Designing the packaging for cricket protein bars

How do you package a protein bar made from cricket flour? Here’s how . Exo raised $54.9K on Kickstarter last summer, as a pair of Brown roommates took their senior year project to the next level, trying to come up with a sustainable protein source, along with help from molecular gastronomy superstar Heston Blumenthal. The packaging was designed by New York’s Tag Collective .

More:
Designing the packaging for cricket protein bars

Having leisure time is now a marker for poverty, not riches

In Post-Industrious Society: Why Work Time will not Disappear for our Grandchildren , researchers from Oxford’s Centre for Time Use Research argue that there has been a radical shift in the relationship between leisure, work and income. Where once leisure time was a mark of affluence, now it is a marker for poverty. The richer you are, the more likely you are to work long hours; while the poorer you are, the fewer hours you are likely to work every week. The researchers theorise multiple causes for this. Poor people are more likely to be underemployed and unable to get the work-hours they want (and need) to support themselves. Rich people are likely to work in jobs that disproportionately advance and reward workers who put in overtime, so a 10% increase in hours worked generates more than 10% in expected career-gains. They also claim that rich workers are more likely to be satisfied with their jobs, but I’m skeptical of this — I think that relative to unskilled workers doing at-will 0-hours temp work whose every move is constrained and scripted by their employers, this is probably true, but I don’t think that the white-collar world is producing a lot of people who think that their work is meaningful and rewarding. In today’s advanced economies things are different. Overall working hours have fallen over the past century. But the rich have begun to work longer hours than the poor. In 1965 men with a college degree, who tend to be richer, had a bit more leisure time than men who had only completed high school. But by 2005 the college-educated had eight hours less of it a week than the high-school grads. Figures from the American Time Use Survey, released last year, show that Americans with a bachelor’s degree or above work two hours more each day than those without a high-school diploma. Other research shows that the share of college-educated American men regularly working more than 50 hours a week rose from 24% in 1979 to 28% in 2006, but fell for high-school dropouts. The rich, it seems, are no longer the class of leisure. There are a number of explanations. One has to do with what economists call the “substitution effect”. Higher wages make leisure more expensive: if people take time off they give up more money. Since the 1980s the salaries of those at the top have risen strongly, while those below the median have stagnated or fallen. Thus rising inequality encourages the rich to work more and the poor to work less. Nice work if you can get out [The Economist] ( via /. ) ( Image: Lonely Hammock , Micky Zlimen, CC-BY-SA )

Taken from:
Having leisure time is now a marker for poverty, not riches

Reddit’s /r/technology demoted over scandal of secret censorship that blocked Internet freedom stories

Alan sez, “According to various media reports ( e.g. BBC ) the technology subreddit has scrubbed its moderator team after users discovered that the sub was holding a secret censorship list of banned words that included ‘National Security Agency’, ‘GCHQ’, ‘Anonymous’, ‘anti-piracy’, ‘Bitcoin’, ‘Snowden’, ‘net neutrality’, ‘EU Court’, ‘startup’ and ‘Assange’. On its face, this looks like a list of politicized terms, and blocking them looks like a highly political and partisan act — for example, by blocking “net neutrality,” then stories that are critical of network discrimination would be blocked, while straight news stories that overwhelmingly quoted corporate spokespeople using uncritical terms would make the front door. More charitably, it may have been the act of overworked (and ultimately irresponsible) moderators to simply ban hot-button topics altogether. Here’s the Reddit post that outed /r/technology’s moderators. Once the news got publicized, the moderator team did a ‘U turn’ and removed the auto-deletion software, as well as booting the mods responsible for it in the first place. Still, as the BBC story notes, the technology sub is no longer “featured”, meaning it doesn’t appear in the subreddits that are promoted to new users and appear on the front page. Reddit downgrades technology community after censorship [BBC] ( Thanks, Alan ! )

Excerpt from:
Reddit’s /r/technology demoted over scandal of secret censorship that blocked Internet freedom stories

Motion picture industry continues to stagger under piracy with mere record-breaking income

Once again, the “piracy-stricken” motion picture association has had a banner year , with box office revenue breaking all records (as they’ve done in most recent years). The biggest gains this year come from China — a market condemned by the studios as a hive of piracy. Some of the best news in the report is that American movies are seeing success in China, which has become the first international market to reach more than $3 billion in movie sales. The Chinese enthusiasm for US-produced movies comes despite the fact that China continues to  restrict  the number of foreign-made films that can be released in theaters to 34 imports a year. But the country at the top of the MPAA’s sales charts is also at the top of its piracy target list. Last year, the MPAA placed China on the list of the “most notorious” markets for distributing pirated movies and TV shows. As reported by the  LA Times ,  MPAA spokesperson Michael O’Leary has explained: The criminals who profit from the most notorious markets through the world threaten the very heart of our industry and in doing so threaten the livelihoods of the people who give it life. These markets are an immediate threat to legitimate commerce, impairing legitimate markets’ viability and curbing US competitiveness. Despite prolific piracy, China’s increase in sales has been positively “meteoric,” MPAA chief Chris Dodd said at a press conference yesterday , noting a 27 percent increase. Piracy notwithstanding, MPAA enjoys a “very strong year”—again [Joe Silver/Ars Technica]        

More:
Motion picture industry continues to stagger under piracy with mere record-breaking income

Games console/phone refurbishing kit with specialized case-opening tools

Thinkgeek have teamed up with Ifixit to create a Game Console & Electronics Refurbishing Kit , with all the tools you need to crack the case on most games consoles, phones and other gadgets. The 3.5lb box also includes a bunch of cleaning stuff for removing scuffs and marks, to spruce up your old gear to look like the day you unboxed it. Game Console & Electronics Refurbishing Kit gives you both opening and cleaning tools Works with * Xbox One (also Xbox 360) * PlayStation 4 (also PS Vita, PS3, PSP, PS2, and the original PlayStation) * Wii U (also Wii), NES, SNES, Gamecube, N64 * Nintendo 3DS (also DSi, DS Lite, and the Nintendo DS) * Dreamcast * Game Boy Advance SP (also Game Boy Advance, Game Boy Cartridges) * PC building and repair * Smartphone repair * and a bazillion other electronic devices Includes: * 26 Bit Driver Kit   * 4 mm Driver Handle – rubberized for a sturdy grip and magnetized to hold bits and screws   * 60 mm Driver Extension – increase your reach into smaller devices   * Metal Tweezers – grab hold of small screws and components   * 26 bits in the following sizes:     * Flathead sizes 1.5, 2, 2.5, 3 mm     * Phillips sizes #000, #00, #0, #1, #2     * Torx sizes T4, T5, T6     * Torx Security sizes TR7, TR8, TR9, TR10, TR15, TR20 (compatible with non-security)     * Hex sizes 1.5, 2, 2.5, 3, 4 mm     * Tri-wing sizes #0, #1     * Spanner size U3.0   * Anti-Static Wrist Strap   * Dust Blower   * ESD-safe Tweezers (electrostatic damage)   * Plastic Spudger   * Metal Spudger Set   * Xbox 360 Opening Tool   * Cleaning Swabs   * Plastic Opening Tools   * Surface Detailing Block (great for refreshing old or dirty plastic parts)   * German Detailing Eraser with Brush   * Pencil Sharpener   * Small ESD-safe Brush (electrostatic damage)   * Large ESD-safe Brush (electrostatic damage)   * 1/4″ Driver Handle     * Phillips #2     * Flathead 6 mm     * Game Bit 4.5 mm (Nintendo Nut Setter #6)     * Game Bit 3.8 mm (Nintendo Nut Setter #8) Game Console & Electronics Refurbishing Kit        

View article:
Games console/phone refurbishing kit with specialized case-opening tools

Full NHS hospital records uploaded to Google servers, "infinitely worse" story to come

To clarify, the @HSCIC story that’s coming is, I believe, infinitely worse than patient hospital records being uploaded to Google BigQuery — ben goldacre (@bengoldacre) March 3, 2014 PA Consulting, a management consulting firm, obtained the entire English and Welsh hospital episode statistics database and uploaded it to Google’s Bigquery service . The stats filled 27 DVDs and took “a couple of weeks” to transfer to Google’s service, which is hosted in non-EU data centres. This is spectacularly illegal. The NHS dataset includes each patient’s NHS number, post code, address, date of birth and gender, as well as all their inpatient, outpatient and emergency hospital records. Google’s Bigquery service allows for full data-set sharing with one click. The news of the breach comes after the collapse of a scheme under which the NHS would sell patient records to pharma companies, insurers and others (there was no easy way to opt out of the scheme, until members of the public created the independent Fax Your GP service ). According to researcher and epidemiologist Ben Goldacre, this story is just the beginning: there’s an “infinitely worse” story that is coming shortly. Sarah Wollaston, who is also a family doctor and Conservative backbencher, tweeted: “So HES [hospital episode statistics] data uploaded to ‘google’s immense army of servers’, who consented to that?” The patient information had been obtained by PA Consulting, which claimed to have secured the “entire start-to-finish HES dataset across all three areas of collection – inpatient, outpatient and A&E”. The data set was so large it took up 27 DVDs and took a couple of weeks to upload. The management consultants said: “Within two weeks of starting to use the Google tools we were able to produce interactive maps directly from HES queries in seconds.” The revelations alarmed campaigners and privacy experts, who queried how Google maps could have been used unless some location data had been provided in the patient information files. NHS England patient data ‘uploaded to Google servers’, Tory MP says [Randeep Ramesh/The Guardian] ( via Charlie Stross )        

Read this article:
Full NHS hospital records uploaded to Google servers, "infinitely worse" story to come

Wearable planters: 3D printed translucent jewelry, with plants!

Etsy seller Wearableplanter has a wide range of 3D printed planters: rings, jewelry — even bicycle vases! They’re intended for use with succulents, small flowers, and sprouts. They’re watertight and translucent, and you can see the roots through the material. A Wearable Planter ( via Wil Wheaton )        

Read the original post:
Wearable planters: 3D printed translucent jewelry, with plants!

High-rez scan Poe’s "Raven," illustrated by Dore

The Library of Congress’s website hosts a high-resolution scan of a rare edition of Edgar Allan Poe’s “The Raven” illustrated by Gustave Doré. The title-page is at page 11 , the list of illustrations is on page 14 . The illustrations are amazing, like no other illustrated Poe I’ve seen. I’ve collected my favorites below, and there are a lot of them — honestly, it was impossible to choose. The Raven / by Edgar Allan Poe ; illustrated by Gustave Doré ; with comment by Edmund C. Stedman. ( via Reddit )        

See the original article here:
High-rez scan Poe’s "Raven," illustrated by Dore

NSA has a 50-page catalog of exploits for software, hardware, and firmware

A Snowden leak accompanying today’s story on the NSA’s Tailored Access Operations group (TAO) details the NSA’s toolbox of exploits , developed by an NSA group called ANT (Advanced or Access Network Technology). ANT’s catalog runs to 50 pages, and lists electronic break-in tools, wiretaps, and other spook toys. For example, the catalog offers FEEDTROUGH, an exploit kit for Juniper Networks’ firewalls; gimmicked monitor cables that leak video-signals; BIOS-based malware that compromises the computer even before the operating system is loaded; and compromised firmware for hard drives from Western Digital, Seagate, Maxtor and Samsung. Many of the exploited products are made by American companies, and hundreds of millions of everyday people are at risk from the unpatched vulnerabilities that the NSA has discovered in their products. The ANT division doesn’t just manufacture surveillance hardware. It also develops software for special tasks. The ANT developers have a clear preference for planting their malicious code in so-called BIOS, software located on a computer’s motherboard that is the first thing to load when a computer is turned on. This has a number of valuable advantages: an infected PC or server appears to be functioning normally, so the infection remains invisible to virus protection and other security programs. And even if the hard drive of an infected computer has been completely erased and a new operating system is installed, the ANT malware can continue to function and ensures that new spyware can once again be loaded onto what is presumed to be a clean computer. The ANT developers call this “Persistence” and believe this approach has provided them with the possibility of permanent access. Another program attacks the firmware in hard drives manufactured by Western Digital, Seagate, Maxtor and Samsung, all of which, with the exception of latter, are American companies. Here, too, it appears the US intelligence agency is compromising the technology and products of American companies. Shopping for Spy Gear: Catalog Advertises NSA Toolbox [Jacob Appelbaum, Judith Horchert and Christian Stöcker/Spiegel]        

Read the original post:
NSA has a 50-page catalog of exploits for software, hardware, and firmware