Chris sez, "My name is Chris Peterson. I run web communications for MIT Admissions and have been a loyal BB reader for years.
For the last several years we have been sending our admitted students their acceptance letters in cardboard tubes. First because we sent a poster, but now it's its own thing.
2012 is the anniversary of an old MIT balloon hack, so we put a letter in all of the Early Action admit tubes telling them we wanted them to hack the tubes somehow, and set up http://hackthetubes.mitadmissions.org to collect responses.
Lots of them are great, but this one, from Erin King (MIT '16) in Georgia, is the best."
Update: Erin sez, "I goofed on my Erin king 'MIT admit letter in space' submission. She is 17. I plain forgot what year it was - been too buried in applications!!"
16 year old girl from Georgia launches her MIT acceptance letter into near space
It’s been seven years since we previewed Theft: A History of Music, a comic book that explains the complicated history of music, borrowing, control and copyright, created by a dynamic duo of witty copyright law professors from Duke University as a followup to the greatest law-comic ever published: the book was due out years ago, but the untimely and tragic death of illustrator Keith Aoki delayed it — until today.
Back in 2014, Google announced Project Ara, a click-in/click-out modular concept-phone that you could customize by adding or removing modules as you saw fit.
Announced today: So It Is, a new album of Cuban-inspired jazz from the monumentally amazing Preservation Hall Jazz Band (previously), due out on April 21. Available today: Santiago, an instrumental track from the album that will MAKE YOU DANCE.
Although there will never be a consensus about the best way to make coffee, any coffee connoisseur will agree that controlling the grind of your beans and balancing water temperature are the keys to a tasty cup. Since your plastic coffee pot doesn’t really allow for that kind of customization, going back to the French […]
Not all hackers are malicious information thieves—white-hat ethical hackers work with technology companies to ensure the security of their computer systems and user data. With all of today’s high-profile data breaches, ethical hackers are in considerable demand. To learn these critical skills and break into the high-paying cyber security field, try taking the courses in this […]
Making people aware of goods and services in the digital age requires an array of new strategies from social media and email to number-crunching tools like Google Analytics. To get a handle on the techniques used to capture attention and convert traffic into dollars in a crowded online environment, the Full-Stack Marketer Bundle offers 22 hours of training to get […]