Jason Crane’s Congress Tracker is a Glitch app that automatically collects statements (official and otherwise) made by U.S. congresspersons. The initial focus is on gun control but it could be forked to target any issue.
Here’s a little thing I made to help keep track of what our representatives in Congress are doing and saying about guns (with help from @ProPublica’s Congress API and @glitch):
I’ve mentioned it online before, but here we go: Two years ago, my wife and I decided to leave our rented home behind and move into a 40-foot RV. We spend our spring and summer in Alberta, Canada where she has a job for six months of the year working as an addictions counselor. The […]
Androkavo tests some of the cheap eBay solder against the brand-name stuff; it gets there in the end, but it’s surely not the advertized 60/40 alloy and needs to be close to 400° before it behaves itself.
MIT Tech Review’s Antonio Regalado rounds up the year’s stupidest, worst moments in tech, from the guy who created his own CRISPR-based gene therapy to beef up his muscles and injected it to Donald Trump’s Twitter feed to the FCC’s Net Neutrality catastrophe. Of course, Juicero rates a mention.
From your apartment door to your bike lock, it’s not uncommon to carry a number of different keys on your keyring, but that doesn’t make it any more bearable when you’re fussing to find the right one or deal with the infamous pocket bulge. The KeySmart Pro’s smart design cuts down on key clutter and […]
You have a right to privacy, but whether or not it’s respected online is a different story. With hackers, shady third-party companies, and the government prowling the web for personal information, you can’t be too careful when it comes to protecting yourself online. VPNs have emerged as a popular solution, but not all are created […]
It might sound counterintuitive, but one of the best ways to bring down a hacker is with another hacker. Commonly known as “white hats,” or ethical hackers, these professionals use a cybercriminal’s tools against them, sniffing out network vulnerabilities and patching them up before they can be exploited. In today’s heightened cybersecurity climate, demand for […]