Technology
- Preventing Murder: 3 Ways To Predict Who Will Become A Killer
-
Right now, the police can't do much to help you until after a crime has been committed. In a science-fiction tale about free will and psychological determinism, Philip K. Dick's "Minority Report" detailed a world where PreCrime officer ...
Article - Hank Campbell - Oct 24 2014 - 12:38pm
- Blood Vessel Transplant From Own Stem Cells- Now In A Week
-
Three years ago, a patient at Sahlgrenska University Hospital received a blood vessel transplant grown from her own stem cells. Two other transplants were performed in 2012. The patients, two young children, had the same condition as in the first case – t ...
Article - News Staff - Oct 25 2014 - 3:28pm
- Simple New Test For Vitamin B12 Deficiency
-
A novel method to test for vitamin B12 deficiency is sensitive enough to work on anyone, including newborn babies and large swaths of the general population. It uses a single drop of blood collected from a finger prick which is then blotted and dried over ...
Article - News Staff - Oct 27 2014 - 10:31am
- US Operating Rooms Could Donate 2 Million Pounds Of Unused Medical Supplies
-
In the past, it was common practice to get rid of anything that was used- and unused- in operating rooms, but with rising health care costs due to government insurance and growing realization that many countries have few supplies at all, recovery of unuse ...
Article - News Staff - Oct 28 2014 - 10:47am
- How Understanding The Heterogeneous Topocracy Of Twitter Can Help The Future Of Science 2.0
-
To gain followers on Twitter, some supposed social media and SEO "experts" claim that a lot of volume and following a lot of people is the road to popularity. Not really. The most effective strategy is to already be famous. Due to its imbalance ...
Article - News Staff - Oct 31 2014 - 9:27am
- Information-Theoretic Security: Creating 21st Century Cryptography Standards
-
Most modern cryptographic schemes rely on complexity for security- they can be cracked, but that would take a prohibitively long time, even with enormous computational resources. Information-theoretic security, in which even an adversary with unbounded co ...
Article - News Staff - Oct 31 2014 - 10:02am
- Comics, Cosplay, Conventions, and Dr. Who Too
-
Source My colleague, Tony Troxell, has a blog called Geeking in Indiana with the tagline, “Movies, Tidbits, and General Geekery from Around Indiana.” Tony explains the purpose of his blog here. ...
Blog Post - Steve Schuler - Nov 5 2014 - 10:53am
- In Cybersecurity, The Weakest Link Is You
-
We should know by now- don't click that link. Bill Buchanan, Author provided By Bill Buchanan, Edinburgh Napier University A chain is only as strong as its weakest link. Computer security relies on a great number of links, hardware, software and some ...
Article - The Conversation - Nov 1 2014 - 10:51pm
- Big Data, Mutant Models And Science 2.0
-
Modern biology has a problem- how to find meaning in the rising oceans of genomic data, such as the reams of cancer mutations that genome-wide studies are publishing every week. The challenge is finding efficient ways to parse the signals from the noise. ...
Article - News Staff - Nov 3 2014 - 10:01am
- Turning Antibodies Into Nanobodies
-
Antibodies that recognize and home in on molecular targets are among the most useful tools in biology and medicine- now those kinds of techniques are getting smaller and easier to produce in the form of nanobodies. ...
Article - News Staff - Nov 2 2014 - 5:41pm