As its name implies, Researcher is designed to help the user find reliable sources of information by using the Bing Knowledge Graph to search for sources, and it will properly cite them in the Word document.
[Editor] builds on the already-existing spellchecker and thesaurus to offer suggestions on how to improve your overall writing. In addition to the wavy red line under a misspelled word and the wavy blue line under bad grammar, there will be a gold line for writing style.
The new features are expected to be available later this year.
‘Ultradiffuse’ galaxies came to attention only last year, after Pieter van Dokkum of Yale University in New Haven, Connecticut, and Roberto Abraham of the University of Toronto in Canada built an array of sensitive telephoto lenses named Dragonfly. The astronomers and their colleagues observed the Coma galaxy cluster 101 megaparsecs (330 million light years) away and detected 47 faint smudges.
“They can’t be real,” van Dokkum recalls thinking when he first saw the galaxies on his laptop computer. But their distribution in space matched that of the cluster’s other galaxies, indicating that they were true members. Since then, hundreds more of these galaxies have turned up in the Coma cluster and elsewhere.
Ultradiffuse galaxies are large like the Milky Way — which is much bigger than most — but they glow as dimly as mere dwarf galaxies. It’s as though a city as big as London emitted as little light as Kalamazoo, Michigan.
More significantly, they have now found that these dim galaxies can be as big and as massive as the biggest bright galaxies, suggesting that there are a lot more stars and mass hidden out there and unseen than anyone had previously predicted.
they have not listed intruders or attempted intrusions to the DNC site. I suspect that’s because they did a quick and dirty look for known attacks. Of course, this brings up another question; if it’s a know attack, why did the DNC not have software to stop it? You can tell from the network log who is going into a site. I used that on networks that I had. I looked to see who came into my LAN, where they went, how long they stayed and what they did while in my network.
Further, if you needed to, you could trace back approaches through other servers etc. Trace Route and Trace Watch are good examples of monitoring software that help do these things. Others of course exist probably the best are in NSA/GCHQ and the other Five Eyes countries. But, these countries have no monopoly on smart people that could do similar detection software.
Question is do they want to fix the problems with existing protection software. If the DNC and OPM are examples, then obviously, they don’t care to fix weakness probably because the want to use these weaknesses to their own advantage.
Matter cannot be created or destroyed, nor can it be returned without a receipt.