en

Arsenal Women Arsecast 90: Arsenal 2-2 Man City

In this episode of the Arsenal Women Arsecast and the first in our new format. Tim and Jamie break down the starting line-up, the tactical approach and the big moments and incidents in Arsenal’s 2-2 draw against Manchester City at the Emirates. In the second half, there are listener questions on Arsenal’s wayward finishing and whether it is a long term concern, how much is profligacy a coaching issue v a personnel issue, the midfield setup, Kafaji on the wing and how much the game plan v City was a one off versus how things might look longer term.


Get extra bonus content and help support Arseblog by becoming an Arseblog Member on Patreon: https://www.patreon.com/arseblog




Hosted on Acast. See acast.com/privacy for more information.




en

Arsenal Women Arsecast 91: Leicester 0-1 Arsenal

In this episode of the Arsenal Women Arsecast, Tim and Jamie talk about Arsenal’s 1-0 win over Leicester at the King Power. Tim and Jamie discuss a rotated starting line-up, how much the packed early season schedule contributed to a leggy performance, whether the game can be taken in isolation or whether concerns about the attack in particular persist and the performances of Daphne van Domselaar, Alessia Russo, the midfield partnership of Lia Walti and Kyra Cooney-Cross, defensive injuries and a lack of creativity without Mariona and Kafaji starting the game.


Get extra bonus content and help support Arseblog by becoming an Arseblog Member on Patreon: https://www.patreon.com/arseblog




Hosted on Acast. See acast.com/privacy for more information.




en

Arsenal Women Arsecast 92: Arsenal 0-0 Everton

In this episode of the Arsenal Women Arsecast, Tim and Jamie talk about Arsenal’s 1-0 win over Leicester at the King Power. Tim and Jamie discuss a rotated starting line-up, how much the packed early season schedule contributed to a leggy performance, whether the game can be taken in isolation or whether concerns about the attack in particular persist and the performances of Daphne van Domselaar, Alessia Russo, the midfield partnership of Lia Walti and Kyra Cooney-Cross, defensive injuries and a lack of creativity without Mariona and Kafaji starting the game.


Get extra bonus content and help support Arseblog by becoming an Arseblog Member on Patreon: https://www.patreon.com/arseblog




Hosted on Acast. See acast.com/privacy for more information.




en

Arsenal Women Arsecast 93: Arsenal 1-2 Chelsea

In this episode of the Arsenal Women Arsecast Tim and Jamie pore over the 2-1 defeat to Chelsea on Saturday and try to dissect how to separate this result and performance from the wider funk that Arsenal seem to be in. Did Arsenal just 'get varianced'? And is it possible to separate that from the wider malaise? Tim and Jamie talk about the defending on the goals conceded and whether a lack of confidence in attack had an impact on the result with more than one proven player low on confidence. In the second half, Tim and Jamie deal with listener questions on Rosa Kafaji and the lack of integration for young players, on Clare Wheatley's role and whether more communication from 'upstairs' is needed at the club and on the delicate balance between rotation and trying and failing to find partnerships that work.


Get extra bonus content and help support Arseblog by becoming an Arseblog Member on Patreon: https://www.patreon.com/arseblog



Hosted on Acast. See acast.com/privacy for more information.




en

Arsenal Women Arsecast 94: Jonas Eidevall resigns

In this emergency episode of the Arsenal Women Arsecast, Tim and Jamie run the rule over the resignation of Jonas Eidevall as the Head Coach of Arsenal Women. Tim talks a little bit about how Arseblog News became aware of and were able to (just about) break the story on Tuesday morning. Then Tim and Jamie analyse where things went wrong, how the situation took a serious turn in the last week, why it didn't quite click the way the club and Jonas wanted it to and looked ahead to how Arsenal might succession plan for his departure. Tim and Jamie then each share one high point from Eidevall's reign.

 

Get extra bonus content and help support Arseblog by becoming an Arseblog Member on Patreon: https://www.patreon.com/arseblog



Hosted on Acast. See acast.com/privacy for more information.




en

Arsenal Women Arsecast 95: West Ham 0 Arsenal 2

In this episode of the Arsenal Women Arsecast, Tim and Jamie comb through the 2-0 victory at West Ham. Tim and Jamie look at Arsenal's tactical approach and selection and some of the issues with chance creation rearing their head again, question how much has changed and how much change we could expect from Renee Slegers' interim charge and look at the impact of the quadruple substitution early in the second half. In the second half, Tim and Jamie take your questions on the midfield, whether Kafaji should have an increased role now, Steph Catley at centre-back, the goalkeeper situation, whether Arsenal need a 'clean break' with a new manager ASAP and then Tim and Jamie consider Manu Zinsberger's recent LinkedIn post and consider the lines between criticism and abuse.


Get extra bonus content and help support Arseblog by becoming an Arseblog Member on Patreon: https://www.patreon.com/arseblog


If you are a regular listener please consider giving the show a review in your favourite podcast app, thanks!



Hosted on Acast. See acast.com/privacy for more information.




en

Arsenal Women Arsecast 96: Man Utd 1 Arsenal 1

On this episode of the Arsenal Women Arsecast, Tim and Jamie discuss the frustrating 1-1 draw with Manchester United. Tim and Jamie comb over the performance, the encouraging display of Alessia Russo but the irritation at again seeing Arsenal struggle to convert dominance into goals and ask whether there are any green shoots here. They also discuss Arsenal's lack of aerial prowess in defence and whether it can be fixed by any other means than the transfer market. As ever, in part 2 Tim and Jamie take listener questions on the attacking issues, whether the Russo / Stina split works, the relationship between the attackers, the lack of goal celebrations and the new manager search.


Get extra bonus content and help support Arseblog by becoming an Arseblog Member on Patreon: https://www.patreon.com/arseblog



Hosted on Acast. See acast.com/privacy for more information.




en

Arsenal Women Arsecast 96: Arsenal 5 Brighton 0

In this episode of the Arsenal Women Arsecast, Tim and Jamie dissect the 5-0 win over Brighton at Emirates Stadium on Friday evening. Tim and Jamie consider how far this was a vintage Arsenal performance and a bad Brighton one, whether trademark goals from Mead, Foord, Maanum and Hurtig suggest that Arsenal are back in the swing of things attacking wise and they consider Renee Slegers' willingness to make early substitutions. In the second half, they take listener questions on the new manager search, the decision to switch the Bayern Munich UWCL game away from the Emirates, the future of the midfield and a team featuring players who were largely signed several years ago.

 

Get extra bonus content and help support Arseblog by becoming an Arseblog Member on Patreon: https://www.patreon.com/arseblog



Hosted on Acast. See acast.com/privacy for more information.




en

Scientific Replication is Harder Than YouThink -and Can Be Hilarious

Science experiments are not considered completely valid unless they can be replicated. Replicating an experiment is pretty much impossible unless you've been steeped in the various factors of scientific theory. And even if you are thoroughly trained in those factors, it's easy to lose track when you're doing a casual experiment at home. That goes double when your aim is to debunk something that you find obviously wrong.

Sage the Bad Naturalist jumped into such a debunking experiment with both feet, and then got entangled in them. She spent an entire year trying to replicate a dubious TikTok, which turned into an embarrassing adventure in how not to do science. But negative results are still results, and the goal of science is always to learn something. She bravely admits all the things she did wrong, because scientists have to have humility to be accepted. What's funniest is how many things went wrong, and how they all piled up to the end. What she ended up with is an amusing and rather charming video on the dangers of throwing your heart (and time) into debunking something you saw on the internet. -via Metafilter






en

Girl Texts Guy Insult in an Attempt to Flirt, and Ends up Getting Stonewalled after Some Serious Awkwardness

It all starts with the anything-but-smooth introduction...











en

Walmart Revenge

What's between aggressively keying a car and passively doing nothing? Passive aggressive cart block.




en

35 Funny Texting FAILs Full of Cringe to Lighten Your Mood




en

Enough to Convince Me to Convert to Satinism




en

Vampire bats have a really strange way of getting energy, scientists discover after putting them on treadmills

Vampire bats rely on amino acids from their blood diet to fuel their exercise, scientists discovered after observing the animals on tiny treadmills.




en

2,600-year-old Celtic wooden burial chamber of 'outstanding scientific importance' uncovered by archaeologists in Germany

The discovery of an impeccably preserved Celtic burial chamber in southern Germany is a "stroke of luck for archaeology," scientists say.




en

Pando, the world's largest organism, may have been growing nonstop since the 1st humans left Africa, study suggests

The clonal quaking aspen known as Pando is between 16,000 and 80,000 years old.




en

Global carbon emissions reach new record high in 2024, with no end in sight, scientists say

There is a 50% chance that global warming will consistently exceed 1.5 degrees Celsius in the next six years, according to a new report.




en

06 – The Internet Musician – Music Licensing for Indie Artists

Show Notes for Episode 6: Following my recent appearance on the Film and TV Music Licensing Panel at the MidAtlantic Music Conference here in Charlotte, NC, I definitely have music licensing on my mind.  It’s always been a passion of mind…one of those areas of music marketing that I’ve researched exhaustively for years.  It’s also […]




en

Stop LUCR-3 Attacks: Learn Key Identity Security Tactics in This Expert Webinar

Did you know that advanced threat actors can infiltrate the identity systems of major organizations and extract sensitive data within days? It’s a chilling reality, becoming more common and concerning by the day. These attackers exploit vulnerabilities in SaaS and cloud environments, using compromised identities to move laterally within networks, causing widespread damage. Cybersecurity and IT




en

New FakeCall Malware Variant Hijacks Android Devices for Fraudulent Banking Calls

Cybersecurity researchers have discovered a new version of a well-known Android malware family dubbed FakeCall that employs voice phishing (aka vishing) techniques to trick users into parting with their personal information. "FakeCall is an extremely sophisticated Vishing attack that leverages malware to take almost complete control of the mobile device, including the interception of incoming




en

Google’s AI Tool Big Sleep Finds Zero-Day Vulnerability in SQLite Database Engine

Google said it discovered a zero-day vulnerability in the SQLite open-source database engine using its large language model (LLM) assisted framework called Big Sleep (formerly Project Naptime). The tech giant described the development as the "first real-world vulnerability" uncovered using the artificial intelligence (AI) agent. "We believe this is the first public example of an AI agent finding




en

Critical Flaws in Ollama AI Framework Could Enable DoS, Model Theft, and Poisoning

Cybersecurity researchers have disclosed six security flaws in the Ollama artificial intelligence (AI) framework that could be exploited by a malicious actor to perform various actions, including denial-of-service, model poisoning, and model theft. "Collectively, the vulnerabilities could allow an attacker to carry out a wide-range of malicious actions with a single HTTP request, including




en

New Android Banking Malware 'ToxicPanda' Targets Users with Fraudulent Money Transfers

Over 1,500 Android devices have been infected by a new strain of Android banking malware called ToxicPanda that allows threat actors to conduct fraudulent banking transactions. "ToxicPanda's main goal is to initiate money transfers from compromised devices via account takeover (ATO) using a well-known technique called on-device fraud (ODF)," Cleafy researchers Michele Roviello, Alessandro Strino




en

FBI Seeks Public Help to Identify Chinese Hackers Behind Global Cyber Intrusions

The U.S. Federal Bureau of Investigation (FBI) has sought assistance from the public in connection with an investigation involving the breach of edge devices and computer networks belonging to companies and government entities. "An Advanced Persistent Threat group allegedly created and deployed malware (CVE-2020-12271) as part of a widespread series of indiscriminate computer intrusions designed




en

Google Cloud to Enforce Multi-Factor Authentication by 2025 for All Users

Google's cloud division has announced that it will enforce mandatory multi-factor authentication (MFA) for all users by the end of 2025 as part of its efforts to improve account security. "We will be implementing mandatory MFA for Google Cloud in a phased approach that will roll out to all users worldwide during 2025," Mayank Upadhyay, vice president of engineering and distinguished engineer at




en

South Korea Fines Meta $15.67M for Illegally Sharing Sensitive User Data with Advertisers

Meta has been fined 21.62 billion won ($15.67 million) by South Korea's data privacy watchdog for illegally collecting sensitive personal information from Facebook users, including data about their political views and sexual orientation, and sharing it with advertisers without their consent. The country's Personal Information Protection Commission (PIPC) said Meta gathered information such as




en

North Korean Hackers Target Crypto Firms with Hidden Risk Malware on macOS

A threat actor with ties to the Democratic People's Republic of Korea (DPRK) has been observed targeting cryptocurrency-related businesses with a multi-stage malware capable of infecting Apple macOS devices. Cybersecurity company SentinelOne, which dubbed the campaign Hidden Risk, attributed it with high confidence to BlueNoroff, which has been previously linked to malware families such as




en

IcePeony and Transparent Tribe Target Indian Entities with Cloud-Based Tools

High-profile entities in India have become the target of malicious campaigns orchestrated by the Pakistan-based Transparent Tribe threat actor and a previously unknown China-nexus cyber espionage group dubbed IcePeony. The intrusions linked to Transparent Tribe involve the use of a malware called ElizaRAT and a new stealer payload dubbed ApoloStealer on specific victims of interest, Check Point




en

Bitcoin Fog Founder Sentenced to 12 Years for Cryptocurrency Money Laundering

The 36-year-old founder of the Bitcoin Fog cryptocurrency mixer has been sentenced to 12 years and six months in prison for facilitating money laundering activities between 2011 and 2021. Roman Sterlingov, a dual Russian-Swedish national, pleaded guilty to charges of money laundering and operating an unlicensed money-transmitting business earlier this March. The U.S. Department of Justice (DoJ)




en

Palo Alto Advises Securing PAN-OS Interface Amid Potential RCE Threat Concerns

Palo Alto Networks on Friday issued an informational advisory urging customers to ensure that access to the PAN-OS management interface is secured because of a potential remote code execution vulnerability. "Palo Alto Networks is aware of a claim of a remote code execution vulnerability via the PAN-OS management interface," the company said. "At this time, we do not know the specifics of the




en

Security Flaws in Popular ML Toolkits Enable Server Hijacks, Privilege Escalation

Cybersecurity researchers have uncovered nearly two dozen security flaws spanning 15 different machine learning (ML) related open-source projects. These comprise vulnerabilities discovered both on the server- and client-side, software supply chain security firm JFrog said in an analysis published last week. The server-side weaknesses "allow attackers to hijack important servers in the




en

The ROI of Security Investments: How Cybersecurity Leaders Prove It

Cyber threats are intensifying, and cybersecurity has become critical to business operations. As security budgets grow, CEOs and boardrooms are demanding concrete evidence that cybersecurity initiatives deliver value beyond regulation compliance. Just like you wouldn’t buy a car without knowing it was first put through a crash test, security systems must also be validated to confirm their value.




en

New GootLoader Campaign Targets Users Searching for Bengal Cat Laws in Australia

In an unusually specific campaign, users searching about the legality of Bengal Cats in Australia are being targeted with the GootLoader malware. "In this case, we found the GootLoader actors using search results for information about a particular cat and a particular geography being used to deliver the payload: 'Are Bengal Cats legal in Australia?,'" Sophos researchers Trang Tang, Hikaru Koike,




en

5 Ways Behavioral Analytics is Revolutionizing Incident Response

Behavioral analytics, long associated with threat detection (i.e. UEBA or UBA), is experiencing a renaissance. Once primarily used to identify suspicious activity, it’s now being reimagined as a powerful post-detection technology that enhances incident response processes. By leveraging behavioral insights during alert triage and investigation, SOCs can transform their workflows to become more




en

New Flaws in Citrix Virtual Apps Enable RCE Attacks via MSMQ Misconfiguration

Cybersecurity researchers have disclosed new security flaws impacting Citrix Virtual Apps and Desktop that could be exploited to achieve unauthenticated remote code execution (RCE) The issue, per findings from watchTowr, is rooted in the Session Recording component that allows system administrators to capture user activity, and record keyboard and mouse input, along with a video stream of the




en

WHY COMPETITION IS RELEVANT TO SELF-DEFENSE

Recently saw this on YouTube, from a grandmaster competition shooter who is also in law enforcement. I agree with him. I’ve said for years that while a shooting match is not a gunfight, a gunfight most certainly is a shooting match. Competition experience makes shooting under pressure the norm. Wyatt Earp competed in the informal […]




en

THE NEXT TIME AN ANTI-GUNNER SAYS CITIZENS’ RIFLES ARE USELESS AGAINST ARMIES…

…remind them of this. I was recently reading “Andrew Jackson and the Miracle of New Orleans” by Brian Kilmeade and Don Yeager. The War of 1812 was going badly for the Americans. The British had burned the White House, and a huge contingent of British troops was in Louisiana planning to march north in conquest. […]




en

SUICIDE PREVENTION

While participating in a Zoom conference with other members of the New Hampshire Firearms Safety Coalition, of which I’ve been a proud member for a quarter century or so, I was reminded that I have not addressed here a topic NHFSC has strongly and successfully focused upon: suicide prevention. The organization was founded by the […]




en

CATCH THE NEW SECOND AMENDMENT FOUNDATION VIDEO

The Second Amendment Foundation has released a 22-minute video celebrating its fifty years of fighting for gun owners’ civil rights. Some of those who’ve been along for most or all of the ride, including founder Alan Gottlieb, give insight into how far we’ve come.  See it here:




en

Record of Achievement

On the interesting properties of becoming the kind of person who buys vinyl records.




en

Typo in Trump’s Name on Ballot Review Screen Is Not ‘Election Fraud’

A misspelling of former President Donald Trump's name occurred on an optional ballot review screen in Virginia, prompting an unfounded claim on social media of "election fraud." The error was a typo that appeared only on the ballot review screen, not on actual ballots, and would not affect any votes, election officials said.

The post Typo in Trump’s Name on Ballot Review Screen Is Not ‘Election Fraud’ appeared first on FactCheck.org.




en

Posts Spread Unfounded Claim of Race-Based Threat of Violence in Georgia

Posts shared on Facebook make an unfounded claim of racially motivated threats of violence in Gwinnett County, Georgia, "from now until the Inauguration." The county sheriff's office said it had "not received any information indicating threats to any group(s) on or after election day."

The post Posts Spread Unfounded Claim of Race-Based Threat of Violence in Georgia appeared first on FactCheck.org.




en

Trump’s New York Case: What Happens Now?

Q: What will happen in Donald Trump’s New York state criminal case now that he is president-elect?

A: Trump is scheduled to be sentenced on Nov. 26, but the judge could decide that sentencing is no longer appropriate. If Trump does receive a sentence, it could be appealed, or the judgment could be deferred until 2029, when Trump would be out of office.

FULL QUESTION

What happens if Trump wins the election and then he gets sentenced at the end of the month?

The post Trump’s New York Case: What Happens Now? appeared first on FactCheck.org.




en

More inexpensive ebook goodies!


You can now download Peter F. Hamilton's Pandora's Star for only 2.99$ by following this Amazon Associate link. This OneLink will take you to the nearest Amazon site serving your country and you'll see if you can take advantage of this sale.

Here's the blurb:

The year is 2380. The Intersolar Commonwealth, a sphere of stars, contains more than six hundred worlds interconnected by a web of transport “tunnels” known as wormholes. At the farthest edge of the Commonwealth, astronomer Dudley Bose observes the impossible: over one thousand light-years away, a star . . . disappears. Since the location is too distant to reach by wormhole, the Second Chance, a faster-than-light starship commanded by Wilson Kime, a five-times-rejuvenated ex-NASA pilot, is dispatched to learn what has occurred and whether it represents a threat.

Opposed to the mission are the Guardians of Selfhood, led by Bradley Johansson. Shortly after the journey begins, Kime wonders if the crew of the Second Chance has been infiltrated. But soon enough he will have other worries. Halfway across the galaxy, something truly incredible is waiting: a deadly discovery whose unleashing will threaten to destroy the Commonwealth . . . and humanity itself.




en

More inexpensive ebook goodies!


You can now get your hands on the digital edition of Blake Crouch's Upgrade for only 1.99$ by following this Amazon Associate link. This OneLink will take you to the nearest Amazon site serving your country and you'll see if you can take advantage of this sale.

Here's the blurb:

The mind-blowing new thriller from the New York Times bestselling author of Dark Matter and Recursion—currently in development as a motion picture at Steven Spielberg's Amblin Partners

“You are the next step in human evolution.”

At first, Logan Ramsay isn’t sure if anything’s different. He just feels a little . . . sharper. Better able to concentrate. Better at multitasking. Reading a bit faster, memorizing better, needing less sleep.

But before long, he can’t deny it: Something’s happening to his brain. To his body. He’s starting to see the world, and those around him—even those he loves most—in whole new ways.

The truth is, Logan’s genome has been hacked. And there’s a reason he’s been targeted for this upgrade. A reason that goes back decades to the darkest part of his past, and a horrific family legacy.

Worse still, what’s happening to him is just the first step in a much larger plan, one that will inflict the same changes on humanity at large—at a terrifying cost.

Because of his new abilities, Logan’s the one person in the world capable of stopping what’s been set in motion. But to have a chance at winning this war, he’ll have to become something other than himself. Maybe even something other than human.

And even as he’s fighting, he can’t help wondering: what if humanity’s only hope for a future really does lie in engineering our own evolution?

Intimate in scale yet epic in scope, Upgrade is an intricately plotted, lightning-fast tale that charts one man’s thrilling transformation, even as it asks us to ponder the limits of our humanity—and our boundless potential.





en

More inexpensive ebook goodies!


You can now download Sebastien de Castell's Play of Shadows for only 0.99$ by following this Amazon Associate link. This OneLink will take you to the nearest Amazon site serving your country and you'll see if you can take advantage of this sale.

Here's the blurb:

Swordplay, magic, intrigue and friendships stronger than iron: the first volume in the new swashbuckling fantasy series set in the universe of THE GREATCOATS.

Damelas Chademantaigne picked a poor night to flee a judicial duel.

He has precious little hope of escaping the wrath of the Vixen, the most feared duellist in the entire city, until he stumbles through the stage doors of the magnificent Operato Belleza and tricks his way into the company of actors. An archaic law provides a temporary respite from his troubles - until one night a ghostly voice in his head causes Damelas to fumble his lines, inadvertently blurting out a dreadful truth: the city's most legendary hero may actually be a traitor and a brutal murderer.

With only the help of his boisterous and lusty friend Bereto, a beautiful assassin whose target may well be Damelas himself, and a company of misfit actors who'd just as soon see him dead, this failed grandson of two Greatcoats must somehow find within himself the courage to dig up long-buried truths before a ruthless band of bravos known as the Iron Orchids come for his head.

Oh, and there's still that matter of the Vixen waiting to duel him . . .





en

More inexpensive ebook goodies!


For a limited time, you can download Paolo Bacigalupi's Navola for only 5.99$ by following this Amazon Associate link. This OneLink will take you to the nearest Amazon site serving your country and you'll see if you can take advantage of this sale.

Here's the blurb:

From the New York Times best-selling author of The Windup Girl and The Water Knife comes a sweeping literary historical fantasy about the young scion from a ruling-class family who faces rebellion as he ascends to power.

"You must be as sharp as a stilettotore’s dagger and as subtle as a fish beneath the waters. This is what it is to be Navolese, this is what it is to be di Regulai."

In Navola, a bustling city-state dominated by a handful of influential families, business is power, and power is everything. For generations, the di Regulai family—merchant bankers with a vast empire—has nurtured tendrils that stretch to the farthest reaches of the known world. And though they claim not to be political, their staggering wealth has bought cities and toppled kingdoms. Soon, Davico di Regulai will be expected to take the reins of power from his father and demonstrate his mastery of the games of Navolese diplomacy: knowing who to trust and who to doubt, and how to read what lies hidden behind a smile. But in Navola, strange and ancient undercurrents lurk behind the gilt and grandeur—like the fossilized dragon eye in the family’s possession, a potent symbol of their raw power and a talisman that seems to be summoning Davico to act.

As tensions rise and the events unfold, Davico will be tested to his limits. His fate depends on the eldritch dragon relic and on what lies buried in the heart of his adopted sister, Celia di Balcosi, whose own family was destroyed by Nalova’s twisted politics. With echoes of Renaissance Italy, The Godfather, and Game of Thrones, Navola is a stunning feat of world-building and a mesmerizing depiction of drive and will.