Menu

Blog

Page 1414

Oct 17, 2023

Enhancing Automation in Making Cell Therapies

Posted by in category: robotics/AI

Although many people could benefit from cell therapy, many can’t get it. “The entire industry is focused on ensuring safety while increasing accessibility,” says Evan Zynda, PhD, senior staff scientist at Thermo Fisher Scientific. “When it comes to developing and manufacturing cell therapies, the main challenges to these goals are manufacturing inefficiencies, complex and manual processes that require human intervention and introduce failure modes, and a lack of standardized workflows for manufacturing, especially as emerging modalities are still being defined.”

In fact, making a cell therapy is extremely complicated. “We estimate the cell therapy–manufacturing process may have upwards of 40 process steps, which is not only labor intensive but creates opportunities for errors and contamination that lead to failures,” Zynda says. “By aseptically closing and automating the manufacturing process, we’re reducing the need for the highly specialized labor required to produce these therapies, thereby eliminating touchpoints, reducing expenses, and ultimately increasing the reproducibility and predictability of the process.”

Oct 17, 2023

Experts Warn of Severe Flaws Affecting Milesight Routers and Titan SFTP Servers

Posted by in category: futurism

🚨 Vulnerabilities Alert — Milesight’s industrial routers risk unauthorized web interface access, while Titan MFT and Titan SFTP servers face remote superuser threats.

Find details here:

Oct 17, 2023

Novel Immune Cell Types and Interactions within Adipose Tissue Revealed

Posted by in categories: biotech/medical, health

Researchers are attempting to uncover the basics of how fat tissue is structured and, specifically, inflammation associated with obesity, in the hopes of unlocking the connection between the accumulation of fat and poor health outcomes. Now, a new study by researchers at the University of Michigan revealed previously unrecognized immune cell types and interactions within adipose tissue using single-cell analysis of gene expression combined with spatial transcriptomics.

The findings are published in JCI Insight in an article titled, “A lipid-associated macrophage lineage rewires the spatial landscape of adipose tissue in early obesity.”

“Adipose tissue macrophage (ATM) infiltration is associated with adipose tissue dysfunction and insulin resistance in mice and humans,” wrote the researchers. “Recent single-cell data highlight increased ATM heterogeneity in obesity but do not provide a spatial context for ATM phenotype dynamics. We integrated single-cell RNA-Seq, spatial transcriptomics, and imaging of murine adipose tissue in a time course study of diet-induced obesity. Overall, proinflammatory immune cells were predominant in early obesity, whereas nonresident antiinflammatory ATMs predominated in chronic obesity.”

Oct 17, 2023

Fire & Disaster Resistant, This Sustainable Home in Kerala Can be Packed & Relocated!

Posted by in categories: habitats, sustainability

Imagine a home that is eco-friendly, resilient to disasters, and can be built in a fraction of the time it takes to construct a traditional home.

That’s what’s possible with LGSF (Light Gauge Steel Frame) technology.

In Kozhikode, architect Majid TK has designed a unique LGSF home for Dr Jayakumar and his family. This weekend getaway home that can be disassembled, packed, and reassembled wherever you want.

Continue reading “Fire & Disaster Resistant, This Sustainable Home in Kerala Can be Packed & Relocated!” »

Oct 17, 2023

How Google Chrome Vulnerability can Put Millions of Users in Danger — Safeguard Your Data Now!

Posted by in categories: cybercrime/malcode, space

The digital realm, while offering boundless possibilities, is also a fertile ground for myriad cybersecurity threats. One such peril that has recently come to light is the User-After-Free vulnerability in Google Chrome, specifically identified as CVE-2023–5218. This vulnerability not only poses a significant threat to user data and system integrity but also opens a Pandora’s box of potential cyber-attacks and exploitations.

The User-After-Free vulnerability is a type of cybersecurity flaw that surfaces when a program continues to utilize memory space after it has been freed or deleted. This flaw allows attackers to execute arbitrary code or potentially gain unauthorized access to a system. CVE-2023–5218, identified within Google Chrome, was noted to be potentially exploitable to perform such malicious actions, thereby putting users’ data and privacy at substantial risk.

CVE-2023–5218 was unveiled to the public through various cybersecurity platforms and researchers who detected unusual activities and potential exploitation trails leading back to this particular flaw. This vulnerability was identified to be present in a specific Chrome component, prompting Google to release a flurry of updates and patches to mitigate the associated risks.

Oct 17, 2023

Silent Predator Unveiled: Decoding WebWyrm Stealthy Malware affecting 50 countries

Posted by in categories: cryptocurrencies, cybercrime/malcode, employment, evolution, finance, military

In the intricate landscape of global cybersecurity, Webwyrm malware has surfaced as a formidable adversary, casting its ominous shadow across 50 nations and leaving in its wake over 100,000 compromised victims. This insidious digital menace successfully emulates in excess of 1,000 reputable companies globally, with the ensuing potential financial fallout estimated to surpass a staggering $100 million. It is imperative for cybersecurity professionals and organizations alike to comprehend the multifaceted nature of this threat to devise and implement robust defensive strategies effectively.

In the dynamic realm of cyber threats, malicious actors incessantly refine their Tactics, Techniques, and Procedures (TTPs), exploiting extant vulnerabilities and augmenting the efficacy of their malicious campaigns. Webwyrm epitomizes this relentless pursuit of evolution, embodying a level of sophistication reminiscent of infamous cyber threats of yore, such as the notorious ‘Blue Whale Challenge.’

WebWyrm malware orchestrates a complex, deceptive narrative aimed at duping unsuspecting job seekers into relinquishing their cryptocurrency. Initiating contact predominantly via WhatsApp, the malefactors likely leverage data procured from employment portals to pinpoint and engage individuals predisposed to their deceptive overtures. Prospective victims are enticed with promises of lucrative weekly remuneration, ranging between $1200 and $1500, contingent upon the completion of daily task “packets” or “resets.”

Oct 17, 2023

Webb detects quartz crystals in clouds of hot gas giant

Posted by in categories: particle physics, space

Researchers using NASA’s James Webb Space Telescope have detected evidence for quartz nanocrystals in the high-altitude clouds of WASP-17 b, a hot Jupiter exoplanet 1,300 light-years from Earth.

The detection, which was uniquely possible with MIRI (Webb’s Mid-Infrared Instrument), marks the first time that silica (SiO2) particles have been spotted in an .

The are only about 10 nanometers across, so small that 10,000 could fit side-by-side across a human hair. Their size and composition of pure silica were reported in “JWST-TST DREAMS: Quartz Clouds in the Atmosphere of WASP-17b,” published in Astrophysical Journal Letters.

Oct 17, 2023

Study: Deep neural networks don’t see the world the way we do

Posted by in category: robotics/AI

Human sensory systems are very good at recognizing objects that we see or words that we hear, even if the object is upside down or the word is spoken by a voice we’ve never heard.

Computational models known as deep neural networks can be trained to do the same thing, correctly identifying an image of a dog regardless of what color its fur is, or a word regardless of the pitch of the speaker’s voice. However, a new study from MIT neuroscientists has found that these models often also respond the same way to images or words that have no resemblance to the target.

When these neural networks were used to generate an image or a word that they responded to in the same way as a specific natural input, such as a picture of a bear, most of them generated images or sounds that were unrecognizable to human observers. This suggests that these models build up their own idiosyncratic “invariances”—meaning that they respond the same way to stimuli with very different features.

Oct 17, 2023

SpaceX details Starlink-for-phones plan, launching in 2024

Posted by in categories: mobile phones, satellites

Starlink’s website update is revealing a bit more about its plans for a satellite-delivered cell phone service. The new page for “Starlink Direct to Cell” promises “ubiquitous coverage” from “cellphone towers in space” that will work over bog-standard LTE. The current timeline claims there will be text service starting in 2024, voice and data in 2025, and “IoT” service in 2025.

Today satellite phone connectivity still requires giant, purpose-built hardware, like the old-school Iridium network phones. If you’re only looking for emergency texting, you can also make do with Apple’s introduction of the barely there connectivity paradigm, requiring being inside a connectivity window, holding up a phone, and following a signal-targeting app. Starlink wants to bring full-blown space connectivity to normal smartphone hardware.

Oct 17, 2023

Ghosts and goblins aren’t the only scary things your children might encounter this Halloween

Posted by in category: health

For parents of kids with food allergies, Halloween treats—from candy to cookies—can be frightening too. Be cautious of “fun size” candy, which may contain different ingredients than regular size packages.


The AAAAI offers tips written and reviewed by experts on allergies on avoiding the danger of anaphylaxis this Halloween.