BLOGGER TEMPLATES AND TWITTER BACKGROUNDS

Monday, January 4, 2010

DIPLOMA RESULTS 2009:

Today, January 04, 2010, 4 hours ago | titusmagnet@gmail.com (IEEE)Go to full article
Diploma CET Results 2009 at http://www.tndte.com/ .in Diploma CET results 2009 at http://www.tndte.com/ .in tamilnadua Diploma CET Exam Results has been declared on www.karresults.nic.inKarnataka Common Entrance Test - CET is entrance examination taken by Karnataka state to give the admission into the various Diploma courses of Karanataka.
LINK:1
LINK:2

ASAL MP3 FREE DOWNLOAD:ASAL TRAILER FREE DOWNLOAD:

Tuesday, December 22, 2009, 4:37:25 PM | titusmagnet@gmail.com (IEEE)Go to full article


NOTE:WAIT TILL THE SITE TO LOAD
DONTSKIP THAT PAGE

DOWNLOAD LINK-1
DOWNLOAD LINK-2

Biggest Fireworks in the History (Atlantis Hotel - Dubai):

Thursday, December 17, 2009, 3:52:57 PM | titusmagnet@gmail.com (IEEE)Go to full article
The Palm Islands are artificial peninsulas constructed of sand dredged from the bottom of the Persian Gulf by the Belgian company Jan De Nul and the Dutch company Van Oord. The sand is sprayed by the dredging ships, which are guided by DGPS, onto the required area in a process known as rainbowing because of the arcs in the air when the sand is sprayed. The outer edge of each Palm's encircling crescent is a large rock breakwater.




GOOGLE WORK-STATION:

Wednesday, December 16, 2009, 4:02:32 PM | titusmagnet@gmail.com (IEEE)Go to full article











HOW DNA STORES BIOLOGICAL DATA??

Monday, December 07, 2009, 8:08:23 PM | titusmagnet@gmail.com (IEEE)Go to full article


p.MsoNormal, li.MsoNormal, div.MsoNormal {margin-top:0in;margin-right:0in;margin-bottom:10.0pt;margin-left:0in;line-height:115%;font-size:11.0pt;font-family:'Calibri","sans-serif';} p.MsoPlainText, li.MsoPlainText, div.MsoPlainText {margin:0in;margin-bottom:.0001pt;font-size:10.0pt;font-family:'Courier New';} span.PlainTextChar {font-family:'Courier New';} .MsoChpDefault {;} .MsoPapDefault {margin-bottom:10.0pt;line-height:115%;} @page Section1 {size:8.5in 11.0in;margin:1.0in 1.0in 1.0in 1.0in;} div.Section1 {page:Section1;} ol {margin-bottom:0in;} ul {margin-bottom:0in;}
  • Molecular biologists are beginning to unravel the information processing tools-such as enzymes, copying tools, and so on-that evolution has spent billions of years refining. Now we are taking those tools in large numbers of DNA molecules and using them as biological computer processors.
· A single gram of dried DNA, about the size of a half-inch sugar cube, can hold as much information as a trillion compact discs.
· Each nucleotide-A, C, T, or G – can be considered a letter in a four-letter alphabet that is used to write our biological messages in a linear “ticker-tape” form.
· Organisms differ because their respective DNA molecules carry different nucleotide sequences and therefore different biological message.
· Since the number of possible sequences in a DNA molecule, which is n nucleotides long, is 4ⁿ, the biological variety that could in principle be generated using even a modest length of DNA is enormous.
· A typical animal cell contains a meter of DNA (3*10 Nucleotides). Written in a linear alphabet of four letters, an unusually small human gene would occupy a quarter of a page of text, while the genetic information carried in a human cell would fill a book of more than 500,000 pages.



OTHER NAMES OF BLACKBERRY:

Monday, December 07, 2009, 7:58:48 PM | titusmagnet@gmail.com (IEEE)Go to full article
The ability to read e-mail that is received in realtime, anywhere, has made the BlackBerry devices infamously addictive, earning them the nickname "CrackBerry". Use of the term CrackBerry became so wide spread that in November 2006 Webster's dictionary named "crackberry" the "New Word of the Year".
Within the company, various model families are named after subatomic particles; names used include Tachyon (BlackBerry 5810), Tachyon 2 (BlackBerry 6700), Electron, Proton, Baryon, Quark (BlackBerry 7200) and Charm.

MAKING OF FERRARI CARS:(FERRARI 599):

Monday, December 07, 2009, 3:53:09 PM | titusmagnet@gmail.com (IEEE)Go to full article


Ferrari S.p.A. is an Italian sports car manufacturer based in Maranello, Italy. Founded by Enzo Ferrari in 1929 as Scuderia Ferrari, the company sponsored drivers and manufactured race cars before moving into production of street-legal vehicles in 1947 as Ferrari S.p.A.. Throughout its history, the company has been noted for its continued participation in racing, especially in Formula One, where it has enjoyed great success.
THE 4 MAIN UNITS OF FERRARI FACTORY ARE:
1 FOUNDRY








2 BODY BUILDING UNIT






3.ASSEMBLY UNIT









4.INTERIORS






LIST OF COMPUTER VIRUSES:

Monday, December 07, 2009, 3:15:19 PM | titusmagnet@gmail.com (IEEE)Go to full article
Early 1970s

Creeper virus was detected on ARPANET infecting the Tenex operating system. Creeper gained access independently through a modem and copied itself to the remote system where the message, 'I'M THE CREEPER : CATCH ME IF YOU CAN.' was displayed. The Reaper program, itself a virus, was created to delete Creeper. The creators of both programs are unknown.
1974
Rabbit virus appears infecting other machines via multiplication. Named for the speed at which it clogged the system with copies of itself, reducing system performance, before reaching a threshold and crashing.
1975
Pervading Animal was a game written for the UNIVAC 1108, was designed to ask a number of questions in an attempt to guess the type of animal that the user was thinking of. It would attempt to write itself to every writable program file, then marked that file with an illegal creation time so it could tell the difference between user and program created files. However, it remains a matter of debate whether Pervading Animal represented the first Trojan or an innocent game with unintended bugs.
1980-1989
Jürgen Kraus wrote master thesis Selbstreproduktion bei Programmen (Self-reproduction of programs) Warning: Downloads from this site may contain concept viruses.
1982
A program called Elk Cloner, written for Apple II systems and created by Richard Skrenta. Apple II was seen as particularly vulnerable due to the storage of its operating system on Floppy disk. Elk Cloner's design combined with public ignorance about what malware was and how to protect against it led to Elk Cloner being responsible for the first large-scale computer virus outbreak in history.
1983
The term 'virus' is coined by Frederick Cohen in describing self-replicating computer programs. In 1984 Cohen uses the phrase "computer virus" – as suggested by his teacher Leonard Adleman – to describe the operation of such programs in terms of "infection". He defines a 'virus' as "a program that can 'infect' other programs by modifying them to include a possibly evolved copy of itself."

November 10th, 1983, at Lehigh University, Cohen demonstrates a virus-like program on a VAX11/750 system. The program was able to install itself to, or infect, other system objects.
1986
January: The Brain boot sector virus (aka Pakistani flu) is released to the wild. Brain is considered the first IBM PC compatible virus, and the program responsible for the first IBM PC compatible virus epidemic. The virus is also known as Lahore, Pakistani, Pakistani Brain, as it was created in Lahore, Pakistan by 19 year old Pakistani programmer, Basit Farooq Alvi and his brother Amjad Farooq Alvi.
December 1986: Ralf Burger presented the Virdem model of programs at a meeting of the underground Chaos Computer Club in Germany. The Virdem model represented the first programs that could replicate themselves via addition of their code to executable DOS files in COM format.

1987
Appearance of the Vienna virus, which was subsequently neutralized- the first time this had happened on the IBM platform.[1]
Appearance of Lehigh virus, boot sector viruses such as Yale from USA, Stoned from New Zealand, Ping Pong from Italy, and appearance of first self-encrypting file virus, Cascade. Lehigh was never released to the wild however. A subsequent infection of Cascade in the offices of IBM Belgium led to IBM responding with its own antivirus product development. Prior to this, antivirus solutions developed at IBM were intended for staff use only.

October: The Jerusalem virus, part of the (at that time unknown) Suriv family, is detected in the city of Jerusalem. Jerusalem destroys all executable files on infected machines upon every occurrence of Friday the 13th (except Friday the 13th Nov 1987 making its first trigger date May 13th 1988). Jerusalem caused a worldwide epidemic in 1988.
November: The SCA virus, a boot sector virus for Amigas appears, immediately creating a pandemic virus-writer storm. A short time later, SCA releases another, considerably more destructive virus, the Byte Bandit.

1988
June: The Festering Hate Apple ProDOS virus spreads from underground pirate BBS systems and starts infecting mainstream networks.
November 2: The Morris worm, created by Robert Tappan Morris, infects DEC VAX and Sun machines running BSD UNIX connected to the Internet, and becomes the first worm to spread extensively "in the wild", and one of the first well-known programs exploiting buffer overrun

1989
October 1989: Ghostball, the first multipartite virus, is discovered by Friðrik Skúlason

1990-1999
1990
Mark Washburn working on an analysis of the Vienna and Cascade viruses with Ralf Burger develops the first family of polymorphic virus: the Chameleon family. Chameleon series debuted with the release of 1260.
1992
Michelangelo was expected to create a digital apocalypse on March 6th, with millions of computers having their information wiped according to mass media hysteria surrounding the virus. Later assessments of the damage showed the aftermath to be minimal.

1995
The "Concept virus" the first Macro virus is created

1996
"Ply" - DOS 16-bit based complicated polymorphic virus appeared with built-in permutation engine.

1998
June 2: The first version of the CIH virus appears.

1999
March 26: The Melissa worm is released, targeting Microsoft Word and Outlook-based systems, and creating considerable network traffic.

June 6: The ExploreZip worm, which destroys Microsoft Office documents, is first detected.
The Happy99 worm invisibly attached itself to emails. Displayed fireworks to hide changes being made and wished you a happy new year. Modified system files related to Outlook Express and Internet Explorer on Windows 95 and Windows 98.

2000 and later

2000
May: The VBS/Loveletter ('ILOVEYOU') worm appeared. As of 2004 this is the most costly virus to business, causing upwards of 10 billion dollars in damage. The backdoor trojan to the worm, Barok, was created by Filipino programmer Onel de Guzman; it is not known who created the attack vector or who (inadvertently) unleashed it; de Guzman himself denies being behind the outbreak although he suggests he may have been duped by someone using his own Barok code as a payload.

Zmist - a fully metamorphic, code integrating virus.

2001

March: Simile - a multi-OS, metamorphic virus written in assembly language .
May 8: The Sadmind worm spreads by exploiting holes in both Sun Solaris and Microsoft IIS.
July: The Sircam worm is released, spreading through e-mails and unprotected network shares.
July 13: The Code Red worm attacking the Index Server ISAPI Extension in Microsoft Internet Information Services is released.

August 4: A complete re-write of the Code Red worm, Code Red II begins aggressively spreading, primarily in China.

September 18: The Nimda worm is discovered and spreads through a variety of means including vulnerabilities in Microsoft Windows and backdoors left by Code Red II and Sadmind worm.

October 26: The Klez worm is first identified.

2003
January 24: The SQL slammer worm also known as the Sapphire worm, attacked vulnerabilities in Microsoft SQL Server and MSDE causes widespread problems on the Internet.
August 12: The Blaster worm, also known as the Lovesan worm, spread rapidly by exploiting a vulnerability in Microsoft Windows computers.
August 18: The Welchia (Nachi) worm is discovered. The worm tries to remove the blaster worm and patch Windows.
August 19: The Sobig worm (technically the Sobig.F worm) spread rapidly via mail and network shares.
October 24: The Sober worm is first seen and maintains its presence until 2005 with many new variants.
The simultaneous attack on network weakpoints by the Blaster and Sobig worms caused a
2004

Late January: MyDoom emerges, and currently holds the record for the fastest-spreading mass mailer worm.

March 19: The Witty worm is a record-breaking worm in many regards. It exploited holes in several Internet Security Systems (ISS) products. It was the fastest disclosure to worm, it was the first internet worm to carry a destructive payload and it spread rapidly using a pre-populated list of ground-zero hosts.
May 1: The Sasser worm emerges by exploiting a vulnerability in LSASS and causes problems in networks, even interrupting business in some cases.

December: Santy, the first known "webworm" is launched. It exploited a vulnerability in phpBB and used Google in order to find new targets. It infected around 40000 sites before Google filtered the search query used by the worm, preventing it from spreading.

2005

August 16: The Zotob worm and several variations of malware are discovered. The effect was overblown because several United States media outlets were infected.

October 13: The Samy XSS worm became the fastest spreading virus by some definitions as of 2006.

2006

January 20: The Nyxem worm was discovered. It spread by mass-mailing. Its payload, which activates on the third of every month, starting on February 3, attempts to disable security-related and file sharing software, and destroy files of certain types, such as Microsoft Office files.

February 16: discovery of the first-ever virus for Mac OS X, a low-threat worm known as OSX/Leap-A or OSX/Oompa-A, is announced.

December Stration or Warezov worm first discovered.
2007

January Storm Worm begins gathering infected computers into the Storm botnet, which comprised between 10 and 50 million computers by September.

Moon landing conspiracy theories:

Monday, December 07, 2009, 2:36:37 PM | titusmagnet@gmail.com (IEEE)Go to full article

MAN ON THE MOON-IS THIS TRUE OR HOAX?
Various Moon landing conspiracy theories claim that some or all elements of the Apollo Project and the associated Moon landings were falsifications staged by NASA and members of other involved organizations.
There are subcultures worldwide which advocate the belief that the Moon landings were faked. James Oberg of ABC News stated that claims made that the moon landings were faked are actively taught in Cuban schools and wherever Cuban teachers are sent.[5][6] A 1999 Gallup poll found that 6% of the American public doubted that the Moon landings had occurred and that 5% had no opinion on the subject which roughly matches the findings of a similar 1995 Time/CNN poll.Officials of Fox television stated that such skepticism increased to about 20% after the February 15, 2001 airing of that network's TV show entitled Conspiracy Theory: Did We Land on the Moon? Seen by approximately 15 million viewers,[8] the 2001 Fox special is viewed as having promoted the hoax claims




A 2000 poll conducted by the Russian Public Opinion Fund found that 28% do not believe that American astronauts have been on the Moon, and this percentage is roughly equal in all social-demographic groups.[11] In 2009, a poll conducted by the British Engineering & Technology magazine found that 25% of Britons do not believe that humans have walked on the Moon.

WHATS THE DIFFERENCE BETWEEN THE NTFS AND FAT32?

Monday, December 07, 2009, 2:23:15 PM | titusmagnet@gmail.com (IEEE)Go to full article
_________________________________
Difference between NTFS and FAT32
________________________________________
NTFS
1)allows access local to w2k,w2k3,XP,win NT4 with SP4 & later may get access for somefile.
2)Maximum size of partition is 2 Terabytes & more.
3)Maximum File size is upto 16TB.
4)File & folder Encryption is possible only in NTFS.
FAT 32
1)Fat 32 Allows access to win 95,98,win millenium,win2k,xp on local partition.
2)Maximum size of partition is upto 2 TB.
3)Maximum File size is upto 4 GB.
4)File & folder Encryption is not possible.

WEARABLE COMPUTERS:

Monday, December 07, 2009, 2:20:33 PM | titusmagnet@gmail.com (IEEE)Go to full article
Wearable computers are computers that are worn on the body. They have been applied to areas such as behavioral modeling, health monitoring systems, information technologies and media development. Government organizations, military, and health professionals have all incorporated wearable computers into their daily operations. Wearable computers are especially useful for applications that require computational support while the user's hands, voice, eyes or attention are actively engaged with the physical environment.
One of the main features of a wearable computer is consistency. There is a constant interaction between the computer and user, ie. there is no need to turn the device on or off. Another feature is the ability to multi-task. It is not necessary to stop what you are doing to use the device; it is augmented into all other actions. These devices can be incorporated by the user to act like a prosthetic. It can therefore be an extension of the user’s mind and/or body.
Such devices look far different from the traditional cyborg image of wearable computers, but in fact these devices are becoming more powerful and more wearable all the time. The most extensive military program in the wearables arena is the US Army's Land Warrior system, which will eventually be merged into the Future Force Warrior system

TROJAN HORSE:(LIST OF TROJAN HORSES:)

Monday, December 07, 2009, 2:05:19 PM | titusmagnet@gmail.com (IEEE)Go to full article
Trojan horse is a program that installs malicious software while under the guise of doing something else. Though not limited in their payload, Trojan horses are more notorious for installing backdoor programs which allow unauthorized non permissible remote access to the victim's machine by unwanted parties - normally with malicious intentions. Unlike a computer virus, a Trojan horse does not propagate by inserting its code into other computer files. The term is derived from the classical myth "Trojan horse"
SOME OF THE WELL kNOWN TROJAN HORSE ARE

•Downloader-EV
•Dropper-EV
•Pest Trap
•NetBus
•flooder
•Tagasaurus
•Prorat
•Turkojan
•Back Orifice
•TroJanizary
•Vundo trojan
•Gromozon Trojan
•Sub-7
•Cuteqq_Cn.exe

TRUTH ABOUT TAJMAHAL:TRUTH ABOUT TAJMAHAL:

Saturday, December 05, 2009, 2:30:29 PM | titusmagnet@gmail.com (IEEE)Go to full article


TRUTH ABOUT TAJMAHAL:

·TAJMAHAL WAS BUILT BY MUGHAL EMPEROR SHAHJAHAN(@KHURAM)
· IT WAS BUILT IN HONOUR OF HIS WIFE ARJUMAND BANU BAYGAM@ MUMTAZ MAHAL
· MOST OF US BELIEVE THAT TAJMAHAL WAS BUILT IN MEMORY OF MUMTAZ AFTER HER DEATH
· BUT THE TRUTH IS THAT SHAHJAHAN BUILT THE TAJMAHAL IN HONOUR OF HIS WIFE,IN 1632 INVOLVING NEARLY 20,OOO WORKERS,FOR 22 YEARS
·TAJ MAHAL IS BUILT USING WHITE MARBLE IT IS THE BLEND OF INDIAN ,ISLAMIC AND PERSIAN STYLES
· THE WALLS,PILLARS,SHIMMER WITH INLAID GEMSTONES,INCLUDING LAPIS,LAZULI,JADE,CRYSTAL,TURQUOISE,AMETHYST
· VERSES OF KORAN APPEARS ON THE PARTS OF TAJMAHAL
· AFTER THE DEATH OF MUMTAZ ,SHAHJAHAN WAS HEARTBROKEN,AND HE DECIDED TO BUILT A BLACK TAJMAHAL IN MEMORY OF HER,BUT BEFORE THAT HE WAS PRISONED BY HIS SON AURONGAZIB
· TAJ WAS MADE WORLD HERITAGE SITE IN 1983

INDIAN MP EXPENSES:

Saturday, December 05, 2009, 2:19:55 PM | titusmagnet@gmail.com (IEEE)Go to full article

· Office expenses 14 thousand
· Train ticket free of cost
· Flight to Delhi free of cost
· MP hostel free
· Electricity cost 50000 units free
· Local phone call charges 170000 calls free
· Total expenses 32 lacs per year
· Total expenses for 5 years 1crore 60 lacs
For 543 MPs its about 855 crores

HOW TO PROTECT YOUR PENDRIVE:

Saturday, December 05, 2009, 2:16:15 PM | titusmagnet@gmail.com (IEEE)Go to full article

PROTECT YOUR PENDRIVE FROM MALICIOUS PROGRAMS:
Pendrive is easily attacked by Trojan horse,malware,spyware etc..
All these malicious programs will first create an “autorun.inf” file in your pendrive
With this it starts multiplying,To avoid this
· Create an empty text file
· Rename the file with the same name “autorun.inf
· Copy this in to your pendrive
· Right click over the pendrive and go to properties
· Select “hidden”
· And important thing write protect options
· That’s all 90% of the attack can be avoided

AMAZING FACTS ABOUT F-1 RACING CARS:

Saturday, December 05, 2009, 2:14:17 PM | titusmagnet@gmail.com (IEEE)Go to full article

·F1 car has a massive engine power of over 700bhp
·It consumes 75lts of fuel per 100 kms
· On avg a F1 car has a top speed of 360Kmph
·It uses the brake system as of a space shuttle
·Lightening quick acceleration from 0-100 in 1.7 secs
·Marvellous decleration from 200Kmph to a full stop in 2.9sec in just 65mts
·Most effective rear spoilers to suppress lift at high speeds

10 FACTS ABOUT A.R.RAHMAN:

Tuesday, December 01, 2009, 8:53:32 PM | titusmagnet@gmail.com (IEEE)Go to full article
· A.R.Rahman is a hindu by birth
· His actual name is Dileep kumar
A.R stands for Allah rakha
· His first entry was made in the movie “roja”(tamil),for that he won his first National award for Best music director
· He was introduced by director Manirathnam
· He is honoured as Mozart of Madras ,for the first time by “The times of India”
· He bagged 2 oscars for the movie Slumdog millionaire in 2009
· He also won the Golden globe award for that movie
· He is the first Indian to receive oscar award
· He signed the contract for music direction for London Olympics 2012
·



AMAZING FACTS ABOUT ASIANS:

Tuesday, December 01, 2009, 8:39:16 PM | titusmagnet@gmail.com (IEEE)Go to full article
BELIEFS OF ASIANS:
· You may think pasta as an Italian dish ,but actually it was created in china.So were fireworks,compasses,chopsticks,crossbow,paper,and paper money
· Mt.fuji may not seem so high compared with world,s other mountains,But high enough in summer the temperature at the top is 22c cooler than it is at the bottom
· The great wall of china can be seen from outer space
· For many Koreans the no 4 is considered unlucky as if no 13 for westerners,as it is pronounced same as death
· Indonesia has more than 200 active volcanoes ,famous among them is krakatoa
· If u want to give a gift in Singapore ,don’t give them handkercheif or clock,bcoz these things were related with funerals ,accidents and death
· The full official Thai name for Bangkok has more than 160 letters,according to some source it is the longest name of any place in the world
· One of the most popular sports of Bangladesh is “kite flying”
· The govt of Bhutan limits the no of tourists entering the city
· In srilanka some people believe that it’s a bad luck to have a chameleon(a kind of lizard) cross ur path
· Many Armeniens hold Mt.Ararat sacred.they believe that their ancestors were first people to appear in the world
· The religion of Zoroastrianism was founded in Iran by a man named zarathushtra more than 2500 years ago
· The caliphs of Baghdad in 800s and 900s Ad were great supporters of chess.The city was the home of some of the best chess players
· The dead sea is so salty,that when u swim in it,u float even if u don’t want to
· Nearly 2400 years ago the Egyptian king Ptolemy ii philadelphus took over the city of Amman.He decided to rename it.The name he choose?Philadelphia for himself
· There are more than 1 billion muslims in the world today.Every year 2 million muslims from different parts of the world make their pilgrimage to Mecca
· Damascus is believed to be the world’s oldest continuously inhabited city.People had apparently lived there from 2500BC
· Two bridges spanning the Bosporus strait connect Istanbul’s European and Asian sides
· Britan used to send some of the prisoners to Australia,thousands of miles away,so they wont able to get back
· Central Sydney is called Eora country.Today many aboriginal people in Sydney call themselves as Eora
· Newzealand is the home of one of the world’s longest name of a hill called”Taumatawhakatangihangakoauauotamateaturipukakapikimaungahoronukupokaiwhenuakitanatahu”
· Wellington ia a centre of Newzealand’s growing cinema industry
· Phillipines is called the Hollywood of the East
. In India some people believe that it’s a bad luck to have a cat cross ur path

WHAT IS INSIDE THE KALASA(KALASAM) OF THE HINDU TEMPLES?

Tuesday, December 01, 2009, 8:33:09 PM | titusmagnet@gmail.com (IEEE)Go to full article
WHAT IS INSIDE THE KALASA(KALASAM) OF THE HINDU TEMPLES?
· Kalasa(Kalasam) is a topmost tomb of the hindu temples
· This kalasa was sacred and special offerings were being made on “Kumbavisekham” ie the inaugural day of the temple
· The kalasa is mostly made up of gold or silver
· The kalasa contains valuable gems in a small sack ,and a small sack containing nine types of Indian grains(navadhaniyam)
· It’s a belief of the hindus ,that these grains will feed the people in case of any disaster occurs,and to educate them ,those grains are the edile grains


Wildfires in Southern CaliforniaWildfires in Southern California

Wednesday, November 25, 2009, 3:17:08 PM | titusmagnet@gmail.com (IEEE)Go to full article

Scientists are trying to create fastest trees

Monday, November 23, 2009, 6:26:13 PM | titusmagnet@gmail.com (IEEE)Go to full article

Scientists are trying to create fastest trees



A tree that can reach 90 feet in six years and be grown as a row crop on fallow farmland could represent a major replacement for fossil fuels. Purdue University researchers are using genetic tools in an effort to design trees that readily and inexpensively can yield the substances needed to produce alternative transportation fuel. The scientists are focused on a compound in cell walls called lignin that contributes to plants' structural strength, but which hinders extraction of cellulose. Cellulose is the sugar-containing component needed to make the alternative fuel ethanol. With funding from the Department of Energy, Clint Chapple and Rick Meilan are using genetic tools to find ways to convert trees into ethanol as a replacement for fossil fuels.

Dutch scientists create genetically engineered cows to produce fortified milk

Monday, November 23, 2009, 6:23:10 PM | titusmagnet@gmail.com (IEEE)Go to full article

Dutch scientists create genetically engineered cows to produce fortified milk




A Dutch biotechnology company called Pharming has genetically engineered cows, outfitting females with a human gene that causes them to express high levels of the protein human lactoferrin in their milk. According to Pharming's website, the protein —which is naturally present in human tears, lung secretions, milk and other bodily fluids—fights against the bacteria that causes eye and lung infections, plays a key role in the immune system of infants and adults and improves intestinal microbial balance, promoting the health of the gastro-intestinal tract. “Since the protein has the ability to bind iron, is a natural anti-bacterial, anti-fungal and anti-viral, is an antioxidant and also has immunomodulatory properties, large groups of people might benefit from orally administered lactoferrin,” the company literature reads. Scientists have tested the toxicity of the protein—isolated from the cows' milk—on rats. They found that—even at the high level of 2,000 mg recombinant human lactoferrin per kg body weight—orally consumed human lactoferrin has no adverse effects to complement all the supposed benefits already mentioned.

Scientists are trying to grow human eyeballs

Monday, November 23, 2009, 6:21:31 PM | titusmagnet@gmail.com (IEEE)Go to full article

Scientists are trying to grow human eyeballs


A genetic switch that gives tadpoles three eyes could allow stem-cell scientists to eventually grow human eyeballs or at least create replacement parts needed for repair jobs. If scientists could grow eyeballs from stem cells in the lab, the process would be a boon to individuals with damage to cells within the eye, including retinal disorders.

Scientists had already established the amphibian genes that initiate and direct eye development, which they refer to as Eye Field Transcription Factors (EFTFs). How these genes get activated in the right location at a certain time during development had been cloaked in mystery. But in 2007, a new study suggested a nitrogen-bearing molecule sets off a series of steps that result in eye formation in frogs. When researchers injected a specific enzyme into frog embryos, the resulting tadpoles showed an extra eye. The mechanism probably also applies to humans and other animals with eyes. Dale and University of Warwick developmental biologist Elizabeth Jones, along with colleagues, discovered the eye-switch while investigating how "ectoenzyme" molecules located on the external surface of cells contributed to the development of locomotion in the African clawed frog (Xenopus laevis). The biologists injected the molecules into frog embryos that comprised just eight cells.

One of the ectoenzymes triggered wonky eye development. When added to cells that would eventually form the head, the resulting tadpole sported three eyes instead of two. An even stranger sight resulted when they injected the ectoenzyme into other developing body cells. The molecule caused an additional "ectopic" eye, leading to tadpoles with a spare peeper growing out of the side, abdomen or even along the tail.


Scientists demonstrate that girls are genetically predisposed to pink

Monday, November 23, 2009, 6:20:11 PM | titusmagnet@gmail.com (IEEE)Go to full article

Scientists demonstrate that girls are genetically predisposed to pink


We all know that women like pink and men prefer blue, but we have never really known why. Now it emerges that parents who dress their boys in blue and girls in pink may not just be following tradition but some deep-seated evolutionary instinct. Researchers have found that there could be sound historical reasons why women have developed a heightened appreciation of reds and pinks, while men are drawn to blue.

The scientists from the University of Newcastle upon Tyne, who were led by Dr Hurlbert and Yazhu Ling, averaged people's overall preferences. The male favourite was a pale blue while the female favourite was a lilac shade of pink. The participants in the study were Chinese and British. The Chinese students showed a marked preference for red. As red symbolises luck and happiness in China, this indicates that cultural norms are also involved. In the study, which is published in the journal Current Biology, the scientists showed pairs of colours to 208 volunteers aged between 20 and 26, who had to select which they preferred by clicking with a computer mouse. Both groups showed similar sex-related preferences, with women liking blues and pinks while men liked mainly blues.

There is already evidence that human's ability to see in colour is likely to have evolved because of the usefulness of being able to distinguish red fruits from green backgrounds. The female role as gatherers while males hunted could have favoured a particular preference for reds and pinks, the scientists said. Dr Ling said the team was now seeking to investigate further the extent to which these preferences are innate. Her own favourite colour? “A very paleish pink,” she said.

Scientist are creating a modified mosquito to fight other mosqiutos

Monday, November 23, 2009, 6:19:05 PM | titusmagnet@gmail.com (IEEE)Go to full article

Scientist are creating a modified mosquito to fight other mosqiutos


A genetically modified (GM) strain of malaria-resistant mosquito has been created that is better able to survive than disease-carrying insects.

It gives new impetus to one strategy for controlling the disease: introduce a transgenic mosquito carrying a gene that confers resistance to the malaria parasite into wild populations in the hope that they will take over. These mosquitoes had another gene inserted into them to make their eyes fluoresce, to distinguish them from the ordinary strain. The insect carries a gene that prevents infection by the malaria parasite. The researchers caution that their studies are still at an early stage, and that it could be 10 years or more before engineered insects are released into the environment. The approach exploits the fact that the health of infected mosquitoes is itself compromised by the parasite they spread. Insects that cannot be invaded by the parasite are therefore likely to be fitter and out-compete their disease-carrying counterparts.



Read More