scorpions glow in the darkhttp://blogs.discovermagazine.com/notrocketscience/2011/12/23/why-do-scorpions-glow-in-the-dark-and-could-their-whole-bodies-be-one-big-eye/
The Contemporary Classical Composer's Bullshit Generatorhttp://www.dominicirving.com/temp/cccbsg.pl
BCC BCC BCC
New York Times national security reporter Jim Risen reported that in 2000, the CIA accidently exposed its entire network of Iranian contacts thanks to a boneheaded reply-all mishap.
More seriously, in what might be the biggest reply-all-FAIL of all time, a CIA agent accidentally emailed the agency’s entire spy network inside Iran in 2004, allowing a double agent to identify and then neutralize all the CIA’s snitches.http://www.guardian.co.uk/environment/2006/jan/05/energy.g2http://ethnographymatters.net/2011/11/23/data-conversations-can-ethnographers-do-numbers/
the future of drone warfarehttp://globalguerrillas.typepad.com/globalguerrillas/2011/12/drone-bonjwas.html
this was greathttp://cache.gawker.com/assets/images/io9/2011/12/rulesofmagic4.jpg
one approach to technology-oriented life skillshttp://www.kk.org/thetechnium/archives/2011/04/techno_life_ski.php
Don't agree with several points here, but several of these I'm ok with. http://www.forbes.com/sites/andygreenberg/2011/12/19/an-mit-magic-trick-computing-on-encrypted-databases-without-ever-decrypting-them/http://people.csail.mit.edu/nickolai/papers/raluca-cryptdb.pdf
An MIT Magic Trick: Computing On Encrypted Databases Without Ever Decrypting Them
CryptDB, a piece of database software the researchers presented in a paper (PDF here) at the Symposium on Operating System Principles in October, allows users to send queries to an encrypted set of data and get almost any answer they need from it without ever decrypting the stored information, a trick that keeps the info safe from hackers, accidental loss and even snooping administrators. And while it’s not the first system to offer that kind of magically flexible cryptography, it may be the first practical one, taking a fraction of a second to produce an answer where other systems that perform the same encrypted functions would require thousands of years.
John robb on darknetshttp://globalguerrillas.typepad.com/globalguerrillas/2011/12/the-proliferation-of-darknets.html
socializing with other people in the same room as opposed to onlinehttp://www.fastcompany.com/1800307/why-in-person-socializing-is-a-mandatory-to-do-item
post by friend about his and my new camerahttp://blog.paulcory.com/2011/12/lumix-dmc-lx5-for-strobist-work.html
A brilliantly done map of the USAhttp://www.slate.com/articles/arts/culturebox/2012/01/the_best_american_wall_map_david_imus_the_essential_geography_of_the_united_states_of_america_.single.html
how not to do a kickstarterhttp://a.wholelottanothing.org/2012/01/lessons-for-kickstarter-creators-from-the-worst-project-i-ever-funded-on-kickstarter.html
some of these are great (retro-styled movie posters)http://www.flickr.com/photos/8066505@N08/
don't make me do this, the equations screamedhttp://www.npr.org/blogs/krulwich/2012/01/10/144991340/don-t-make-me-do-this-the-equations-screamed
Basically, the obfuscated perl contest, with math.