Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Biotech

Anti-Ebola Drug ZMapp Makes Clean Sweep: 18 of 18 Monkeys Survive Infection 91

Scientific American reports, based on a study published today in Nature, that ZMapp, the drug that has been used to treat seven patients during the current Ebola epidemic in West Africa, can completely protect monkeys against the virus, research has found. ... The drug — a cocktail of three purified immune proteins, or monoclonal antibodies, that target the Ebola virus — has been given to seven people: two US and three African health-care workers, a British nurse and a Spanish priest. The priest and a Liberian health-care worker who got the drug have since died. There is no way to tell whether ZMapp has been effective in the patients who survived, because they received the drug at different times during the course of their disease and received various levels of medical care. NPR also has an interview with study lead Gary Kobinger, who says that (very cautious) human trials are in the works, and emphasizes the difficulites of producing the drug in quantity.
Technology

Ask Slashdot: What Old Technology Can't You Give Up? 635

An anonymous reader writes: It's the year 2014, and I still have a floppy drive installed on my computer. I don't know why; I don't own any floppy disks, and I haven't used one in probably a decade. But every time I put together a PC, it feels incomplete if I don't have one. I also have a Laserdisc player collecting dust at the bottom of my entertainment center, and I still use IRC to talk to a few friends. Software, hardware, or otherwise, what technology have you had a hard time letting go? (I don't want to put a hard limit on age, so you folks using flip-phones or playing on Dreamcasts or still inexplicably coding in Perl 4, feel free to contribute.)
Science

Particle Physics To Aid Nuclear Cleanup 35

mdsolar sends this report from Symmetry Magazine: Cosmic rays can help scientists do something no one else can: safely image the interior of the nuclear reactors at the Fukushima Daiichi plant. ... [M]uon tomography is similar to taking an X-ray, only it uses naturally produced muons. These particles don't damage the imaged materials and, because they already stream through everything on Earth, they can be used to image even the most sensitive objects. Better yet, a huge amount of shielding is needed to stop muons from passing through an object, making it nearly impossible to hide from muon tomography. ... By determining how muons scatter as they interact with electrons and nuclei within the item, the team's software creates a three-dimensional picture of what's inside. ... To prove the technology, the Los Alamos team shipped a demo detector system to a small, working nuclear reactor in a Toshiba facility in Kawasaki, Japan. There, they placed one detector on either side of the reactor core. "When we analyzed our data we discovered that in addition to the fuel in the reactor core, they had put a few fuel bundles off to the side that we didn't know about," says Morris. "They were really impressed that not only could we image the core, but that we also found those bundles."
Printer

Robot Printer Brings Documents To Your Desk 64

mrspoonsi sends this news from the BBC: Fuji Xerox has developed a new robotic printer that can move around a lounge or office to bring documents to the person who printed them. The printer is designed to be used primarily in public places as a way to keep sensitive documents secure. Sensors on the machine prevent it from bumping into people on the way. However, some analysts argued that the idea was not cost effective when compared with other secure printing methods. Fuji Xerox — a joint venture between the two firms — has been testing the printer this month at a business lounge in Tokyo. Each desk in the lounge is given a unique web address from which to print. Users access the address and upload documents to be printed. Once the printer receives the job, it moves to the intended recipient who then has to display a smart card to activate printing.
Security

IEEE Guides Software Architects Toward Secure Design 51

msm1267 writes: The IEEE's Center for Secure Design debuted its first report this week, a guidance for software architects called "Avoiding the Top 10 Software Security Design Flaws." Developing guidance for architects rather than developers was a conscious effort the group made in order to steer the conversation around software security away from exclusively talking about finding bugs toward design-level failures that lead to exploitable security vulnerabilities. The document spells out the 10 common design flaws in a straightforward manner, each with a lengthy explainer of inherent weaknesses in each area and how software designers and architects should take these potential pitfalls into consideration.
The Internet

How Big Telecom Smothers Municipal Broadband 111

Rick Zeman writes: The Center for Public Integrity has a comprehensive article showing how Big Telecom (aka, AT&T, Comcast, Charter, Time Warner) use lobbyists, paid-for politicians, and lawsuits (both actual and the threat thereof) in their efforts to kill municipal broadband. From the article: "The companies have also used traditional campaign tactics such as newspaper ads, push polls, direct mail and door-to-door canvassing to block municipal networks. And they've tried to undermine the appetite for municipal broadband by paying for research from think tanks and front groups to portray the networks as unreliable and costly."
Google

Google Testing Drone Delivery System: 'Project Wing' 52

rtoz writes: Google's research division, Google X, is developing a fleet of drones to deliver goods. This drone delivery system is called "Project Wing," and Google X has been developing it in secret for the past two years. During a recent test in Australia, drones successfully delivered a first aid kit, candy bars, dog treats, and water to a couple of Australian farmers. The self-flying vehicle uses four electrically-driven propellers to get around, and it has a wingspan of about five feet. It weighs just under 19 pounds and can take off and land without a runway. Google's long-term goal is to develop drones that could be used for disaster relief by delivering aid to isolated areas.
Microsoft

Microsoft Releases Replacement Patch With Two Known Bugs 140

snydeq writes Microsoft has re-released its botched MS14-045/KB 2982791 'Blue Screen 0x50' patch, only to introduce more problems, InfoWorld's Woody Leonhard reports. "Even by Microsoft standards, this month's botched Black Tuesday Windows 7/8/8.1 MS14-045 patch hit a new low. The original patch (KB 2982791) is now officially 'expired' and a completely different patch (KB 2993651) offered in its stead; there are barely documented revelations of new problems with old patches; patches that have disappeared; a 'strong' recommendation to manually uninstall a patch that went out via Automatic Update for several days; and an infuriating official explanation that raises serious doubts about Microsoft's ability to support Windows 9's expected rapid update pace."
United States

The Executive Order That Led To Mass Spying, As Told By NSA Alumni 180

An anonymous reader writes with this Ars piece about the executive order that is the legal basis for the U.S. government's mass spying on citizens. One thing sits at the heart of what many consider a surveillance state within the US today. The problem does not begin with political systems that discourage transparency or technologies that can intercept everyday communications without notice. Like everything else in Washington, there's a legal basis for what many believe is extreme government overreach—in this case, it's Executive Order 12333, issued in 1981. “12333 is used to target foreigners abroad, and collection happens outside the US," whistleblower John Tye, a former State Department official, told Ars recently. "My complaint is not that they’re using it to target Americans, my complaint is that the volume of incidental collection on US persons is unconstitutional.” The document, known in government circles as "twelve triple three," gives incredible leeway to intelligence agencies sweeping up vast quantities of Americans' data. That data ranges from e-mail content to Facebook messages, from Skype chats to practically anything that passes over the Internet on an incidental basis. In other words, EO 12333 protects the tangential collection of Americans' data even when Americans aren't specifically targeted—otherwise it would be forbidden under the Foreign Intelligence Surveillance Act (FISA) of 1978.

Submission + - Microsoft Ships Replacement Patch With Two Known Bugs 1

snydeq writes: Microsoft has re-released its botched MS14-045/KB 2982791 'Blue Screen 0x50' patch, only to introduce more problems, InfoWorld's Woody Leonhard reports. 'Even by Microsoft standards, this month's botched Black Tuesday Windows 7/8/8.1 MS14-045 patch hit a new low. The original patch (KB 2982791) is now officially "expired" and a completely different patch (KB 2993651) offered in its stead; there are barely documented revelations of new problems with old patches; patches that have disappeared; a "strong" recommendation to manually uninstall a patch that went out via Automatic Update for several days; and an infuriating official explanation that raises serious doubts about Microsoft's ability to support Windows 9's expected rapid update pace.'
Earth

Drought Inspires a Boom In Pseudoscience, From Rain Machines To 'Water Witches' 266

merbs (2708203) writes Across drought-stricken California, farmers are desperate for water. Now, many of them are calling dowsers. These "water witches," draped in dubious pseudoscience or self-assembled mythologies—or both—typically use divining rods and some sort of practiced intuition to "find" water. The professional variety do so for a fee. And business is booming. They're just part of a storied tradition of pseudoscientific hucksters exploiting our thirst for water, with everything from cloudbusters to rainmachines to New Age rituals.
Cellphones

Judge Lucy Koh Rejects Apple's Quest For Anti-Samsung Injunction 30

The Associated Press, in a story carried by The Financial Express, reports that Federal Judge Lucy Koh has has rejected Apple's attempt to block the sale of several older Samsung smartphones that copied features in the iPhone. Wednesday's rebuff comes nearly four months after a jury awarded Apple Inc. $119 million in damages for Samsung's infringements on technology used in the trend-setting iPhone. The amount was well below the $2.2 billion in damages that Apple had been seeking in the latest round of legal wrangling between the world's two leading smartphone makers since the tussle began four years ago. The Register also carries the story, and notes Perhaps because the ongoing battle was turning the two companies into law firms rather than tech titans, the two agreed to abandon all patent lawsuits outside the USA earlier this month. However, Apple still wanted the infringing features extirpated from American stores, and was seeking to have phones nobody bought banned as ammo for future battles.
PHP

PHP 5.6.0 Released 118

An anonymous reader writes The PHP team has announced the release of PHP 5.6.0. New features include constant scalar expressions, exponentiation using the ** operator, function and constant importing with the use keyword, support for file uploads larger than 2 GB, and phpdbg as an interactive integrated debugger SAPI. The team also notes important changes affecting compatibility. For example: "Array keys won't be overwritten when defining an array as a property of a class via an array literal," json_decode() is now more strict at parsing JSON syntax, and GMP resources are now objects. Here is the migration guide, the full change log, and the downloads page.

Slashdot Top Deals

You knew the job was dangerous when you took it, Fred. -- Superchicken

Working...