Technology

#MeToo is a movement started by Alyssa Milano which is raising awareness of sexual harassment...
A vulnerability in the common WPA2 Wi-Fi security protocol means practically every device that connects to a router (which is just about all of them) can be exploited to reveal access to credit card information, passwords and more. The Key Reinstallation Attacks (Krack Attacks) allow anyone in physical proximity to gain access. A flavor of Linux and devices using Android 6.0 and up are especially vulnerable. 

Changing the password won't do any good, the devices themselves need to be updated, so if you are using old technology you may be out of luck. The groups with most to lose will be corporations so they are likely to be updating.


The heads of more than 100 of the world’s top artificial intelligence companies are very alarmed about the development of “killer robots”. In an open letter to the UN, these business leaders – including Tesla’s Elon Musk and the founders of Google’s DeepMind AI firm – warned that autonomous weapon technology could be misused by terrorists and despots or hacked to perform in undesirable ways.

Ovaries constructed of 3-D printed scaffolds that house immature eggs were successful in boosting hormone production and restoring fertility by actually ovulating - and they produced healthy offspring which mothers also were able to nurse. 

By removing a female mouse's ovary and replacing it with a bioprosthetic ovary, the mouse was able to not only ovulate but also give birth to healthy pups. The moms were even able to nurse their young.  The bioprosthetic ovaries are constructed of 3-D printed scaffolds that house immature eggs, and have been successful in boosting hormone production and restoring fertility in mice, which was the ultimate goal of the research.
Prosthetics may look better but they have not really changed much in the last 100 years. That could soon change. The next generation of hand prosthetics may be far more like a real hand - they could allow the wearer to reach for objects almost automatically, without really thinking, like real hands do now.

Current prosthetic hands are controlled via myoelectric signals - that is electrical activity of the muscles recorded from the skin surface of the stump.In the US there are 500,000 upper limb amputees a year.
A new bio-inspired algorithm seems to use the social behavior of bee colonies, which allows them to attack in an optimal way, could help dismantle social networks linked to organized crime, jihadist terrorism, or facilitate the design of vaccination strategies capable of containing the spread of a pandemic.

The tool automatically detects and identifies the most dangerous actors or nodes within a given social network and the density of the interconnected relationships between them, which may help law enforcement authorities make their decisions and act in the most efficient way possible.
Cookbooks are popular. Cookbooks are instructional.

But they are woefully lacking information about a vital thing - food safety. An analysis of 1,497 recipes from 29 cookbooks that appeared on the New York Times best sellers list for food and diet books, all of which included handling raw animal ingredients, such as meat, poultry, seafood or eggs, didn't note food safety much at all.

Specifically, the researchers looked for three things:

* Did the recipe tell readers to cook the dish to a specific internal temperature?

Data from online video games has been used to study what kinds of practice and habits help people acquire skill. Basically, what does it take to get good? 10,000 hours, as Malcom Gladwell said? Nope, not even close. But there are reasons why some people are great in The Division and you die in the Dark Zone within seconds after meeting another player. Basically, they learned shortcuts and before they ever met you, they warmed up.

Russian author Boris Zhitkov wrote the 1931 short story Microhands, in which the narrator creates miniature hands to carry out intricate surgeries. And while that was nearly 100 years ago, the tale illustrates the real fundamentals of the nanoscience researchers are working on today.

How Wind Turbines Work - A Legal Perspective

If you want to know how a wind turbine works you may visit Wikipedia or the Office of Energy Efficiency and Renewable Energy


You would not normally look for scientific information on a case law web site, but there is now an excellent scientific description of wind turbine basics in a judgement on patent law as applied to a wind turbine design.