Skip to main content

Home/ Indie Nation/ Group items tagged test

Rss Feed Group items tagged

John Lemke

DNA from maggot guts used to identify corpse in criminal case | Ars Technica - 0 views

  • It had already been suggested by other researchers that the gastrointestinal contents of maggots could be used to identify the subjects they feed on. However, never before has the theory been trialed in a legal, criminal case. Pathologists at Autonomous University of Nuevo León in San Nicolás, Mexico, led by María de Lourdes Chávez-Briones and Marta Ortega-Martínez, carried out short tandem repeat typing tests (a common method of DNA profiling) on the matter extracted from three dissected maggots found on the victim's face and neck, and separately on the alleged father of the missing woman. Preliminary results showed that the body was female, and the final outcome was a 99.685 percent probability of positive paternity—the victim had been identified.
  •  
    "It had already been suggested by other researchers that the gastrointestinal contents of maggots could be used to identify the subjects they feed on. However, never before has the theory been trialed in a legal, criminal case. Pathologists at Autonomous University of Nuevo León in San Nicolás, Mexico, led by María de Lourdes Chávez-Briones and Marta Ortega-Martínez, carried out short tandem repeat typing tests (a common method of DNA profiling) on the matter extracted from three dissected maggots found on the victim's face and neck, and separately on the alleged father of the missing woman. Preliminary results showed that the body was female, and the final outcome was a 99.685 percent probability of positive paternity-the victim had been identified."
John Lemke

FBI surveillance malware in bomb threat case tests constitutional limits | Ars Technica - 0 views

  • The FBI has an elite hacker team that creates customized malware to identify or monitor high-value suspects who are adept at covering their tracks online, according to a published report.
  • as the capability to remotely activate video cameras and report users' geographic locations—is pushing the boundaries of constitutional limits on searches and seizures
  • Critics compare it to a physical search that indiscriminately seizes the entire contents of a home, rather than just those items linked to a suspected crime. Former US officials said the FBI uses the technique sparingly, in part to prevent it from being widely known.
  • ...1 more annotation...
  • "We have transitioned into a world where law enforcement is hacking into people’s computers, and we have never had public debate,” Christopher Soghoian, principal technologist for the American Civil Liberties Union, told The Washington Post, speaking of the case against Mo. "Judges are having to make up these powers as they go along."
John Lemke

Artificial spleen cleans up blood : Nature News & Comment - 0 views

  • A device inspired by the spleen can quickly clean blood of everything from Escherichia coli to Ebola, researchers report on 14 September in Nature Medicine1.
  • Blood infections can be very difficult to treat, and can lead to sepsis, an often-fatal immune response. More than 50% of the time, physicians cannot diagnose the cause of an infection that has prompted sepsis, and so they resort to antibiotics that attack a broad range of bacteria2. This approach is not always effective, and can lead to antibiotic resistance in bacteria.
  • To test the device, Ingber and his team infected rats with either E. coli or Staphylococcus aureus and filtered blood from some of the animals through the biospleen. Five hours after infection, 89% of the rats whose blood had been filtered were still alive, compared with only 14% of those that were infected but not treated.
  • ...3 more annotations...
  • the device had removed more than 90% of the bacteria from the rats' blood.
  • The researchers then tested whether the biospleen could handle the volume of blood in an average adult human — about 5 litres. They ran human blood containing a mixture of bacteria and fungi through the biospleen at a rate of 1 litre per hour, and found that the device removed most of the pathogens within five hours.
  • That degree of efficacy is probably enough to control an infection, Ingber says. Once the biospleen has removed most pathogens from the blood, antibiotics and the immune system can fight off remaining traces of infection — such as pathogens lodged in the organs, he says.
    • John Lemke
       
      In short, it remove enough pathogens to be an effective human treatment.
John Lemke

Sticky Nanobeads Can Strip Bacteria, Viruses From Blood - D-brief | DiscoverMagazine.com - 0 views

  • Bioengineers at Harvard’s Wyss Institute have developed a blood filter that quickly grabs toxins, such as E.coli or Ebola, from the bloodstream using protein-coated nanobeads and magnets. In early tests, the biomechanical treatment removed more than 90 percent of toxins from infected human blood within a few hours.
  • dubbed an “artificial spleen,” instead mechanically clears pathogens from the bloodstream, thereby reducing reliance on heavy doses of antibiotics. Its trick lies in magnetic nanobeads coated with a modified human protein. This protein binds to sugar molecules on the surfaces of more than 90 different bacteria, viruses and fungi, as well as to the toxins released by dead bacteria.
  • Researchers then tested their device by cleaning 5 liters of human blood spiked with a variety of pathogens. The device cleared blood at a rate of 1 liter per hour, and again removed over 90 percent of the pathogens.
John Lemke

Google has poached an expert scientist to build a quantum computer | The Verge - 0 views

  • the next step in computing technology
  • But the technology took a hit earlier this year when tests on the world's first commercially available quantum computer — the D-Wave 2, priced at around $15 million — appeared to show that it was no faster than a standard computer.
John Lemke

Self-repairing software tackles malware -- ScienceDaily - 0 views

  • Unlike a normal virus scanner on consumer PCs that compares a catalog of known viruses to something that has infected the computer, A3 can detect new, unknown viruses or malware automatically by sensing that something is occurring in the computer's operation that is not correct. It then can stop the virus, approximate a repair for the damaged software code, and then learn to never let that bug enter the machine again.
  • To test A3's effectiveness, the team from the U and Raytheon BBN used the infamous software bug called Shellshock for a demonstration to DARPA officials in Jacksonville, Florida, in September. A3 discovered the Shellshock attack on a Web server and repaired the damage in four minutes, Eide says. The team also tested A3 successfully on another half-dozen pieces of malware.
John Lemke

September 11, 2012: Opus audio codec is now RFC6716, Opus 1.0.1 reference source released - 0 views

  • Free and Open Another reason there are so many audio codecs: silly licensing restrictions. Would you base a business on technology a competitor controls? That's why the Opus specification and complete source are Free, Open, and available for any use whatsoever without IP restrictions, explicit licensing or royalties. Opus was developed and tested in a public, fully transparent process within the IETF, proof that open collaboration can produce a better audio codec than proprietary, secretive, patent-encumbered systems. Open standards benefit-- and benefit from-- open source organizations and traditional commercial software companies alike. Opus itself is the result of a collaboration including Broadcom, Google, the IETF, Microsoft (through Skype), Mozilla, Octasic and Xiph.Org.
John Lemke

Ain't No Science Fiction, Suspended Animation Is FDA Approved and Heading To Clinical T... - 0 views

  • The Food and Drug Administration has already approved his technique for human trials, and he has secured funding from the Army to conduct the feasibility phase. Dr. Rhee is currently lobbying for funds to conduct a full trial. If he’s successful human trials could begin as early as next year.
  • What Dr. Rhee hopes to test on humans is a method he worked out for the past couple decades on pigs. Patients would be injected with a cold fluid to induce severe hypothermia. Clinically hypothermia is characterized by the drop of a person’s body temperature from its normal 98.6 degrees Fahrenheit (37 degrees Celcius) to lower than 95 degrees (35 C). Below 95, the heart, nervous system and other organs begin to fail. The strict range is indicative of a metabolic system with strict temperature requirements for proper function (death waits only a few degrees the other way as well). Dr. Rhee’s method involves injecting patients with a cold fluid that would bring the body’s temperature down to 50 degrees Fahrenheit (10 C). Sounds chilling, but when he induced the extreme hypothermia in pigs they came out just fine. Heart function, breathing, and brain function was completely normal.
  • Dr. Rhee is no stranger to high-stakes medicine. The native South Korean was trained at the Uniformed Services University Medical School in Bethesda, Maryland. Following a fellowship in trauma and critical care at the University of Washington’s Harborview Medical Center he served in the US Navy as director of the University of South California’s Navy Trauma Training Center at Los Angeles County. He was then sent to Afghanistan where he was one of the first surgeons at Camp Rhino. Later he started the first surgical unit at Ramadi, Iraq. His cool under fire was on display nationally as he performed surgery on US Representative Gabrielle Giffords after she was shot through the skull in the Tucson shootings this past January. His experience with induced hypothermia came into play the night of the shootings when Dr. Rhee removed part of the congresswoman’s skull. The wound had raised her body temperature and began “cooking the brain.” He used a device to cool Rep. Giffords’ skin.
John Lemke

Want to remotely control a car? $20 in parts, some oily fingers, and you're in command ... - 0 views

  • untraceable, off-the-shelf parts worth $20 that can give wireless access to the car's controls while it's on the road.
  • Illera and fellow security researcher Javier Vazquez-Vidal said that they had tested the CAN Hacking Tool (CHT) successfully on four popular makes of cars and had been able to apply the emergency brakes while the car was in motion, affect the steering, turn off the headlights, or set off the car alarm.
  • currently only works via Bluetooth,
John Lemke

Genetically engineered white blood cells could be the future of HIV treatment | The Verge - 0 views

  • Scientists have successfully modified the white blood cells of 12 patients living with HIV, making their cells resistant to the retrovirus and improving the study participants' overall ability to fight off infection. The researchers achieved this result through a gene editing technique, described today in
  • Unlike the child who went into HIV remission a year ago, the patients in this study continue to test positive for HIV. But the results of this Phase I clinical trial still represent a promising debut for HIV treatments involving tailored gene therapy, as the white blood cells persisted for nearly a year after transfusion.
John Lemke

DARPA Robotics Challenge Trials Day 1 - 0 views

  • Pictured above is Valkyrie from NASA JPL. We reported on Valkyrie earlier this month. Arguably one of the better looking robots of the bunch, Valkyrie proved to be all show and no go today, failing to score any points in its day 1 trials. The day one lead went to Team Schaft, a new robot from Tokyo based startup company Schaft inc. Schaft scored 18 points in its first day. In second place is the MIT team  with 12 points. Third place is currently held by Team TRACLabs with 9 points. All this can change tomorrow as the second day of trials take place. The live stream will be available from 8am to 7pm EST on DARPA’s robotics challenge page.
John Lemke

Hackers Using 'Shellshock' Bash Vulnerability to Launch Botnet Attacks - 0 views

  • Researchers on Thursday discovered a critical remotely exploitable vulnerability in the widely used command-line shell GNU Bourne Again Shell (Bash), dubbed "Shellshock" which affects most of the Linux distributions and servers worldwide, and may already have been exploited in the wild to take over Web servers as part of a botnet that is currently trying to infect other servers as well.
  • the vulnerability is already being used maliciously by the hackers.
  • There is as of yet no official patch that completely addresses both vulnerabilities, including the second, which allows an attacker to overwrite files on the targeted system.
  • ...3 more annotations...
  • It's things like CGI scripts that are vulnerable, deep within a website (like CPanel's /cgi-sys/defaultwebpage.cgi)," Graham wrote in a blog post. "Getting just the root page is the thing least likely to be vulnerable. Spidering the site and testing well-known CGI scripts (like the CPanel one) would give a lot more results—at least 10x." In addition, Graham said, "this thing is clearly wormable and can easily worm past firewalls and infect lots of systems. One key question is whether Mac OS X and iPhone DHCP service is vulnerable—once the worm gets behind a firewall and runs a hostile DHCP server, that would be 'game over' for large networks."
  • 32 ORACLE PRODUCTS VULNERABLE
  • PATCH ISSUED, BUT INCOMPLETE
  •  
    "Researchers on Thursday discovered a critical remotely exploitable vulnerability in the widely used command-line shell GNU Bourne Again Shell (Bash), dubbed "Shellshock" which affects most of the Linux distributions and servers worldwide, and may already have been exploited in the wild to take over Web servers as part of a botnet that is currently trying to infect other servers as well."
John Lemke

Stepson of Stuxnet stalked Kaspersky for months, tapped Iran nuke talks | Ars Technica - 0 views

  • Since some time in the second half of 2014, a different state-sponsored group had been casing their corporate network using malware derived from Stuxnet, the highly sophisticated computer worm reportedly created by the US and Israel to sabotage Iran’s nuclear program.
  • the malware was more advanced than the malicious programs developed by the NSA-tied Equation Group that Kaspersky just exposed. More intriguing still, Kaspersky antivirus products showed the same malware has infected one or more venues that hosted recent diplomatic negotiations the US and five other countries have convened with Iran over its nuclear program.
  • We see this battle or arms race emerging and now it involves some kind of confrontation between the security industry and nation-state sponsored spies
  • ...3 more annotations...
  • Kaspersky officials first became suspicious their network might be infected in the weeks following February's Security Analyst Summit, where company researchers exposed a state-sponsored hacking operation that had ties to some of the developers of Stuxnet. Kaspersky dubbed the highly sophisticated group behind the 14-year campaign Equation Group. Now back in Moscow, a company engineer was testing a software prototype for detecting so-called advanced persistent threats (APTs), the type of well-organized and highly sophisticated attack campaigns launched by well-funded hacking groups. Strangely enough, the developer's computer itself was having unusual interactions with the Kaspersky network. The new APT technology under development, it seemed, was one of several things of interest to the Duqu attackers penetrating the Kaspersky fortress. "For the developer it was important to find out why" his PC was acting oddly, Kamluk said. "Of course, he did not consider that machine could be infected by real malware. We eventually found an alien module that should not be there that tried to mask behind legitimate looking modules from Microsoft. That was the point of discovery."
  • What they found was a vastly overhauled malware operation that made huge leaps in stealth, operational security, and software design. The Duqu actors also grew much more ambitious, infecting an estimated 100 or so targets, about twice as many as were hit by the 2011 version.
  • So the Duqu 2.0 attackers pulled an audacious feat that Kaspersky researchers had never seen before. Virtually all of the malware resided solely in the memory of the compromised computers or servers. When one of them was restarted, the infection would be purged, but as the rebooted machine reconnected to the network, it would be infected all over again by another compromised computer in the corporate network. The secret lynchpin making this untraceable reinfection scheme possible was the Windows vulnerability Microsoft patched only Tuesday, which has been designated
John Lemke

Robot hummingbird passes flight tests (w/ Video) - 0 views

  •  
    The Hummingbird's bird-shaped body is removable but it gives the bot an uncanny resemblance to a real hummingbird. The vehicle can hover and maneuver just like the bird. The ornithopter can fly into buildings under the control of an operator flying the spybot with the help of a feed from its tiny video camera. The prototype is capable of flying at speeds of up to 18 km/h (11 mph) and weighs 19 grams, which is about the same as an AA battery.
John Lemke

Payback time: First patent troll ordered to pay "extraordinary case" fees | Ars Technica - 0 views

  • In the recent Octane Fitness case (PDF), the Supreme Court changed the test for fee-shifting precisely to deter behavior such as Lumen's, Cote found. Lumen didn't do "any reasonable pre-suit investigation," and filed a number of near-identical "boilerplate" complaints in a short time frame. That all suggests "Lumen’s instigation of baseless litigation is not isolated to this instance, but is instead part of a predatory strategy aimed at reaping financial advantage from the inability or unwillingness of defendants to engage in litigation against even frivolous patent lawsuits."
John Lemke

Bacteria from bees possible alternative to antibiotics - Lund University - 0 views

  • Raw honey has been used against infections for millennia, before honey - as we now know it - was manufactured and sold in stores. So what is the key to its’ antimicrobial properties? Researchers at Lund University in Sweden have identified a unique group of 13 lactic acid bacteria found in fresh honey, from the honey stomach of bees. The bacteria produce a myriad of active antimicrobial compounds. 
  • While the effect on human bacteria has only been tested in a lab environment thus far, the lactic acid bacteria has been applied directly to horses with persistent wounds. The LAB was mixed with honey and applied to ten horses; where the owners had tried several other methods to no avail. All of the horses' wounds were healed by the mixture.
1 - 17 of 17
Showing 20 items per page