120 V, but [Jason] wanted it to run on USB-C. While there are USB-C chargers that will supply enough power for an Easy Bake Oven, the voltage is limited to 20V. Rather than step up the USB-C voltage, [Jason] added some nichrome wires to divide it into six equal segments, then wired all the segments in parallel. This lowers the voltage by one sixth and increases the current by a factor of six. Good enough.
The power supply used for this hack is the official Apple 87W deal, with a USB-C breakout board (available on Tindie, buy some stuff on Tindie. Superliminial advertising) an Arduino Uno connected to the I2C pins. A few bits of code later, and [Jason] had a lot of power coming over a USB cable.