Latest bookmarks (page 41 of 95)
5 Apr
spectrum.ieee.org
"when the eye starts to blink, the tear electrolytes meet the magnesium anode, causing an oxidation reaction and the generation of electrons. Finally the tear electrolytes come into contact with both an anode and the platinum cathode, creating more energy through further oxidation on the surface of the anode and oxygen reduction on the surface of the cathode."
(use cases: detecting glaucoma or diabetes, augmented reality displays, delivering medication to the eye, etc)
(use cases: detecting glaucoma or diabetes, augmented reality displays, delivering medication to the eye, etc)
4 Apr
cohost.org
"The situation with online persistent 3D/VR worlds ("metaverses") is basically that we currently have AOL, Compuserve, Prodigy and GEnie and we are waiting for someone to invent the web browser."
3 Apr
www.rfc-editor.org
"FLIP provides a way to avoid congestion, enhance security, and deliver faster packets on the Internet by using AI to predict future packets at the receiving peer before they arrive."
3 Apr
www.uncannymagazine.com
"The thirty-third annual convention for the Lefthand Metro Worm Cosplayers Club was, not surprisingly, ruined by drama."
Set on the world of The Terraformers after the intelligent worms learn to communicate.
Set on the world of The Terraformers after the intelligent worms learn to communicate.
3 Apr
dead.garden
Interesting post on the different levels of interaction in email, webmentions, comments and social networks
3 Apr
www.washingtonpost.com
"The answer includes Benjamin Franklin, Mutiny on the Bounty and centuries of records."
2 Apr
lutrasecurity.com
"This attack is possible because most email clients allow CSS to be used to style HTML emails. When an email is forwarded, the position of the original email in the DOM usually changes, allowing for CSS rules to be selectively applied only when an email has been forwarded.
An attacker can use this to include elements in the email that appear or disappear depending on the context in which the email is viewed. Because they are usually invisible, only appear in certain circumstances, and can be used for all sorts of mischief, I’ll refer to these elements as kobold letters, after the elusive sprites of mythology."
An attacker can use this to include elements in the email that appear or disappear depending on the context in which the email is viewed. Because they are usually invisible, only appear in certain circumstances, and can be used for all sorts of mischief, I’ll refer to these elements as kobold letters, after the elusive sprites of mythology."
1 Apr
www.computerworld.com
"Today's tools may be more powerful, but many lack some useful features of their forebears. In the world before popular and simple displaced complex and useful there were such things as clicky keyboards with programmable function keys, text editors would bend to your will, and scrollbars could do more than just drag."