Menu

Blog

Page 3495

Nov 23, 2022

Consumer Health: Treating stomach cancer

Posted by in categories: biotech/medical, health

November is Stomach Cancer Awareness Month, which makes this a good time to learn more about treating stomach cancer.

More than 26,000 people in the U.S. will be diagnosed with stomach cancer this year, and more than 11,000 people will die of the disease, according to the American Cancer Society. Stomach cancer accounts for about 1.5% of all new cancers diagnosed in the U.S. each year.

Stomach cancer, also known as gastric cancer, can affect any part of the stomach. In most of the world, stomach cancers form in the main part of the stomach. In the U.S., stomach cancer is more likely to affect the area where the esophagus meets the stomach. Where the cancer occurs in the stomach is one factor health care professionals consider when determining treatment options.

Nov 23, 2022

Soil’s Microbial Market Shows the Ruthless Side of Forests

Posted by in category: economics

In the “underground economy” for soil nutrients, fungi strike hard bargains and punish plants that won’t meet their price.

Nov 23, 2022

Cybersecurity incidents cost organizations $1,197 per employee, per year

Posted by in categories: business, cybercrime/malcode

Check out the on-demand sessions from the Low-Code/No-Code Summit to learn how to successfully innovate and achieve efficiency by upskilling and scaling citizen developers. Watch now.

Cybersecurity is an expensive business. To prepare to address sophisticated threat actors, an enterprise needs to maintain a complete security operations center (SOC) filled with state-of-the-art technologies and experienced professionals who know how to identify and mitigate threats.

All of these factors add up. According to a new report released by threat prevention provider Perception Point and Osterman Research, organizations pay $1,197 per employee yearly to address cyber incidents across email services, cloud collaboration apps or services, and web browsers.

Nov 23, 2022

Photovoltaic windows unlock goal of increased energy efficiency for skyscrapers

Posted by in category: energy

Skyscrapers dominate city skylines, but these massive glass-walled structures can be made more energy efficient through the addition of thermally efficient photovoltaic (PV) windows, according to an analysis by researchers at the National Renewable Energy Laboratory (NREL).

Their findings, published in the journal One Earth, outline building design rules that can yield a structure with net-zero or even net-positive energy consumption.

“There are preconceived notions of what an energy-efficient building looks like, and it usually is not highly glazed, and it probably isn’t very tall,” said Lance Wheeler, a scientist at NREL who specializes in integrating PV technology into . “We found that there are other ways to build high-efficiency buildings.”

Nov 23, 2022

The Species That Eats The Universe | Culture

Posted by in category: space

In this video we discuss the different types of civilizations mention in the Culture series by Iain M. Banks. This video wont have any major spoilers for the series.

Art: https://docs.google.com/document/d/16JYYq4_SqGtPirGfSc6otg_a…sp=sharing.

Continue reading “The Species That Eats The Universe | Culture” »

Nov 23, 2022

A simpler path to better computer vision

Posted by in categories: biotech/medical, internet, robotics/AI

Before a machine-learning model can complete a task, such as identifying cancer in medical images, the model must be trained. Training image classification models typically involves showing the model millions of example images gathered into a massive dataset.

However, using real image data can raise practical and : The images could run afoul of copyright laws, violate people’s privacy, or be biased against a certain racial or ethnic group. To avoid these pitfalls, researchers can use image generation programs to create for model training. But these techniques are limited because expert knowledge is often needed to hand-design an image generation program that can create effective training data.

Researchers from MIT, the MIT-IBM Watson AI Lab, and elsewhere took a different approach. Instead of designing customized image generation programs for a particular training task, they gathered a dataset of 21,000 publicly available programs from the internet. Then they used this large collection of basic image generation programs to train a computer vision model.

Nov 23, 2022

AI Reveals New Possibilities in Matrix Multiplication

Posted by in categories: mathematics, robotics/AI

Inspired by the results of a game-playing neural network, mathematicians have been making unexpected advances on an age-old math problem.

Nov 23, 2022

New Alzheimer’s Genes Discovered in World’s Largest Study

Posted by in categories: biotech/medical, neuroscience

Summary: Researchers have identified two new genes, ATP8B4 and ABCA1, that are implicated in Alzheimer’s disease. The genes impact the brain’s immune system and cholesterol processing, leading to an increased risk of developing Alzheimer’s disease.

Source: Cardiff University.

Two new genes that raise a person’s risk of developing Alzheimer’s Disease have been discovered by researchers.

Nov 23, 2022

Coming to a moon near you: humans, traffic, and trash

Posted by in category: space

Putting humans on the moon is more political than you might think.

Nov 23, 2022

Hackers breach energy orgs via bugs in discontinued web server

Posted by in categories: cybercrime/malcode, energy, internet

Microsoft said today that security vulnerabilities found to impact a web server discontinued since 2005 have been used to target and compromise organizations in the energy sector.

As cybersecurity company Recorded Future revealed in a report published in April, state-backed Chinese hacking groups (including one traced as RedEcho) targeted multiple Indian electrical grid operators, compromising an Indian national emergency response system and the subsidiary of a multinational logistics company.

The attackers gained access to the internal networks of the hacked entities via Internet-exposed cameras on their networks as command-and-control servers.