Fungi use ingenious strategies to forage underground
When you think of fungi, you'll probably picture a huddle of chubby brown mushrooms, or the large, red-capped toadstools you stumble across in the woods. In doing so, you're reducing fungi to their reproductive organs—tasty or striking as they may.....»»
How changing automaker EV plans complicate suppliers" labor strategies
Some suppliers are cutting jobs because of slowdowns in automakers' electrification plans, often reluctantly so because of how difficult it can be to fill roles to begin with, executives and industry analysts said......»»
Study calls for locally inclusive public health adaptation strategies to climate change
Modern disaster risk reduction strategies must incorporate Indigenous knowledge and local cultural practices to be adoptable and sustainable, according to a descriptive phenomenological study carried out in Kenya by researchers from the University of.....»»
Strategies for security leaders: Building a positive cybersecurity culture
Culture is a catalyst for security success. It can significantly reduce cybersecurity risks and boost cybersecurity resilience of any organization. Culture can also greatly enhance the perceived value, relevance and reputation of the cybersecurity fu.....»»
Researchers develop index to quantify circular bioeconomy
As the world faces the challenges of mitigating climate change and providing resources for a growing population, there is increasing focus on developing circular economies for sustainable production. But to evaluate strategies and impacts, it is nece.....»»
Soundscape study shows how underground acoustics can amplify soil health
Barely audible to human ears, healthy soils produce a cacophony of sounds in many forms—a bit like an underground rave concert of bubble pops and clicks......»»
Scientists characterize shale cap rocks at tiny scales
A team of researchers is working on a multidisciplinary approach to advancing the exploration of shale rock as a suitable geological seal for resource recovery and underground storage. Given that the pore space in shale rock is predominantly sub-micr.....»»
Zebrafish use surprising strategy to regrow spinal cord: Findings could help identify ways to heal spinal cord damage
Zebrafish are members of a rarefied group of vertebrates capable of fully healing a severed spinal cord. A clear understanding of how this regeneration takes place could provide clues toward strategies for healing spinal cord injuries in people. Such.....»»
Researchers discover new way to purify liquid argon for neutrino experiments
Construction workers have finished the excavation of the huge caverns that will house the international Deep Underground Neutrino Experiment. While engineers and technicians are preparing for the installation of the gigantic neutrino detectors into t.....»»
Mars has ‘oceans’ worth’ of water – but it’s deep underground
Researchers have identified what they believe could be oceans' worth of water on Mars. There's just one snag: it's deep underground......»»
Scientists find oceans of water on Mars. It"s just too deep to tap.
Using seismic activity to probe the interior of Mars, geophysicists have found evidence for a large underground reservoir of liquid water—enough to fill oceans on the planet's surface......»»
Scientists observe first neutrinos with prototype detector
In a major step for the international Deep Underground Neutrino Experiment (DUNE), scientists have detected the first neutrinos using a DUNE prototype particle detector at the U.S. Department of Energy's Fermi National Accelerator Laboratory (Fermila.....»»
74% of ransomware victims were attacked multiple times in a year
An alarming trend toward multiple, sometimes simultaneous cyber attacks forces business leaders to re-evaluate their cyber resilience strategies to address common points of failure, including inadequate identity system backup and recovery practices,.....»»
From fungi to pharmaceuticals: A milestone for the production of eutyscoparol A and violaceoid C
The natural world is rich in chemical compounds with remarkable medicinal properties. A notable example is penicillin, discovered by chance from the Penicillium mold. This discovery revolutionized the treatment of bacterial infections and highlighted.....»»
Moon ‘Spiders’ Suggest Extensive Underground Lunar Caves
Newfound spiderlike features suggest lunar explorers should watch their step.....»»
Fungi adapt cell walls to evade antifungal drugs
Every year, life-threatening invasive fungal infections afflict more than 2 million individuals globally. Mortality rates for these infections are high, even when patients receive treatment......»»
Biotech potential set to soar with the help of digital technology
Microbes and fungi have long been nature's helpers in producing fine food, drinks and medicine, but new digital technologies could unlock far greater potential for the European biotech sector......»»
Ancient poppy seeds and willow wood offer clues to the Greenland ice sheet"s last meltdown
As we focused our microscope on the soil sample for the first time, bits of organic material came into view: a tiny poppy seed, the compound eye of an insect, broken willow twigs and spikemoss spores. Dark-colored spheres produced by soil fungi domin.....»»
Researchers use vibrations from traffic to measure underground soil moisture
Caltech researchers have developed a new method to measure soil moisture in the shallow subterranean region between the surface and underground aquifers. This region, called the vadose zone, is crucial for plants and crops to obtain water through the.....»»
Colombia, Guatemala learn from each other in rainforest preservation
In the lush jungle of northern Guatemala—in the largest protected area in Central America—30 leaders from Colombia's Amazon basin region are swapping strategies with local ethnic Maya farmers on how to live off this dense forest without destroyin.....»»
Practical strategies to mitigate risk and secure SAP environments
Large companies use ERP applications to manage business processes, including payroll and financial planning. This is precisely why bad actors are taking a renewed interest in these legacy systems – and succeeding. In this Help Net Security vide.....»»