Scientific American reports, based on a study published today in Nature, that ZMapp, the drug that has been used to treat seven patients during the current Ebola epidemic in West Africa, can completely protect monkeys against the virus, research has found. ... The drug — a cocktail of three purified immune proteins, or monoclonal antibodies, that target the Ebola virus — has been given to seven people: two US and three African health-care workers, a British nurse and a Spanish priest. The priest and a Liberian health-care worker who got the drug have since died. There is no way to tell whether ZMapp has been effective in the patients who survived, because they received the drug at different times during the course of their disease and received various levels of medical care.
NPR also has an interview with study lead Gary Kobinger, who says that (very cautious) human trials are in the works, and emphasizes the difficulites of producing the drug in quantity.
Foreign Policy has an in-depth look at the contents of a laptop reportedly seized this year in Syria from a stronghold of the organization now known as the Islamic State, and described as belonging to a Tunisian national ("Muhammed S."). The "hidden documents" folder of the machine, says the report, contained a vast number of documents, including ones describing and justifying biological weapons:
The laptop's contents turn out to be a treasure trove of documents that provide ideological justifications for jihadi organizations -- and practical training on how to carry out the Islamic State's deadly campaigns. They include videos of Osama bin Laden, manuals on how to make bombs, instructions for stealing cars, and lessons on how to use disguises in order to avoid getting arrested while traveling from one jihadi hot spot to another. ... The information on the laptop makes clear that its owner is a Tunisian national named Muhammed S. who joined ISIS in Syria and who studied chemistry and physics at two universities in Tunisia's northeast. Even more disturbing is how he planned to use that education: The ISIS laptop contains a 19-page document in Arabic on how to develop biological weapons and how to weaponize the bubonic plague from infected animals. ... "The advantage of biological weapons is that they do not cost a lot of money, while the human casualties can be huge," the document states.
An anonymous reader writes: It's the year 2014, and I still have a floppy drive installed on my computer. I don't know why; I don't own any floppy disks, and I haven't used one in probably a decade. But every time I put together a PC, it feels incomplete if I don't have one. I also have a Laserdisc player collecting dust at the bottom of my entertainment center, and I still use IRC to talk to a few friends. Software, hardware, or otherwise, what technology have you had a hard time letting go? (I don't want to put a hard limit on age, so you folks using flip-phones or playing on Dreamcasts or still inexplicably coding in Perl 4, feel free to contribute.)
An anonymous reader writes: A study of 50,000 people in Italy has found the impact of social networking on individual welfare to be "significantly negative." The researchers found that improvements in self-reported well-being occurred when online networking led to face-to-face interactions, but this effect was overwhelmed by the perceived losses in well-being (PDF) generated by interaction strictly through social networks. The researchers "highlight the role of discrimination and hate speech on social media which they say play a significant role in trust and well-being. Better moderation could significantly improve the well-being of the people who use social networks, they conclude."
mdsolar sends this report from Symmetry Magazine:
Cosmic rays can help scientists do something no one else can: safely image the interior of the nuclear reactors at the Fukushima Daiichi plant. ... [M]uon tomography is similar to taking an X-ray, only it uses naturally produced muons. These particles don't damage the imaged materials and, because they already stream through everything on Earth, they can be used to image even the most sensitive objects. Better yet, a huge amount of shielding is needed to stop muons from passing through an object, making it nearly impossible to hide from muon tomography. ... By determining how muons scatter as they interact with electrons and nuclei within the item, the team's software creates a three-dimensional picture of what's inside. ... To prove the technology, the Los Alamos team shipped a demo detector system to a small, working nuclear reactor in a Toshiba facility in Kawasaki, Japan. There, they placed one detector on either side of the reactor core. "When we analyzed our data we discovered that in addition to the fuel in the reactor core, they had put a few fuel bundles off to the side that we didn't know about," says Morris. "They were really impressed that not only could we image the core, but that we also found those bundles."
Trailrunner7 writes: Mozilla is planning to add support for public-key pinning in its Firefox browser in an upcoming version. In version 32, which would be the next stable version of the browser, Firefox will have key pins for a long list of sites, including many of Mozilla's own sites, all of the sites pinned in Google Chrome and several Twitter sites. Public-key pinning has emerged as an important defense against a variety of attacks, especially man-in-the-middle attacks and the issuance of fraudulent certificates. The function essentially ties a public key, or set of keys, issued by known-good certificate authorities to a given domain. So if a user's browser encounters a site that's presenting a certificate that isn't included in the set of pinned public keys for that domain, it will then reject the connection. The idea is to prevent attackers from using fake certificates in order to intercept secure traffic between a user and the target site.
mrspoonsi sends this news from the BBC:
Fuji Xerox has developed a new robotic printer that can move around a lounge or office to bring documents to the person who printed them. The printer is designed to be used primarily in public places as a way to keep sensitive documents secure. Sensors on the machine prevent it from bumping into people on the way. However, some analysts argued that the idea was not cost effective when compared with other secure printing methods. Fuji Xerox — a joint venture between the two firms — has been testing the printer this month at a business lounge in Tokyo. Each desk in the lounge is given a unique web address from which to print. Users access the address and upload documents to be printed. Once the printer receives the job, it moves to the intended recipient who then has to display a smart card to activate printing.
crookedvulture writes: Intel has updated its high-end desktop platform with a new CPU-and-chipset combo. The Haswell-E processor has up to eight cores, 20MB of cache, and 40 lanes of PCI Express 3.0. It also sports a quad-channel memory controller primed for next-gen DDR4 modules. The companion X99 chipset adds a boatload of I/O, including 10 SATA ports, native USB 3.0 support, and provisions for M.2 and SATA Express storage devices. Thanks to the extra CPU cores, performance is much improved in multithreaded applications. Legacy comparisons, which include dozens of CPUs dating back to 2011, provide some interesting context for just how fast the new Core i7-5960X really is. Intel had to dial back the chip's clock speeds to accommodate the extra cores, though, and that concession can translate to slower gaming performance than Haswell CPUs with fewer, faster cores. Haswell-E looks like a clear win for applications that can exploit its prodigious CPU horsepower and I/O bandwidth, but it's clearly not the best CPU for everything.
Reviews also available from Hot Hardware, PC Perspective, AnandTech, Tom's Hardware, and HardOCP.
msm1267 writes: The IEEE's Center for Secure Design debuted its first report this week, a guidance for software architects called "Avoiding the Top 10 Software Security Design Flaws." Developing guidance for architects rather than developers was a conscious effort the group made in order to steer the conversation around software security away from exclusively talking about finding bugs toward design-level failures that lead to exploitable security vulnerabilities. The document spells out the 10 common design flaws in a straightforward manner, each with a lengthy explainer of inherent weaknesses in each area and how software designers and architects should take these potential pitfalls into consideration.
Rick Zeman writes: The Center for Public Integrity has a comprehensive article showing how Big Telecom (aka, AT&T, Comcast, Charter, Time Warner) use lobbyists, paid-for politicians, and lawsuits (both actual and the threat thereof) in their efforts to kill municipal broadband. From the article: "The companies have also used traditional campaign tactics such as newspaper ads, push polls, direct mail and door-to-door canvassing to block municipal networks. And they've tried to undermine the appetite for municipal broadband by paying for research from think tanks and front groups to portray the networks as unreliable and costly."
sciencehabit writes: Our memories are annoyingly glitchy. Names, dates, birthdays, and the locations of car keys fall through the cracks, losses that accelerate at an alarming pace with age and in neurodegenerative diseases. Now, by applying electromagnetic pulses through the skull to carefully targeted brain regions, researchers have found a way to boost memory performance in healthy people. The new study (abstract) sheds light on the neural networks that support memories and may lead to therapies for people with memory deficits, researchers say.
Similar studies have been performed using electric current.
An anonymous reader writes: Caffeine is a staple of most workplaces — it's rare to find an office without a coffee pot or a fridge full of soda. It's necessary (or at least feels like it's necessary) because many workers have a hard time staying awake while sitting at a desk for hours at a time, and the alternative — naps — aren't usually allowed. But new research shows it might be more efficient for employers to encourage brief "coffee naps," which are more effective at returning people to an alert state than either caffeine or naps alone. A "coffee nap" is when you drink a cup of coffee, and then take a sub-20-minute nap immediately afterward. This works because caffeine takes about 20 minutes to get into your bloodstream, and a 20-minute nap clears adenosine from your brain without putting you into deeper stages of sleep. In multiple studies, tired participants who took coffee naps made fewer mistakes in a driving simulator after they awoke than the people who drank coffee without a nap or slept without ingesting caffeine.
An anonymous reader writes: On August 6, U.S. District Judge Anthony Trenga ordered the federal government to "explain why the government places U.S. citizens who haven't been convicted of any violent crimes on its no-fly database." Unsurprisingly, the federal government objected to the order, once more claiming that to divulge their no-fly list criteria would expose state secrets and thus pose a national security threat. When the judge said he would read the material privately, the government insisted that reading the material "would not assist the Court in deciding the pending Motion to Dismiss (PDF) because it is not an appropriate means to test the scope of the assertion of the State Secrets privilege." The federal government has until September 7 to comply with the judge's order unless the judge is swayed by the government's objection.
rtoz writes: Google's research division, Google X, is developing a fleet of drones to deliver goods. This drone delivery system is called "Project Wing," and Google X has been developing it in secret for the past two years. During a recent test in Australia, drones successfully delivered a first aid kit, candy bars, dog treats, and water to a couple of Australian farmers. The self-flying vehicle uses four electrically-driven propellers to get around, and it has a wingspan of about five feet. It weighs just under 19 pounds and can take off and land without a runway. Google's long-term goal is to develop drones that could be used for disaster relief by delivering aid to isolated areas.
snydeq writes Microsoft has re-released its botched MS14-045/KB 2982791 'Blue Screen 0x50' patch, only to introduce more problems, InfoWorld's Woody Leonhard reports. "Even by Microsoft standards, this month's botched Black Tuesday Windows 7/8/8.1 MS14-045 patch hit a new low. The original patch (KB 2982791) is now officially 'expired' and a completely different patch (KB 2993651) offered in its stead; there are barely documented revelations of new problems with old patches; patches that have disappeared; a 'strong' recommendation to manually uninstall a patch that went out via Automatic Update for several days; and an infuriating official explanation that raises serious doubts about Microsoft's ability to support Windows 9's expected rapid update pace."
Zothecula writes No one with red blood in their veins buys a sports car and hands the keys to a chauffeur, so one of the barriers to truly personal submarining has long been the need for a trained pilot, not to mention the massive logistics involved in transporting, garaging and launching the underwater craft ... until now. Pioneering underwater aviation company DeepFlight is set to show an entirely new type of personal submarine at the 2014 Monaco Yacht Show next week, launching the personal submarine era with a submersible that's reportedly so easy to pilot that it's likely to create a new niche in the tourism and rental market.
angry tapir writes The Australian Competition and Consumer Commission, a government funded watchdog organization, is taking Valve to court. The court action relates to Valve's Steam distribution service. According to ACCC allegations, Valve misled Australian consumers about their rights under Australian law by saying that customers were not entitled to refunds for games under any circumstances.
Andreas Kolbe writes Wikipedia is well known to have a very large gender imbalance, with survey-based estimates of women contributors ranging from 8.5% to around 16%. This is a more extreme gender imbalance than even that of Reddit, the most male-dominated major social media platform, and it has a palpable effect on Wikipedia content. Moreover, Wikipedia editor survey data indicate that only 1 in 50 respondents is a mother – a good proportion of female contributors are in fact minors, with women in their twenties less likely to contribute to Wikipedia. Wikimedia Foundation efforts to address this "gender gap" have so far remained fruitless. Wikipedia's demographic pattern stands in marked contrast to female-dominated social media sites like Facebook and Pinterest, where women aged 18 to 34 are particularly strongly represented. It indicates that it isn't lack of time or family commitments that keep women from contributing to Wikipedia – women simply find other sites more attractive. Wikipedia's user interface and its culture of anonymity may be among the factors leading women to spend their online time elsewhere.