y

Bacteria supply their allies with munitions

Many bacteria possess molecular spear guns, which they fire at enemies and rivals, thus putting them out of action. The tips of these nano-spear guns, known as Type VI secretion system (T6SS), are loaded with toxic molecules that lead to death of their adversaries. However, sometimes close related bacteria come under fire.

read more



  • Biology & Nature

y

Genetic analysis uncovers 4 species of giraffe, not just 1

Up until now, scientists had only recognized a single species of giraffe made up of several subspecies. But, according to the most inclusive genetic analysis of giraffe relationships to date, giraffes actually aren't one species, but four. For comparison, the genetic differences among giraffe species are at least as great as those between polar and brown bears.

read more



  • Biology & Nature

y

Kill them with cuteness: The adorable thing bats do to catch prey

A Johns Hopkins University researcher noticed the bats he works with cocked their heads to the side, just like his pet Pug.

read more



  • Biology & Nature

y

Male chemistry primes females for reproduction -- but at a cost

A research team led by a Northwestern University scientist has discovered that male animals, through their invisible chemical "essence," prime female animals for reproduction but with the unfortunate side effect of also hastening females' aging process.

read more



  • Biology & Nature

y

Seek and you shall find -- bees remain excellent searchers even when ill

Honeybees are hardwired to efficiently search the landscape enabling them to continue working for the greater good of their hives even when they are sick, according to new research co-authored by Queen Mary University of London (QMUL).

read more



  • Biology & Nature

y

Snails' speedy insulin

University of Utah researchers have found that the structure of an insulin molecule produced by predatory cone snails may be an improvement over current fast-acting therapeutic insulin. The finding suggests that the cone snail insulin, produced by the snails to stun their prey, could begin working in as few as five minutes, compared with 15 minutes for the fastest-acting insulin currently available. Biologist Helena Safavi, co-author on a paper describing the cone snail insulin published September 12 in Nature Structural & Molecular Biology, says that studying complex venom cocktails can open doors to new drug discoveries.

read more



  • Biology & Nature

y

Study reveals how ionising radiation damages DNA and causes cancer

For the first time, researchers from the Wellcome Trust Sanger Institute and their collaborators have been able to identify in human cancers two characteristic patterns of DNA damage caused by ionising radiation. These fingerprint patterns may now enable doctors to identify which tumours have been caused by radiation, and investigate if they should be treated differently.

read more



  • Biology & Nature

y

Trees recognize roe deer by saliva

In spring, the young, delicate shoots in the forest light up, bright and May green. The buds and shoots are the future of the forests as they allow young trees to grow. The problem for the trees is: Roe deer like to eat them, and especially their buds. With a bit of luck, the young, gnawed saplings will only take a few more years to grow than their non-bitten conspecifics. In the worst case, they will become stunted trees, or they will have to give up their fight for survival after a number of years. In this respect, roe deer can cause a great deal of damage and hinder the regeneration of many deciduous tree species.

read more



  • Biology & Nature

y

Study links altered brain chemistry, behavioral impairments in fish exposed to elevated CO2

Study Links Altered Brain Chemistry, Behavioral Impairments in Fish Exposed to Elevated CO2 Research team studied damselfish behavior and physiology under ocean acidification conditions predicted for year 2300

read more



  • Biology & Nature

y

Microsoft says new computing service for chemicals can slash R&D time

The new offering uses a combination of existing quantum computers, artificial intelligence and conventional high-performance computing systems.




y

Apple in talks with NPCI, plans to launch UPI based Apple Pay service in India

According to RBI’s Bulletin for June, UPI transactions in May reached a record Rs 14.3 trillion in terms of value and 9.41 billion in volume. Unified Payments Interface (UPI) is expected to account for 90% of retail digital transactions volume in the next five years.




y

Tesla charging technology put on fast track to become US standard

Tesla's charging technology has been gathering momentum for weeks. Volvo Car on Tuesday joined General Motors, Ford and Rivian in embracing Tesla's charging design, shunning earlier efforts by the Biden administration to make the Combined Charging System (CCS) the dominant charging standard in the United States.




y

Google training Bard on scraped web data: Here's what the company has to say

“Our privacy policy has long been transparent that Google uses publicly available information from the open web to train language models for services like Google Translate,” The Verge quoted Google spokesperson Christa Muldoon as saying. This publically available data includes data available on the internet, device type and settings, operating system, mobile network information including carrier name and phone number, and application version number.




y

OpenKylin: China introduces indigenous computer operating system

China has developed OpenKylin, an operating system based on the open-source Linux platform, to reduce its dependence on US technology. OpenKylin 1.0, created by a community of approximately 4,000 developers, has been utilised in various sectors, such as finance, energy, and even in its space program. China's tech industry has prioritised developing an operating system that is not dependent on US technology, and OpenKylin is one of several under development that could replace Microsoft's Windows and Apple's MacOS. Notably, the system provides reliable fundamental software services and ensures security in critical areas such as government affairs and finance.




y

Samsung has a plan to stop Exynos chips from overheating

Samsung's FOWLP-HPB cooling tech for Exynos 2500 chipsets, set for Q4 2024, will enhance performance, modeled in Galaxy S25. Galaxy Z Fold 6, Z Flip 6 launching at Glaaxy Unpacked with Snapdragon 8 Gen 3, 4000mAh battery, 50MP sensor, and IP48 durability rating aims to combat Exynos 2400 throttling, offering better battery life and consistent performance.




y

Apple removes 25 VPN apps from App Store in Russia, here's why

Apple has removed 25 VPN apps from its App Store in Russia, complying with orders from the communications regulator. This move comes amidst Russia's crackdown on VPNs and ongoing tensions with big tech companies over content regulation and censorship.




y

Digital payments show strong uptick buoyed by wider adoption of credit during festive season

During this year’s festive season sales, credit cards and credit-based payment instruments like pay-later products saw a significant increase, according to industry reports. Transactions rose by 35-50% compared to last year, with a large share being made through credit cards, EMIs, and pay-later options. Unified Payments Interface (UPI) remained the dominant payment method, with a 34% rise in transactions and over 500 million daily payments recorded.




y

Study highlights serious security threat to many internet users

RIVERSIDE, Calif. -- Researchers at the University of California, Riverside have identified a weakness in the Transmission Control Protocol (TCP) of all Linux operating systems since late 2012 that enables attackers to hijack users' internet communications completely remotely.

read more



  • Mathematics & Economics

y

Researchers find that Android apps can secretly track users' whereabouts

Three years ago, the Federal Trade Commission dimmed hopes for the Brightest Flashlight app for Android, slapping its developer with charges of consumer deception. Why? The app was transmitting users' locations and device IDs to third parties without telling the users or getting their permission.

read more



  • Mathematics & Economics

y

In right balance, environmental regulations increased firms' profits, new study finds

CEOs and corporate lobbyists often spend plenty of time decrying how potential government regulations will affect their bottom line, but a new University of Kansas study finds that the U.S. Clean Water Act, when implemented in the right balance, improves firms' profitability.

read more



  • Mathematics & Economics

y

New study: Are voters influenced by campaign visits?

Los Angeles, CA (August 17, 2016) Despite their extensive national press coverage, campaign visits might not be worth presidential candidates' time and resources. A new study out today finds that voters are largely unaware of and unresponsive to campaign visits. The study was published as part of a special issue of The ANNALS of the American Academy of Political and Social Science (a journal from SAGE Publishing) titled "Elections in America."

read more



  • Mathematics & Economics

y

Stanford scientists combine satellite data and machine learning to map poverty

One of the biggest challenges in providing relief to people living in poverty is locating them. The availability of accurate and reliable information on the location of impoverished zones is surprisingly lacking for much of the world, particularly on the African continent. Aid groups and other international organizations often fill in the gaps with door-to-door surveys, but these can be expensive and time-consuming to conduct.

read more



  • Mathematics & Economics

y

Ramen noodles supplanting cigarettes as currency among prisoners

Ramen noodles are supplanting the once popular cigarettes as a form of currency among state prisoners, but not in response to bans on tobacco products within prison systems, finds a new study.

read more



  • Mathematics & Economics

y

Louisiana Tech University uses underground radar to locate post-Katrina damage

An innovative underground radar technology developed at Louisiana Tech University is helping the City of Slidell in south Louisiana to identify and document underground infrastructure damage that had gone undetected in the months and years following Hurricane Katrina.

read more



  • Mathematics & Economics

y

Researchers find vulnerabilities in iPhone, iPad operating system

An international team of computer science researchers has identified serious security vulnerabilities in the iOS - the operating system used in Apple's iPhone and iPad devices. The vulnerabilities make a variety of attacks possible.

read more



  • Mathematics & Economics

y

Beat the stock market by satisfying customers

Satisfy your customers and win in the stock market, says a new study by a team of researchers from Michigan's University Research Corridor, who found positive stock returns on customer satisfaction far out-distance competitive market measures that have been in play for more than half a century.

read more



  • Mathematics & Economics

y

App vs. website: Which best protects your privacy?

That's the ques­tion that North­eastern researchers, led by assis­tant pro­fessor David Choffnes, ask in new research that explores how free app- and web- based ser­vices on Android and iOS mobile devices com­pare with respect to pro­tecting users' privacy.

read more



  • Mathematics & Economics

y

China drafts rules for using facial recognition technology

The use of the technology will also require individual's consent, the CAC said in a statement. It added that non-biometric identification solutions should be favored over facial recognition in cases where such methods are equally effective.




y

New data bill’s mandate could pose security risk, say social media platforms

For users in India between 13 and 18 years of age, apps may now have to get parental consent by verifying the identity of the children and their parents.. The Digital Personal Data Protection bill defines children as those below 18 years, which is above the global threshold. Users above 13 years of age, for example, are typically allowed on many social media platforms.




y

Building the government-to-citizen (G2C) value chain with cloud-first-security-first approach

The government will need to start by assessing and uplifting the digital posture of each concerned department, further enabling an interconnected ecosystem of government, private, and peering parties, and offering seamless and secure last mile for government-to- citizen services and support. All this while keeping the citizen’s data and identity safe.




y

Generative AI biggest weapon and tool for cybersecurity: Microsoft's Brad Smith

Addressing cybersecurity attack concerns raised by generative AI, Smith said that there will be an increasing number of organisations and governments that will use the technology to develop cybersecurity threats.




y

Cybersecurity firms CrowdStrike, Okta shares jump after better-than-expected earnings

CrowdStrike beat estimates when it reported late on Wednesday that its revenue jumped 37% to $731.6 million while adjusted net income more than doubled to $180 million in the second quarter on strong growth in subscriptions to its cloud-based data and identity protection services.




y

Encourage ethical data management amid rising concerns: Confluent’s Jay Kreps

Confluent chief Jay Kreps says compliance can be challenging and lead to scrutiny of data movements. “Streaming technology enables the real-time synchronization of data, connecting all these disparate sources. An apt analogy is that of a central nervous system. The capability to unify data streams from different organizational segments empowers better decision making and the creation of personalized customer experiences,” he said.




y

What Google's antitrust trial means for your search habits

If Mehta rules that Google has been running an illegal monopoly in search, the punishment could open up new online avenues for consumers and businesses to explore in pursuit of information, entertainment and commerce.




y

IT hardware companies may require global certification

The Indian government is considering asking importers of IT hardware to provide an international certification, attesting that their products are from trusted sources. This move is in response to concerns raised by countries such as China, the US, South Korea, and Taiwan about India's restrictions on the import of these products.




y

Major AI models not very transparent, says report

Artificial intelligence (AI) based foundations models such as Meta's Llama 2 and OpenAI's GPT-4 are low on transparency, according to a global report.




y

Identity governance: Upgrading beyond AD and PIM solutions

Let us explore the limitations of traditional AD and PIM solutions, and why identity governance is essential.




y

API integration: Fueling business the secure way

At the ETCIO Annual Conclave 2024, top IT leaders converged to discuss the critical topic of API integration. This gathering of minds explored how APIs are not only catalysts for digital transformation but also a cornerstone for enterprise security.




y

Three hackers arrested in Spain over DDoS cyberattacks

The suspects were detained for their alleged participation in distributed denial of service (DDoS) cyber attacks against public institutions and strategic sectors, the Civil Guard said.




y

First in UP, Agra police launches advanced digital court monitoring system

The Agra Police Commissionerate launched the Commissionerate Courts Monitoring System (CCMS) to enhance transparency and efficiency in judicial processes. The digital portal, developed under Commissioner J Ravinder Goud's supervision, provides real-time access to case information for citizens and police officers, aiming to streamline and digitize court case management.




y

California lawmakers pass AI safety bill

At least 40 states have introduced bills this year to regulate AI, and a half dozen have adopted resolutions or enacted legislation aimed at the technology, according to The National Conference of State Legislatures.




y

AI-driven cyber attacks top risk for enterprises, says report

According to Zachary Ginsburg, senior director, research in the Gartner Risk & Audit Practice, while the upcoming US election generates headlines over the candidates' regulatory, trade and other proposals, organisations have difficulty considering the actual risk implications from the many scenarios that might unfold.




y

IT industry needs guardrails to weed out graft: Staffing experts

This comes after the country’s largest IT services firm Tata Consultancy Services found senior executives breaching corporate code of conduct to give preferential treatment to some recruiters. The incident was discovered following a whistle-blower complaint. Initial reports suggested that TCS had blacklisted three staffing firms identified during an investigation.




y

Persistent Systems positive on generative AI-led growth

Despite the noise around AI in the market right now, it is going to take time for companies to develop and adapt to the technology, Kalra said. On the business front, the company expects to fair well despite the challenging global environment and continue on its plan to expand in Europe and Asia Pacific while continuing the North America focus.




y

Vedanta deepens tech push with $4 billion India display factory

Even as it’s suffering from a heavy debt load, billionaire Anil Agarwal’s metals and mining conglomerate is expanding in electronics components to take advantage of India’s push to become a technology manufacturing hub. The display business is separate from Vedanta’s struggling chip venture and may find an easier path to success as it’s a less techically demanding undertaking.




y

Databricks rolls out AI assistant to help analyse business data

Databricks, a San Francisco-based startup most recently valued at $38 billion, is among several tech companies, including Adobe Inc and Intel Corp, racing to use chatbots that can hold human-like conversations to sift through business data like sales transactions or written reports for answers.




y

TecRivulet transforms customer service with advanced helpdesk systems

It offers centralized request management, omnichannel integration, self-service capabilities, enhanced visibility for business partners, employee training and tools, powerful analytics capabilities, seamless integration with existing systems, and comprehensive service offerings.




y

Our data strategy is the fallout of our business strategy: V Ganapathy, Holcim

V Ganapathy, VP, & Head- Global Advanced Analytics CoE, Holcim lays bare the building blocks of his data strategy, the AI-capabilities he is building across the group, and data-led vision for operational efficiency, profitability, and sustainability.




y

Data and analytics can be instrumental in shaping FMCG’s future: Nithya Subramanian, Kellogg Company

One of the primary ways data and analytics are influencing the FMCG industry is through demand forecasting and inventory management. By analyzing historical sales data, market trends, and external factors like seasonality and economic indicators, FMCG companies can optimize their production and supply chain processes.




y

Data enabling agility to changes in healthcare landscape: Preetam Biswas, Aditya Birla Health Insurance

Hospitals and healthcare systems utilize data to streamline their operations. Through predictive analytics, they can forecast patient admissions, optimize staff scheduling, and manage inventory efficiently. These data-driven insights enhance resource allocation and ensure that healthcare facilities are prepared for fluctuations in demand.