The CIA World Factbook provides information on the history, people, government, economy, energy, geography, communications, transportation, military, and transnational issues for 267 world entities. While the CIA World Factbook is helpful for finding factual tidbits of information like the average number of children born per woman in Angola (5.37) or when Kiribati will hold their […]
Four Ways to Use Bread Crumbs
I found a big can of bread crumbs that I had forgotten about in the pantry. Not knowing what to do with them, I decided to make all the recipes on the can’s label. The result wasn’t very tasty in my opinion, except for the breaded eggplants, which were delicious. Baked Tomatoes with Garlic […]
Digital Art
Computer processing has revolutionized the way we can create artwork. With current technology, we can create any conceivable image. The movie industry has capitalized on the trend by producing films with computer-generated imagery (CGI). But you don’t have to be a big movie studio to create digital artwork. All you need are a computer and […]
Daiquiri
The Daiquirí is one of the most popular cocktails around. The traditional recipe goes something like this: Add 2 ounces rum, an ounce of lime juice, and 2 or 3 dashes of sugar syrup to a shaker with ice. Shake and pour into a chilled martini glass. Garnish with a wedge of lime and […]
The Persuasive Power of Coffee
Scopolamine has been called “the world’s scariest drug.” Tasteless and odorless, it is often used by criminals to put people into a zombie-like state where they no longer have memory or free will. Scopolamine is just one of various “truth serums” that remove inhibitions or alter higher cognitive functions to make someone more easily […]
Ideas on Authentication
Authentication is the process of verifying your identification. Entering your password into a system is authentication. Showing a cashier your driver’s license when buying alcohol is authentication. Typing in your PIN number at the ATM is authentication. A traditional method of authentication is two-factor authentication (2FA). Typically, 2FA involves 1) something you know, and 2) something […]