Drones used to identify pregnant dolphins
Researchers have found a way to remotely determine if protected female bottlenose dolphins are expecting a calf using aerial photos taken from drones......»»
"Speckles" the piebald dolphin makes a splash as Australian first
University of the Sunshine Coast researchers believe they have recorded one of the world's most unusually colored dolphins for the first time in Australia. With its patchy black-and-white coloring, the dolphin is one of only six cases in the world wh.....»»
Snap is recalling every Pixy drone that it ever sold
Snap is recalling all of its Pixy drones over a safety issue, with owners urged to refrain from ever using it again and instead to seek a refund......»»
Graylog API Security enables organizations to identify and classify APIs
Graylog released a free version of Graylog API Security. This API discovery and monitoring tool makes API security accessible to enterprises of all sizes at a time when API-related attacks are on the rise. Uniquely, Graylog API Security enables organ.....»»
Qualys enhances CyberSecurity Asset Management to discover risky unmanaged devices
Qualys is expanding Qualys CyberSecurity Asset Management (CSAM) to identify unmanaged and untrusted devices in real-time. Leveraging the Qualys Cloud Agent to continuously monitor the network, this passive discovery method complements scans, agents,.....»»
AI tool designed to identify olive varieties based on photos of olive pits
The development of an app capable of identifying olive varieties using photos of olive pits is the ultimate goal of "OliVaR," a neural network trained with the largest photographic database of olive fruit endocarps, which has been generated by the pa.....»»
Thesis finds that recruitment of Swedish operational police officers needs to be broadened
Can scientific methods be used to identify who is best suited for physically and mentally demanding missions? In his doctoral thesis, Peter Tedeholm explores the individual characteristics of Swedish operational police officers......»»
Researchers identify new species of tuft-tailed rat in Madagascar
In an international effort, researchers have identified a previously unknown tuft-tailed rat (genus Eliurus) taxon in the Montagne d'Ambre forest in northern Madagascar, underscoring the region's extraordinary biodiversity. This discovery, published.....»»
Video: Can science beat counterfeit detector pens?
Counterfeit detector pens use a starch-iodine reaction to identify fake bills......»»
Researchers map genome for cats, dolphins, birds, and dozens of other animals
Researchers mapped genetic blueprints for 51 species including cats, dolphins, kangaroos, penguins, sharks, and turtles, a discovery that deepens our understanding of evolution and the links between humans and animals......»»
A rhino got pregnant from embryo transfer, in a success that may help nearly extinct subspecies
Researchers say a rhinoceros was impregnated through embryo transfer in the first successful use of a method that they say might later make it possible to save the nearly extinct northern white rhino subspecies......»»
Physicists identify a surprising phenomenon of aging in materials over time
Physicists in Darmstadt are investigating aging processes in materials. For the first time, they have measured the ticking of an internal clock in glass. When evaluating the data, they discovered a surprising phenomenon......»»
Scientists show that quantum infrared spectroscopy can achieve ultra-broadband spectroscopic measurements
Our understanding of the world relies greatly on our knowledge of its constituent materials and their interactions. Recent advances in materials science technologies have ratcheted up our ability to identify chemical substances and expanded possible.....»»
Ads and push notifications being used to spy on iPhone users
Both in-app ads and push notifications are being used to identify and spy on iPhone users, according to two separate reports. The first says that in-app ads are being used to gather data intended to identify your iPhone and send highly sensitive d.....»»
Google Maps makes it easier for you to identify food on a menu
Google Maps has received an update that will make matching photos to menu items a lot easier for users to identify. The post Google Maps makes it easier for you to identify food on a menu appeared first on Phandroid. Trying to look at a re.....»»
Scientists identify potential new method for diagnosing male infertility
Researchers have discovered a new phenomenon where sperm from mice can induce non-reproductive cells from hamsters to fuse and form a syncytia—a cell with multiple nuclei......»»
Warner Bros. Wants Tumblr to Identify Beetlejuice 2 ‘Leaker’
The upcoming "Beetlejuice 2" film, starring Jenna Ortega and Winona Ryder, is scheduled to premiere in September. However, it appears that someone managed to get their hands on early footage, leaking an 'on set' photo on Tumblr. Warner Bros. is unhap.....»»
For outsiders, stereotypes about Southern speech outweigh experience
The phenomenon of behavioral mimicry is well known among social scientists. We mirror the posture, movements and speech of our interlocutors at some unconscious level, but also as a means of trying to identify or communicate more clearly with them......»»
Researchers find traces of disease in dolphin poop: A potential tool for live health monitoring
Scientists have found a new non-invasive way to identify a deadly virus in dolphins that could be a testing breakthrough. For the first time, researchers at the University of Hawai'i Health and Stranding Lab have successfully detected Fraser's morbil.....»»
Study of gigantism in whales provides clues to genomic mechanism involved in tumor suppression
The functioning of certain regions of a few genes in cetaceans (whales, porpoises and dolphins) may explain why the Blue whale (Balaenoptera musculus) can reach lengths of up to 30 meters—almost 10 m more than a bus—while the Bottlenose dolphin (.....»»
New method to safeguard against mobile account takeovers
Computer science researchers have developed a new way to identify security weaknesses that leave people vulnerable to account takeover attacks, where an attacker gains unauthorized access to online accounts. Most mobiles are now home to a complex eco.....»»