a discussion on relationship formats

me: *explaining various relationship formats to a classmate*

classmate: wait, what's polyamory?

me: well, it's when someone has more than one intimate relationship at a time with the knowledge and consent of everyone involved.

professor: *overhears from front of class*

professor: that is d i s g u s t i n g

me: *defensively* um, actually, no it's--

professor: how DARE they put a greek prefix on a latin root like that?! What right do they have to decimate my beautiful antiquated languages?!?! GREEK AND LATIN DO NOT FRATERNIZE THIS IS LIKE THAT STUPID ROMANTIC SUBPLOT BETWEEN THAT DWARF AND THAT ELF IN THE DESOLATION OF SMAUG NO NO NO NO NO NO!!!

me: ....

me: ....

me: ....

professor: it should be polyerosy

Once, Picasso was asked what his paintings meant. He said, “Do you ever know what the birds are singing? You don’t. But you listen to them anyway.” So, sometimes with art, it is important just to look.

Marina Abramović 

(Source: kingoftheclubkids)

Even computers isolated from ethernet/wi-fi can be hacked.

Researchers Create Trojan That Uses Computers’ Built-in Speakers and Mics to Transmit Data Using Ultrasonic Frequencies

The proof-of-concept software—or malicious trojans that adopt the same high-frequency communication methods—could prove especially adept in penetrating highly sensitive environments that routinely place an “air gap” between computers and the outside world.

Using nothing more than the built-in microphones and speakers of standard computers, the researchers were able to transmit passwords and other small amounts of data from distances of almost 65 feet. The software can transfer data at much greater distances by employing an acoustical mesh network made up of attacker-controlled devices that repeat the audio signals.

…The hurdles of implementing covert acoustical networking are high enough that few malware developers are likely to add it to their offerings anytime soon. Still, the requirements are modest when measured against the capabilities of Stuxnet, Flame, and other state-sponsored malware discovered in the past 18 months.

And that means that engineers in military organizations, nuclear power plants, and other truly high-security environments should no longer assume that computers isolated from an Ethernet or Wi-Fi connection are off limits.

(via Scientist-developed malware covertly jumps air gaps using inaudible sound | Ars Technica)

nanodash:

This is Alexandrite, it’s also called “emerald by day, ruby by night”
It changes colour based on whether the light source is from the sun or from a candle.
It does this because Alexandrite strongly absorbs yellow light due to chromium ions in its crystal structure, leaving the other colours behind. Light from the Sun emits all colours, but it peaks in the green, and our eyes are most sensitive to green, so in Sunlight Alexandrite is green.
Incandescent lights are things like candles and filament light bulbs. They also emit all colours of light, but they peak far, far into the red, so there’s not nearly as much green or blue, so under those, Alexandrite is red. 
Gemstones are awesome.

nanodash:

This is Alexandrite, it’s also called “emerald by day, ruby by night”

It changes colour based on whether the light source is from the sun or from a candle.

It does this because Alexandrite strongly absorbs yellow light due to chromium ions in its crystal structure, leaving the other colours behind. Light from the Sun emits all colours, but it peaks in the green, and our eyes are most sensitive to green, so in Sunlight Alexandrite is green.

Incandescent lights are things like candles and filament light bulbs. They also emit all colours of light, but they peak far, far into the red, so there’s not nearly as much green or blue, so under those, Alexandrite is red. 

Gemstones are awesome.

I was trying to get to sleep, but I couldn’t stop thinking about this gifset entitled “Penelope goes on an adventure (and falls over)”

(Source: tootricky)