At long last, Asimov's Science Fiction Magazine is open to electronic submissions, as opposed to managing the mountains of paper that come into its NYC office every month. Asimov's gets vastly more submissions than it could ever publish, but the willingness to put a paper manuscript in the postal mail is not a good proxy for the ability to write a great story. Asimov's is the first of the big three (Asimov's, Analog and F&SF to open to electronic subs.
Artist David Bowen (previously) has produced a new video of his expanded tele-present wind project, where indoor plants in Spain are moved by an outdoor plant buffeted by winds in Minnesota.
Pioneering engineer Bill Atkinson was the lead designer/developer of the Apple Lisa graphical user interface, creator of MacPaint and QuickDraw, and part of the original team that developed the Apple Macintosh. In 1985, Atkinson dropped acid and came up with HyperCard, the groundbreaking multimedia authoring program that was really a precursor to the first Web […]
In Washington today, U.S. House Speaker Paul Ryan received a letter signed by 47 Senate Democrats and two independents calling on him to schedule a vote to keep Net Neutrality rules active. Under Trump’s FCC chief Ajit Pai, the Obama-era rules to help keep the internet free, fair, and equal will die next week.
The Adobe Creative Cloud is home to a suite of editing tools today’s creatives count on to produce their content. Whether you’re an aspiring photographer, animator, or graphic designer, Adobe’s programs can help you in your creative pursuits, and with the Complete Adobe CC Training Bundle, you can come to grips with six of them for […]
Your pet might be photogenic, but getting them to stare long enough at your camera to snap that Instagram-worthy photo isn’t as simple as telling them to sit. Bribing your pets with their favorite treat, however, might just do the trick, and with the Adjustable Pet Selfie Smartphone Attachment, you can do just that while getting […]
The cybersecurity landscape is changing, and now one of the most effective ways to counter hacking threats is to employ another hacker against them. Commonly referred to as ethical hackers, these professionals use a cybercriminal’s tools against them, checking networks for vulnerabilities and patching them up before they can be exploited. The Certified Ethical Hacker Bootcamp […]