We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!
Dr. Tom (23206) writes "The National Institutes of Health (NIH) Research Festival, an annual event scheduled to be held next week, has been canceled. Bill Gates was to have delivered the opening keynote speech tomorrow (Monday):
David E. Barmes Global Health Lecture Bill Gates, Co-chair and Trustee of the Bill and Melinda Gates Foundation Masur Auditorium (Videocast Overflow in Lipsett Amphitheater)
Many of us at the NIH were looking forward to attending the lecture, which was to have been videocast across the NIH campus, and are also saddened that the actions of a small minority have been able to disrupt this celebration of medical science and research." top
Clipping news stories: AP wants to shut down news portal sites
Dr. Tom writes "The defendant in the case is Norway-based Meltwater, a service that monitors the internet for news about its clients. Its clients, which include companies and governments, pay thousands of dollars a year to receive news alerts and to search Meltwater’s database.
The Associated Press demanded Meltwater buy a license to distribute the story excerpts and, when the service refused, the AP sued it for copyright infringement. Meltwater said it’s fair use to clip and display news stories.
The issue, apparently, is that Meltwater charges for their service of aggregating news stories. Does fair use require that redistribution of stories be free? How about ads on those pages? If Meltwater got their revenue from ads---perhaps ads from their customers---would that be OK?" Link to Original Source top
Dr. Tom writes "The U.S. has deployed more than 11,000 military drones, up from fewer than 200 in 2002. They carry out a wide variety of missions while saving money and American lives. Within a generation they could replace most manned military aircraft, says John Pike, a defense expert at the think tank GlobalSecurity.org. Pike suspects that the F-35 Lightning II, now under development by Lockheed Martin, might be “the last fighter with an ejector seat, and might get converted into a drone itself.”
The weakest link is the pilot. A jet could pull 15 g's, out-turning any conventional aircraft, except it would kill the pilot. Is it time to stop spending billions on obsolete aircraft?" Link to Original Source top
Dr. Tom writes "Scientists at MIT and other labs have created transgenic neurons that fire when exposed to light. The technique targets specific cell types in live primates. They are already talking about the possibilities for therapy and behavior modification by optically stimulating specific brain circuits." Link to Original Source top
Dr. Tom writes "WHAT IS IT?
CDC users recently received bogus emails purported to be from
Jason.firstname.lastname@example.org with the Subject: Reference Data Request about
F-35. There are two attachments: JSF Fun Pod Planning.ppt and
These emails have been highly correlated with similar emails across the
government from the same originating IP address. The attachments contain
malicious code not detected by current antivirus patterns. CDC and HHS are
working with US-CERT on further investigation.
Similarly, U.S. Federal Court officials have warned that hackers are emailing
phony subpoenas embedded with malicious software to high-ranking executives to
steal valuable information. Some emails are crafted with the seal of the US
federal court in San Diego, California, and are addressed to executives using
their names, addresses and other individual details. Clicking on a link to see
a "subpoena" displays a realistic looking document and stealthily installs
malicious computer code in the reader's computer.
In other attacks, high ranking government and military officials have been sent
emails embedded with malicious software which appear to have been sent by
someone the receivers knows or contain a subject the receiver may recognize.
These emails are used to exploit the receiving computer once the attachment or
link is clicked."