How gold nanoparticles may make killing tumors easier

Enlarge / Nanoparticles (black dots) sit in the remains of a cell they’ve helped kill. (credit: University of Michigan ) One of the ways to kill a cancer is to cook it, since heat can kill cells. The trick, of course, is to only cook the cancer and not the surrounding tissue. To do this, you need to have an accurate idea of the extent of a tumor, a precise mechanism for delivering heat, and a damn good thermometer. It may surprise you to learn that gold nanoparticles do a pretty good job of achieving the first two. The third—a good thermometer—has eluded researchers for quite some time. But, now it seems that gold nanoparticles may provide the full trifecta . Drowning a tumor in molten gold Some cancers—the ones most people imagine when they think of cancer—form lumps of tissue. At some point, these lumps require a blood supply. Once supplied with blood vessels, the tumor can not only grow, but it has a readily available transport system to deliver the cells that can spread the cancer throughout the body. For the patient, this is not good news. The development of a blood supply opens up new imaging and treatment options, though. Cancer tumors are not well-organized tissues compared to healthy tissue like muscle or kidney tissue. So there are lots of nooks and crannies in a tumor that can trap small particles. And this disorganization is exactly what researchers hope to take advantage of. Gold nanoparticles are injected into the blood stream; these exit the blood supply, but, in most of the body, they get rapidly cleaned out. Except that, inside tumors, the nanoparticles lodge all over the place. Read 22 remaining paragraphs | Comments

Read More:
How gold nanoparticles may make killing tumors easier

Supercomputing center in a beautiful, deconsecrated church

Allison writes, “The Barcelona Supercomputing Center is not only gorgeous with its soaring ceilings, it also was an instrumental site for developing modern microchip technology.” Read the rest

View post:
Supercomputing center in a beautiful, deconsecrated church

Zentai: full-body masked spandex subculture from Japan

Zentai (short for “zenshintaitsu,” Japanese for “full body suit”) is a largely obscure Japanese subculture whose adherents go out wearing full-body patterned spandex suits that cover their faces. In a relatively unsensational article in the Japan Times, Harumi Ozawa talks to a few zentais about their hobby, and learns that for some proponents, being completely covered is a liberating experience. The zentais in the article describe the suit as an anonymizer that frees them from the judging gaze of society, which is a fascinating study in contradictions, since the suits undoubtably attract lots of judgmental looks, but these seem to adhere to the suit without penetrating to the wearer within. Some zentais wear their suits in superhero fashion, and do good deeds in public, while others wear the suits for sexual kicks. They are often mocked in Japanese pop culture. One academic cited in the article believes that the wearers use the suits to hide their appearance in order to force others to deal with their “true” underlying identity. By night, she dresses in a skin-tight, all-in-one Spandex body suit that covers everything — including her eyes — and sits in bars, alone but liberated, she believes, from the judgment of others. “With my face covered, I cannot eat or drink like other customers,” said the woman, who is in her 20s and says her name is Hokkyoku Nigo (North Pole No. 2). “I have led my life always worrying about what other people think of me. They say I look cute, gentle, childish or naive,” she said, her lips ruffling the tight, red shiny material. “I always felt suffocated by that. But wearing this, I am just a person in a full body suit.” ‘Zentai’ fans search for identity in fetish suits [Harumi Ozawa/Japan Times] ( via JWZ ) ( Image: Zentai.jpg , MonkeyMyshkin, CC-BY )

View original post here:
Zentai: full-body masked spandex subculture from Japan

Motion picture industry continues to stagger under piracy with mere record-breaking income

Once again, the “piracy-stricken” motion picture association has had a banner year , with box office revenue breaking all records (as they’ve done in most recent years). The biggest gains this year come from China — a market condemned by the studios as a hive of piracy. Some of the best news in the report is that American movies are seeing success in China, which has become the first international market to reach more than $3 billion in movie sales. The Chinese enthusiasm for US-produced movies comes despite the fact that China continues to  restrict  the number of foreign-made films that can be released in theaters to 34 imports a year. But the country at the top of the MPAA’s sales charts is also at the top of its piracy target list. Last year, the MPAA placed China on the list of the “most notorious” markets for distributing pirated movies and TV shows. As reported by the  LA Times ,  MPAA spokesperson Michael O’Leary has explained: The criminals who profit from the most notorious markets through the world threaten the very heart of our industry and in doing so threaten the livelihoods of the people who give it life. These markets are an immediate threat to legitimate commerce, impairing legitimate markets’ viability and curbing US competitiveness. Despite prolific piracy, China’s increase in sales has been positively “meteoric,” MPAA chief Chris Dodd said at a press conference yesterday , noting a 27 percent increase. Piracy notwithstanding, MPAA enjoys a “very strong year”—again [Joe Silver/Ars Technica]        

More:
Motion picture industry continues to stagger under piracy with mere record-breaking income

Turkish government blocks Youtube to shut down spread of phone recording in which PM conspires to hide millions from investigators

The Turkish government has doubled down on its Internet censorship program, blocking all of Youtube in addition to its ban on Twitter . Despite theories about the political theatre of blocking Twitter , it seems like Prime Minister Recep Tayyip Erdoğan is also genuinely concerned with suppressing a recording of a conversation with his son in which he conspires to hide the money he is thought to have received through corrupt dealing. As with the Twitter block, this one was undertaken as an administrative order from the PM’s office, without judicial oversight. The Twitter ban has since been rescinded by the Turkish courts, but the block may not be lifted before the elections. There is still no official announcement by TİB, the government authority in charge of internet regulation and the organ who implements blocking decisions. However, YouTube’s URL and title appeared on BTK’s (higher organ that includes TİB) web page where the blocked URLs are listed. The site is still accessible through some ISPs, but the blocking is expected to be implemented fully in an hour’s time by all ISPs. The government banned Twitter last week on the grounds that the company fails to remove ‘illegal’ content according to Turkish authorities. Yesterday, an administrative court ruled for the suspension of the execution of Twitter blocking. Last week, Google Inc. has announced that it declined the requests coming from the Turkish government in recent weeks to remove YouTube videos revealing extensive corruption involving PM, his family, ministers, businessmen and several government officials, the Wall Street Journal reported. Turkish government takes down YouTube too [updated] [Noyan Ayan/Webrazzi] ( via Engadget )        

More here:
Turkish government blocks Youtube to shut down spread of phone recording in which PM conspires to hide millions from investigators

Turkey orders block of Twitter’s IP addresses

Just a few days after Turkey’s scandal-rocked government banned Twitter by tweaking national DNS settings, the state has doubled down by ordering ISPs to block Twitter’s IP addresses , in response to the widespread dissemination of alternative DNS servers, especially Google’s 8.8.8.8 and 8.8.4.4 (these numbers were even graffitied on walls ). Following the ban, Turkey’s Twitter usage grew by 138 percent. Now that Twitter’s IP range is blocked, more Turkish Internet users are making use of Tor and VPNs, and they continue to use SMS for access to the service. It’s interesting that Prime Minister Recep Tayyip Erdoğan has singled out Twitter for his attacks (“Twitter, schmitter! We will wipe out Twitter . I don’t care what the international community says.”) Why not Facebook or Google Plus? I’m not certain, but my hypothesis is that Facebook and Google’s “real names” policy — which make you liable to disconnection from the service if you’re caught using an alias — make them less useful for political dissidents operating in an environment in which they fear reprisals. According to the Internet activist collective Telecomix, there also were reports that devices configured to use Google’s DNS service or other DNS providers outside the country were being hijacked to a local DNS server by the Wi-Fi network at Istanbul’s airport. The move has driven up the usage of VPN services and the Tor anonymizing network in Turkey. Telecomix has been providing a list of Tor gateways for Turkish users. Tor network metrics show a huge spike in users directly connecting to the Tor network over the past few days, growing from 25,000 users to 35,000 since March 19. Downloads of VPN software have also exploded with VPN apps for Apple’s iOS and Google’s Android becoming the most downloaded apps from their respective app stores in Turkey. After DNS change fails, Turkish government steps up Twitter censorship [Sean Gallagher/Ars Technica]        

Continue reading here:
Turkey orders block of Twitter’s IP addresses

Unless companies pay, their Facebook updates reach 6 percent of followers

Facebook continues to tighten the screws on the businesses that use the service to market to their customers. Independent research shows that new updates from businesses reach about six percent of the people who follow those businesses. It is rumored that Facebook intends to reduce this number to “between one and two percent” over time. Businesses that want to reach the people who follow them at higher rates will have to pay Facebook to reach them through paid advertisements. If you’re building your business’s marketing and customer relations strategy atop Facebook, take note — and remember that if you have a real website, all your readers see your posts, even if you don’t pay Facebook! Facebook declined to comment on the percentage of fans that see posts from a typical Facebook page (the last publicly disclosed figure was 16 percent in the summer of 2012), but the company admitted in December that posts from Pages are reaching less users. Facebook attributes this change to increased competition as more people and companies join its service. The typical user is inundated with 1,500 posts per day from friends and Pages, and Facebook picks 300 to present in the News Feed. Getting squeezed out are both posts from Pages and meme photos as Facebook shifts its focus to what it deems “high quality” content. The solution for brands with declining engagement, according to Facebook, is to buy ads. “Like many mediums, if businesses want to make sure that people see their content, the best strategy is, and always has been, paid advertising,” a spokeswoman said in an emailed statement. The Free Marketing Gravy Train Is Over on Facebook [Victor Luckerson/Time] ( Image: flaming LIKE , a Creative Commons Attribution Share-Alike (2.0) image from zaigee’s photostream )        

View the original here:
Unless companies pay, their Facebook updates reach 6 percent of followers

Samsung Galaxy back-door allows for over-the-air filesystem access

Developers from the Replicant project (a free Android offshoot) have documented a serious software back-door in Samsung’s Android phones , which “provides remote access to the data stored on the device.” They believe it is “likely” that the backdoor could provide “over-the-air remote control” to “access the phone’s file system.” At issue is Samsung’s proprietary IPC protocol, used in its modems. This protocol implements a set of commands called “RFS commands.” The Replicant team says that it can’t find “any particular legitimacy nor relevant use-case” for adding these commands, but adds that “it is possible that these were added for legitimate purposes, without the intent of doing harm by providing a back-door. Nevertheless, the result is the same and it allows the modem to access the phone’s storage.” The Replicant site includes proof-of-concept sourcecode for a program that will access the file-system over the modem. Replicant has created a replacement for the relevant Samsung software that does not allow for back-door access. Samsung Galaxy devices running proprietary Android versions come with a back-door that provides remote access to the data stored on the device. In particular, the proprietary software that is in charge of handling the communications with the modem, using the Samsung IPC protocol, implements a class of requests known as RFS commands, that allows the modem to perform remote I/O operations on the phone’s storage. As the modem is running proprietary software, it is likely that it offers over-the-air remote control, that could then be used to issue the incriminated RFS messages and access the phone’s file system. …The incriminated RFS messages of the Samsung IPC protocol were not found to have any particular legitimacy nor relevant use-case. However, it is possible that these were added for legitimate purposes, without the intent of doing harm by providing a back-door. Nevertheless, the result is the same and it allows the modem to access the phone’s storage. However, some RFS messages of the Samsung IPC protocol are legitimate (IPC_RFS_NV_READ_ITEM and IPC_RFS_NV_WRITE_ITEM) as they target a very precise file, known as the modem’s NV data. There should be no particular security concern about these as both the proprietary implementation and its free software replacement strictly limit actions to that particular file. Samsung Galaxy Back-door        

See more here:
Samsung Galaxy back-door allows for over-the-air filesystem access

Games console/phone refurbishing kit with specialized case-opening tools

Thinkgeek have teamed up with Ifixit to create a Game Console & Electronics Refurbishing Kit , with all the tools you need to crack the case on most games consoles, phones and other gadgets. The 3.5lb box also includes a bunch of cleaning stuff for removing scuffs and marks, to spruce up your old gear to look like the day you unboxed it. Game Console & Electronics Refurbishing Kit gives you both opening and cleaning tools Works with * Xbox One (also Xbox 360) * PlayStation 4 (also PS Vita, PS3, PSP, PS2, and the original PlayStation) * Wii U (also Wii), NES, SNES, Gamecube, N64 * Nintendo 3DS (also DSi, DS Lite, and the Nintendo DS) * Dreamcast * Game Boy Advance SP (also Game Boy Advance, Game Boy Cartridges) * PC building and repair * Smartphone repair * and a bazillion other electronic devices Includes: * 26 Bit Driver Kit   * 4 mm Driver Handle – rubberized for a sturdy grip and magnetized to hold bits and screws   * 60 mm Driver Extension – increase your reach into smaller devices   * Metal Tweezers – grab hold of small screws and components   * 26 bits in the following sizes:     * Flathead sizes 1.5, 2, 2.5, 3 mm     * Phillips sizes #000, #00, #0, #1, #2     * Torx sizes T4, T5, T6     * Torx Security sizes TR7, TR8, TR9, TR10, TR15, TR20 (compatible with non-security)     * Hex sizes 1.5, 2, 2.5, 3, 4 mm     * Tri-wing sizes #0, #1     * Spanner size U3.0   * Anti-Static Wrist Strap   * Dust Blower   * ESD-safe Tweezers (electrostatic damage)   * Plastic Spudger   * Metal Spudger Set   * Xbox 360 Opening Tool   * Cleaning Swabs   * Plastic Opening Tools   * Surface Detailing Block (great for refreshing old or dirty plastic parts)   * German Detailing Eraser with Brush   * Pencil Sharpener   * Small ESD-safe Brush (electrostatic damage)   * Large ESD-safe Brush (electrostatic damage)   * 1/4″ Driver Handle     * Phillips #2     * Flathead 6 mm     * Game Bit 4.5 mm (Nintendo Nut Setter #6)     * Game Bit 3.8 mm (Nintendo Nut Setter #8) Game Console & Electronics Refurbishing Kit        

View article:
Games console/phone refurbishing kit with specialized case-opening tools

CIA spied on Senate committee writing damning torture report and Obama knew about it

The CIA’s Inspector General has asked the Justice Department to consider criminally charging CIA agents who spied on a senate committee that was engaged in writing a report that was highly critical of the CIA’s use of torture. Senator Mark Udall, who sits on a CIA oversight committee and whose staff was spied on by the CIA alleges that the CIA surveilled overseeing senators and their staff with Obama’s knowledge and consent. In a recent hearing, Senator Ron Wyden asked the CIA director repeatedly whether the Computer Fraud and Abuse Act, America’s major anti-hacking statute, applied to the CIA, and whether the CIA spied domestically. CIA director John Brennan replied “yes” and “no,” respectively. If Udall’s allegations are correct, this means that Brennan lied to Congress (in the second instance) and committed a felony (in the first instance). The report that caused some CIA agents to spy on their bosses was about how the CIA was wasting time, getting nowhere and doing something illegal and cruel when it kidnapped terror suspects and tortured the shit out of them. McClatchy and the New York Times reported Wednesday that the CIA had secretly monitored computers used by committee staffers preparing the inquiry report, which is said to be scathing not only about the brutality and ineffectiveness of the agency’s interrogation techniques but deception by the CIA to Congress and policymakers about it. The CIA sharply disputes the committee’s findings. Udall, a Colorado Democrat and one of the CIA’s leading pursuers on the committee, appeared to reference that surreptitious spying on Congress, which Udall said undermined democratic principles. “As you are aware, the CIA has recently taken unprecedented action against the committee in relation to the internal CIA review and I find these actions to be incredibly troubling for the Committee’s oversight powers and for our democracy,” Udall wrote to Obama on Tuesday. Obama knew CIA secretly monitored intelligence committee, senator claims [Spencer Ackerman/The Guardian]        

Read the article:
CIA spied on Senate committee writing damning torture report and Obama knew about it