Examining the toxins in the common tomato
Regardless of how one says "tomato," they all contain tomatine, a toxin in the plant's green fruit, leaves, and roots. Tomatoes produce the bitter-tasting compound—a major plant-specialized metabolite secreted from the roots—to defend against pat.....»»
Drowning tomatoes for science
I can barely hear Esther Ngumbi over the roar of greenhouse fans as she shows me around her rooftop laboratory in Morrill Hall. The benches are full of tomato plants, and the tomatoes don't look good. Half of the plants are submerged in bins of water.....»»
Like people, vultures get set in their ways and have fewer friends as they age
If you'd rather be watching TV on your couch than dancing at the club, you might have something in common with aging griffon vultures. New research shows that young griffon vultures move frequently between sleeping sites in different locations and in.....»»
Study explores how active management relates to Australian forest management
Acting President of Forestry Australia Dr. Bill Jackson says "active management" is a common term in Government and forest stakeholder reports, policies, and strategies in Australia and around the world, but up until now, it has not been well defined.....»»
APT group exploits WPS Office for Windows RCE vulnerability (CVE-2024-7262)
ESET researchers discovered a remote code execution vulnerability in WPS Office for Windows (CVE-2024-7262). APT-C-60, a South Korea-aligned cyberespionage group, was exploiting it to target East Asian countries. When examining the root cause, ESET d.....»»
Population genetic insights into the conservation of common walnut (Juglans regia) in Central Asia
Understanding species distribution, differentiation and the factors affecting genetic diversity is important for sustainable conservation and effective management, as well as the rational utilization of species germplasm......»»
MagSafe Monday: Sometimes the best products have nothing to do with technology
You’ll notice some common trends if you search for MagSafe docks on Amazon. A lot of the devices look very similar. It’s not a bad thing in a lot of ways. The job of a MagSafe dock is simple: keep all your devices charged in a way that keeps cab.....»»
What makes a supercluster?
By eye, it's impossible to pick out the exact boundaries of the superclusters, which are among the largest structures in the universe. But that's because they are not defined by their edges, but by the common motion of their components......»»
Tomato ripening study highlights cell wall component interactions
Tomato fruit ripening involves intricate biochemical and structural changes, particularly within the cell wall, which are vital for the fruit's final texture and quality. These changes include modifications in polysaccharides and proteins, but the sp.....»»
Novel features of r-process nucleosynthesis shed light on origin of heavy elements
In a study published in The Astrophysical Journal, scientists have proposed the features of the rapid neutron capture process (r-process) nucleosynthesis in a novel scenario: common envelop jet supernovae (CEJSNe). The study sheds new light on the or.....»»
Common vehicle technology frustrates drivers, J.D. Power study says
Despite industrywide technology woes, Genesis received the highest technology experience ranking for the fourth consecutive year......»»
Bonobo evidence suggests ancient origin of the "common enemy effect"
In the face of threats from other groups, humans, chimpanzees, and a selection of other species get closer to their own. Now an international team led by Kyoto University has shown that even our more peaceful cousins, bonobos—who have never been ob.....»»
Chemists succeed in upscaling a common reagent for industrial level applications
The metallic element samarium, when bound with other elements, is an incredibly useful chemical reagent for synthesizing molecules that can lead to new pharmaceuticals. Discovered in a Russian mine in 1879, the element was named after the mineral it.....»»
Bayesian Yacht Sinking: Climate Change Created Perfect Storm for Waterspouts
While the exact cause of the deadly sinking of the Bayesian superyacht remains unknown, dangerous waterspouts were spotted in the area. Scientists say they may become far more common......»»
Birds have accents, too: Researchers find cultural change in the dialects of parrots over 22-year period
While distinct languages and dialects are common to human societies, most people are unaware that other species may similarly have culturally significant dialects. New research conducted by a team of researchers from the University of Pittsburgh at J.....»»
How Russian gender-based disinformation could influence the 2024 US presidential election
Most people have a general understanding of disinformation—false information that is intentionally created to cause harm. Disinformation becomes "gendered" when deliberately false information draws on common understandings of issues like masculinit.....»»
Earth-like exoplanets might be in short supply for the Habitable Worlds Observatory
How common are Earth-like exoplanets—also called exo-Earths—and which exoplanetary systems should we target to find them?.....»»
GuidePoint Security releases Phishing as a Service
GuidePoint Security has launched a new Phishing as a Service (PhaaS) offering. Phishing remains one of the most common entry points for threat actors – according to CISA, over 90% of successful cyberattacks start with a phishing email. However, man.....»»
Climate Change’s Latest Deadly Threat: Lightning Strikes
In rural India, stormy weather, a lack of knowledge, and scant protections are combining to kill thousands every year, with climate change likely to raise the threat as lightning becomes more common......»»
Project Helianthus—a solar-sail-driven geomagnetic storm tracker
Solar storms captured the imagination of much of the American public earlier this year when auroras were visible well south of their typical northern areas. As the sun ramps into another solar cycle, those storms will become more and more common, and.....»»
Common API security issues: From exposed secrets to unauthorized access
Despite their role in connecting applications and driving innovation, APIs often suffer from serious security vulnerabilities. Recent investigations reveal that many organizations are struggling with exposed secrets such as passwords and API keys, wh.....»»