This document provides an overview of microtomy and microtomes. It begins by defining microtomy as the technique of cutting thin tissue sections for pathological and histological studies. It then discusses the history and development of microtomy devices. The document outlines the key components and features of microtomes, including different knife types and sharpening methods. It describes the main types of microtomes such as rotary, sledge, vibrating, saw, laser, and freezing microtomes. Finally, it provides a brief overview of the tissue processing steps after receiving a sample, including grossing, fixation, dehydration, clearing, embedding, sectioning and slide preparation.
The use of the microtome and the science of microtomy remains key in histology and anatomical pathology. The microtomist ( A Biomedical Scientist) who cuts tissue at ultrathin microns) uses the microtome to aid diagnosis and improve research. This lecture note highlights different types of microtome and also discuses principles and troubleshooting
The use of the microtome and the science of microtomy remains key in histology and anatomical pathology. The microtomist ( A Biomedical Scientist) who cuts tissue at ultrathin microns) uses the microtome to aid diagnosis and improve research. This lecture note highlights different types of microtome and also discuses principles and troubleshooting
Microtomy is a method for the preparation of thin sections for materials such as bones, minerals and teeth, and an alternative to electropolishing and ion milling. Microtome sections can be made thin enough to section a human hair across its breadth, with section thickness between 50 nm and 100 μm
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
1. Maan singh - 0221600132
Drishti singh - 0151600132
Sattwik das - 02916001320
crotomy & Microtomes
Microtomy &
Microtomes
2. INTRODUCTION
What is microtomy ?
• Microtomy is the technique
of cutting tissues in very
thin sections.
• This technique is used for
pathological and
histological studies.
• “mikros” means “small”
“temnein” means “to cut”
• Microtome- an instrument
used to cut extremely
3. HISTORY OF MICROTOMY
At the beginning microscopy slides were prepared
manually using razor blades. Due to this histological
studies were hindered because of human error in
cutting of the sections.
The first microtomy device was invented by sir George
adams jr. and shortly later on developed by Alexander
cummings in 1770s .
The previously hand held design was later developed
to be a table based Andrew pichard in 1835 which
reduced vibrations.
The present day microtome we see was is a model that
was developed and presented by Wilhelm his sr. and
Wilhelm his
4. MICROTOME features
• Microtome is an instrument used for
microtomy procedures.
• Microtomes consist of various parts
such as knives, base (microtome
body), and material of tissue holder.
• Other features are mostly type specific,
some features are present on some and
absent on others.
6. KNIFETYPES
• Microtomes come in give various shapes –
I. planoconcave shape
II. biconcave shape
III. wedged shape
IV. chisel shape
• Based on material used blades can be distinguised into
four categories-
- steel, glass, diamond, disposable
8. • Bevel angle is the angle between the two facets of the
cutting edge.
• 27-32 degrees
• Smaller the bevel angle sharper the knife, but too low
bevel angle can cause elastic distortion of the edge.
• High rake angle and low clearance angle gives less
compression to tissue block.
9. MICROTOME SHARPENING
METHODS
• Microtome knives are sharpened via a two step method,
by manual and automatic means.
• Two steps- honing and stropping.
• Honing- grinding the cutting edge of the knife on a hard
abrasive surface to sharpen the knife.
• Stropping- process of polishing an already fairly
sharpened knife edge.
10.
11. TYPES OF MICROTOME
• Most popular types of microtome machines are listed
below
1. rotatory microtome
2. sledge microtome
3. vibrating microtome
4. saw microtome
5. laser microtome
6. Freezing microtome
12. ROTATORY MICROTOME
• The most frequently used version works in a rotating
manner.
• Machine body itself rotates around the blade.
• Produces tissue slices as thin as 1-60 micrometers.
This microtome
usually uses glass or
diamond knives
for cutting thin slices of
a given sample.
13. SLEDGE MICROTOME
• This microtome design Works by holding the sample still
in the “shuttle”, which then advances and retreats over
the blade.
• This design cuts tissues that are much tougher and are
therefore hard to slice .
• Majorly used to cut
bones
• and other difficult
material.
14. VIBRATING MICROTOME
• A vibrating blade is the defining characteristic of this
machine.
• This allows tough and hard samples to be cut without
applying the pressure that another mechanism, with a
stationary blade, would instill.
• This mechanism can produce sample slices
as thin as 30 – 50 micrometers.
15. SAW MICROTOME
• Similar to a sledge
design, this type of
microtome is used when
materials are extremely
hard, like bones or teeth,
and require more force.
• A rotating saw is used
to slice which can
produce slices that are,
at a minimum 30
micrometers thick.
16. LASER MICROTOME
• A laser is used for
precise cutting without
actually touching the
sample.
• this machine enables
non-contact slicing
without causing thermal
damage.
• This automatic
microtome design can
cut slices with thickness
ranging from 10-100
17. FREEZING MICROTOME
• the tissue sample is
frozen and maintained in a
frozen state with liquid carbon
dioxide. It is useful for (rapidly)
obtaining sections of unfixed
soft tissue.
• The freezing microtome is
equipped with a stage upon
which tissues can be quickly
frozen.
• The knife is moved, whereas
the cutting block is kept static.
18. Why liquid carbondioxide ?
Liquid nitrogen has an extremely low
specific heat constant. The result is that
the contact between liquid nitrogen and
the tissue causes a vapour barrier that
builds up next to the tissue and greatly
slows the penetration of cold into the
tissue.
19. TISSUE RECIEVING
• Tissue received in surgical pathology contains specimen
details and patient information.
• The samples are received fresh or in liquid preservative
such as formalin
20. GROSSING
• Grossing is the process in which pathology specimens
are examined and trimmed to proper size, best part is
selected for further microscopic examination to obtain
diagnostic information.
• The tissue is now placed in small cassettes which hold
the tissue in and allow the fluids through the slits to
bathe the tissue in the fluids.
21. TISSUE FIXATION AND
PROCESSING
• The objective of tissue processing is to stabilize the
tissues or cells and preserve their morphological,
anatomical and biochemical characteristics for accurate
diagnosis.
• To achieve this the tissue smears are usually immersed
in fixative solutions.
• Most commonly used fixative is 10% neutral buffered
formalin
22. DEHYDRATION
• Water is found In tissues as free and bound form.
• Tissues are processed to the embedding medium by
removing free water.
• To minimize tissue distortion or shrinkage from
dehydrant, delicate specimens are dehydrated in a
series of ethanol – from 10%, 20%, 50%, 95%, 100%
ethanol.
23. CLEARING
• Since ethanol ad paraffin are not miscible, alcohol must
be replaced by an organic solvent that is miscible with
both paraffin and alcohol.
• The tissues are usually put through three changes of the
clearing agent and transferred to paraffin
24. SAMPLE EMBEDDING
• Tissues from the processor are still in the cassettes, then
transferred manually into the embedding molds.
• Tissues must be aligned properly at the bottom of mold
ad the bottom part of cassette containing ascession
number need to place over the mold
• The mold and cassette are then filled with more wax.
• The paraffin the allowed to solidify by putting the
embedding molds on a refrigerated surface .
• Once the paraffin is solid, the entire block with the
cassette is popped out of the mold and the block is ready
for the thin sectioning using the microtome
25. SECTIONING
Once the paraffin has solidified the tissue block is removed
from the mold ad placed o the microtome.
In the microtome due to the friction between the knife and
the microtome enough heat is generated with the cutting
action allows the tissue section to adhere with each new
section and forms a ribbon of sections.
The ribbon is floated on warm water bath to remove any
compression and wrinkles in the tissue caused by the
cutting .
The desired section is picked upon a glass slide and is then
is kept away for drying.