Effects of habitat loss and climate change mean the future of the tiny native mammal is uncertain
Numbers of Britain's native dormouse have declined by more than a third since 2000, according to the first definitive report on the state of the species.
The tiny, golden-brown animals were once widespread throughout England and Wales, but have become one of Britain's most threatened mammals due to loss and fragmentation of their woodland habitat, changes in land management and a warmer climate.
Related: How the dormouse is returning to England's hedgerows after 100 years
Continue reading...Aleem Yousaf posted a photo:
Full Text:
Indigo buntings often migrate by night, using the stars to navigate. The seasonality of bird migration is shifting in response to climate change. As a result, birds in the United States are arriving at their northern breeding grounds earlier in spring -- and may be departing later in fall. Scientists supported by the National Science Foundation made the migration shift discovery thanks to information aggregated from two sources: remote-sensing data from weather surveillance radar and ground-based data collected in citizen science databases.
Image credit: Kyle Horton
Full Text:
The ubiquity of smartphones and their sophisticated gadgetry makes them an ideal tool to steal sensitive data from 3-D printers. That's according to a new University at Buffalo study that explores security vulnerabilities of 3-D printing, also called additive manufacturing, which analysts say will become a multibillion-dollar industry employed to build everything from rocket engines to heart valves. Unlike most security hacks, the researchers did not simulate a cyberattack. Instead, the researchers programmed a common smartphone's built-in sensors to measure electromagnetic energy and acoustic waves that emanate from 3-D printers. These sensors can infer the location of the print nozzle as it moves to create the three-dimensional object being printed. According to the researchers, the tests show that smartphones are quite capable of retrieving enough data to put sensitive information at risk.
Image credit: Wenyao Xu