Peng Peng (below), a cloned sheep, is seen on a video display at the Beijing Genomics Institute in Shenzhen, southern China April 23, 2012. Chinese scientists have cloned a genetically modified sheep containing a "good" type of fat found naturally in nuts, seeds, fish and leafy greens that helps reduce the risk of heart attacks and cardiovascular disease. "Peng Peng", which has a roundworm fat gene, weighed in at 5.74 kg when it was born on March 26 in a laboratory in China's far western region of Xinjiang. Mmmm, delicious roundworm genes.
(Picture taken April 23, 2012. REUTERS/Tyrone Siu)
Frog tongue mechanism has been well-documented, but only recently have scientists started looking at the remarkable combo of tongue softness and frog spit’s chemical makeup.
Elenco’s Night ‘n Day Mechanical Globe uses a system of translucent, exposed gears to rotate an internally illuminated globe that displays the seasonally adjusted, real-time night/day terminator as it spins.
KSU plant biochemical geneticist Raj Nagarajan describes the properties of Thaumatin, Monellin and Brazzein, all found in west African plants that are generally considered safe for consumption; each is a protein, and they are, respectively, 1,000x, 2000x, and 3000x sweeter than sugar.
DJI is the world’s leading designer and producer of easy-to-fly drones and aerial photography systems. If you’re a drone enthusiast, you want a DJI. If you know absolutely nothing about drones and think they’re weird, if you win a DJI you’re going to become a drone enthusiast.Enter this giveaway (for free, yes) and you’ll get a […]
Although there will never be a consensus about the best way to make coffee, any coffee connoisseur will agree that controlling the grind of your beans and balancing water temperature are the keys to a tasty cup. Since your plastic coffee pot doesn’t really allow for that kind of customization, going back to the French […]
Not all hackers are malicious information thieves—white-hat ethical hackers work with technology companies to ensure the security of their computer systems and user data. With all of today’s high-profile data breaches, ethical hackers are in considerable demand. To learn these critical skills and break into the high-paying cyber security field, try taking the courses in this […]