Technology

Preventing Murder: 3 Ways To Predict Who Will Become A Killer

Right now, the police can't do much to help you until after a crime has been committed. In a science-fiction tale about free will and psychological determinism, Philip K. Dick's "Minority Report" detailed a world where PreCrime officer ...

Article - Hank Campbell - Oct 24 2014 - 12:38pm

Blood Vessel Transplant From Own Stem Cells- Now In A Week

Three years ago, a patient at Sahlgrenska University Hospital received a blood vessel transplant grown from her own stem cells. Two other transplants were performed in 2012. The patients, two young children, had the same condition as in the first case – t ...

Article - News Staff - Oct 25 2014 - 3:28pm

Simple New Test For Vitamin B12 Deficiency

A novel method to test for vitamin B12 deficiency is sensitive enough to work on anyone, including newborn babies and large swaths of the general population. It uses a single drop of blood collected from a finger prick which is then blotted and dried over ...

Article - News Staff - Oct 27 2014 - 10:31am

US Operating Rooms Could Donate 2 Million Pounds Of Unused Medical Supplies

In the past, it was common practice to get rid of anything that was used- and unused- in operating rooms, but with rising health care costs due to government insurance and growing realization that many countries have few supplies at all, recovery of unuse ...

Article - News Staff - Oct 28 2014 - 10:47am

How Understanding The Heterogeneous Topocracy Of Twitter Can Help The Future Of Science 2.0

To gain followers on Twitter, some supposed social media and SEO "experts" claim that a lot of volume and following a lot of people is the road to popularity.  Not really. The most effective strategy is to already be famous. Due to its imbalance ...

Article - News Staff - Oct 31 2014 - 9:27am

Information-Theoretic Security: Creating 21st Century Cryptography Standards

Most modern cryptographic schemes rely on complexity for security- they can be cracked, but that would take a prohibitively long time, even with enormous computational resources. Information-theoretic security, in which even an adversary with unbounded co ...

Article - News Staff - Oct 31 2014 - 10:02am

Comics, Cosplay, Conventions, and Dr. Who Too

Source My colleague, Tony Troxell, has a blog called Geeking in Indiana with the tagline, “Movies, Tidbits, and General Geekery from Around Indiana.” Tony explains the purpose of his blog here. ...

Blog Post - Steve Schuler - Nov 5 2014 - 10:53am

In Cybersecurity, The Weakest Link Is You

We should know by now- don't click that link. Bill Buchanan, Author provided By Bill Buchanan, Edinburgh Napier University A chain is only as strong as its weakest link. Computer security relies on a great number of links, hardware, software and some ...

Article - The Conversation - Nov 1 2014 - 10:51pm

Big Data, Mutant Models And Science 2.0

Modern biology has a problem- how to find meaning in the rising oceans of genomic data, such as the reams of cancer mutations that genome-wide studies are publishing every week. The challenge is finding efficient ways to parse the signals from the noise. ...

Article - News Staff - Nov 3 2014 - 10:01am

Turning Antibodies Into Nanobodies

Antibodies that recognize and home in on molecular targets are among the most useful tools in biology and medicine- now those kinds of techniques are getting smaller and easier to produce in the form of nanobodies.   ...

Article - News Staff - Nov 2 2014 - 5:41pm