Security prompts don’t help you think, Tricoders are closer then you think, abandoned means abandoned with cool pictures, are people evil or stupid, how to pwn a browser, Mars photos, and more GeekNews.
Two weeks ago on Siri gets an alternative Lyft to Pi Energy GeekSpeak episode we talked a bit about wind energy, and I (Lyle) said a flippant remark about birds being killed. Here is my attempt to correct that mistake.
First off, a lot of birds are killed. Take a look at Do wind turbines kill birds
And also read National Geographic’s article Will Newer Wind Turbines Mean Fewer Bird Deaths?
The blue basin gets filled with rain water from larger collection barrels outside, or from the shower when the water is heating up.

Kaul was showing off the components of his entry in the Tricorder Xprize, the $10-million competition that requires teams to develop a sci-fi medical scanner worthy of Star Trek. Each device must be able to diagnose 15 different medical conditions and monitor vital signs for 72 hours.
Cloud DX was ready to unveil its prototype at SXSW, but all ten finalist teams must be nearly done tinkering with their devices. They
On March 19, the second day of the Hewlett-Packard Zero Day Initiative (ZDI) sponsored Pwn2Own hacking challenge at the CanSecWest conference in Vancouver, B.C., security researchers were able to successfully exploit Mozilla Firefox, Microsoft Internet Explorer, Google Chrome and Apple Safari.
An Adage that I endorse strongly.
Curiosity took full advantage of its state-of-the-art equipment to take the first ever billion-pixel panorama of its location, raw-colored (atop) and color-corrected.
What we think of as 3D printing, says Joseph DeSimone, is really just 2D printing over and over … slowly. Onstage at TED2015, he unveils a bold new technique
On-body detection uses the accelerometer in the phone to detect when it
On Tuesday, my personal account at GoDaddy was compromised. I knew it was coming, but considering the layered account protections used by the world’s largest domain registrar, I didn’t think my attacker would be successful.
I was wrong. He was able to gain control over my account within days, and all he needed to do was speak to customer support and submit a Photoshopped ID.
This episode of GeekSpeak was pre-recorded on March 23rd in Los Gatos, CA.