background preloader

Interesting Stuff

Facebook Twitter

Setting book lists. Barry Martin's Hopalong Orbits Visualizer - WebGL Experiment. The Scale of the Universe 2. Rock Paper Scissor Necklace by TheBowedArrow. Barry Martin's Hopalong Orbits Visualizer - WebGL Experiment. Pointer Pointer by @StudioMoniker. A Grand Unified Theory of Pixar. Courtesy of Pixar Back in July, Jon Negroni went down an animated wormhole with his Grand Unified Theory of Pixar, an absurdly close reading of the studio’s canon that weaves together each of its 14 feature films to create a world that stretches several thousand years into the future only to eventually loop back upon itself. Negroni has condensed his original theory for Slate. (A longer version of this article originally appeared on Negroni's personal blog.) The Grand Unified Theory of Pixar is a long tale, spanning centuries, of a struggle for the domination of Earth among humans, animals with humanlike consciousness, and sentient inanimate objects—AI machines.

The theory begins and ends with Brave, the studio’s 13th feature film and one that falls at the very beginning of the animated universe’s chronology as we know it. 1. This is a world with magic. 2. So, what happens to the animals that the witch experiments on? This marks the beginning of the rise of the AI machines. Tap code. The tap code, sometimes called the knock code, is a way to encode messages, letter by letter, in a very simple way and transmit it using a series of tap sounds, hence its name. It has been commonly used by prisoners to communicate with each other. The method of communicating is usually by "tapping" either the metal bars, pipes or the walls inside the cell.

Design[edit] The tap code is based on a Polybius square, a 5×5 grid of letters representing all the letters of the Latin alphabet, except for K, which is represented by C. Each letter is communicated by tapping two numbers: the first designating the row (horizontally) and the second designating the column (vertically). Or to communicate the word "water", the cipher would be the following (the pause between each number in a pair is smaller than the pause between one pair and the next): History[edit] The origins of this encoding go back to the Polybius square of Ancient Greece. References[edit] External links[edit] - StumbleUpon.

MR01001101 :: cryptography steganography resources and challenges. CrackingCreditCode.jpg (JPEG Image, 600x1708 pixels) Would Wiretapping Laws Spell the End of Quantum Encryption?: Scientific American. The nascent industry of quantum communications could suffer a fatal blow if the U.S. enacts sweeping new regulations to provide wiretapping access to law enforcement. The weirdness of quantum mechanics makes it possible for two parties to share an encryption key and be sure that no one else can copy it. Any attempt to eavesdrop on the communication of the quantum key would irreversibly disturb its quantum state, thus revealing that the channel is being wiretapped. In recent decades, the development of quantum communication and encryption has motivated significant advances in basic research in mathematics, physics and engineering.

The first of such futuristic systems are already commercially available and have been installed by a few banks and government agencies. The New York Times now reports that the U.S. government is seeking to establish new regulations that would outlaw encryption systems that don’t provide a built-in way for a third party to intercept and decrypt the data. How to use Google for Hacking. | Arrow Webzine. Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed.

In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google. 1. Hacking Security Cameras There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time. Inurl:”viewerframe? Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. you now have access to the Live cameras which work in real-time. Intitle:”Live View / – AXIS” 2. 3. . “? 4. Gadgets. SOOOOooo…yes I know that is all grammatically incorrect and yes I am a TEACHER!

AHHHhhhh! Anyways, usually most people don’t worry too much about grammar when we are communicating what we might say in person to someone else in writing on the internet, not a term paper. Have you read a published book with dialog in it? I thought the internet was a place for freedom of expression? ANYWAYS, a lot of this commentating explains a lot about human interaction in general to me. Why are we so defensive? I am predicting either someone will come back with another insult to this or ignore it altogether because they aren’t sure what I am talking about….oooorrr we could start an equally engaging conversation and discussion (not argument) about what we think about all this wonderfully engaging art!

Every one have a blessed day or at least a better one than some of the above appears to be having. Which also applies to the next comment from my fellow American, as well. Pizza Vending Machine Video - 5min.com. This Awesome Urn Will Turn You into a Tree After You Die | Design for Good. You don't find many designers working in the funeral business thinking about more creative ways for you to leave this world (and maybe they should be). However, the product designer Gerard Moline has combined the romantic notion of life after death with an eco solution to the dirty business of the actual, you know, transition. His Bios Urn is a biodegradable urn made from coconut shell, compacted peat and cellulose and inside it contains the seed of a tree.

Once your remains have been placed into the urn, it can be planted and then the seed germinates and begins to grow. You even have the choice to pick the type of plant you would like to become, depending on what kind of planting space you prefer. I, personally, would much rather leave behind a tree than a tombstone. 201011191019.jpg (442×700) THIS DAY. Music-Map - The tourist map of music - StumbleUpon. Airplane Travel Tips - 100 Words or Less - Gadling. Don't take sleep aids until you're in the air - Airplane tip by Melanie Linn Gutowski (RSS feed) on Aug 9th, 2010 at 11:16AM Though it may seem appealing to sleep through those long waits on the tarmac, avoid the temptation to take a sleep aid until you're up in the air.

You may miss important announcements, or, worse yet, you may be asked to disembark and wait for a later plane. If you plan to take a sleep aid, be sure to take a seat where you are less likely to block in other passengers, like a window seat or a middle seat. Your fellow passengers don't want to climb over your dead weight in the middle of the night. [Photo: Flickr | mirjoran] Swap shelves in airport bookstores - Airplane tip by Erin Frank (RSS feed) on Aug 9th, 2010 at 10:16AM I've been noticing swap shelves in airport bookstores lately.

A few airports, like Portland International, have used bookstores where someone has undoubtedly just sold back that bestseller you wanted, and you can pick it up for less than full price. Hi. Day Of The Week. 6174 (number) 6174 is known as Kaprekar's constant[1][2][3] after the Indian mathematician D. R. Kaprekar. This number is notable for the following property: Take any four-digit number, using at least two different digits. (Leading zeros are allowed.)Arrange the digits in ascending and then in descending order to get two four-digit numbers, adding leading zeros if necessary.Subtract the smaller number from the bigger number.Go back to step 2. 9990 – 0999 = 8991 (rather than 999 – 999 = 0) 9831 reaches 6174 after 7 iterations: 8820 – 0288 = 8532 (rather than 882 – 288 = 594) 8774, 8477, 8747, 7748, 7487, 7847, 7784, 4877, 4787, and 4778 reach 6174 after 4 iterations: Note that in each iteration of Kaprekar's routine, the two numbers being subtracted one from the other have the same digit sum and hence the same remainder modulo 9.

Sequence of Kaprekar transformations ending in 6174 Sequence of three digit Kaprekar transformations ending in 495 Kaprekar number Bowley, Rover. "6174 is Kaprekar's Constant". Learn how to throw lethal playing cards - The Blogs at HowStuffWorks. If you watch the following video, you will be able to see one of the world’s leading card-throwing experts practicing his craft.

With a business card and a flick of his wrist he can pop balloons, extinguish candles, hit targets, etc.: Around the 50-second point, you will also see him impale a tomato with a business card. This is where the lethality comes in. The art of deadly card throwing was first popularized (as far as I know) by a performer named Gallagher, who could dismantle a watermelon with playing cards. Around 3:15, Rick Smith demonstrates his technique very quickly. How to throw cards fast and effectively !!!!! See also: If you need a source of cheap playing cards, check out the dollar store – two decks for a buck. One level up from card throwing is knife throwing: - the fastest knife thrower in the world - How to throw knives [[[Jump to previous How To - How to blow your money if you are super-wealthy]]]

The Official Tim Burton Website. You've been tagged! How to Play Turning Tables By Adele. Human World. Human World The women of the Tiwi tribe in the South Pacific are married at birth. When Albert Einstein died, his final words died with him. The nurse at his side didn't understand German. St Patrick, the patron saint of Ireland, was not Irish. The lance ceased to be an official battle weapon in the British Army in 1927. St. Many sailors used to wear gold earrings so that they could afford a proper burial when they died. Some very Orthodox Jew refuse to speak Hebrew, believing it to be a language reserved only for the Prophets. A South African monkey was once awarded a medal and promoted to the rank of corporal during World War I.

Born 4 January 1838, General Tom Thumb's growth slowed at the age of 6 months, at 5 years he was signed to the circus by P.T. Because they had no proper rubbish disposal system, the streets of ancient Mesopotamia became literally knee-deep in rubbish. The Toltecs, Seventh-century native Mexicans, went into battle with wooden swords so as not to kill their enemies. TED: Ideas worth spreading. Webexhibits.

A Supercut Of People Saying Silence! In Movies. Short Film of the Day: Stuxnet: Anatomy of a Computer Virus. Why Watch? Because we should challenge how we define a film. Most of the shorts featured in this column are either easy to spot as stories or completely experimental. Even when a documentary short is in the spotlight, it tells a clear tale of people doing things.

This short, is none of those things. Stuxnet: Anatomy of a Computer Virus is an informational film made entirely of voice over narration and motion graphics. It’s distilled knowledge about a new weapon that might be threatening a governmental computer near you, but it raises the same questions that all documentaries do. It’s beautiful, compelling, and it does tell a story, but it’s nothing like most short films. What does it cost? Check out Stuxnet: Anatomy of a Computer Virus for yourself: Trust us.