Today in my ongoing series of photos from my travels over the years: a coiled cable-keeper in a shop in Melbourne (though the coil bore a label saying MADE IN USA). The cable came down from the ceiling to the cash-register, protecting the Ethernet cable that ran down from a drop-ceiling. I've been responsible for more than my share of truly ugly cable-runs with sudden drops in the middle of the room where the data needed to be -- a handsome little gizmo like this could have made my fugly hacks into decor.
Back in 2014, Google announced Project Ara, a click-in/click-out modular concept-phone that you could customize by adding or removing modules as you saw fit.
M. David Weisman, a magistrate judge in Illinois’s Eastern Division, denied a federal warrant application that would have allowed law enforcement officers to force suspects to unlock their mobile devices with a fingerprint, ruling that the suspects’ Fourth Amendment (undue search and seizure) and Fifth Amendment (self-incrimination) rights protected them from being forced to unlock […]
Elenco’s Night ‘n Day Mechanical Globe uses a system of translucent, exposed gears to rotate an internally illuminated globe that displays the seasonally adjusted, real-time night/day terminator as it spins.
DJI is the world’s leading designer and producer of easy-to-fly drones and aerial photography systems. If you’re a drone enthusiast, you want a DJI. If you know absolutely nothing about drones and think they’re weird, if you win a DJI you’re going to become a drone enthusiast.Enter this giveaway (for free, yes) and you’ll get a […]
Although there will never be a consensus about the best way to make coffee, any coffee connoisseur will agree that controlling the grind of your beans and balancing water temperature are the keys to a tasty cup. Since your plastic coffee pot doesn’t really allow for that kind of customization, going back to the French […]
Not all hackers are malicious information thieves—white-hat ethical hackers work with technology companies to ensure the security of their computer systems and user data. With all of today’s high-profile data breaches, ethical hackers are in considerable demand. To learn these critical skills and break into the high-paying cyber security field, try taking the courses in this […]