shop imp kerr
nswd

pipeline

There was a sort of scholars along either side the board, that is to wit, Dixon yclept junior of saint Mary Merciable

34.png

How might one prove the existence of other universes given that we can experience only this one? […]

What is the world made of? One might answer in terms of the electrons, protons, and neutrons that make up atoms. But what are electrons, protons and neutrons? Quantum physics shows how they are observed to behave like waves as they move about. But on reaching their destination and giving up their energy and momentum they behave like tiny particles. But how can something be both a spread out wave with humps and troughs, and at the same time be a tiny localized particle? This is the famous wave/particle paradox. It afflicts everything, including light.

{ Russell Stannard | Continue reading }

painting { Peter Halley, Delayed Reaction, 1989 }

Every time someone checks in on Foursquare, I just assume it’s a requirement of their parole officer

233.jpg

Free services in exchange for personal information. That’s the “privacy bargain” we all strike on the Web. It could be the worst deal ever. […]

Why do we seem to value privacy so little? In part, it’s because we are told to. Facebook has more than once overridden its users’ privacy preferences, replacing them with new default settings. […]

Even if you read the fine print, human beings are awful at pricing out the net present value of a decision whose consequences are far in the future. […] The risks increase as we disclose more, something that the design of our social media conditions us to do. […]

Imagine if your browser loaded only cookies that it thought were useful to you, rather than dozens from ad networks you never intended to interact with. […] There’s a business opportunity for a company that wants to supply arms to the rebels instead of the empire.

{ Technology Review | Continue reading }

photo { Leonard Freed }

And I’m gonna shine homie until my heart stops

54.jpg

Using scientific theories, toy ecosystem modeling and paleontological evidence as a crystal ball, 18 scientists, including one from Simon Fraser University, predict we’re on a much worse collision course with Mother Nature than currently thought. […]

Earth’s accelerating loss of biodiversity, its climates’ increasingly extreme fluctuations, its ecosystems’ growing connectedness and its radically changing total energy budget are precursors to reaching a planetary state threshold or tipping point.

Once that happens, which the authors predict could be reached this century, the planet’s ecosystems, as we know them, could irreversibly collapse in the proverbial blink of an eye.

{ EurekAlert | Continue reading }

If you can’t use Excel without a mouse, keep your résumé updated. 390 Greenwich is just down the street.

344.jpg

A census of workplace microbes found that men’s offices have significantly more than women’s, and offices in New York have more than those in San Francisco.

{ PLoS One | NY Times }

‘My role is the joint of being the secretary and, quite ironically, the dialectically reduplicated author of the author or the authors.’ –Kierkegaard

543.jpg

Moebius syndrome is a rare condition that affects the 6th and 7th cranial nerves, resulting in paralysis of the muscles that control face and eye movements. This means that those affected by Moebius syndrome are unable to move their face and eyes, and thus to form any facial expressions.

This one-in-a-million neurological disorder is present from birth, but its rarity often leads to late diagnosis. Besides a “mask-like” lack of expression, the Moebius syndrome is characterized by the inability to suck, problems with swallowing, and hearing and speech impairment.

{ United Academics | Continue reading }

collage { John Stezaker }

‘Although rivaled closely by SATAN PUT THE DINO BONES THERE, QUENTIN.’ –Malcolm Harris

451.jpg

Worst Companies At Protecting User Privacy: Skype, Verizon, Yahoo!, At&T, Apple, Microsoft.

{ Main Device | full story }

photos { Marlo Pascual | Sean and Seng }

The continuation of policy by other means

234.jpg

From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.

Mr. Obama decided to accelerate the attacks — begun in the Bush administration and code-named Olympic Games — even after an element of the program accidentally became public in the summer of 2010 because of a programming error that allowed it to escape Iran’s Natanz plant and sent it around the world on the Internet. Computer security experts who began studying the worm, which had been developed by the United States and Israel, gave it a name: Stuxnet. […]

It appears to be the first time the United States has repeatedly used cyberweapons to cripple another country’s infrastructure, achieving, with computer code, what until then could be accomplished only by bombing a country or sending in agents to plant explosives. The code itself is 50 times as big as the typical computer worm, Carey Nachenberg, a vice president of Symantec, one of the many groups that have dissected the code, said at a symposium at Stanford University in April. Those forensic investigations into the inner workings of the code, while picking apart how it worked, came to no conclusions about who was responsible.

A similar process is now under way to figure out the origins of another cyberweapon called Flame that was recently discovered to have attacked the computers of Iranian officials, sweeping up information from those machines. But the computer code appears to be at least five years old, and American officials say that it was not part of Olympic Games. They have declined to say whether the United States was responsible for the Flame attack.

Soon the two countries had developed a complex worm that the Americans called “the bug.” But the bug needed to be tested. So, under enormous secrecy, the United States began building replicas of Iran’s P-1 centrifuges. […] Those first small-scale tests were surprisingly successful: the bug invaded the computers, lurking for days or weeks, before sending instructions to speed them up or slow them down so suddenly that their delicate parts, spinning at supersonic speeds, self-destructed. After several false starts, it worked. One day, toward the end of Mr. Bush’s term, the rubble of a centrifuge was spread out on the conference table in the Situation Room, proof of the potential power of a cyberweapon. The worm was declared ready to test against the real target: Iran’s underground enrichment plant. […]

The first attacks were small, and when the centrifuges began spinning out of control in 2008, the Iranians were mystified about the cause, according to intercepts that the United States later picked up. “The thinking was that the Iranians would blame bad parts, or bad engineering, or just incompetence,” one of the architects of the early attack said.

The Iranians were confused partly because no two attacks were exactly alike. Moreover, the code would lurk inside the plant for weeks, recording normal operations; when it attacked, it sent signals to the Natanz control room indicating that everything downstairs was operating normally. “This may have been the most brilliant part of the code,” one American official said.

But by the time Mr. Bush left office, no wholesale destruction had been accomplished. Meeting with Mr. Obama in the White House days before his inauguration, Mr. Bush urged him to preserve two classified programs, Olympic Games and the drone program in Pakistan. Mr. Obama took Mr. Bush’s advice. […]

An error in the code, they said, had led it to spread to an engineer’s computer when it was hooked up to the centrifuges. […] It began replicating itself all around the world. Suddenly, the code was exposed. […] Within a week, another version of the bug brought down just under 1,000 centrifuges. Olympic Games was still on. […]

American cyberattacks are not limited to Iran.

{ NY Times | Continue reading }

photo { Donovan Wylie }

‘Idleness is the beginning of all psychology.’ –Nietzsche

5.jpg

HorrendousRex
No one seems to have mentioned it, so I’ll point out that this looks like an M4 Carbine with iron sights, without any magazine inserted (and I have to imagine no bullet round chambered, either).
It appears to have no attachments besides the iron sights, which I thought is surprising as I thought that the foregrip and picatinny rail and ACOG scope were standard attachments for the IDF. I would imagine this is because she is a new recruit (mentioned elsewhere in the thread). [Edit: Apparently no M4 attachments are standard in the IDF, they are either soldier-purchased or disbursed for relevant combat roles.]
The gun might also be the M4A1 automatic variant of the M4, but without any modifications I don’t really know how to tell. [Apparently it might also be a short-barreled variant of the M16 - but isn’t that what an M4 is?]
The umbrella stands belong to “Carlsberg” pale lager, a product of the Carlsberg Group. Their motto is “Probably the best beer in the world”, but it is not the best beer in the world.
I’m having trouble identifying the bikinis but the girl with the gun seems to be wearing a mismatched set, as is often the fashion.
The ass is good.

voodoopredatordrones
you just Sherlocked that picture…for no apparent reason

lampkyter
If he really Sherlocked it he would have told us something like how many times she’s had sex.

imatosserama
I can’t definitively say how many times, or if, she has had sex. What I can say is that it is unlikely that either of the two had orgasmed earlier that day.
Look at the way they hold their hips. When a woman orgasms, there is an involuntary relaxation of several of the hip muscles. The hips are carried in a way that looks relaxed and comfortable, rather unlike the somewhat stiff postures we see here. This effect usually lasts for several hours.
Of course, they could have had sex. Quite a lot, even. But it seems unlikely that they reached an orgasm that day. I could be wrong. But it seems unlikely. A more definite conclusion could be reached if we had a video of them walking.
Edit for proof: http://www.ncbi.nlm.nih.gov/pubmed/18637995

{ reddit | Continue reading }

Mental concentration in front of a mirror

438.jpg

A freak attack described as drug induced “zombie face eating” has hit international headlines this week. Until the results of a toxicological analysis emerge, the drug(s) involved is unknown and open to speculation. This has not stopped the newspapers, who understandably have gone absolutely bat-shit over the story. The Daily Mail has claimed the attacker was “high on LSD”, while the Guardian initially claimed the assailant was “under the influence of a potent LSD-like drug called bath salts”, the Guardian went on to make the bizarre claim that the assailant had taken “the delirium-inducing drug, which is similar to cocaine and other forms of LSD.” […]

Far from LSD or even formerly popular legal chemicals such as mephedrone, the consensus among speculators appears to be that the “zombie face eater” in addition to likely having an undiagnosed pre-existing mental condition may have been in a state of severe drug induced psychosis and/or may have taken something more along the lines of a PCP analogue. This is obviously pure guess work, however PCP is known for its astounding ability to precipitate psychosis, bizarre behaviour and extreme violence. It has even been linked to cases of cannibalism in the past, cases such as this are of course rare and heavily publicised but the fact that people are now taking drugs blindly as a matter of course, the contents of which may contain substances they are utterly unprepared for is extremely worrying. Another key factor pointing to PCP is that it is well known that PCP users are prone to getting naked and becoming violent. Another popular guess that may be more grounded in reality is that the drug could be MDPV, a drug with a thoroughly unpleasant reputation that has been known to be marketed as bath salts in the past.

{ Neurobonkers | Continue reading }

A kiss to the winner? Oodelally!

2311.jpg

A massive, highly sophisticated piece of malware has been newly found infecting systems in Iran and elsewhere and is believed to be part of a well-coordinated, ongoing, state-run cyberespionage operation. […] Dubbed “Flame” by Russia-based anti-virus firm Kaspersky Lab […]

The malware, which is 20 megabytes when all of its modules are installed, contains multiple libraries, SQLite3 databases, various levels of encryption — some strong, some weak — and 20 plug-ins that can be swapped in and out to provide various functionality for the attackers. It even contains some code that is written in the LUA programming language — an uncommon choice for malware.

Kaspersky Lab is calling it “one of the most complex threats ever discovered.” […]

Gostev says that because of its size and complexity, complete analysis of the code may take years. “It took us half-a-year to analyze Stuxnet,” he said. “This is 20-times more complicated. It will take us 10 years to fully understand everything.” […]

Among Flame’s many modules is one that turns on the internal microphone of an infected machine to secretly record conversations that occur either over Skype or in the computer’s near vicinity; a module that turns Bluetooth-enabled computers into a Bluetooth beacon, which scans for other Bluetooth-enabled devices in the vicinity to siphon names and phone numbers from their contacts folder; and a module that grabs and stores frequent screenshots of activity on the machine, such as instant-messaging and email communications, and sends them via a covert SSL channel to the attackers’ command-and-control servers.

The malware also has a sniffer component that can scan all of the traffic on an infected machine’s local network and collect usernames and password hashes that are transmitted across the network. The attackers appear to use this component to hijack administrative accounts and gain high-level privileges to other machines and parts of the network. […]

Because Flame is so big, it gets loaded to a system in pieces. The machine first gets hit with a 6-megabyte component, which contains about half-a-dozen other compressed modules inside. The main component extracts, decompresses and decrypts these modules and writes them to various locations on disk. The number of modules in an infection depends on what the attackers want to do on a particular machine.

Once the modules are unpacked and loaded, the malware connects to one of about 80 command-and-control domains to deliver information about the infected machine to the attackers and await further instruction from them. The malware contains a hardcoded list of about five domains, but also has an updatable list, to which the attackers can add new domains if these others have been taken down or abandoned.

While the malware awaits further instruction, the various modules in it might take screenshots and sniff the network. The screenshot module grabs desktop images every 15 seconds when a high-value communication application is being used, such as instant messaging or Outlook, and once every 60 seconds when other applications are being used.

{ Wired | Continue reading }

He seizes solitary paper. He holds it towards fire. Twilight. He reads.

46.jpg

They will be custom bugs, designer bugs — bugs that only Venter can create. He will mix them up in his private laboratory from bits and pieces of DNA, and then he will release them into the air and the water, into smokestacks and oil spills, hospitals and factories and your house.

Each of the bugs will have a mission. Some will be designed to devour things, like pollution. Others will generate food and fuel. There will be bugs to fight global warming, bugs to clean up toxic waste, bugs to manufacture medicine and diagnose disease, and they will all be driven to complete these tasks by the very fibers of their synthetic DNA.

Right now, Venter is thinking of a bug. He is thinking of a bug that could swim in a pond and soak up sunlight and urinate automotive fuel. He is thinking of a bug that could live in a factory and gobble exhaust and fart fresh air. […]

The challenge of building a synthetic bacterium from raw DNA is as byzantine as it probably sounds. It means taking four bottles of chemicals — the adenine, thymine, cytosine and guanine that make up DNA — and linking them into a daisy chain at least half a million units long, then inserting that molecule into a host cell and hoping it will spring to life as an organism that not only grows and reproduces but also manufactures exactly what its designer intended. […]

The future, he says, may be sooner than we think. Much of the groundwork is already done. In 2003, Venter’s lab used a new method to piece together a strip of DNA that was identical to a natural virus, then watched it spring to action and attack a cell. In 2008, they built a longer genome, replicating the DNA of a whole bacterium, and in 2010 they announced that they brought a bacterium with synthetic DNA to life. That organism was still mostly a copy of one in nature, but as a flourish, Venter and his team wrote their names into its DNA, along with quotes from James Joyce and J. Robert Oppenheimer and even secret messages. As the bacteria reproduced, the quotes and messages and names remained in the colony’s DNA. […]

“Agriculture as we know it needs to disappear,” Venter said. “We can design better and healthier proteins than we get from nature.” By this, he didn’t mean growing apples in a Petri dish. He meant producing bulk commodities like corn, soy and wheat, that we use in processed products like tofu and cereal. “If you can produce the key ingredients with 10 or 100 times the efficiency,” he said, “that’s a better use of land and resources.”

{ NY Times | Continue reading }

images { 1 | 2 }

Don’t get creepy in the teepee

2534.jpg

In particle physics, antimatter is the extension of the concept of the antiparticle to matter, where antimatter is composed of antiparticles in the same way that normal matter is composed of particles.

For example, a positron (the antiparticle of the electron) and an antiproton can form an antihydrogen atom in the same way that an electron and a proton form a “normal matter” hydrogen atom.

Furthermore, mixing matter and antimatter can lead to the annihilation of both, in the same way that mixing antiparticles and particles does, thus giving rise to high-energy photons (gamma rays) or other particle–antiparticle pairs.

The result of antimatter meeting matter is an explosion.

There is considerable speculation as to why the observable universe is apparently composed almost entirely of matter (as opposed to a mixture of matter and antimatter), whether there exist other places that are almost entirely composed of antimatter instead, and what sorts of technology might be possible if antimatter could be harnessed. At this time, the apparent asymmetry of matter and antimatter in the visible universe is one of the greatest unsolved problems in physics.

{ Wikipedia | Continue reading }

An international collaboration of scientists has reported in landmark detail the decay process of a subatomic particle called a kaon – information that may help answer fundamental questions about how the universe began. The research used breakthrough techniques on some of the world’s fastest supercomputers to expand on a 1964 Nobel Prize-winning experiment. […] “This calculation brings us closer to answering fundamental questions about how matter formed in the early universe and why we, and everything else we observe today, are made of matter and not anti-matter,” says Thomas Blum, associate professor of physics at the University of Connecticut, a co-author of the paper.

{ DailyGalaxy | Continue reading }

photo { Lee Kwang-Ho }

‘This final aim is God’s purpose with the world; but God is the absolutely perfect Being, and can, therefore, will nothing but himself.’ –Hegel

2310.jpg

You may recall last summer that Apple, Microsoft, EMC, RIM, Ericsson and Sony all teamed up to buy Nortel’s patents for $4.5 billion. They beat out a team of Google and Intel who bid a bit less. While there was some antitrust scrutiny over the deal, it was dropped and the purchase went through. Apparently, the new owners picked off a bunch of patents to transfer to themselves… and then all (minus EMC, who, one hopes, was horrified by the plans) decided to support a massive new patent troll armed with the remaining 4,000 patents. The company is called Rockstar Consortium, and it’s run by the folks who used to run Nortel’s patent licensing program anyway — but now employs people whose job it is to just find other companies to threaten.

{ TechDirt | Continue reading }

I think fast, I talk fast, and I need you guys to act fast

2341.jpg

Microsoft tops the list of companies making the most requests to Google to takedown copyrighted material.

Google’s Transparency Report previously tracked the number of requests from governments and released data on copyright requests to the Chilling Effects website. Now, it has decided to start publishing more details after a jump in the number of copyright-related notices, largely under the US DMCA, which requires Google to stop linking to sites if it receives a complaint.

“These days it’s not unusual for us to receive more than 250,000 requests each week, which is more than what copyright owners asked us to remove in all of 2009.”

{ PC Pro | Continue reading }

painting { Franz Kline, Suspended, 1953 }

Not peace at any price, but war

321.jpg

At least four law suits have been filed as of Wednesday, including one suit by a Maryland investor alleging that Nasdaq OMX Group “badly mishandled” the IPO such that trades were delayed and orders couldn’t be canceled. […]

For example, according to his complaint, Goldberg himself tried to make a series of limit buy orders via an online account. When the trades failed to execute, he tried to cancel them. His cancellation orders were reflected as pending for much of the day, and one trade, to purchase Facebook shares at $41.23, was executed three hours after the order was made, when the stock’s price had dropped to around $38. […]

Meanwhile, three other suits have been lodged against Facebook and numerous financial service firms who underwrote or otherwise took part in the IPO.

For example, Lieff Cabraser Heimann & Bernstein, announced that it had filed a class action lawsuit on behalf of all persons and entities who purchased the securities of Facebook, Inc. in connection with its $16 billion initial public offering of common stock on May 18, 2012 (the “IPO”).

The action was brought against Facebook, some of its officers and directors, and the underwriters of the IPO for violations of the federal securities laws.

Meanwhile, Los Angeles law-firm Glancy Binkow & Goldberg LLP, filed its own class action lawsuit on behalf of investors. The complaint, captioned Lazar v. Facebook, Inc., et al., was filed today in the Superior Court for the State of California, County of San Mateo, on behalf of a class consisting of all persons or entities who purchased the securities of Facebook.. It alleges, among others, that the offering materials provided to potential investors were negligently prepared and failed to disclose material information about Facebook’s business, operations and prospects, in violation of federal securities laws.

{ Securities Technology Monitor | Continue reading }

Fri May 18, 2012 11:44am EDT

“A 15 to 20 percent pop is in the realm of possibility,” said Tim Loughran, a finance professor at the University of Notre Dame, before the start of trade. […]

Some expect shares could rise 30 percent or more on Friday, despite ongoing concerns about Facebook’s long-term money-making potential. An average of Morningstar analyst estimates put the closing price for Facebook shares on Friday at $50.

{ Reuters | Continue reading }

related { Morgan Stanley told brokers on Wednesday it is reviewing every Facebook Inc trade and will make price adjustments for retail customers who paid too much }

photo { Joel Barhamand }

‘Paradise on earth is where I am.’ –Voltaire

561.jpg

If you are an IPO company founder and — even more explicitly — you are Facebook CEO Mark Zuckerberg, you want your share price on the first day to go exactly nowhere, which is what Facebook did. That means no money was left on the table and the company got the best possible deal.

Zuckerberg didn’t and doesn’t care about investors in this scenario. He just doesn’t give a damn. Investment bankers do give a damn because they’d like to have another IPO next week or next month and have that go very well, too. Zuckerberg expects Facebook to never issue another share of stock. He’s done raising money thanks, and on his honeymoon.

I’m sure there was a struggle at the end over how to price the offering. The bankers would have preferred $34 or even $32, but Facebook went for $38 and they were correct to do so from their point of view because we now see it was the optimal solution.

{ Cringely | Continue reading }

As Facebook shares continued their slide, regulators launched inquiries into whether privileged Wall Street insiders were alerted to the company’s weakening financial projections, leading them to shun the stock or dump shares just as buying was opened to the public. […]

SEC Chairwoman Mary Schapiro said the agency will examine “issues” into the bungled Facebook public offering. […]

The legal issue raised could be “securities fraud — plain and simple,” said Ernest Badway, a securities lawyer in New York and New Jersey and a former enforcement attorney at the U.S. Securities and Exchange Commission.

{ LA Times | Continue reading }

One mutual fund source said they had never, in a decade of experience, seen an underwriter cut a company’s outlook during the road show prior to an offering. […]

Brokers who over-ordered shares in the expectation that supply would be limited continued to complain they received too much stock to handle and were left in the dark about forecast changes.

{ The Age | Continue reading }

photo { Victor Cobo }

Omar comin’ yo

546.jpg

Millennium Challenge 2002 (MC02) was a major war game exercise conducted by the United States armed forces in mid-2002, likely the largest such exercise in history. The exercise cost $250 million, involved both live exercises and computer simulations.

MC02 was meant to be a test of future military “transformation”—a transition toward new technologies that enable network-centric warfare and provide more powerful weaponry and tactics.

Red, commanded by retired Marine Corps Lt. General Paul K. Van Riper, used old methods to evade Blue’s sophisticated electronic surveillance network. Van Riper used motorcycle messengers to transmit orders to front-line troops and World War II light signals to launch airplanes without radio communications. … In a preemptive strike, Red launched a massive salvo of cruise missiles that overwhelmed the Blue forces’ electronic sensors and destroyed sixteen warships. […]

Another significant portion of Blue’s navy was “sunk” by an armada of small Red boats, which carried out both conventional and suicide attacks that capitalized on Blue’s inability to detect them as well as expected.

At this point, the exercise was suspended, Blue’s ships were “re-floated”, and the rules of engagement were changed. … The war game was forced to follow a script drafted to ensure a Blue Force victory. […] Red Force was ordered to turn on all his anti-aircraft radar in order for them to be destroyed, and Red Force was not allowed to shoot down any of the aircraft bringing Blue Force troops ashore. … They also ordered Red Force not to use certain weapons systems against Blue Force and even ordered that the location of Red Force units to be revealed. […]

Due to his criticism regarding the scripted nature of the new exercise, Van Riper resigned his position in the midst of the war game.

War colleges, where people learn to be soldiers, often have war simulations where different people play different parts of a war between “us” and “them.” Students and others are told that these are realistic, or at least as realistic as is feasible given the simplifications that simulations and games require.

But I’ve now heard personally from enough independent expert insider sources that I’m willing to post it: the above example was not a rare exception; war games are mostly fake.

{ OvercomingBias | Continue reading }

Because in middle youth he had often sat observing through a rondel of bossed glass of a multicolored pane the spectacle offered with continual changes of the thoroughfare without, pedestrians, quadrupeds, velocipedes, vehicles, passing slowly, quickly, evenly, round and round and round the rim of a round precipitous globe.

3231.jpg

Divorce lawyers and wedding planners have been gearing up for the Facebook IPO, waiting for the influx of wealth in Silicon Valley to stir up drama in romantic relationships, for better and for worse.

“When Google went public, there was a wave of divorces. When Cisco went public there was a wave of divorces,” says Steve Cone, a divorce attorney based in Palo Alto, near the social network’s Menlo Park headquarters. “I expect a similar wave shortly after Facebook goes public.”

{ FT | Continue reading }

photo { Vivian Maier }

Kill everyone now! Condone first degree murder! Advocate cannibalism! Eat shit!

451.jpg

{ A human brain overrun with cysts from Taenia solium, a tapeworm that normally inhabits the muscles of pigs. | Discover | full story }

Coming out with a whopper now. Rhapsodies about damn all.

31.jpg

One of the nightmare scenarios for modern society is the possibility of a global flu pandemic like the 1918 Spanish influenza which infected about a quarter of the global population and killed as many as 130 million of them.

An important question for policy makers is how best to limit the spread of such a disease if a new outbreak were to occur. (The Spanish flu was caused by the H1N1 flu virus that was also responsible for the 2009 swine flu outbreak.)

One obvious idea is to close international airports to prevent, or at least dramatically reduce, the movement of potentially infected individuals between countries. But is this the best approach?

Today, Jose Marcelino and Marcus Kaiser at Newcastle University in the UK, provide an answer. They say a better approach is to cut specific flights between airports because it can achieve the same reduction in the spread of the disease with far less drastic action.

{ The Physics arXiv Blog | Continue reading }



kerrrocket.svg