John writes, “My partner, Valery Estabrook, is an artist who has started a Kickstarter for a project of limited edition coins based on actual historic events associated with the Trump administration. The first of these is a coin commemorating all the participants of the infamous Trump Tower Meeting with Don Jr.” Coins are $15 and up!
The next installment of the excellent SF in SF series is tomorrow night, June 10, starting at 630PM and featuring Ellen Klages (previously), Lucy Jane Bledsoe, and Meg Elison, moderated as always by Terry Bisson.
3D printing complex shapes is hard; the additive nature of most 3D printing means that the printer has to create sprues (struts that support parts of the structure during printing, which have to be removed later), or add in material that can be dissolved in a solvent bath after main production.
Techdirt is in the throes of a two-part revelation: 1. the US government’s works are public domain and can be freely commercialized, and; 2. many of the weird things that spy agencies make can be turned into ironic, cool, and sometimes fun and/or beautiful objects of commerce.
From your apartment door to your bike lock, it’s not uncommon to carry a number of different keys on your keyring, but that doesn’t make it any more bearable when you’re fussing to find the right one or deal with the infamous pocket bulge. The KeySmart Pro’s smart design cuts down on key clutter and […]
You have a right to privacy, but whether or not it’s respected online is a different story. With hackers, shady third-party companies, and the government prowling the web for personal information, you can’t be too careful when it comes to protecting yourself online. VPNs have emerged as a popular solution, but not all are created […]
It might sound counterintuitive, but one of the best ways to bring down a hacker is with another hacker. Commonly known as “white hats,” or ethical hackers, these professionals use a cybercriminal’s tools against them, sniffing out network vulnerabilities and patching them up before they can be exploited. In today’s heightened cybersecurity climate, demand for […]