Electric stimulation will accelerate wound healing

Researchers from the University of Manchester, together with Oxford BioElectronics, are working on a new method that could significantly speed up wound healing. It could help in the faster treatment of patients after surgery and accelerate the recovery of athlete injuries.

Technological progress has made treatment of patients today much simpler and more effective than decades ago. And ongoing research brings new inventions that can further improve this process. The latest idea is being developed by researchers at the University of Manchester, in collaboration with Oxford BioElectronics and is concerned with accelerating wound healing by electrostimulation of wounded areas.

A recent 40 volunteer test gave very promising results. Each patient had an identical wound on both arms. The left was treated in the traditional way, while in the right case a small electrical impulse was used, which was applied four times over a period of two weeks. These pulses stimulate a process called angiogenesis that accelerates the formation of new blood vessels and leads to increased blood flow to the damaged area. After 10 days, the wound was much smaller and deeper than this treated in the normal way, so it healed much faster. You can see this very accurately in the image below.

Ardeshir Bayat, head of the study, says the new method may be particularly useful for treating chronic wounds but also for any other type of lesion, much faster putting the patient on foot.

Apple lost the patent dispute

Apple loves to pull rivals in court to infringe its patents. But it also does not avoid using anyone else’s technology and sometimes has to answer for it. The American company has just lost the trial with the Swiss company Kudelski, whose unlawful patents have violated.

German court in Dusseldorf has found Apple to be in violation of patents owned by the Swiss company Kudelski, the owner of OpenTV platform, related to video streaming technology. He also ordered the continued use of the disputed patents that were used on iPhone, iPad and Apple TV.

The OpenTV platform is currently not the most recognizable brand, but at one time it was one of the first players in the video content streaming market. In 2010, OpenTV was purchased by the Kudelski Group, which in 2014 sued Apple for infringing its patents by filing a suit against Cupertino in US and German court cases.…

Intel co-founder and multi-legacy president

Andrew Grove, a legend in the computer industry, a longtime Intel president and one of the most influential leaders in the new technology industry died Monday at 79.

Andrew Grove, born in 1936 in Budapest, a Jewish family, survived the war in hiding, and in 1956 emigrated to the United States. After completing his doctorate at Berkeley, he worked at Fairchild Semiconductor alongside Robert Noyce, inventor of silicon chip integrated circuits.

Founded in 1968 by Robert Noyce and Gordon E. Moore of Intel, Andy Grove was their first employee, taking the position of chief engineer. In 1979 he became president of the company and then its executive director. In 1998 – due to health problems (prostate cancer) – he resigned from this function, until 2004 still remaining chairman of the board.

Under his management, Intel has become the largest semiconductor manufacturer with earnings of $ 26 billion in the early 1990s, which has made it the world’s most valuable company.

The fact that Intel has survived and grown on the market despite all the changes in the industry has made its president a model for many of the Silicon Valley leaders. Numerous processor families including the legendary 386 and Pentium have become world-renowned brands, contributing to the development of the market and the availability of personal computers.…

Internet Things can be used for surveillance

US intelligence chief James Clapper, in a hearing before the US Senate, said that devices belonging to the Internet Thief category (IoT) could pose a threat to users. Intelligence agencies are in a position to use them for surveillance of people.

More and more equipment belonging to the so-called. Things that are devices that have wireless connectivity to communicate with the Internet. One might think that such devices have the same benefits, since a communications system integrated with smart circuitry can be very helpful, allowing remote monitoring of a sleeping baby or controlling energy consumption or home lighting.

The truth is that such equipment can also pose a threat, allowing surveillance of people who use it. This was confirmed by US intelligence chief James Clapper during a Senate hearing. In his opinion, this type of device can be used by intelligence agencies used for eavesdropping, tracking, surveillance and even search for targets for recruitment. Although he did not name any agency that could use such methods during his work, he clearly made clear that this was all about, of course, after the information revealed by Snowden is not a big surprise.…

Galaxy Note 5 Dual SIM with a microsd reader

For several weeks it is said that Samsung Note 5, the latest business phablet Samsung, has been stripped of the microSD card reader, which will significantly reduce its functionality compared to the previous model. However, it turns out that the dual SIM version, however, has such a reader.

The new design change strategy for Samsung products has led to a partial limitation of their functionality. The Galaxy S6 no longer has a removable battery, as does the microSD card reader. The same strategy will also continue in the Galaxy Note 5 business model, which will undoubtedly bother its future buyers.

How much the Galaxy S6 does not have a microSD card slot can still be overwhelmed, so much for the business model is a big drawback, which will limit its functionality.

However, it turns out that not all variants of Galaxy Note 5 do not have a card reader. This component we will find in the version of Dual Sim. A photo of this model published by the ePrice portal, which clearly shows the frames for two SIM cards, allows one to insert a microSD card into the network.…

Twitter must keep user data from Russia in their country

The Russian authorities, like the Chinese, see social networking as another opportunity for surveillance of their citizens. Therefore, the governmental body Roskomnadzor issued a ruling that requires Twitter to keep Russian users of this portal stored in Russia. Thanks to this, the authority will have easier access to these resources.

It can not be denied that social networking sites are an excellent source of information for a user that he is willing to provide. While many countries want to have access to this data, they are hampered by the policies of the portals themselves, which physical servers are usually outside the reach of government agencies.

Such a policy is also Twitter, which very much does not like the Russian government. Roskomnadzor, a state media oversight agency, has therefore demanded from a well-known portal that Russian users should be kept on servers located in Russia.

Alexander Zharov Roskomnadzora explained to the media that the governmental body’s action was to enforce Twitter’s compliance with Russian law. And it is worth adding that in September this year there was introduced a law, which requires that every site collecting data of Russian users, kept them in the country. In case of non-fulfillment of this request, their owners must count on financial penalties, including blocking access to the site.…

Computer Processors with Trojan Horse?

According to the latest report, which is a joint effort of European and American specialists, CPUs used in computers can be equipped with a hardware Trojan horse. Already at the stage of their production, the design of the system can be changed to include the appropriate technology to facilitate the break-in of computers and the spying of users of such equipment. Worse yet, these changes would be virtually undetectable without the use of specialized equipment.

The above message should not be a big surprise. Five years ago, researchers from the University of Illinois at Urbana-Champaign have proven that it is possible. By adding a few additional items to the chip, they can spy on the user without hindrance.

Recent research in this field shows, however, that the proper fabrication of the system does not require the installation of any additional circuitry, as it can simply change the doping of some transistors.

This is a method to introduce impurities into the silicon to thereby change its electrical properties. By adjusting the doping of a small number of transistors you can modify the operation of the system to create a hardware spy directly in the processor. And since the changes were made at the atomic level, they can not be detected using standard IC quality verification methods.

You could write that the NSA would be happy to welcome new ways of spying on citizens, but I am surprised that they have known this for a long time, and perhaps even use this knowledge on a large scale. All the more, as I recently wrote, NSA can hack into virtually any computer, and so modified processor would make it much easier.…