What happens these days when a photographer's photo inadvertently shoulder-surfs your phone screen? If you're a politician and the content vaguely resembles porn, internet sleuths are on the case. In one case this week, depending on your point of view, the results were a disappointment or a relief.
It all started with a now-deleted Tweet, as Sam Haysom reports:
In yet more evidence that crowdsourcing works, it took a few hundred retweets and a few hours for the answer to emerge:
Turns out is was possible FBI snitch Gordon Parks! Checkmate, politician!
• Blurry, fleshy-looking pic on politician's phone sparks Twitter search (Mashable)
Piers attempts to embarrass UK reality TV star Hayley of “Love Island” by asking her, “Do you know Pythagoras’s theorem to the nearest five decimal place?” Um… wut?
I didn’t bother to watch any of the NBA championship series but I was glued to the screen for this Bad Lip Reading of the 2017-2018 pro basketball season.
A physics student and an engineering student from Stanford fed 400,000 memes to a Long Short-Term Memory Recurrent Neural Network and asked it to generate more memes of its own.
The Adobe Creative Cloud is home to a suite of editing tools today’s creatives count on to produce their content. Whether you’re an aspiring photographer, animator, or graphic designer, Adobe’s programs can help you in your creative pursuits, and with the Complete Adobe CC Training Bundle, you can come to grips with six of them for […]
Your pet might be photogenic, but getting them to stare long enough at your camera to snap that Instagram-worthy photo isn’t as simple as telling them to sit. Bribing your pets with their favorite treat, however, might just do the trick, and with the Adjustable Pet Selfie Smartphone Attachment, you can do just that while getting […]
The cybersecurity landscape is changing, and now one of the most effective ways to counter hacking threats is to employ another hacker against them. Commonly referred to as ethical hackers, these professionals use a cybercriminal’s tools against them, checking networks for vulnerabilities and patching them up before they can be exploited. The Certified Ethical Hacker Bootcamp […]