ic

Water catchment home in Africa wins special recognition

A water catchment house design in Africa won Special Recognition in the Architectural Design category at the Design Educates Awards 2023. The design by Hong-En, Lin addresses the challenges of water scarcity and pollution in Africa by using local materials and traditional weaving techniques to create a clean and sustainable water source.[...]




ic

Is your farmers market produce really organic?

You shop local and buy organic when you can, but how can you tell if your farmers market produce is really organic? There have been a few scandals in recent years where farmers market vendors were found to be purchasing and reselling grocery store produce labeled as locally grown. So how can you tell? Here's how to find a great farmers market vendor or food co-op for organic produce.[...]





ic

Would you work at this all-timber Amsterdam office?

You probably spend more time at work than you spend at home. When you consider the amount of time you spend just sleeping when you're at home, you really do spend more quality time in the workplace on a lot of days. So shouldn't you be working in a healthy, beautiful and inspiring workspace?[...]




ic

Helpful and easy tips for a pest-free organic garden

From droughts to flooding and heat waves, the weather has been tough all across the country recently. Did you know that pests can significantly reduce your garden yield? According to the Connecticut State Agricultural Experiment Station, you could be dealing with several kinds of pests that drastically impact your garden. [...]




ic

How the endangered American chestnut is making a big return

The American chestnut was all but destroyed by fungal blight and logged as settlements spread west when the United States was settled by Europeans. But lately, it's making a comeback. Endangered for years, the American chestnut is now being appreciated for its many helpful characteristics in cultivated permaculture gardens and its value as a historical tree that anchored entire ecosystems. Americans are embracing the great chestnut like never before. [...]




ic

Buzzfeed Tasty clean ceramic cookware is now sold at Walmart

Buzzfeed Tasty food site is filled with easy recipes and videos to whip up an incredible meal. In fact, during the height of the pandemic lockdown, when many people were taking care of plants and baking bread, I followed their guide to making sourdough bread from scratch. Expanding from their brand, Tasty also has cookbooks and cookware, the latest being a 16-piece cookware set sold at Walmart. [...]




ic

Hidden Garden House showcases a design dictated by nature

Today's architecture is no longer about creating the best space just for humans, though of course that has to be a factor. It's also about preserving and living in harmony with the natural world. But being harmonious with nature presents a unique set of challenges. The Hidden Garden House by RAD+ar (Research Artistic Design + Architecture) is a showcase of creative and innovative solutions for just such a challenge.[...]




ic

The first agricultural community of its kind in Ontario

Humans living in harmony with nature and with each other is really the goal of sustainable, environmentally-friendly design. And it is hardly a hip and modern idea, not unless you think the Stone Age is trendy. Long ago, people banded together in groups to live and work together as one community, rather than as individuals. Now, Castlepoint Numa is bringing this ancient idea into the modern era with an innovative design.[...]




ic

Biophilic building enhances biodiversity in the neighborhood

Kaiserstraße is a new residential building currently under construction in Blumenau, Brazil. The project is designed by Alencar Arquitetura and aims to harness connections between residents and the natural world.[...]




ic

Travel to the ancient beauty of Machu Picchu, Peru

Our group sat in a circle at a 15th century Inca site. We each held three coca leaves glued together with llama fat and concentrated on protection, prosperity and a balanced life. A young shaman named Lucas alternately prayed in Quechua and explained things to us in Spanish, both translated by our guide Wilfredo Huillca. The shaman added quinoa, corn, confetti and other symbolic items to Pachamama, the Andean earth mother. Fortunately, modern rituals substitute animal cookies for alpaca sacrifices.[...]




ic

A Connecticut home with a green roof and minimal site impact

Meeting the challenge to gently place a home into a valley below the access road and adjacent to a scenic river, Weston Residence is both a primary residence and an award-winning example of minimal site impact architectural design. [...]




ic

Never Discuss Politics At Family Reunions

divine creation evolution discussing politics during a family reunion is never a good idea




ic

Neither Edwin nor Lucinda wanted to be the first to admit they couldn't see a thing in the magic eye picture




ic

Episode 771 - Nice and quiet

In this episode I'm joined Charles Watts to chat about how nice and quiet it is after Arsenal's 6-0 on Sunday, before we shoot the breeze about peaking in the second half of the season, the importance of getting injured players back to compete domestically and in Europe, Bukayo Saka's incredible output and the definition of 'world class', the stable environment at the club right now, Ivan Toney, the impending arrival of Kylian Mbappe to North London, and lots more.


Here's the Sky Sports article we reference: https://www.skysports.com/football/news/11670/13071635/bukayo-saka-reaches-half-century-for-arsenal-with-more-goals-and-assists-than-cristiano-ronaldo-in-first-210-games


Follow Charles @charles_watts


Get extra bonus content and help support Arseblog by becoming an Arseblog Member on Patreon: https://www.patreon.com/arseblog



Hosted on Acast. See acast.com/privacy for more information.




ic

Episode 781 - Antics

In this episode I'm joined by Sam Dean to chat about Ben White and the focus on his 'antics' from corners. Why the focus now? Will it force him and Arsenal to modify behaviour from set-pieces? And does it obscure discussion of his outstanding quality and consistency as a footballer? We also talk about Gabriel Jesus amid reports around his future, Oleksandr Zinchenko perhaps being more 'at risk' of a departure, the new contract offered to Jorginho and what that means for the summer, as well as chat about proposed new financial rules in the Premier League, games being held in the US, and lots more – including details of our donation to UNICEF.


Follow Sam @samjdean


Get extra bonus content and help support Arseblog by becoming an Arseblog Member on Patreon: https://www.patreon.com/arseblog



Hosted on Acast. See acast.com/privacy for more information.




ic

Arsenal Women Arsecast 91: Leicester 0-1 Arsenal

In this episode of the Arsenal Women Arsecast, Tim and Jamie talk about Arsenal’s 1-0 win over Leicester at the King Power. Tim and Jamie discuss a rotated starting line-up, how much the packed early season schedule contributed to a leggy performance, whether the game can be taken in isolation or whether concerns about the attack in particular persist and the performances of Daphne van Domselaar, Alessia Russo, the midfield partnership of Lia Walti and Kyra Cooney-Cross, defensive injuries and a lack of creativity without Mariona and Kafaji starting the game.


Get extra bonus content and help support Arseblog by becoming an Arseblog Member on Patreon: https://www.patreon.com/arseblog




Hosted on Acast. See acast.com/privacy for more information.




ic

Episode 806 - Change the dynamic

In this episode I'm joined by Phil Costa to look back at our 1-0 defeat to Inter Milan in the Champions League. Another loss is frustrating, but were there signs of improvement from the Arsenal attack last night? We analyse that, taking into context the quality of the opposition, while acknowledging things aren't exactly fluent at this moment in time. We wonder how Mikel Arteta might change the dynamic, and chat about some of the key moments in the game, from second half chances to two penalty decisions in the first half that went a long way to deciding the result. There's also discussion of Mikel Merino, Ethan Nwaneri, Raheem Sterling, and lots more.


Get extra bonus content and help support Arseblog by becoming an Arseblog Member on Patreon: https://www.patreon.com/arseblog



Hosted on Acast. See acast.com/privacy for more information.




ic

VISOVASO Ceramic Vase by Jimmy Lanza

Here's a vase that's sure to be a conversation piece for your next family gathering. Just put it at the center of the dinner table, and make sure that the face is pointing towards the person you love the most. Or the least. We're not sure.

Check out VisoVaso, handmade ceramic vase by Italian artist Jimmy Lanza over at his Instagram page.




ic

Would You Let Your Child Ride in a Classic Car?

Car manufacturers have made great strides in automobile safety in the last few decades. When I was a child, my family drove everywhere in a Volkswagen Beetle or a Microbus that didn't have seatbelts. Nor did they have crumple zones, antilock brakes, or airbags. Riding in the bed of a pickup truck was a regular experience. Fifty years later, my oldest child wanted to get a classic Beetle, but was dissuaded when my brother called them "death traps." Now she has children, and purchased an SUV the size of a tank to keep the kids safe.

The newer a car is, the safer it will be, but when does that become overkill? We know large SUVs are safer for the occupants, yet more dangerous for others around them. We also know that accidents can happen anywhere, but deadly accidents are more likely at high speeds on highways than a short trip to school. And we know that children learn situational awareness and how to test their limits and manage their fears by being in slightly unsafe situations, such as old-fashioned playgrounds. Today, we have young adults who are terrified at the idea of learning to drive.

Jason Torchinsky at Autopian asked reader's opinions on letting their child ride in a classic car such as the original Volkswagen Beetle, and got plenty of replies about how much automotive safety is enough, from farm kids who drove tractors at a young age to ultimate safety advocates. The best comment: "Being unsafe in a car was how I got kids in the first place."




ic

Scientific Replication is Harder Than YouThink -and Can Be Hilarious

Science experiments are not considered completely valid unless they can be replicated. Replicating an experiment is pretty much impossible unless you've been steeped in the various factors of scientific theory. And even if you are thoroughly trained in those factors, it's easy to lose track when you're doing a casual experiment at home. That goes double when your aim is to debunk something that you find obviously wrong.

Sage the Bad Naturalist jumped into such a debunking experiment with both feet, and then got entangled in them. She spent an entire year trying to replicate a dubious TikTok, which turned into an embarrassing adventure in how not to do science. But negative results are still results, and the goal of science is always to learn something. She bravely admits all the things she did wrong, because scientists have to have humility to be accepted. What's funniest is how many things went wrong, and how they all piled up to the end. What she ended up with is an amusing and rather charming video on the dangers of throwing your heart (and time) into debunking something you saw on the internet. -via Metafilter




ic

Michelangelo Depicting Breast Cancer

Nightis a sculpture on the tomb of Giuliano de Medici, the Duke of Urbino, in the city of Florence. Michelangelo carved it between 1526 and 1531 and composed these lines to place in the mouth of this personification of the night:

Precious is sleep, better to be of stone,
while the oppression and the shame still last;
not seeing and not hearing, I am blest;
so do not wake me, hush! keep your voice down

In a 2000 letter to the New England Journal of Medicine, James J. Stark and Jonathan Katz Nelson argue that the model that Michelanglo used likely had advanced breast cancer. Her left breast has lumps indicative of a tumor in the nipple or the lymphatics beneath the nipple. As these shapes are not present in the other female breasts that Michelanglo composed, it's likely that this shape reflects, tragically, the model herself.

-via TYWKIWDBI






ic

Drink of the Day: The Trump Tower Martini That Put Twitter on Ice And Weirded Everybody Out




ic

2,600-year-old Celtic wooden burial chamber of 'outstanding scientific importance' uncovered by archaeologists in Germany

The discovery of an impeccably preserved Celtic burial chamber in southern Germany is a "stroke of luck for archaeology," scientists say.




ic

Pando, the world's largest organism, may have been growing nonstop since the 1st humans left Africa, study suggests

The clonal quaking aspen known as Pando is between 16,000 and 80,000 years old.




ic

01 – The Internet Musician – Podcast Launch and Describing Your Music

Welcome to the first episode of the Internet Musician Podcast! Show notes for Episode #1: Subscribe to the Internet Musician Podcast with iTunes: The first episode of The Internet Musician Podcast, hosted by indie artist and internet music marketing junkie Brian Hartzog (http://www.brianhartzog.net).  In this introductory episode, Brian introduces himself, his indie music credentials and […]



  • Podcast
  • describe your music
  • internet music promotion
  • music marketing podcast
  • promotion your music on the internet
  • The Internet Musician Podcast

ic

02 – The Internet Musician – Music Tools for the Indie Artist/Songwriter

Show notes for Episode #2: Subscribe to the Internet Musician Podcast with iTunes: In this episode, I present “Music Tools for the Indie Artist”, a topic that I recently presented to a local songwriting group.  Specifically, I present the tools and process I use to capture and preserve those moments of musical inspiration–no matter whether they strike […]




ic

03 – The Internet Musician – Five Things You Must Believe To Go Indie

Show notes for Episode #3: Subscribe to the Internet Musician Podcast with iTunes: Also in this episode, I discuss the five things you must believe cultivate your DIY music attitude, including: 1. The business has been lying to you. Major label artists are not getting rich off of record sales. Radio is fake. Don’t belive […]



  • Podcast
  • DIY music attitude
  • internet musician podcast
  • music marketing on the internet

ic

04 – The Internet Musician – 8 Steps to Create a Music Website

Show Notes for Episode 4: Subscribe to the Internet Musician Podcast with iTunes: As a musician, you need a good website.  You know that. But you really don’t need to spend years trying to understand the technology. You also don’t want to spend tons of time working on your site without knowing if you’re doing things […]



  • Podcast
  • create a music website
  • create a website
  • music website design

ic

06 – The Internet Musician – Music Licensing for Indie Artists

Show Notes for Episode 6: Following my recent appearance on the Film and TV Music Licensing Panel at the MidAtlantic Music Conference here in Charlotte, NC, I definitely have music licensing on my mind.  It’s always been a passion of mind…one of those areas of music marketing that I’ve researched exhaustively for years.  It’s also […]




ic

Stop LUCR-3 Attacks: Learn Key Identity Security Tactics in This Expert Webinar

Did you know that advanced threat actors can infiltrate the identity systems of major organizations and extract sensitive data within days? It’s a chilling reality, becoming more common and concerning by the day. These attackers exploit vulnerabilities in SaaS and cloud environments, using compromised identities to move laterally within networks, causing widespread damage. Cybersecurity and IT




ic

New FakeCall Malware Variant Hijacks Android Devices for Fraudulent Banking Calls

Cybersecurity researchers have discovered a new version of a well-known Android malware family dubbed FakeCall that employs voice phishing (aka vishing) techniques to trick users into parting with their personal information. "FakeCall is an extremely sophisticated Vishing attack that leverages malware to take almost complete control of the mobile device, including the interception of incoming




ic

THN Recap: Top Cybersecurity Threats, Tools, and Practices (Oct 28 - Nov 03)

This week was a total digital dumpster fire! Hackers were like, "Let's cause some chaos!" and went after everything from our browsers to those fancy cameras that zoom and spin. (You know, the ones they use in spy movies? ????️‍♀️) We're talking password-stealing bots, sneaky extensions that spy on you, and even cloud-hacking ninjas! ???? It's enough to make you want to chuck your phone in the ocean.




ic

German Police Disrupt DDoS-for-Hire Platform dstat[.]cc; Suspects Arrested

German law enforcement authorities have announced the disruption of a criminal service called dstat[.]cc that made it possible for other threat actors to easily mount distributed denial-of-service (DDoS) attacks. "The platform made such DDoS attacks accessible to a wide range of users, even those without any in-depth technical skills of their own," the Federal Criminal Police Office (aka




ic

Critical Flaws in Ollama AI Framework Could Enable DoS, Model Theft, and Poisoning

Cybersecurity researchers have disclosed six security flaws in the Ollama artificial intelligence (AI) framework that could be exploited by a malicious actor to perform various actions, including denial-of-service, model poisoning, and model theft. "Collectively, the vulnerabilities could allow an attacker to carry out a wide-range of malicious actions with a single HTTP request, including




ic

Synology Urges Patch for Critical Zero-Click RCE Flaw Affecting Millions of NAS Devices

Taiwanese network-attached storage (NAS) appliance maker Synology has addressed a critical security flaw impacting DiskStation and BeePhotos that could lead to remote code execution. Tracked as CVE-2024-10443 and dubbed RISK:STATION by Midnight Blue, the zero-day flaw was demonstrated at the Pwn2Own Ireland 2024 hacking contest by security researcher Rick de Jager. RISK:STATION is an "




ic

New Android Banking Malware 'ToxicPanda' Targets Users with Fraudulent Money Transfers

Over 1,500 Android devices have been infected by a new strain of Android banking malware called ToxicPanda that allows threat actors to conduct fraudulent banking transactions. "ToxicPanda's main goal is to initiate money transfers from compromised devices via account takeover (ATO) using a well-known technique called on-device fraud (ODF)," Cleafy researchers Michele Roviello, Alessandro Strino




ic

FBI Seeks Public Help to Identify Chinese Hackers Behind Global Cyber Intrusions

The U.S. Federal Bureau of Investigation (FBI) has sought assistance from the public in connection with an investigation involving the breach of edge devices and computer networks belonging to companies and government entities. "An Advanced Persistent Threat group allegedly created and deployed malware (CVE-2020-12271) as part of a widespread series of indiscriminate computer intrusions designed




ic

Google Cloud to Enforce Multi-Factor Authentication by 2025 for All Users

Google's cloud division has announced that it will enforce mandatory multi-factor authentication (MFA) for all users by the end of 2025 as part of its efforts to improve account security. "We will be implementing mandatory MFA for Google Cloud in a phased approach that will roll out to all users worldwide during 2025," Mayank Upadhyay, vice president of engineering and distinguished engineer at




ic

INTERPOL Disrupts Over 22,000 Malicious Servers in Global Crackdown on Cybercrime

INTERPOL on Tuesday said it took down more than 22,000 malicious servers linked to various cyber threats as part of a global operation. Dubbed Operation Synergia II, the coordinated effort ran from April 1 to August 31, 2024, targeting phishing, ransomware, and information stealer infrastructure. "Of the approximately 30,000 suspicious IP addresses identified, 76 per cent were taken down and 59




ic

Winos 4.0 Malware Infects Gamers Through Malicious Game Optimization Apps

Cybersecurity researchers are warning that a command-and-control (C&C) framework called Winos is being distributed within gaming-related applications like installation tools, speed boosters, and optimization utilities. "Winos 4.0 is an advanced malicious framework that offers comprehensive functionality, a stable architecture, and efficient control over numerous online endpoints to execute




ic

VEILDrive Attack Exploits Microsoft Services to Evade Detection and Distribute Malware

An ongoing threat campaign dubbed VEILDrive has been observed taking advantage of legitimate services from Microsoft, including Teams, SharePoint, Quick Assist, and OneDrive, as part of its modus operandi. "Leveraging Microsoft SaaS services — including Teams, SharePoint, Quick Assist, and OneDrive — the attacker exploited the trusted infrastructures of previously compromised organizations to




ic

Malicious PyPI Package ‘Fabrice’ Found Stealing AWS Keys from Thousands of Developers

Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) that has racked up thousands of downloads for over three years while stealthily exfiltrating developers' Amazon Web Services (AWS) credentials. The package in question is "fabrice," which typosquats a popular Python library known as "fabric," which is designed to execute shell commands remotely over




ic

Cisco Releases Patch for Critical URWB Vulnerability in Industrial Wireless Systems

Cisco has released security updates to address a maximum severity security flaw impacting Ultra-Reliable Wireless Backhaul (URWB) Access Points that could permit unauthenticated, remote attackers to run commands with elevated privileges. Tracked as CVE-2024-20418 (CVS score: 10.0), the vulnerability has been described as stemming from a lack of input validation to the web-based management




ic

SteelFox and Rhadamanthys Malware Use Copyright Scams, Driver Exploits to Target Victims

An ongoing phishing campaign is employing copyright infringement-related themes to trick victims into downloading a newer version of the Rhadamanthys information stealer since July 2024. Cybersecurity firm Check Point is tracking the large-scale campaign under the name CopyRh(ight)adamantys. Targeted regions include the United States, Europe, East Asia, and South America. "The campaign




ic

CISA Alerts to Active Exploitation of Critical Palo Alto Networks Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a now-patched critical security flaw impacting Palo Alto Networks Expedition to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability, tracked as CVE-2024-5910 (CVSS score: 9.3), concerns a case of missing authentication in the Expedition migration tool that




ic

Malicious NPM Packages Target Roblox Users with Data-Stealing Malware

A new campaign has targeted the npm package repository with malicious JavaScript libraries that are designed to infect Roblox users with open-source stealer malware such as Skuld and Blank-Grabber. "This incident highlights the alarming ease with which threat actors can launch supply chain attacks by exploiting trust and human error within the open source ecosystem, and using readily available




ic

IcePeony and Transparent Tribe Target Indian Entities with Cloud-Based Tools

High-profile entities in India have become the target of malicious campaigns orchestrated by the Pakistan-based Transparent Tribe threat actor and a previously unknown China-nexus cyber espionage group dubbed IcePeony. The intrusions linked to Transparent Tribe involve the use of a malware called ElizaRAT and a new stealer payload dubbed ApoloStealer on specific victims of interest, Check Point