Genetic method leverages bacterial transfer mechanism to produce new active ingredients
Microorganisms produce a wide variety of natural products that can be used as active ingredients to treat diseases such as infections or cancer. The blueprints for these molecules can be found in the microbes' genes, but often remain inactive under l.....»»
The Amazon rainforest as a cloud machine: How thunderstorms and plant transpiration produce condensation nuclei
The rainforest in the Amazon basin transpires vast amounts of gaseous isoprene. Until now, it was assumed that this molecule is not transported far up into the atmosphere, as it rapidly declines when exposed to light conditions. The CAFE-Brazil measu.....»»
Q&A: Researcher discusses protecting the health of wildlife ecosystems
The plague is one of the deadliest bacterial infections in human history. An estimated 50 million Europeans died from it in the mid-1300s when it was known as the "Black Death.".....»»
The dual role of insects in parasitic plant reproduction solves a long-standing botanical mystery
In the dark and moist understories of the subtropical forests of Shimoshima Island in Japan grow parasitic plants that feed on the roots of other plants. They are called Balanophora, and for over a century, the mechanism of their seed dispersal has r.....»»
Study confirms two forms of longtooth groupers in Asia are separate species of fish
A team of marine biologists from the Japan Fisheries Research and Education Agency, the Kanagawa Prefectural Museum of Natural History, also in Japan, and the Vietnam Academy of Science and Technology, has found via genetic and physical study that tw.....»»
Discovery of molecular switch explains how bacteria control their protein biosynthesis through cell metabolism
Protein biosynthesis—the process whereby cells produce protein molecules, which are essential for life and growth—is a highly complex and strictly regulated affair. An interdisciplinary team led by LMU biologist PD Dr. Jürgen Lassak has now disc.....»»
Product showcase: Securing Active Directory passwords with Specops Password Policy
Password policies are a cornerstone of cybersecurity for any organization. A good password policy ensures every end user has a strong and unique password, significantly reducing the risk of unauthorized access and data breaches. These policies not on.....»»
Bose QuietComfort headphones are down to only $199 for Cyber Week
The Bose QuietComfort wireless headphones feature active noise cancellation and a 24-hour battery life. They're on sale for an affordable $199 from Best Buy......»»
Tiny dancers: Scientists synchronize bacterial motion
Researchers at TU Delft have discovered that E. coli bacteria can synchronize their movements, creating order in seemingly random biological systems. By trapping individual bacteria in micro-engineered circular cavities and coupling these cavities th.....»»
X-ray vision: Seeing through the mystery of an X-ray emissions mechanism
Since the 1960s, scientists who study X-rays, lightning and similar phenomena have observed something curious: In lab experiments replicating these occurrences, electrons accelerated between two electrodes can be of a higher energy than the voltage a.....»»
Hybridization of landlocked and anadromous Atlantic salmon to rescue a population threatened by inbreeding
The doctoral dissertation of Aslak Eronen, MSc, entitled "Hybridization of landlocked and anadromous Atlantic salmon: Potential genetic rescue in a population threatened by inbreeding" will be defended at the Faculty of Science, Forestry and Technolo.....»»
Peat-bog fungi produce substances that kill tuberculosis-causing bacteria
An analysis of fungi collected from peat bogs has identified several species that produce substances toxic to the bacterium that causes the human disease tuberculosis. The findings suggest that one promising direction for development of better treatm.....»»
Open-source platform supports large imaging data analysis of single cell responses to manipulation
Modern day drug discovery is shifting from single end point assays to more complex phenotypic assays that query single cell and population responses to chemicals and genetic manipulation......»»
Seeking a new way of life under the sea—and a world record
There are probably easier ways to set a world record, but Rudiger Koch has found his method 11 meters (36 feet) under the sea......»»
Enzyme study sheds light on the molecular mechanism behind "sleepiness"
Recent research has observed that chemical modifications called phosphorylation of proteins in brain neurons dynamically regulate sleep and wakefulness. But the protein kinases that suppress sleep and the dephosphorylation enzymes that control sleep.....»»
Customized CRISPR toolkit allows remote-controlled genome editing
Thanks to CRISPR, medical specialists will soon have unprecedented control over how they treat and prevent some of the most challenging genetic disorders and diseases......»»
New map shows where koalas are at most risk
A first-of-its-kind map created by a team of scientists at the University of Sydney shows that the genetic diversity of koala populations is in decline across Australia, putting the iconic marsupial at increased risk of extinction......»»
Backyard chickens in Australia perceived as companion animals and food source, interviews reveal
Chickens have been a mainstay in Australian backyards for generations. New research from the University of Adelaide reveals that owners see their chooks as a blend between pet and livestock as well as a trustworthy source of produce......»»
Study discovers a nano-switch mechanism controlled by a single hydrogen atom in all living organisms
A group of researchers in Japan has revealed, for the first time, a mechanism for controlling the potential of an electron carrier protein in the redox reaction that all organisms need to obtain energy. The study was published in the online edition o.....»»
Push Security introduces verified stolen credentials detection capability
Push Security unveiled verified stolen credentials detection capability, a new feature designed to reshape how security teams combat identity threats. By analyzing threat intelligence (TI) on stolen credentials and comparing it against active credent.....»»
Hurry! These Cyber Monday Walmart laptop deals are active for now
Walmart has some great Cyber Monday laptop deals. We've picked out our favorites including many popular brands and some key buying advice too......»»