Judge halts Argentine woman's wedding to sister's killer






BUENOS AIRES: An Argentine judge has blocked planned nuptials between a 22-year-old woman and her twin sister's convicted killer after a formal complaint by her mother.

Edith Casas insists that Victor Cingolani did not murder her sister Johana Casas, a fashion model. He is serving a 13-year prison sentence in southern Santa Cruz province for her murder in 2010.

The twins' mother Marcelina Orellana says Edith is mentally ill and "does not know what she is doing." She filed a request in court to suspend the marriage.

Casas "does not have full use of her faculties, is deprived of reason, and her physical and mental well-being are at risk," said the mother's lawyer Fabian Farias.

The Argentine Civil Code says that any permanent or temporary loss of mental capacities is reason enough to prevent a marriage.

Farias said Casas made the surprise decision to marry the convicted killer just 10 days ago. The couple had planned to marry in jail to avoid a media circus over the highly publicized wedding.

"She used to live with her parents and nobody expected such a sudden change in behavior," he said.

But Casas has insisted that Cingolani was unjustly convicted, saying he "is a guy who would not hurt a fly. He did not kill her."

She also accused her mother of abandoning her and her sister, adding: "she cannot say I need a psychiatrist because I am fully aware of what I am doing."

Another man, Marcos Diaz, who had also gone out with Johana, is also doing time for the killing.

Cingolani's lawyer has filed a brief appealing the judge's decision.

- AFP/al



Read More..

Why does my external hard drive only show 2.2TB?



External hard drives are exceptionally useful for expanding storage capabilities for both backups and data management. While external hard drives are often sold in preconfigured packages by manufacturers, another popular option is to purchase an external hard-drive enclosure and then use any drive of your choice in it. This is beneficial because as your demands for storage increase, you can replace the enclosure's drive with a larger one.


These days, the availability of hard drives with 4TB of storage are enticing for people to swap into their existing enclosures; however, when doing so they may find that the system will only recognize 2.2TB of the drive, regardless of how they partition or format the device.


While modern file-system formats such as HFS+, NTFS, and ExFAT ought to handle volume sizes of between hundreds of gigabytes to zettabytes, and though operating systems like OS X have increased the maximum volume size from 2TB to 8EB (exabytes) over the years, there are hardware limitations that may limit the size of the volume that can be used. If you are using an older drive enclosure for your large hard drive, then the controllers on it may not be capable of handling over 2.2TB, regardless of the software environment being used around it.


This problem happens because of the use of LBA (logical block addressing) in modern hard-drive controllers coupled with a hardware-based limit of how many blocks can be included in the LBA scheme. Early LBA controllers used 32-bit (or lower) addressing coupled with a maximum supported block size of 512 bytes. This means they support up to 2^32 or 4,294,967,296 blocks for a device, and with each block being 512 bytes, this translates to a maximum of 2,199,023,255,552 bytes, or 2.199TB.


Unfortunately in many cases these limits are hard-coded in enclosure's firmware, so even though modern drives use 4,096-byte sectors, the system will still only address these sectors as 512 bytes in size, resulting in both a waste of space and degraded performance.


The only way around this problem is to replace your drive enclosure with a new one that has proper support for both 48-bit (or greater) LBA and 4,096-byte sectors in hard drives. Luckily most enclosures on the market today do support this, so if you run into this problem, you should be up and running in no time.




Questions? Comments? Have a fix? Post them below or !
Be sure to check us out on Twitter and the CNET Mac forums.


Read More..

Pictures: Fungi Get Into the Holiday Spirit


Photograph courtesy Stephanie Mounaud, J. Craig Venter Institute

Mounaud combined different fungi to create a Santa hat and spell out a holiday message.

Different fungal grow at different rates, so Mounaud's artwork rarely lasts for long. There's only a short window of time when they actually look like what they're suppose to.

"You do have to keep that in perspective when you're making these creations," she said.

For example, the A. flavus fungi that she used to write this message from Santa grows very quickly. "The next day, after looking at this plate, it didn't say 'Ho Ho Ho.' It said 'blah blah blah,'" Mounaud said.

The message also eventually turned green, which was the color she was initially after. "It was a really nice green, which is what I was hoping for. But yellow will do," she said.

The hat was particularly challenging. The fungus used to create it "was troubling because at different temperatures it grows differently. The pigment in this one forms at room temperature but this type of growth needed higher temperatures," Mounaud said.

Not all fungus will grow nicely together. For example, in the hat, "N. fischeri [the brim and ball] did not want to play nice with the P. marneffei [red part of hat] ... so they remained slightly separated."

Published December 21, 2012

Read More..

Obama Still an 'Optimist' on Cliff Deal


gty barack obama ll 121221 wblog With Washington on Holiday, President Obama Still Optimist on Cliff Deal

Mandel Ngan/AFP/Getty Images


WASHINGTON D.C. – Ten days remain before the mandatory spending cuts and tax increases known as the “fiscal cliff” take effect, but President Obama said he is still a “hopeless optimist” that a federal budget deal can be reached before the year-end deadline that economists agree might plunge the country back into recession.


“Even though Democrats and Republicans are arguing about whether those rates should go up for the wealthiest individuals, all of us – every single one of us -agrees that tax rates shouldn’t go up for the other 98 percent of Americans, which includes 97 percent of small businesses,” he said.


He added that there was “no reason” not to move forward on that aspect, and that it was “within our capacity” to resolve.


The question of whether to raise taxes on incomes over $250,000 remains at an impasse, but is only one element of nuanced legislative wrangling that has left the parties at odds.


For ABC News’ breakdown of the rhetoric versus the reality, click here.


At the White House news conference this evening, the president confirmed he had spoken today to Senate Majority Leader Harry Reid, D-Nev., and House Speaker John Boehner, R-Ohio, although no details of the conversations were disclosed.


The talks came the same day Speaker Boehner admitted “God only knows” the solution to the gridlock, and a day after mounting pressure from within his own Republican Party forced him to pull his alternative proposal from a prospective House vote. That proposal, ”Plan B,” called for extending current tax rates for Americans making up to $1 million a year, a far wealthier threshold than Democrats have advocated.


Boehner acknowledged that even the conservative-leaning “Plan B” did not have the support necessary to pass in the Republican-dominated House, leaving a resolution to the fiscal cliff in doubt.


“In the next few days, I’ve asked leaders of Congress to work towards a package that prevents a tax hike on middle-class Americans, protects unemployment insurance for 2 million Americans, and lays the groundwork for further work on both growth and deficit reduction,” Obama said. ”That’s an achievable goal.  That can get done in 10 days.”


Complicating matters: The halls of Congress are silent tonight. The House of Representatives began its holiday recess Thursday and Senate followed this evening.


Meanwhile, the president has his own vacation to contend with. Tonight, he was embarking for Hawaii and what is typically several weeks of Christmas vacation.


However, during the press conference the president said he would see his congressional colleagues “next week” to continue negotiations, leaving uncertain how long Obama plans to remain in the Aloha State.


The president said he hoped the time off would give leaders “some perspective.”


“Everybody can cool off; everybody can drink some eggnog, have some Christmas cookies, sing some Christmas carols, enjoy the company of loved ones,” he said. “And then I’d ask every member of Congress, while they’re back home, to think about that.  Think about the obligations we have to the people who sent us here.


“This is not simply a contest between parties in terms of who looks good and who doesn’t,” he added later. “There are real-world consequences to what we do here.”


Obama concluded by reiterating that neither side could walk away with “100 percent” of its demands, and that it negotiations couldn’t remain “a contest between parties in terms of who looks good and who doesn’t.”


Boehner’s office reacted quickly to the remarks, continuing recent Republican statements that presidential leadership was at fault for the ongoing gridlock.


“Though the president has failed to offer any solution that passes the test of balance, we remain hopeful he is finally ready to get serious about averting the fiscal cliff,” Boehner said. “The House has already acted to stop all of the looming tax hikes and replace the automatic defense cuts. It is time for the Democratic-run Senate to act, and that is what the speaker told the president tonight.”


The speaker’s office said Boehner “will return to Washington following the holiday, ready to find a solution that can pass both houses of Congress.”

Read More..

Van-sized space rock is a cosmic oddball








































The shattered remains of a high-profile space rock are oddly low in organic materials, the raw ingredients for life. The discovery adds a slight wrinkle to the theory that early Earth was seeded with organics by meteorite impacts.












In April a van-sized meteor was seen streaking over northern California and Nevada in broad daylight. The fireball exploded with a sonic boom and sprayed the region with fragments. Videos, photographs and weather radar data allowed the meteor's trajectory to be reconstructed, and teams quickly mobilised to search for pieces in the foothills of the Sierra Nevada in northern California.













Researchers readily identified the meteorites as rare CM chondrites, thought to be one of the oldest types of rock in the universe. "Because the meteorites were discovered so freshly, for the first time we had a chance to study this type of meteorite in a pristine form," says Peter Jenniskens of the SETI Institute in Mountain View, California, who led the search effort and the subsequent study of the space rocks.












Jenniskens personally found a fragment in a parking lot, where it remained relatively free of soil contaminants. "That's the best you could hope for, other than landing in a freezer," says Daniel Glavin of NASA's Goddard Space Flight Center in Greenbelt, Maryland.











Battered past












CM chondrites make up only about 1 per cent of known meteorites. Most of them contain plenty of organic materials, including amino acids, the building blocks of life on Earth.













Jenniskens and colleagues found that the California fragments also have amino acids, including some not found naturally on Earth. But in three rocks collected before a heavy rainstorm, which bathed the other pieces in earthly contaminants, organics are less abundant by a factor of 1000 than in previously studied CM chondrites.












These three rocks could not have lost organics due to space "weathering": analysis of the meteorites' exposure to cosmic rays suggests the original meteor was flying through space for only about 50,000 years before hitting Earth.












Based on its trajectory and its relatively short flight time, Jenniskens thinks the meteor can be traced back to a family of asteroids dominated by 495 Eulalia, a group known as a possible source of CM chondrites. It is probably a piece that broke off during an impact, revealing the relatively pristine material inside.












So what happened to its organics? Jenniskens' team found that the meteorites are breccia – smaller rocks cemented together – which suggests that the asteroid from which they came took a series of beatings. Those impacts, or possibly other processes inside the asteroid, could have heated it enough to destroy most organic material.











Limited delivery













The result might have implications for the organics delivery theory, says Bill Bottke of the Southwest Research Institute in Boulder, Colorado.












"It shows that not all asteroids can deliver sufficient quantities. One of the disappointments is that, from a prebiotic organic chemistry perspective, it was very limited," says Bottke. "But this is an unusual case. Most [CM chondrites] are loaded with organic compounds."











Still, studying the space rocks will help us prepare future missions to asteroids such as OSIRIS-Rex, scheduled to take off for asteroid 1999 RQ36 in 2016 and bring a sample back in 2023.













"In some ways, we've had a sample, a very fresh one, come to us," says Bottke. "This is a test bed for the techniques we'll use in that mission."












Journal reference: Science, DOI: 10.1126/science.1227163


















































If you would like to reuse any content from New Scientist, either in print or online, please contact the syndication department first for permission. New Scientist does not own rights to photos, but there are a variety of licensing options available for use of articles and graphics we own the copyright to.




































All comments should respect the New Scientist House Rules. If you think a particular comment breaks these rules then please use the "Report" link in that comment to report it to us.


If you are having a technical problem posting a comment, please contact technical support.








Read More..

User revolt causes Instagram to keep old rules






SAN FRANCISCO: Instagram on Thursday tried to calm a user rebellion by nixing a change that would have given the Facebook-owned mobile photo sharing service unfettered rights to people's pictures.

"The concerns we heard about from you the most focused on advertising, and what our changes might mean for you and your photos," Instagram co-founder and chief Kevin Systrom said in a blog post.

"There was confusion and real concern about what our possible advertising products could look like and how they would work," he continued.

Protests prompted Instagram to stick with wording in its original terms of service and privacy policies regarding advertising and to do away with some changes that were to take effect in January, according to Systrom.

"You also had deep concerns about whether under our new terms, Instagram had any plans to sell your content," the Instagram chief said.

"I want to be really clear: Instagram has no intention of selling your photos, and we never did. We don't own your photos, you do."

Instagram on Tuesday backed off a planned policy change that appeared to clear the way for the mobile photo sharing service to sell pictures without compensation, after users cried foul.

Changes to the Instagram privacy policy and terms of service had included wording that appeared to allow people's pictures to be used by advertisers at Instagram or Facebook worldwide, royalty-free.

Twitter and Instagram forums buzzed over the phrasing, as users debated whether to delete their accounts before the new rules kicked in.

Originally proposed portions of the new policy that rankled users included "You hereby grant to Instagram a non-exclusive, fully paid and royalty-free, transferable, sub-licensable, worldwide license to use the content that you post on or through the service."

The terms also stated that "a business or other entity may pay us to display your username, likeness, photos, and/or actions you take, in connection with paid or sponsored content or promotions, without any compensation to you."

Instagram said that the policy changes to take effect in January were part of a move to better share information with Facebook, which bought the company this year.

The original price was pegged at US$1 billion but the final value was less because of a decline in the social network's share price.

"I'm proud that Instagram has a community that feels so strongly about a product we all love," Systrom said while apologising to users and promising the offensive policy changes were gone.

-AFP/fl



Read More..

Four security trends defined 2012, will impact 2013




The Internet is slowly changing, and security experts say that today's security issues will continue to be major players in driving that change. Here are four trends that dominated headlines in 2012, and will continue to play a major role in 2013.


The Internet as governmental tool
The collective realization by governments around the world that the Internet is an excellent network for conducting surveillance, monitoring, espionage, and war, says Finnish computer security firm F-Secure's Chief Technical Officer Mikko Hypponen, may not come to full fruition in 2013. But the foundation for that change is already underway.


"There will be more operations along the lines of Olympic Games, also from other sources than US and Israel. Later on, we might look back at these first 20 years of the Web as the Golden Days, when the net was still free," he wrote in an e-mail to CNET. "Olympic Games" is the covert inter-govenrment project that birthed Stuxnet, Duqu, and Flame.




Information security expert Chris Wysopal agreed that "cyber-warfare" is becoming commonplace. "When there's a political or actual war event, we're seeing cyber-attacks parallel that. It does seem to be more pronounced. It's almost not newsworthy, as if we expect it to happen alongside a political event."


Take that in for a moment. Government-sponsored, computer-based attacks, as "almost not newsworthy," he said.


But just because these attacks are becoming more frequent doesn't mean that they don't stymie security researchers. Tomer Teller, a security evangelist and researcher at Check Point, said that he was surprised this year by the rise of "precision-targeted attacks."


"We saw that with Gauss this year, from the Stuxnet family. It had an encrypted payload, and researchers couldn't decrypt it."


Tim Rains, the director of Microsoft's Trustworthy Computing division, pointed out that these governmental actions have consequences beyond the nuclear reactors of Iran and other industrial targets.


"Eighty-five percent of the exploits against operating systems tried to take advantage of one of the vulnerabilities that Stuxnet used. A very small fraction of malware uses "zero-days", so we're seeing commodity malware writers benefits from the research of professionals," he said. "It was a trend in 2012, and we'll continue to see that in the next year."




More mobile devices, bigger targets
Experts have been talking up mobile security for several years now, and as mobile device proliferation continues, so will the security problems associated with them. Because of their very mobile, always-connected nature, experts told me that the problems will become more complex in 2013.


Lookout Mobile Security's Senior Product Manager, Derek Halliday, noted two interesting trends that his company saw in 2012. Lookout predicted and saw in 2012, "only a few dominant kinds of mobile malware," he said.


Microsoft's Rains agreed. "[The Looter exploit] is responsible for the second-most highest number of mobile threats we saw."


Halliday added, "The other thing was how geographic specific these threats were. We were surprised by the stark contrast between the U.S. and say Russia or China. If you try to run a toll fraud application at scale in the U.S., you'll encounter some problems -- a double-opt in message, government intervention," he said.


Another point Halliday made was that while
Android 4.2 is the most secure yet, with numerous security improvements, operating system fragmentation will prevent it from reaching most people until late 2013.




On the other hand, said Wysopal, the impact of mobile malware is definitely growing. "In 2012, half a percent of all mobile users got hurt by mobile malware in the U.S. That's a million people, not an insignificant number. It's a trend that is happening slower than expected, but it's not going to go away."


The malware problem is likely to remain isolated from Apple's iOS, according to Hypponen. "There's still no iPhone malware. Five years after shipping one of the most popular systems, they have no malware problem at all. That's a major accomplishment by Apple. Job well done."


Desktop threat, still a threat
Mobile is booming, with Android devices outselling Windows computers in Q3 2012, but that doesn't mean that we'll see a downturn in desktop-focused attacks.


One story that Hypponen says was underreported in 2012 was the rootkit known as ZeroAccess. "Zero Access is almost totally under the radar, yet it's a massive, massive outbreak. It's almost as big in size as Conficker, which was headline material for weeks. [Zero Access] is a commercial kit, being developed and sold by a Russian coder. [It] installs itself to the [master boot record] so it boots before Windows.


While Hypponen noted that
Windows 8 and Macs use UEFI to create secure boot procedures that prevent rootkits like Zero Access, Microsoft's Rains cautioned that eventually, and possibly in the coming year, this will force rootkits to evolve.




Mac malware got a lot of attention in the second half of 2011 and in 2012 with Flashback, and that's expected to continue. Hypponen said, "The author of the Flashback Trojan is still at large and is rumored to be working on something else. And while there have been smart security changes to the Mac OS," likely alluding to Mountain Lion's Gatekeeper, "there's a segment of the Mac-using population who are basically oblivious to the threats facing Macs, making them vulnerable to a new malware outbreak."


And across platforms, browsers remain a broad surface to attack despite ongoing improvements. Jeremiah Grossman of WhiteHat Security said that new exploits and vulnerabilities, such as CSS sniffing attacks, will continue to cause turmoil in the most popular kind of desktop program. "Let's say you just downloaded Chrome or Firefox. If I can get you to click somewhere on the screen, I can get you. These browsers are not really secure, it's death by 1,000 cuts."
we have 15 years of broken, faulty web code, we have a lot of garbage websites out there that are protecting a lot of interesting data.


Privacy and data breaches
One of the big notables in information security over the past year was the rise of awareness in data mining. Brought on by numerous privacy policy changes to high-profile social networks like Facebook, Google, and Instagram, by fast and loose trendy mobile app policies, and by shockingly large data breaches at companies that just can't be bothered investing in better database protection, privacy is becoming a key security topic.



Lookout's Halliday said that he expects privacy to be a hot topic in the coming year. Not only has the California attorney general been pushing for companies to take a stance more favorable to consumers before the government is forced to step in, he said, but consumers are more aware in general.


"Devices are collecting not just location information, but contacts and your historical record of talking to them. We'd be more than happy if there was significant progress towards [better privacy] as a goal," he said.


WhiteHat Security's Grossman pointed out that it's not just malware writers who are using exploits. Difficult to detect until recently, "CSS sniffing was being done data aggregators," he said.


Holistic security
One trend that's impossible to deny is that these security problems may start in discretely different realms, but the nature of the Internet is making them more intertwined than ever before. Malware-writing techniques pioneered for Stuxnet inspire consumer-targeted malware writers, who in turn are forced to develop new social engineering techniques as app stores, browsers, and Web site owners play Whac-a-Mole with vulnerabilities.


And issues like the potential for exploiting devices connected directly to the Internet, like smart TVs and DVD players; more creative, harder to stop social engineering; the commercialized selling of all manner of exploits; and utility and medical device hacks are expected to grow in impact.


As much as we don't want to admit it, security is becoming an issue of ongoing education. 2013 would be a good year to get going on that.

Read More..

Hollies Get Prickly for a Reason



With shiny evergreen leaves and bright red berries, holly trees are a naturally festive decoration seen throughout the Christmas season.


They're famously sharp. But not all holly leaves are prickly, even on the same tree. And scientists now think they know how the plants are able to make sharper leaves, seemingly at will. (Watch a video about how Christmas trees are made.)


A new study published in the Botanical Journal of the Linnean Society suggests leaf variations on a single tree are the combined result of animals browsing on them and the trees' swift molecular response to that sort of environmental pressure.


Carlos Herrera of the National Research Council of Spain led the study in southeastern Spain. He and his team investigated the European holly tree, Ilex aquifolium. Hollies, like other plants, can make different types of leaves at the same time. This is called heterophylly. Out of the 40 holly trees they studied, 39 trees displayed different kinds of leaves, both prickly and smooth.



Five holly leaves from the same tree.

Five holly leaves from the same tree.


Photographs by Emmanuel Lattes, Alamy




Some trees looked like they had been browsed upon by wild goats and deer. On those trees, the lower 8 feet (2.5 meters) had more prickly leaves, while higher up the leaves tended to be smooth. Scientists wanted to figure out how the holly trees could make the change in leaf shape so quickly.


All of the leaves on a tree are genetic twins and share exactly the same DNA sequence. By looking in the DNA for traces of a chemical process called methylation, which modifies DNA but doesn't alter the organism's genetic sequence, the team could determine whether leaf variation was a response to environmental or genetic changes. They found a relationship between recent browsing by animals, the growth of prickly leaves, and methylation.


"In holly, what we found is that the DNA of prickly leaves was significantly less methylated than prickless leaves, and from this we inferred that methylation changes are ultimately responsible for leaf shape changes," Herrera said. "The novelty of our study is that we show that these well-known changes in leaf type are associated with differences in DNA methylation patterns, that is, epigenetic changes that do not depend on variation in the sequence of DNA."


"Heterophylly is an obvious feature of a well-known species, and this has been ascribed to browsing. However, until now, no one has been able to come up with a mechanism for how this occurs," said Mike Fay, chief editor of the Botanical Journal of the Linnean Society and head of genetics at the Kew Royal Botanic Gardens. "With this new study, we are now one major step forward towards understanding how."


Epigenetic changes take place independently of variation in the genetic DNA sequence. (Read more about epigenetics in National Geographic magazine's "A Thing or Two About Twins.")


"This has clear and important implications for plant conservation," Herrera said. In natural populations that have their genetic variation depleted by habitat loss, the ability to respond quickly, without waiting for slower DNA changes, could help organisms survive accelerated environmental change. The plants' adaptability, he says, is an "optimistic note" amidst so many conservation concerns. (Related: "Wild Holly, Mistletoe, Spread With Warmer Winters.")


Read More..

Police Chief Wants to Ban High-Capacity Firepower












High-capacity magazines are the deadliest of gun cartridges. They come in cases of 30, 40, 60 and even 120 rounds.


These magazines are maximum, economy-sized firepower packed into a steel cartridge. When strapped into a pistol or semi-automatic rifle, a shooter can fire non-stop until the magazine is empty. By then, the damage can be devastating.


That is why the Baltimore County Police Chief Jim Johnson wants to outlaw all but the smallest of these magazines. Johnson wants to limit them to a capacity of 10 rounds.


The fewer the bullets, the more often the shooter has to stop firing, eject the empty cartridge and load another one.


A lot can happen in the window of time it takes to reload, Johnson said.


"Folks that are being attacked have time to react, to close that distance in," he said. "I think any football player in America would like to have four-and-a-half seconds to get to the quarterback without any of the offensive players."




An expert shooter like a police officer can switch magazines in less than two seconds. But for a nervous, scared adolescent, it would take much longer, Johnson said, which can be crucial.


During the Tucson, Ariz., attack on Rep. Gabby Giffords, gunman Jared Loughner was wrestled down when he stopped shooting to reload his 9-millimeter pistol.


During the Aurora, Colo., movie theater shooting spree last July, police say James Holmes' assault came to an end when his semi-automatic rifle jammed.


"As we've seen in America today, there have been several attacks where that reload is vital," Johnson said. "Tragically, in the shooting of a congresswoman, the reload was instrumental.


"We've also seen this in Baltimore County, in a school shooting that we had, where the reload became very instrumental in allowing the teacher to actually tackle a student that was trying to reload a double-barreled shotgun," he said.


Last week at Sandy Hook Elementary School in Newtown, Conn., police believe Adam Lanza was armed with high-capacity magazines. He fired at least 30 times before having to stop to reload.


Johnson said there is no reason that the general public should have access to high-capacity magazines.


"I have to advise you that even for law enforcement, 100-round magazines, 50-round magazines, have no place for law enforcement," Johnson said. "Certainly, we believe that limiting a magazine to 10 rounds, what was in place from '94 to 2004, is wise and certainly could save lives in America."



Read More..

Human hands evolved so we could punch each other









































Forget toolmaking, think fisticuffs. Did evolution shape our hands not for dexterity but to form fists so we could punch other people? That idea emerges from a new study, although it runs counter to conventional wisdom.











About the same time as we stopped hanging from trees and started walking upright, our hands become short and square, with opposable thumbs. These anatomical changes are thought to have evolved for tool manipulation, but David Carrier at the University of Utah in Salt Lake City has an alternative explanation.













He says there are several possible hand shapes that would have allowed greater dexterity, making it less clear why we ended up with the hands we have. But only one hand shape lets us make a fist with a thumb as buttress.












Among primates' hands, ours is unique for its ability to form a fist with the thumb outside the fingers. The fingers of other primates' hands are too long to curl into their palms, and their thumbs are too short to reach across the fingers. So when apes fight, they are far more likely to wrestle or hold their opponent down while others stomp on him, says Carrier.












To test the importance of fists, Carrier and his colleagues recruited 10 athletes and measured how hard they could hit a punching bag using a normal fist, a fist with the thumb stuck out, and with an open palm.












The athletes could generate more than twice the force with a normal fist as with the thumb-stuck-out fist, because of thumb's buttressing role. There was no difference in the force they could generate with a normal fist and with an open palm, but Carrier says it's possible that a fist concentrates the force into a smaller area and so does more damage.











Cause or effect?













Mary Marzke of Arizona State University in Tempe says the study is interesting, but it far from proves that the ability to make a strong fist was the main driver behind the evolution of our hands' shape. It is more likely that it was a useful side effect of a whole suite of modifications.












She points out that apes strike with the heel of their hand when knocking fruit out of trees. Carrier's study didn't assess the force that the heel of the hand generates, but if it turns out to be as good as a fist, it becomes less clear that our hands evolved so as to be perfect for fist-making, Marzke says.











But if the hypothesis is true, Carrier thinks it could explain another mystery. It has long been unclear why high levels of testosterone cause men's ring fingers to be longer than their index fingers. He says the finger-length ratio makes sense if it generates a better fist. This would make dominant males even better fighters.













Journal reference: Journal of Experimental Biology, doi:10.1242/jeb.075713


















































If you would like to reuse any content from New Scientist, either in print or online, please contact the syndication department first for permission. New Scientist does not own rights to photos, but there are a variety of licensing options available for use of articles and graphics we own the copyright to.




































All comments should respect the New Scientist House Rules. If you think a particular comment breaks these rules then please use the "Report" link in that comment to report it to us.


If you are having a technical problem posting a comment, please contact technical support.








Read More..