Category: Biological

Controversial T. Rex Soft Tissue Find Finally Explained | LiveScience

Controversial T. Rex Soft Tissue Find Finally Explained | LiveScience.

Posted: November 30, 2013 in Biological

Army Scores a Super-Stealthy Drone That Looks Like a Bird | Danger Room | Wired.com

Army Scores a Super-Stealthy Drone That Looks Like a Bird | Danger Room | Wired.com.

Posted: November 30, 2013 in Gadgetry, Robotics

China to launch moon rover on Monday: state media | AsiaOne

China to launch moon rover on Monday: state media | AsiaOne.

Posted: November 30, 2013 in Space

Sentient code: An inside look at Stephen Wolfram’s utterly new, insanely ambitious computational paradigm | VentureBeat | Dev | by John Koetsier

Sentient code: An inside look at Stephen Wolfram's utterly new, insanely ambitious computational paradigm | VentureBeat | Dev | by John Koetsier.

Posted: November 30, 2013 in Computer, Software

Solving the Neural Code Conundrum: Digital or Analog? | MIT Technology Review

Solving the Neural Code Conundrum: Digital or Analog? | MIT Technology Review.

Posted: November 30, 2013 in Biological

Dutch intelligence agency AIVD hacks internet forums – nrc.nl

Dutch intelligence agency AIVD hacks internet forums – nrc.nl.

Posted: November 30, 2013 in Computer, Security

New state of liquid crystals discovered

New state of liquid crystals discovered.

Posted: November 29, 2013 in Chemistry

Physicists Find a Way to Study Coldest Objects in the Universe – Trending News – iTech Post

Physicists Find a Way to Study Coldest Objects in the Universe – Trending News – iTech Post.

Posted: November 29, 2013 in Physics

How to Burst the “Filter Bubble” that Protects Us from Opposing Views | MIT Technology Review

How to Burst the "Filter Bubble" that Protects Us from Opposing Views | MIT Technology Review.

Posted: November 29, 2013 in Social

Facebook App requires users agree to be monitored by microphone at any time without their permission | RedFlagNews.com

Facebook App requires users agree to be monitored by microphone at any time without their permission | RedFlagNews.com.

Posted: November 29, 2013 in Computer, Security