This Canary Resuscitator was manufactured in the 1920s by Siebe Gorman and Co.; it was carried by miners to revive the canaries that were used from the late 19th century until 1987(!) as early-warning signals for potentially lethal gas leaks.
In Britain, most mines and all Mine Rescue Centres bred their own canaries. The birds were popular with miners, and they were often treated as pets. Following the introduction of electronic gas detectors in 1987, British mines phased out the use of canaries.
Rebecca’s Object of the Week [National Mining Museum]
Roll Sebastian Bergne's $3.33 pencil dice across the table to get a randomish value from 1-6. Useful for writing choose-your-own-adventures! (via Geekologie)
Louis Vuitton’s Windows CE gadget was a misstep. Pocket PCs were unpopular gadgets of questionable utility even in their day: obsolete in a heartbeat and now draped with the comical stink of Microsoft at its nadir. It hardly speaks to the timeless quality a luxury brand wants to conjure, even as a promotional stocking stuffer. […]
BeauHD, a Slashdot moderator, has Crohn's Disease, and he lives in an age of modern miracles, which means that he can have his small intestine surveyed by swallowing a tiny pill-sized camera, rather than having a scope threaded up his rectum or down his throat, or having his gut sliced open.
The Adobe Creative Cloud is home to a suite of editing tools today’s creatives count on to produce their content. Whether you’re an aspiring photographer, animator, or graphic designer, Adobe’s programs can help you in your creative pursuits, and with the Complete Adobe CC Training Bundle, you can come to grips with six of them for […]
Your pet might be photogenic, but getting them to stare long enough at your camera to snap that Instagram-worthy photo isn’t as simple as telling them to sit. Bribing your pets with their favorite treat, however, might just do the trick, and with the Adjustable Pet Selfie Smartphone Attachment, you can do just that while getting […]
The cybersecurity landscape is changing, and now one of the most effective ways to counter hacking threats is to employ another hacker against them. Commonly referred to as ethical hackers, these professionals use a cybercriminal’s tools against them, checking networks for vulnerabilities and patching them up before they can be exploited. The Certified Ethical Hacker Bootcamp […]