['describes'] is in these articles:
- Could stem cell treatments change your DNA? This article describes a bone marrow stem cell transplant that appears to have given on person a second set of DNA. 
- 301 Inkjet Tips and Techniques, ISBN: 978-1598632040, is a book that describes how to get the most from your inkjet printer.
pet-dog (sort of like the Sony Abio)
to completely remove noise from your photos, this article describes
a technique whereby two exposures are made of a scene, the exposures
are separated by a 4 F-stop gap and then the darker areas of the first
photo graph (which are underexposed and noisy) are blended with the
second photograph (where they received 4 F-stops more light). The end
result is to eliminate "noise in the shadows". I thought this was the
process that others were calling "high dynamic range" photography.
- fibra (home page here) is a package that provides cooperative concurrency using Python generators. This article describes it as a task scheduling module. A benchmark comparison (graph here) of Stackless, Kamaelia and Fibra. Improving the handling of exceptions in fibra. Some thoughts on generator co-routines and Kamaelia components. 
Damn Small Linux,
at the 50MB image. This artical describes using
it to revive older computers (discussed
on Slashdot, and again).
- Mantissa: and Alternative to LAMP describes the new Mantissa web stack for the Python Twisted environment. A quick set up guide for Mantissa is here. 
- Cheap binary Windows eggs describes how to set up the MingW compiler to build eggs for Python 2.4. 
- Could the Python import mechanism be broken beyond repair? I can't say I have really had to struggle with it to the extent this article describes, so I'm probably in the large group who find it does the right thing most of the time and in the rare cases it causes problems some thought (and perhaps recoding) is enough to avoid the issue. Still, I would not argue against a better design where even the edge cases work easily. 
- DARPA has released a report (discussed here on Slashdot) that describes some of their strategic research programs, there's some neat stuff including a number of projects related to vaccines and first aid.  
- Bruce Schneier describes the concept of self-enforcing protocols, which can be applied to real-world problems like sales tax cheating and voting fraud. 
- The Amazon EC2 cloud computing service has been used to crack PGP passwords through brute force key searching. This article describes the general process and some details of how to setup the EC2 machine images. A followup article examines the cost to crack passwords of different sizes (and complexities) using this technique. Based on an opponent spending a few thousand dollars a password of 8 characters or less is not safe unless it uses more than just upper and lower case letters and numbers. The good thing is that a password using only lower case letters and numbers would cost $75M to crack this way if it was 12 characters long (and this rises massively with just one more character), so passwords still don't have to be massively long. This gets further discussion here on Slashdot. 
['describes'] is in these pages: