Regenerated Hearts Grown in Laboratory Using Stem Cells

A partly regrown human heart within a bioreactor, which replicates the biological conditions around a normal human heart. Bernhard Jank, MD. OTT Lab, center for regenerative medicine, Massachusetts General Hospital.

Around the world, lists of patients in need of an organ transplant are often longer than the lists of those willing (and able) to donate – in part because some of the most in-demand organs for transplant can only be donated after a person has died.

Right now, there are more than 4,000 plus patients waiting for a heart transplant in the U.S., but with a huge donor shortage not all of these patients are likely to survive. Growing transplantable hearts in a laboratory has been a long-standing dream within the medical community, and a study in the journal Circulation Research has moved it one step closer to reality: A team of researchers have successfully grown a beating human heart in the laboratory using stem cells. Continue reading “Regenerated Hearts Grown in Laboratory Using Stem Cells”

Please follow and like us:

Securing the Industrial Internet of Things (IIOT)

The Industrial Internet of Things (IIoT) is changing the enterprise IT landscape. Many facilities are already using sensors, actuators, and other IIoT devices to collect and use data — for example, to monitor and adjust a building’s physical conditions, precisely control manufacturing processes, or even detect and report fires. With connected monitoring and control capabilities, IIoT technology can help organizations become more efficient than ever before.

However, security is a common concern for IIoT. Related subsystems and equipment that are critical to infrastructure operations or revenue generation, such as process control systems, may not have been designed to be connected to the internet and lack security measures for stopping network-based threats. As a result, compromise of an IIoT device could lead to operational downtime, significant loss of production and revenue, or even physical harm to employees or customers. Continue reading “Securing the Industrial Internet of Things (IIOT)”

Please follow and like us:

Today’s Display Technologies, LCD, LED, OLED, QLED and MicroLED

Display technology has come a long way since the days of CRT displays, anyone of you from the 90s would remember the days when your TV or monitor was still a big hunky box; that was heavy and a testament of how deep your parents’ pockets were, depending how big it was.

Then came the age of plasma displays that were revolutionary, and readily available for purchase. Plasma displays were the next big thing after CRT, it offered TV displays that were flat and wide; it was mind blowing. LCD displays came around the same time, but there was more buzz around plasma displays before LCD took the crown, partially due to pricing and features offered by LCD.

Plasma displays

Plasma displays were great, it offered great brightness and contrast in comparison with LCD displays during those periods. It was relatively cheaper than LCD displays as well. Plasma displays are called “plasma” because it uses small cells containing electrically charged ionized gases, which are plasmas. Hence, this was where you usually hear people saying that plasma displays had “gas” in them. In its simplest explanatory form, the gas is electrically excited to create each pixel’s colour and brightness. There are no backlight panels required like LCDs do. Basically, if you electrically charge each pixel pocket of a plasma display, it glows and shows colour. The colour can be accurately controlled by limiting electrical power and frequency for each pixel. Continue reading “Today’s Display Technologies, LCD, LED, OLED, QLED and MicroLED”

Please follow and like us:

Phone Conferencing Security

Phone conferencing is key to doing business in a global economy: It brings together associates from around the world for real-time exchanges of important information.

In business, information is gold. According to the American Society for Industrial Security, as much as 75 percent of the market value of the average American company is made up of “intellectual property assets” like patented product designs, source codes and confidential client data. [source: Asis International]

Since business executive often use phone conferences to discuss sensitive, valuable information, it’s crucial that they invest in phone conferencing security. Without the proper security, disgruntled former employees and savvy hackers can eavesdrop on private phone conferences and sell the privileged information to the highest bidder. A secure phone conferencing setup will have protocols and safeguards in place for controlling access to conference information during and after the call. Continue reading “Phone Conferencing Security”

Please follow and like us:

The Cambridge Analytica Story: Facebook and Psychological Warfare. (Part 2)

Cambridge Analytica

In The Cambridge Analytica Story: Why you should be concerned? (Part 1) we’ve spoke about who are the key people you should know and what Cambridge Analytica does. In this Part 2 coverage, we’ll dive more extensively into an age-old warfare, psychological warfare. You’ll see how Facebook has played a great part in this domain and why you should be more concerned about your privacy settings.

Psychological Warfare, you’re the Weapon

Also referred as psywar, is simply a propaganda war against an enemy. Usually supported by multiple parties such as the military, economic, or political bodies. In any war, the best thing to do is always to break your enemy’s morale first – their will to fight or resist. Such techniques were greatly used in previous wars, as seen in World War II, when the Japanese Kamikazes would ram their airplanes to strike fear to the Allied troops.

Psywar today, is by all means similar to how it had been played out in history; as one would say that it is easier to be done today than it was in the past.

And in fact, marketing firms are using psywar to win over your loyalty. Companies like Apple, Coca Cola, Samsung and every other companies are basically manipulating ways to make you perceive of things; the way you perceive their brand, to win your loyalty towards them. Continue reading “The Cambridge Analytica Story: Facebook and Psychological Warfare. (Part 2)”

Please follow and like us: