If you thought your mobile carrier was a pile of shit, it's understandable -- after all, the phones themselves are festering hives of E coli:
Researchers said that 16% of the devices were contaminated with E coli, which can cause food poisoning, most probably because people fail to properly wash their hands after going to the toilet. The study by the London School of Hygiene and Tropical Medicine and Queen Mary, University of London, also found that Britons tend to lie about their personal hygiene.
While 95% of the 390 people surveyed said they washed their hands with soap where possible, 92% of mobile phones and 82% of hands were contaminated with bacteria.
(Image: SHIT (med og uten ®), a Creative Commons Attribution (2.0) image from aslakr's photostream)
Frog tongue mechanism has been well-documented, but only recently have scientists started looking at the remarkable combo of tongue softness and frog spit’s chemical makeup.
Elenco’s Night ‘n Day Mechanical Globe uses a system of translucent, exposed gears to rotate an internally illuminated globe that displays the seasonally adjusted, real-time night/day terminator as it spins.
KSU plant biochemical geneticist Raj Nagarajan describes the properties of Thaumatin, Monellin and Brazzein, all found in west African plants that are generally considered safe for consumption; each is a protein, and they are, respectively, 1,000x, 2000x, and 3000x sweeter than sugar.
DJI is the world’s leading designer and producer of easy-to-fly drones and aerial photography systems. If you’re a drone enthusiast, you want a DJI. If you know absolutely nothing about drones and think they’re weird, if you win a DJI you’re going to become a drone enthusiast.Enter this giveaway (for free, yes) and you’ll get a […]
Although there will never be a consensus about the best way to make coffee, any coffee connoisseur will agree that controlling the grind of your beans and balancing water temperature are the keys to a tasty cup. Since your plastic coffee pot doesn’t really allow for that kind of customization, going back to the French […]
Not all hackers are malicious information thieves—white-hat ethical hackers work with technology companies to ensure the security of their computer systems and user data. With all of today’s high-profile data breaches, ethical hackers are in considerable demand. To learn these critical skills and break into the high-paying cyber security field, try taking the courses in this […]