What Did 17th Century Food Taste Like?

Benjamin Breen, an assistant professor of history at UC Santa Cruz, looks at art history to figure out what people cooked in the 1600s, and wonders whether it is possible to ascertain the taste of food. From a blog post: What can we learn about how people ate in the seventeenth century? And even if we can piece together historical recipes, can we ever really know what their food tasted like? This might seem like a relatively unimportant question. For one thing, the senses of other people are always going to be, at some level, unknowable, because they are so deeply subjective. Not only can I not know what Velazquez’s fried eggs tasted like three hundred years ago, I arguably can’t know what my neighbor’s taste like. And why does the question matter, anyway? A very clear case can be made for the importance of the history of medicine and disease, or the histories of slavery, global commerce, warfare, and social change. By comparison, the taste of food doesn’t seem to have the same stature. Fried eggs don’t change the course of history. But taste does change history. Fascinating read. Read more of this story at Slashdot.

Read More:
What Did 17th Century Food Taste Like?

Startup Makes the First Lab-Grown Chicken Tender and Duck L’Orange

A San Francisco startup plated some fairly familiar dishes at a tasting yesterday, like fried chicken with collared greens and duck l’orange. But these meats didn’t come from gutted bird corpses. They were all lab-grown, and our lab-grown meat experts are bummed we were not invited to taste, too. Not that we would… Read more…

Read the original post:
Startup Makes the First Lab-Grown Chicken Tender and Duck L’Orange

Phone companies ditching copper wires will have to follow the rules

The age of the copper land-line is nearing its end, but traditional phone lines aren’t going quietly: new rules from the FCC now require service providers notify customers of the impending removal and drawbacks of switching to a VOIP line three months before killing a copper network. It sounds like a reasonable move — customers need to know that the technology replacing their traditional land-line won’t work during a power-outage without an external power source — but not everybody at the FCC is happy with the new rules. “It appears that Chicken Little rules the roost, ” writes Commissioner Ajit Pai in a dissent to the updated transition rules. “By dragging out the copper retirement process , the FCC is adopting ‘regulations that deter rather than promote fiber deployment.'” Pai argues that the FCC is making it more difficult for companies to modernize their networks because lobbyists are claiming that retiring copper will cause the “sky to fall, ” disrupting services and hurting their business model. He has a point — but wouldn’t you want to be notified if the phone company was changing out your voice service worked? Check out the FCC’s official announcement at the source link below. [Image Credit: Raymond Kleboe via Getty Images] Filed under: Misc Comments Source: Verge , FCC Tags: copper, copperlandline, fcc, landline, phones, telco, telephone

View original post here:
Phone companies ditching copper wires will have to follow the rules

The Least Unhealthy Items at Seven Popular Fast Food Joints

Fast food is hardly health food, but when you’re on the road or it’s late at night, sometimes it’s your only option. These are the menu options to look for that will fill you up without filling you out. Read more…

More:
The Least Unhealthy Items at Seven Popular Fast Food Joints

Uber charges rider $16,000 for a 7-mile trip

But Uber knocked $15 off Jaime Hessel’s bill because it agreed that the driver had taken an “inefficient route.” Gothamist : Hessel told us by phone that she e-mailed Uber at 12:30 today to ask them for an explanation. Read the rest

See the original post:
Uber charges rider $16,000 for a 7-mile trip

McDonald’s Chickens Going Antibiotic Free Is a Really Big Deal 

McDonald’s announced today it will begin only sourcing chickens raised without medically important antibiotics in the U.S. When a juggernaut like McDonald’s makes such decisions, the food world listens—and sourcing only antibiotic-free chicken is a big deal. Read more…

More here:
McDonald’s Chickens Going Antibiotic Free Is a Really Big Deal 

Latin America Exhausts IPv4 Addresses

An anonymous reader writes “LACNIC, the regional Internet registry for Latin America and the Caribbean, considers its IPv4 address pool exhausted, because it is down to less than a quarter of an /8, roughly 4 million IPv4 addresses which are reserved for facilitating transitioning mechanisms. Half of those addresses will be assigned on a first come, first served basis, but no more than 1024 addresses per organization every 6 six months. Allocations from the last 2 million addresses will be a maximum of 1024 addresses total per organization. To maintain connectivity, it is now indispensable to make the switch to IPv6. LACNIC’s CEO expressed his concern that many operators and companies still haven’t taken the steps needed to duly address this circumstance. The RIRs for Asia-Pacific, Europe and North America have all imposed similar limitations on IPv4 assignments when they also crossed their local exhaustion thresholds. As of now, only AfriNIC is not in address exhaustion mode.” Joining North America, and Europe/the Middle East/Central Asia. Read more of this story at Slashdot.

More:
Latin America Exhausts IPv4 Addresses

Some guy made electronica music using MS-DOS

Because anyone can create music with access to a laptop these days, Diode Milliampere decided to up the ante and make it harder for himself by making a song using MS-DOS. Yes, that command line inputting, C-drive accessing MS-DOS from 30 years ago. It turned out pretty well! Read more…        

Read more here:
Some guy made electronica music using MS-DOS

Anatomy of a password-crack, part II

Ars Technica’s Nate Anderson Dan Goodin follows up on Nate Anderson’s excellent piece on the nuts and bolts of password cracking with a further attempt to decrypt an encrypted password file leaked from LivingSocial, this time with the aid of experts. The password file they were working on was encrypted with the relatively weak (and now deprecated) SHA1 hashing algorithm, and they were only attacking it with a single GPU on a commodity PC, and were able to extract over 90% of the passwords in the file. The discussion of the guesswork and refinement techniques used in extracting passwords is absolutely fascinating and really is a must-read. However, the whole exercise is still a bit inconclusive — in the end, we know that a badly encrypted password file is vulnerable to an underpowered password-cracking device. But what we need to know is whether a well-encrypted password file will stand up to a good password-cracking system. The specific type of hybrid attack that cracked that password is known as a combinator attack. It combines each word in a dictionary with every other word in the dictionary. Because these attacks are capable of generating a huge number of guesses—the square of the number of words in the dict—crackers often work with smaller word lists or simply terminate a run in progress once things start slowing down. Other times, they combine words from one big dictionary with words from a smaller one. Steube was able to crack “momof3g8kids” because he had “momof3g” in his 111 million dict and “8kids” in a smaller dict… What was remarkable about all three cracking sessions were the types of plains that got revealed. They included passcodes such as “k1araj0hns0n,” “Sh1a-labe0uf,” “Apr!l221973,” “Qbesancon321,” “DG091101%,” “@Yourmom69,” “ilovetofunot,” “windermere2313,” “tmdmmj17,” and “BandGeek2014.” Also included in the list: “all of the lights” (yes, spaces are allowed on many sites), “i hate hackers,” “allineedislove,” “ilovemySister31,” “iloveyousomuch,” “Philippians4:13,” “Philippians4:6-7,” and “qeadzcwrsfxv1331.” “gonefishing1125” was another password Steube saw appear on his computer screen. Seconds after it was cracked, he noted, “You won’t ever find it using brute force.” Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv1331”        

See the article here:
Anatomy of a password-crack, part II

PETA Wants To Sue Anonymous HuffPo Commenters

MarkWhittington writes, quoting himself: “PETA is incensed over an article in the Huffington Post that details that organization’s unsettling practice of euthanizing animals in a Virginia facility that many have assumed is a no kill shelter. According to the New York Post, PETA wants to sue some of the people who have left comments on the article. The problem is that, following the practice of many on the Internet, many of the comments are under assumed names or are anonymous. PETA is attempting to discover the true identities of their critics so that it can sue them for defamation.” Read more of this story at Slashdot.

More:
PETA Wants To Sue Anonymous HuffPo Commenters