Skip to main content

Thursday 28th January 2021

Here's some of what you missed in the discussion at 'The Thirsty Robot':

Recommended Movies:


In the Shadow of the Moon Netflix UK

    Crime with a twist...

Hotel Artemis Netflix UK

    A little bit John Wick influenced...

Space Sweepers Netflix UK

    Not 'Cleaners in Space' - more like a live action 'Planetes'...

As usual, we reckon it is best if you don't know anything before watching these films! So only click on the links if you want your experience to be potentially spoiled...

Recommended TV:

The Great All 4

    Not quite the hyper-active comedy that the advance adverts suggested, more of a drama with bits of black comedy. As it says: 'Occasionally true' which seems to mean 'Not like what really happened in history'.

The Expanse Amazon Prime

    Another Science Fiction series that changes publisher and ends up on Prime (This one started out on SyFy originally). Space opera and distopian future done nicely - kind of Altered Carbon meets EE 'Doc' Smith...

Recommended YouTube:

Magic Mirror https://www.youtube.com/watch?v=Qwc2Eq6YXTQ

Recommended Things to Make:

Star Wars Terminal https://www.thingiverse.com/thing:4707250

Ted the Talking Toaster https://www.instructables.com/Ted-the-Talking-Toaster/

Recommended Foodstuff:

Arctic Roll https://www.theguardian.com/lifeandstyle/2008/dec/16/arctic-roll-birds-eye

---

The next online meeting at The Thirsty Robot is on Thursday 11th February 2021 at 7:30pm GMT.




Comments

Popular posts from this blog

Thursday 14th May 2021

Here's some of what you missed at The Thirsty Robot: Technical Musings Technology Topic - The 5 Stages of Hacking Discussion turned immediately to Security this time. The fifth stage of Hacking was mentioned, in the context of digital forensics. Hang on, you might be thinking, the fifth stage of Hacking isn't Forensics! Photo of one of the 5 Stages by  Antoine Julien  on  Unsplash Let's refresh our memories about those 5 stages first. No, not that sort of stage! - Reconnaissance - Scanning - Gaining Access - Maintaining Access - Cover(ing) Tracks Now, if you are talking about Ethical Hacking, then that fifth stage is often changed - to Forensics. And some people insist on calling it 'digital forensics', to differentiate it from dusting for fingerprints, looking at blood splatter patterns and all those other 'Witless Silence' tropes. (The long-used incorrect spoonerism of a famous BBC crime drama was first given a mass audience in the 1999 Easter Special epi...

Thursday 9th September 2021

 Here's some of what you missed at The Thirsty Robot: Technical Musings  - Prisoner's Dilemma How do people behave in a situation when they gain by co-operating, but gain more by not co-operating? This is the basic scenario of a mind game that is known as the 'Prisoner's Dilemma' where individual betrayal is rewarded higher than mutual co-operation. If you thought that altruism would win over selfish self-interest, then unfortunately, it seems that you would be wrong most of the time. There are many sources of this, and other similar 'Social Psychology' / Philosophical /  'mind games (thought experiments...) that reveal how people behave - but usually not why!' activities on the InterWeb. it is also used in MANY TV game shows... Prisoner's Dilemma Splitting money equitably? For a VERY deep rabbit hole - try this:  Dilemma or Dilemna?   Or this...    Or...   What seems to be happening is that a lot of people are convinced they were taught that ...

Thursday 12th August 2021

Here's some of what you missed at The Thirsty Robot: Technical Musings Technology Topic - Alternative Operating Systems Not what you might be expecting... There was no mention of Windows or macOS in this discussion. Instead the chat circled around alternative Linuxes, and particularly Kali - the specialised 'security-oriented' community-project offering from Offensive Security .  If you aren't familiar with the extreme customisation that security people prefer in their operating systems, then the words 'specialised' and 'security' are the most important keywords here. Kali is not intended to be used as a general purpose operating system by ordinary people - for that you should use something designed to be as easy to install and maintain as possible:  Mint Linux being just one example of a popular 'distro' that fulfills those 'straight-forward' and 'easy to use' criteria. A lot of people use Mint Linux as an alternative to the W ...