Showing posts with label TO. Show all posts
Showing posts with label TO. Show all posts

Thursday, 22 November 2018

Supercomputers help tailor cancer treatments

Attempts to eradicate cancer are often 

 compared to a "moonshot" - the successful effort that sent the first astronauts to the moon.
But imagine if, instead of Newton's second law of motion, which describes the relationship between an object's mass and the amount of force needed to accelerate it, we only had reams of data related to throwing various objects into the air.
This, says Thomas Yankeelov, approximates the current state of cancer research: data-rich, but lacking governing laws and models.
The solution, he believes, is not to mine large quantities of patient data, as some insist, but to mathematize cancer: to uncover the fundamental formulas that represent how cancer, in its many varied forms, behaves.
"We're trying to build models that describe how tumors grow and respond to therapy," said Yankeelov, director of the Center for Computational Oncology at The University of Texas at Austin (UT Austin) and director of Cancer Imaging Research in the LIVESTRONG Cancer Institutes of the Dell Medical School. "The models have parameters in them that are agnostic, and we try to make them very specific by populating them with measurements from individual patients."
The Center for Computational Oncology (part of the broader Institute for Computational Engineering and Sciences, or ICES) is developing complex computer models and analytic tools to predict how cancer will progress in a specific individual, based on their unique biological characteristics.
In December 2017, writing in Computer Methods in Applied Mechanics and Engineering, Yankeelov and collaborators at UT Austin and Technical University of Munich, showed that they can predict how brain tumors (gliomas) will grow and respond to X-ray radiation therapy with much greater accuracy than previous models. They did so by including factors like the mechanical forces acting on the cells and the tumor's cellular heterogeneity. The paper continues research first described in the Journal of The Royal Society Interface in April 2017.
"We're at the phase now where we're trying to recapitulate experimental data so we have confidence that our model is capturing the key factors," he said.
To develop and implement their mathematically complex models, the group uses the advanced computing resources at the Texas Advanced Computing Center (TACC). TACC's supercomputers enable researchers to solve bigger problems than they otherwise could and reach solutions far faster than with a single computer or campus cluster.
According to ICES Director J. Tinsley Oden, mathematical models of the invasion and growth of tumors in living tissue have been "smoldering in the literature for a decade," and in the last few years, significant advances have been made.
"We're making genuine progress to predict the growth and decline of cancer and reactions to various therapies," said Oden, a member of the National Academy of Engineering.
MODEL SELECTION AND TESTING
Over the years, many different mathematical models of tumor growth have been proposed, but determining which is most accurate at predicting cancer progression is a challenge.
In October 2016, writing in Mathematical Models and Methods in Applied Sciences, the team used a study of cancer in rats to test 13 leading tumor growth models to determine which could predict key quantities of interest relevant to survival, and the effects of various therapies.
They applied the principle of Occam's razor, which says that where two explanations for an occurrence exist, the simpler one is usually better. They implemented this principle through the development and application of something they call the "Occam Plausibility Algorithm," which selects the most plausible model for a given dataset and determines if the model is a valid tool for predicting tumor growth and morphology.
The method was able to predict how large the rat tumors would grow within 5 to 10 percent of their final mass.
"We have examples where we can gather data from lab animals or human subjects and make startlingly accurate depictions about the growth of cancer and the reaction to various therapies, like radiation and chemotherapy," Oden said.
The team analyzes patient-specific data from magnetic resonance imaging (MRI), positron emission tomography (PET), x-ray computed tomography (CT), biopsies and other factors, in order to develop their computational model.
Each factor involved in the tumor response - whether it is the speed with which chemotherapeutic drugs reach the tissue or the degree to which cells signal each other to grow - is characterized by a mathematical equation that captures its essence.
"You put mathematical models on a computer and tune them and adapt them and learn more," Oden said. "It is, in a way, an approach that goes back to Aristotle, but it accesses the most modern levels of computing and computational science."
The group tries to model biological behavior at the tissue, cellular and cell signaling levels. Some of their models involve 10 species of tumor cells and include elements like cell connective tissue, nutrients and factors related to the development of new blood vessels. They have to solve partial differential equations for each of these elements and then intelligently couple them to all the other equations.
"This is one of the most complicated projects in computational science. But you can do anything with a supercomputer," Oden said. "There's a cascading list of models at different scales that talk to each other. Ultimately, we're going to need to learn to calibrate each and compute their interactions with each other."
FROM COMPUTER TO CLINIC
The research team at UT Austin - which comprises 30 faculty, students, and postdocs - doesn't only develop mathematical and computer models. Some researchers work with cell samples in vitro; some do pre-clinical work in mice and rats. And recently, the group has begun a clinical study to predict, after one treatment, how an individual's cancer will progress, and use that prediction to plan the future course of treatment.
At Vanderbilt University, Yankeelov's previous institution, his group was able to predict with 87 percent accuracy whether a breast cancer patient would respond positively to treatment after just one cycle of therapy. They are trying to reproduce those results in a community setting and extend their models by adding new factors that describe how the tumor evolves.
The combination of mathematical modeling and high-performance computing may be the only way to overcome the complexity of cancer, which is not one disease but more than a hundred, each with numerous sub-types.
"There are not enough resources or patients to sort this problem out because there are too many variables. It would take until the end of time," Yankeelov said. "But if you have a model that can recapitulate how tumors grow and respond to therapy, then it becomes a classic engineering optimization problem. 'I have this much drug and this much time. What's the best way to give it to minimize the number of tumor cells for the longest amount of time?'"
Computing at TACC has helped Yankeelov accelerate his research. "We can solve problems in a few minutes that would take us 3 weeks to do using the resources at our old institution," he said. "It's phenomenal."
According to Oden and Yankeelov, there are very few research groups trying to sync clinical and experimental work with computational modeling and state-of-the-art resources like the UT Austin group.
"There's a new horizon here, a more challenging future ahead where you go back to basic science and make concrete predictions about health and well-being from first principles," Oden said.
Said Yankeelov: "The idea of taking each patient as an individual to populate these models to make a specific prediction for them and someday be able to take their model and then try on a computer a whole bunch of therapies on them to optimize their individual therapy - that's the ultimate goal and I don't know how you can do that without mathematizing the problem." 

Improve your Android experience with these tips and tricks

1. Only hear from the people you want 

There's no need to change your number or be forced into awkward conversations either. Instead you can set your phone to only deliver messages from those you actually want to talk to.
Hitting your volume toggle will give you alert options. Hit Priority and the Settings cog. Here you can choose who you receive calls, messages and reminders from. Perfect for when you want to block out the overly chatty 'friends' you'd rather avoid.
2. Give two fingers to quick settings
You probably know that swiping down from the top of your Android handset's home screen will launch the notifications menu. Throwing a second finger into the mix brings quick settings to the foreSaving precious seconds and a second swipe, the double-digit motion puts Wi-Fi controls, screen casting options and Bluetooth shortcuts at your fingertips with literally zero hassle and minimal effort. 
3. Set your phone to automatically unlock when you're at home 
You can set your phone to automatically unlock when you're at home, though, removing this irritation while retaining your privacy when you want it.
In Settings, go to Security >> Trust Agents >> Smart Lock. Activating this will allow you to set parameters for when you want your device to ditch the passcode. 
4. Extend your phone's battery life 
Under the Battery controls in Settings, your phone should have a Power Saver Mode option.
Enable this to reduce background features and survive that night bus ride home. Helping eke out your depleted power supply, this will set your emails to fetch and turn off some of the 76 apps that send you notifications every 30 minutes.

New microfluidic device isolates plasma cells from blood instead of bone marrow

For the first time, researchers have 

 generated blood-forming stem cells in the lab using pluripotent stem cells, which can make virtually every cell type in the body. The advance, published in the journal Nature, opens new avenues for research into the root causes of blood diseases and ways to create immune-matched blood cells, derived from patients' own cells, for treatment purposes.
"We're tantalizingly close to generating bona fide human blood stem cells in a dish," said senior investigator George Daley, who heads a research lab in Boston Children's Hospital's Stem Cell Program. "This work is the culmination of over 20 years of striving."
Although the cells made from the pluripotent stem cells are a mix of true blood stem cells and other cells known as blood progenitor cells, they are capable of generating multiple types of human blood cells when put into mice.
"This step opens up an opportunity to take cells from patients with genetic blood disorders, use gene editing to correct their genetic defect, and make functional blood cells," said Ryohichi Sugimura, the study's first author and a postdoctoral fellow in the Daley Lab. "This also gives us the potential to have a limitless supply of blood stem cells and blood by taking cells from universal donors. This could potentially augment the blood supply for patients who need transfusions."
Since human embryonic stem (ES) cells were isolated in 1998, scientists have been trying, with little success, to use them to make blood-forming stem cells. In 2007, three groups, including the Daley Lab, generated the first induced pluripotent stem (iPS) cells from human skin cells through genetic reprogramming. iPS cells were later used to generate multiple human cell types, such as neurons and heart cells - yet blood-forming stem cells remained elusive.
Sugimura, Daley, and colleagues combined two previous approaches. First, they exposed human pluripotent stem cells - both ES and iPS - to chemical signals that direct stem cells to differentiate into specialized cells and tissues during normal embryonic development. This generated hemogenic endothelium, an early embryonic tissue that eventually gives rise to blood stem cells, although the transition to blood stem cells had never been achieved in a dish.
In the second step, the team added genetic regulatory factors, or transcription factors, to push the hemogenic endothelium toward a blood-forming state. Starting with 26 transcription factors identified as likely candidates, they eventually came down to just five (RUNX1, ERG, LCOR, HOXA5, and HOXA9) that were both necessary and sufficient for creating blood stem cells. They delivered the factors into the cells with a lentivirus, as used in some forms of gene therapy.
Finally, they transplanted the genetically engineered hemogenic endothelial cells into mice. Weeks later, a small number of the animals carried multiple types of human blood cells in their bone marrow and blood circulation. Some mice were even able to mount a human immune response after vaccination.
ES cells and iPS cells were similarly good at creating blood stem and progenitor cells when the technique was applied. But the researchers are most interested in iPS cells, which offer the added ability to derive cells directly from patients and model disease. "We're now able to model human blood function in so-called humanized mice," says Daley.
The researchers' technique produced a mixture of blood stem cells and so-called hematopoietic progenitor cells, which also give rise to blood cells. Their ultimate goal is to expand their ability to make true blood stem cells in a way that's practical and safe, without the need for viruses to deliver the transcription factors, and to introduce gene-editing techniques such as CRISPR to correct genetic defects in pluripotent stem cells before blood cells are made.
One challenge in making bona fide human blood stem cells is that no one's been able to characterize these cells fully.
"It's proved challenging to 'see' these cells," said Sugimura. "You can roughly characterize blood stem cells based on surface markers, but even with this, it may not be a true blood stem cell. And once it starts to differentiate and make blood cells, you can't go back and study it - it's already gone." 

Computer User Tips

How To Solve computer Crashes/Hang problem:
* Check your cooling fan to working properly.
* Check your RAM and fixed accordantly.
* Check motherboard all connection
* Care your power-supply stations work properly.
* Check your mother boar battery.
* Use authorized "Anti-virus" and scan daily or weekly.
* Check any windows file is miss or not. Check windows system file by "SFC" for sfc go run option type "sfc" system file check .

How to speed up 
computer/Laptop:
* Monthly Disk Defragmentation
* Protection a strange antivirus
* Keep always Empty the Recycle Bin
* Delete Your unused data, image, file and Holder
* Keep 30% Free space Heard Desk
* Clean Your Computer's Windows Registry
* Uninstall and Remove Unneeded Programs
* Go "RUN" option and type "tree" and > ENTER
* Go "RUN" option and type "%TEMP%" and > ENTER
* Maintenance e-Safety rules when use internet.

Ways to stay safe online

As benefits of the internet, a wide range of activities can be done from online socializing to banking and shopping. However, in order to do any activity online, one must have an account. And there are always accounts for banking or financial transactions which are targeted by cyber criminals.
The cybercrime rate has recently increased significantly. Email accounts, Facebook accounts or any accounts related to banking are not safe from hackers. Therefore, to protect against these attacks, a user should be careful about some things and take some steps to keep their accounts safe.
Here are some of the ways to keep an online account safeguarded today:
Two-level security system usage:
Currently there is two-factor authentication or two-level security systems in place in almost all websites to protect users' accounts. This system requires in addition to a password, a PIN code which is immediately sent to the mobile phone and a code can be used only once.
Using a strong password:
Many don't pay heed to this when creating new accounts. But this is the first hurdle crossed by hackers during a cybercrime. In order to make a password strong, one must use uppercase, lowercase, symbol, numerical and special characters.
Being careful when using public WiFi networks:
One needs to be careful about using the free WiFi network. Because of the difficulties of these networks compared to the private network is that the cyber criminals may be able to get hold of important information via the medium.
Do not login from any devices other than your own:
Many people have logged into their accounts from devices other than their own computers, laptops or smartphones. But, this work cannot be done at all. Because the device may have hidden malware or programs that can steal passwords or other important information.
Stay away from phishing sites or links:
The phenomenon is especially prominent on Facebook. If someone shares a link then many people tend to click on it. But, that link shouldn't be clicked on unless it is a trusted website. Because doing so can result in the Facebook account being hacked.
Using anti-malware and anti-virus software:
Install Antivirus to prevent viruses and malware attacks on computers, tabs and smartphones.

Amazing game apps for child brain development


In this day and age in Bangladesh with the space for outdoor play diminishing very quickly, and classrooms being similar to cages, games in smartphones and tablets have become a debatable but monopolistic source of entertainment for children.  With that in mind, we've narrowed down the most absorbing, ingenious apps for all age groups, from preschoolers and primary school kids, to bigger kids (including you) which will not only provide entertainment but also augment the constructive mental growth of children in a subtle manner. 
THINKROLLS: KINGS& QUEENS
This slice of gentle gaming fun brings a regal air to its dozens of logic and gravity puzzles (in the sense the roly-poly protagonists wear crowns, unless you decide to play as a chicken). The goal is to clear a pathway so the rotund hero can continue progressing through a massive maze. The snag is this involves figuring out how to work with all kinds of contraptions, like gears, bridges, hatches, and even a harp that makes an otherwise ravenous crocodile sleepy. Just the thing to get tiny minds working overtime, while sneakily getting them interested in videogames.
TOCA LIFE: OFFICE
You can't go wrong with Toca Life apps, which offer a range of scenarios, but Toca Life: Office is our favourite, enabling your kids to imagine what their parents get up to when they go to that exciting-sounding place called 'work'. Unfortunately for you, Toca Life: Office is almost certainly more exciting and colourful than your own office, with dozens of objects to muck about with, and discoveries to make. For toddlers, there's the basic joy of dragging things around, but older kids can revel in messing about with a photocopier, finding secret exits, and hopping into the office helicopter.
ENDLESS ALPHABET
If you've tiny humans toddling about, chances are you'll own some wooden puzzles where letters are slotted into a board. If you're very fortunate, you'll still actually have a few of the letters, rather than a sad infant pointing forlornly at gaps. Endless Alphabet should take their minds off of such losses, with dozens of words to sort by dragging letters about, and a bunch of amusing animations when each word is completed.
METAMORPHABET
Metamorphabet brings new life to learning the alphabet by way of imaginative, surreal and frequently disturbing animations. It begins with an 'A'. Tap and it sprouts antlers you can ping about. The 'A' then transforms into an arch and goes for an amble. And that's just the start. Next, you're watching a giant 'B' with a bushy beard and a beak belching an endless stream of colourful bugs. It's weird, creative, brilliant, and usable enough even for an 18-month-old to try their tiny hand at.
LITTLE DIGITS
Touchscreens are more intuitive than old-school PCs, but that doesn't mean interactions from very young children amount to more than them mashing their hands against the display. With Little Digits, though, such actions at least become productive over time, with the app cunningly using multitouch to help a child learn to count. The mechanics of the basic mode are simple: touch the screen with some digits, and the app chirps the relevant number, while displaying a cuddly number monster. Beyond that, you can delve into basic sums, and even record your own audio for the voiceovers.
SAGO MINI FRIENDS
There are loads of Sago apps for kids, but Mini Friends is particularly good. You choose a character and scoot about a neighbourhood, barging into people's houses and then playing little mini-games. These are simple enough for most kids - fix a birdhouse by smacking some nails into it; play dress-up; eat some snacks - and they cunningly promote empathy and sharing. For example, when two animals are sitting before a feast, lobbing all the noms at one of them makes the other look like it's going to burst into tears. Only by sharing is everyone left in a happy place.
PEEK-A-ZOO
This single-screen app features a bunch of cartoon animals and initially looks a bit basic. But it's really quite sneaky, offering a surprising amount of depth. The basic game involves your wee nipper identifying the correct cartoon animal, based on a simple clue. This might be a name, emotion, action, position or sound. Once the correct character is prodded, a new scene appears. These won't fail to bring a smile to a supervising parent's face, such as a seal trying to make a phone call on a banana, or a pig 'hiding' on a pink background.
NAMOO
Kids tend to like the outdoors, hence many parents finding a collection of pine cones and tiny grubby handprints in their house after a walk in the woods. But the weather doesn't always like kids. When it's being uncooperative, you can feed interest in plant life with Namoo. This interactive book has a gorgeous minimal art style and succinct text. Most importantly, the scenes encourage play and exploration, such as a proddable plant cell that makes beepy sci-fi noises.
WEATHER BY TINYBOP
In Weather by Tinybop, you tap icons, to discover hot-spots that unlock little interactive scenes you can fiddle about with. Kid in a good mood? Watch as they melt ice to help someone fish, or cool things down for a panting dog. A tiny Trump in waiting? Get concerned while they rip apart a house with a tornado, while laughing maniacally and yelling something about climate change being a hoax.
FOLDIFY
If you're concerned your kids spend too much time glued to screens, Foldify cleverly makes them think beyond glass and aluminium. The app kicks off with you selecting a template - such as a blocky human form, car, or arcade cabinet. You then use the app's tools to decorate your creation. Whether you're importing photos, painting like a junior Picasso, or adding more eye and mouth stickers than any one person reasonably needs, Foldify patiently builds up a 3D model of your masterpiece that can be twiddled with a finger. The best bit: you then print it out, cut and fold, and it exists in real life.
LOOPIMAL
Loopimal is essentially 'My First Sequencing App'. You drag coloured shapes to empty slots, which trigger canned loops performed by a cartoon creature. Master that and the screen can be split, enabling an animated Fab Four to smash out oddball beats. There's no going wrong, all songs are in C-major so others can play along, and the funky bass-playing octopus and stompy mammoth need their own record contract immediately.

Increasing the security of web applications


With the expansion of social media, the usages of web applications have been increasing around the world. As a result, online attackers have transformed their mode of action on the internet to maximize on this phenomenon.
The hackers have over the years assailed networks and exploited system level vulnerabilities which has in turn been fueling demand for products like firewall and intrusion detection systems.
As these products mature and security teams for information technology  learn to better handle network security, the information security industry is seeing a visible increase in attacks moving up the stack to target application-level vulnerabilities.
Web Application Firewall (WAF) protects applications from attackers. Internet facing web applications make up a large part of the attack surface, and are where attackers have their attention focused, which is indicated by a prevalence of attacks on the platform being 35%.
In return, WAFs are designed to protect web applications. WAFs are a shielding safeguard intended to defend applications accessed via the Hypertext Transfer Protocol address.
They are capable of preventing attacks that network firewalls or intrusion prevention systems cannot.
WAFs sit in front of a web application or web site,monitor application activity and alert on or block traffic that is malicious or that does not comply with specific rules.
The intention is to catch application level attacks, such as SQL or Standardized Query Language which requesting information from a database injection and cross-site scripting along with attempts to manipulate web application behavior.
Unprotected web applications are the easiest point of entry for hackers and vulnerable to a number of attack types.
Sophisticated threats such as SQL injection, cross-site scripting, buffer overflows, and cookie poisoning malicious sources. DOS attack also includes layer 7 load balancing and accelerated SSL offloading for more efficient application delivery.
It has features like Vulnerability scanning and patching, IP reputation, web application attack signatures, credential stuffing defense, anti-virus, Sandbox, Real-time attack insights and reporting with advanced visual analytics tools, Behavioral attack detection, Advanced false positive and negative detection avoidance.
Amber IT Web Application Firewall (WAF) is a cloud-based service that reduces the complexity of application security with a unified platform to rapidly detect and virtually patch web application vulnerabilities. It's simple, scalable and adaptive approach, backed by Amber IT's security expertise, lets you quickly block web application attacks, prevent disclosure of sensitive information, and control when and where your applications are accessed.

Allen integrated cell: Using AI to look inside human cells

Using artificial intelligence, scientists 

 have created a tool that lets anyone visualize what the structures inside a cell look-a-like, even when you only have images of the outside. The Allen Integrated Cell, available for free online, creates 3D visualizations that could help researchers better understand disease.
This cell tool focuses on human stem cells, or cells that haven't yet turned into, say, muscle cells or heart cells. If we better understand the inner workings of a healthy cell, then we can better understand what goes wrong when it turns into something like a cancer cell, says Greg Johnson, a scientist at the Allen Institute. 
First, the scientists genetically engineered cells so that their internal structures (like the mitochondria) glowed. Then, they took thousands of photos of these glowing cells and fed them to machine learning algorithms. The algorithms learned to predict the shape and location of structures in any cell, not just the ones it had already seen or the ones that had various other structures labeled.
The creation of the interactive tooland learning platform is indeed important as it will let researchers study cells more effectively and cheaply. 

The impacts of information monopoly

The question of how to encourage transformational, market-dominating innovations while limiting the abuse of market power long precedes the digital age.Despite rules prohibiting "predatory" pricing and "anti-competitive" mergers, price wars and acquisitions that increase market leaders' power are permitted in practice. 
The innovation-favoring approach has helped to make the US a nursery of world-dominating businesses, and it has not changed with the digital revolution, either. The "info-monopolists" Google and Facebook, faced with few regulatory obstacles, have created unprecedented value for consumers - and have secured massive market power for themselves.These companies have eviscerated traditional media, though many of the losers were themselves oligopolists or monopolists. 
Unimpeded growth has no doubt helped to increase the value that Google and Facebook can offer. The more Google searches are conducted, the better the results. The more people who use Facebook, the more reason there is to join. This attracts advertisers, whose payments fund investments in improved technology and added features.
But unchecked market power creates opportunities for abuse, particularly with regard to user privacy. Unlike television networks or newspapers, these digital behemoths don't merely give advertisers an audience; they tailor ads to individual consumers. This is not a benign difference, because in order to tailor ads effectively - thereby maximizing their value to advertisers (and thus profits for the platform) - these companies collect a huge amount of personal data from their users. 
Perhaps because most users don't know the details of which data are being collected, they have so far shown a surprisingly high tolerance for online surveillance. Sadly, most users never bother to read, say, Facebook's terms of service before clicking "agree," and are indifferent to how much surveillance is being carried out.
In fact, extensive tracking has become the new normal. The question is no longer whether Facebook should monetize users' personal data, but whether it should be required to pay users for their data or even charge users a fee to opt out of data collection.
But could the data that Facebook or Google accumulates ever really be safe? No matter how much one spends on protecting large databases, it is farfetched to believe that nobody inside or outside such a massive and complex organization could breach it. America's own National Security Agency could not prevent Edward Snowden, a low-level contractor, from walking off with a trove of state secrets on a thumb drive. And then there is the whole Facebook scandal involving the nearly 90 million users' data harvest by the political consultancy Cambridge Analytica.

The world's first 3D-printed human corneas are here

Newcastle University researchers have devised a   

groundbreaking experimental technique that could help millions on the corneal transplant waiting list.
By using a simple 3D bio-printer, Professor of Tissue Engineering Che Connon and his team of scientists were able to combine healthy corneal stem cells with collagen and alginate (a type of sugar sometimes used in tissue regeneration) to create 'bio-ink' which is a printable solution that enabled them to reproduce the shape of a human cornea in just 10 minutes.
The cornea has a significant role in helping us focus and barricading our eyes against dirt and bacteria. However, since it's located on the outermost layer of the eye, it's also pretty vulnerable to injury.
"Our unique gel - a combination of alginate and collagen - keeps the stem cells alive whilst producing a material which is stiff enough to hold its shape but soft enough to be squeezed out the nozzle of a 3D printer," Connon said.
Before printing the corneal replicas, researchers scanned patients' eyes to ascertain the necessary dimensions and coordinates.
Although is years before the 3D-printed corneas are available in an official capacity, they still represent incredible hope for those with more severe corneal-related impairments.    
-Edited 

The hackers teaching old DNA sequencers new tricks

DNA sequencing is any chemical, enzymatic or technological procedure for determining the linear order of nucleotide bases in DNA. Sanger sequencing by replicative synthesis in the presence of dideoxy nucleotide chain terminator monomers has now given way to 'next generation' sequencing by short parallel read technologies. The term often applies to the entire sequence determination pipeline including post-sequencing software analysis.
In a basement storeroom at Stanford University in California, the guts of a dozen DNA sequencers lie exposed - hundreds of thousands of dollars worth of cameras and lasers, optics and fluid controllers, all scavenged from a late-model, next-generation Illumina DNA sequencer called GAIIx. On the floor, the shell of one old instrument sits empty, picked over like a carcass. "I seem like a hoarder," says Stanford biophysicist William Greenleaf.
But over the past 6 years, this collection has fuelled an effort that has engaged about half of Greenleaf's 18-member lab team. Whereas most researchers use DNA sequencers to, well, sequence DNA, Greenleaf's team is one of a small number that has repurposed the devices for an entirely different goal: to study protein and nucleic-acid biochemistry on a massive scale, from macromolecular interactions and RNA folding to enzyme function.
Broadly, the work demonstrates what's possible when scientists look into the guts of their hardware - proof that equipment isn't necessarily without value just because it is old or outdated.
But there's a reason such technology development is called bleeding edge: things often go wrong. Sarah Denny, a biophysicist who graduated from Greenleaf's lab this year, chuckles when asked whether her equipment offers 'plug-and-play' simplicity. "Many times when you did an experiment, something would break and you'd have to figure out how to get it to work again," she says. But given the volume of data she could extract, the reward was worth the pain. In Denny's case, her team gained a better understanding of RNA folding. Such is life in the do-it-yourself trenches.

Malware installed by fake flash installers

If you think that Flash, the once-popular web    

 plugin, couldn't die fast enough, even those
 annoying fake Flash installers riddled with
 malware aren't going anywhere any time soon.
 In fact, they're getting even sneakier.
New research out of Palo Alto Networks  found
a recent spike of fake Flash installers not only
 dropping cryptocurrency mining malware on
 vulnerable computers - but actually installing
 Flash while it's there.
The researchers said that this new technique is a way to deceive the user by tricking them into
 thinking that it's a legitimate Flash installer.

Once the installer opens, it quietly implants XMRig, an open source cryptocurrency miner that uses the computer's processor and graphics card to start mining. All the generated funds are siphoned off to a Monero wallet - making it near impossible to trace. When the mining malware is implanted, the installer downloads a legitimate Flash installer from Adobe's website and installs it.
Since March, the researchers found over a hundred fake Flash updaters alone.
It's a little ironic that Flash, one of the buggiest plugins and most attack prone over the years, is still causing headaches. When Flash wasn't used as a way to used as a way to push malware on users, hackers were imitating it and using the plugin as a springboard to launch their own fake attacks. Flash became so much of a problem that Google began sandboxing Flash (and other plugins) in Chrome almost a decade ago because Flash-based malware was so prevalent.
But since the rise of the more universally supported and easier to use HTML5, Flash use has rapidly been on the decline.
Adobe is set to retire Flash in 2020. Maybe at its demise, we'll see fewer fake Flash installers too?

Technology, innovation, trends and opportunities

Technology is moving at an incredible pace. The years to come will bring impressive technological breakthroughs with massive impact on our lives, markets and societies. In our connected world, with the unprecedented level of information, knowledge and ideas exchange, innovation is happening continuously, at scale and in several forms. It is driven by corporations, secret labs, universities, startups, research scientists or simply by thousands of creative individuals across the globe.
The most promising developments in the wider information technology spectrum. Here is the list:
Artificial Intelligence
Everybody is talking about Artificial Intelligence these days. And yes, in many cases, the topic is covered with exaggerations and hype. Fortunately, the overall A.I. progress and the pace of the underlying technological innovation easily justifies this hype. Consider the progress achieved in fields like Deep Learning and areas such as Computer Vision and Natural LanguageProcessing.
Computer vision is making huge steps, with massive applications in autonomous cars, navigation, robotics, pattern recognition, medical diagnosis and more. Language Understanding has made tremendous progress as well?-?recently reached the levels of human understanding?-?Microsoft reports a word error rate of 5.9% which is equal to human performance on the same input.
Digital assistants become more and more intelligent, contextual and proactive. At some point in the near future, your digital assistant will be able not only to handle your tasks and information requests but also to do respond with humor?-?and this will be a major milestone for A.I. Your digital assistant will know (and keep learning) the style of your humor and how it depends on the time of day, the day of the week, the social arrangement, the agenda of the day and your implicitly quantified mood. 

Developers can now experiment with cognitive service in no time and at low cost,
Natural User Interfaces
It's all about seamless experiences: voice-driveninteractions?-?not only voice commands, but more advanced, natural dialogues and forms of communication combining multiple signals in meaningful, streamlined experiences.
Imagine being in your smart home, asking your digital assistance to 'provide more information about this', where 'this' is resolved automatically by your Digital Assistant, using gaze analytics via connected cameras. This way your Digital Assistant understands what you were looking at when you asked the question.
Then, using object detection algorithms, concludes on the class of objects 'this' refers, to empower a natural and intelligent response and a meaningful conversation development.
At the same time, haptic offers significant opportunities for innovation. Haptic is about recreating the sense of touch by applying force feedback, vibrations, or motions to the user. Startups like Lofelt develop such applications for gaming, AR, VR, and entertainment while Ultrahaptics is working on 'invisible touchless interfaces'. And this is where AI, Natural user interfaces, AR and VR and Touchless User interfaces based on Gesture Recognition are all blended together in smart, innovative scenarios empowering end-users.
Virtual Reality
The virtual reality (VR) technology is exploding. So are the opportunities for innovative experiences, use-cases and products. Content creation for VR is a great opportunity with significant startup activity worldwide. VR startups are working across multiple domains and business scenarios, including E-commerce, gaming, socialapplications, learning and education, healthcare, online VR environments and more. The next few years will bring impressive progress on all VR hardware, applications and VR content.
Augmented Reality
Augmented reality is what we get when physical and digital worlds blend into a single experience. Typical examples are Microsoft HoloLens and Google Glass. Again, this is an area that will grow rapidly as the opportunity for innovation is unlimited: content experiences, content discovery, dataexploration and visualizations, intelligent and contextual object annotation, dynamic physical world mapping and discovery, industrial applications for field workers?-?are just some examples of the applications which will empower the ways we understand our world.
Analytics and Visualization
Data availability has exploded?-?modern corporations have access to vast amounts of complex data, both internal and from the public domain. The breadth and depth of data available, require new ways to summarize, visualize and present data. Novel ways to experience data and insights could involve intelligent interactive synopsis and 'data navigation' systems, VR and AR experiences, voice-driven insights discovery and 'personalized data exploration' scenarios. I do believe that there are great new ways to visually browse and understand data, discover and explore hidden structures, trends and patterns.
Blockchain
Blockchain is one of the most disruptive technologies out there. Its distributed, decentralized and immutable properties make it the ideal way to store and track data across numerous domains and use cases.
I see significant new applications and novel scenarios beyond crypto-currencies and fin-tech. Startups are already working on novel concepts that make sense to leverage blockchain. In the years to come, some of these willdisrupt social, government and even political aspects of our world.
Robotics
Robots are already here, in one form or another. Regardless the particular class?-?humanoids, nano-robots, military, industrial, and so on?-?the progress is impressive. On one hand it is the advances in terms of hardware, sensors and operating software; on the other hand it is the progress of Artificial Intelligence which makes possible to integrate cognitive services and dramatically increase Robot's capabilities for real-time decision making.
In the near future we will start to meet Robots with proactive behaviors, advanced context understanding, able to adapt to human sentiment, enforce 'personalities' and communication styles.

The basics of application security



What is application security? 
Application security is the process of making apps more secure by finding, fixing, and enhancing the security of apps. Much of this happens during the development phase, but it includes tools and methods to protect apps once they are deployed. This is becoming more important as hackers increasingly target applications with their attacks.
Hundreds of tools are available to secure various elements of your applications portfolio, from locking down coding changes to assessing inadvertent coding threats, evaluating encryption options and auditing permissions and access rights. There are specialized tools for mobile apps, for network-based apps, and for firewalls designed especially for web applications.

Why application security is important?
The faster and sooner in the software development process you can find and fix security issues, the safer your enterprise will be.
And, because everyone makes mistakes, the challenge is to find those mistakes in a timely fashion. For example, a common coding error could allow unverified inputs. This mistake can turn into SQL injection attacks and then data leaks if a hacker finds them. 
Application security tools that integrate into your application development environment can make this process and workflow simpler and more effective. These tools are also useful if you are doing compliance audits, since they can save time and the expense by catching problems before the auditors seen them. 
The rapid growth in the application security segment has been helped by the changing nature of how enterprise apps are being constructed in the last several years. Now, we have new working methods, called continuous deployment and integration, that refine an app daily, in some cases hourly. This means that security tools have to work in this ever-changing world and find issues with code quickly.

Application security tools
While there are numerous application security software product categories, the meat of the matter has to do with two: security testing tools and application shielding products. The former is a more mature market with dozens of well-known vendors, some of them are lions of the software industry such as IBM, CA and MicroFocus. These tools are well enough along that Gartner has created its Magic Quadrant and classified their importance and success. Review sites such as IT Central Station have been able to survey and rank these vendors, too.
Gartner categorizes the security testing tools into several broad buckets, and they are somewhat useful for how you decide what you need to protect your app portfolio:
Static testing: which analyzes code at fixed points during its development. This is useful for developers to check their code as they are writing it to ensure that security issues are being introduced during development.

Dynamic testing: which analyzes running code. This is more useful, as it can simulate attacks on production systems and reveal more complex attack patterns that use a combination of systems.

Interactive testing: which combines elements of both static and dynamic testing.

Mobile testing: is designed specifically for the mobile environments and can examine how an attacker can leverage the mobile OS and the apps running on them in its entirety.
Another way to look at the testing tools is how they are delivered, either via an on-premises tool or via a SaaS-based subscription service where you submit your code for online analysis. Some even do both.

Runtime application self-protection (RASP): These tools could be considered a combination of testing and shielding. They provide a measure of protection against possible reverse-engineering attacks. RASP tools are continuously monitoring the behavior of the app, which is useful particularly in mobile environments when apps can be rewritten, run on a rooted phone or have privilege abuse to turn them into doing nefarious things. RASP tools can send alerts, terminate errant processes, or terminate the app itself if found compromised.RASP will likely become the default on many mobile development environments and built-in as part of other mobile app protection tools. Expect to see more alliances among software vendors that have solid RASP solutions.  

Code obfuscation: Hackers often use obfuscation methods to hide their malware, and now tools allow developer to do this to help protect their code from being attacked.

Encryption and anti-tampering tools: These are other methods that can be used to keep the bad guys from gaining insights into your code.

Threat detection tools: These tools examine the environment or network where your apps are running and make an assessment about potential threats and misused trust relationships. Some tools can provide device "fingerprints" to determine whether a mobile phone has been rooted or otherwise compromised.

Application security challenges
The responsibility for application security could be spread across several different teams within your IT operations: The network folks could be responsible for running the web app firewalls and other network-centric tools, the desktop folks could be responsible for running endpoint-oriented tests, and various development groups could have other concerns. This makes it hard to suggest one tool that will fit everyone's needs, which is why the market has become so fragmented.

Cloud Computing

Dr. John McCarthy is known as the father of cloud computing .For more than half a century, that cloud computing has been around, it has been called by many names such as utility computing, time share, thin client, SaaS, PaaS, IaaS, etc. Throughout the years, the concept been advanced, repackaged and re-purposed for as long as computer connectivity has existed. Here are some valuable words from two of the six fathers of cloud computing.



Dr. John McCarthy's opinion regarding the cloud utility of computers?
"Computing may someday be organized as a public utility, just as the telephone system is a public utility. Each subscriber needs to pay only for the capacity he actually uses, but he has access to all programming languages characteristic of a very large system. The computer utility could become the basis of a new and important industry." 
McCarthy's vision of the computing network to come was mainframe-based in a way that somewhat missed the bull's eye, but hit the right target, regardless of the technology's name.
"We keep inventing new names for timesharing it came to be called servers. Now we call it cloud computing. That is still just time-sharing."
McCarthy's concept of the rise of cloud computing wasn't perfect, he shortchanged the value of the personal computer, but his implementation of timesharing set a course for cloud computing, which is only just being realized.
What did Reuven Cohen have to say about advancements in computing?
"You must adapt or die," he declared bluntly in a 2012 blog post, regarding the current cloud transformation in IT and willingness of IT to adapt in general. Cohen, was a one-man-IT/PR firmwhofounded Enomaly, an early infrastructure-as-a-service offering, later purchased by Virtustream in 2012, where Cohen currently serves as an executive vice president. Cohen's techno-proselytizing, has helped cloud gain acceptance in and out of the IT community.

World’s fastest brain-mimicking machine



Scientists just activated the world's biggest "brain": a supercomputer with a million processing cores and 1,200 interconnected circuit boards that together operate like a human brain.
Ten years in the making, it is the world's largest neuromorphic computer, a type of computer that mimics the firing of neurons.
Dubbed Spiking Neural Network Architecture, or SpiNNaker, the computer powerhouse is located at the University of Manchester in the United Kingdom, and it "rethinks the way conventional computers work," project member Steve Furber, a professor of computer engineering at the University of Manchester, said in a statement. 
But SpiNNaker doesn't just "think" like a brain. It creates models of the neurons in human brains, and it simulates more neurons in real time than any other computer on Earth, according to the statement.
"Its primary task is to support partial brain models: for example, models of cortex, of basal ganglia, or multiple regions expressed typically as networks of spiking [or firing] neurons," Furber told Live Science in an email.
Since April 2016, SpiNNaker has been simulating neuron activity using 500,000 core processors, but the upgraded machine has twice that capacity, Furbersaid. But now it has the capacity to perform 200 quadrillion actions simultaneously, university representatives reported in the statement.
While some other computers may rival SpiNNaker in the number of processors they contain, what sets this platform apart is the infrastructure connecting those processors. In the human brain, 100 billion neurons simultaneously fire and transmit signals to thousands of destinations. SpiNNaker's architecture supports an exceptional level of communication among its processors, behaving much like a brain's neural network does, Furber explained.
"Conventional supercomputers have connectivity mechanisms that are much less wellsuited to real-time brain modeling," he said. "SpiNNaker is, I believe, capable of modeling larger spiking neural networks in biological real time than any other machine."
Previously, when SpiNNaker was operating with only 500,000 processors, it modeled 80,000 neurons in the cortex, the brain region that moderates data from the senses. Another SpiNNaker simulation of the basal ganglia, a brain area affected by Parkinson's disease, hints at the computer's potential as a tool for studying brain disorders, according to the statement.
With all its computing power and brain-like capabilities, how close is SpiNNaker to behaving like a real human brain? For now, exactly simulating a human brain is simply not possible, Furber said. An advanced machine such as SpiNNaker can still manage only a fraction of the communication performed by a human brain, and supercomputers have a long way to go before they can think for themselves, Furber wrote in the email.