Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Science

A Brain Implant For Synthetic Memory 87

the_newsbeagle (2532562) writes "People who have experienced traumatic brain injuries sometimes lose the ability to form new memories or recall old ones. Since many veterans of Iraq and Afghanistan suffered TBIs, the U.S. military is funding research on an implantable device that could do the job of damaged brain cells." Lofty goals: "To start, DARPA will support the development of multi-scale computational models with high spatial and temporal resolution that describe how neurons code declarative memories — those well-defined parcels of knowledge that can be consciously recalled and described in words, such as events, times, and places. Researchers will also explore new methods for analysis and decoding of neural signals to understand how targeted stimulation might be applied to help the brain reestablish an ability to encode new memories following brain injury. ... Building on this foundational work, researchers will attempt to integrate the computational models ... into new, implantable, closed-loop systems able to deliver targeted neural stimulation that may ultimately help restore memory function."
Education

Interviews: Ask Juan Gilbert About Human-Centered Computing 30

Awarded the first Presidential Endowed Chair at Clemson University, and being named a Fellow of the American Association for the Advancement of Science (AAAS), are just a couple of Juan Gilbert's more noteworthy honors. Juan is the Associate Chair of Research in the Computer & Information Science & Engineering Department at the University of Florida where he leads the Human Centered Computing Lab. With the help of students, the lab works on a variety of issues, including electronic voting, automotive user interfaces, advanced learning technologies, culturally relevant computing or ethnocomputing, and databases and data analytics. Dr. Gilbert has agreed to answer any questions you might have about computing and affecting society through accessible technologies. As usual, ask as many as you'd like, but please, one question per post.
Privacy

Meet the Muslim-American Leaders the FBI and NSA Have Been Spying On 223

Advocatus Diaboli (1627651) writes The National Security Agency and FBI have covertly monitored the emails of prominent Muslim-Americans — including a political candidate and several civil rights activists, academics, and lawyers — under secretive procedures intended to target terrorists and foreign spies. From the article: "The individuals appear on an NSA spreadsheet in the Snowden archives called 'FISA recap.' Under that law, the Justice Department must convince a judge with the top-secret Foreign Intelligence Surveillance Court that there is probable cause to believe that American targets are not only agents of an international terrorist organization or other foreign power, but also 'are or may be' engaged in or abetting espionage, sabotage, or terrorism. The authorizations must be renewed by the court, usually every 90 days for U.S. citizens. ... The five Americans whose email accounts were monitored by the NSA and FBI have all led highly public, outwardly exemplary lives. All five vehemently deny any involvement in terrorism or espionage, and none advocates violent jihad or is known to have been implicated in any crime, despite years of intense scrutiny by the government and the press. Some have even climbed the ranks of the U.S. national security and foreign policy establishments."
Networking

Alcatel-Lucent's XG-FAST Pushes 10,000Mbps Over Copper Phone Lines 149

Mark.JUK (1222360) writes The Bell Labs R&D division of telecoms giant Alcatel-Lucent has today claimed to set a new world record after they successfully pushed "ultra-broadband" speeds of 10,000 Megabits per second (Mbps) down a traditional copper telephone line using XG-FAST technology, which is an extension of G.fast (ITU G.9700).

G.fast is a hybrid-fiber technology, which is designed to deliver Internet speeds of up to 1000Mbps over runs of copper cable (up to around 250 meters via 106MHz+ radio spectrum). The idea is that a fiber optic cable is taken closer to homes and then G.fast works to deliver the last few meters of service, which saves money because the operator doesn't have to dig up your garden to lay new cables. XG-FAST works in a similar way but via an even shorter run of copper and using frequencies of up to 500MHz. For example, XG-FAST delivered its top speed of 10,000Mbps by bonding two copper lines together over just 30 meters of cable.
United States

DHS Mistakenly Releases 840 Pages of Critical Infrastructure Documents 50

wiredmikey (1824622) writes The Operation Aurora attack was publicized in 2010 and impacted Google and a number of other high-profile companies. However, DHS responded to the request by releasing more than 800 pages of documents related to the 'Aurora' experiment conducted several years ago at the Idaho National Laboratory, where researchers demonstrated a way to damage a generator via a cyber-attack. Of the documents released by the DHS, none were related to the Operation Aurora cyber attack as requested. Many of the 840 pages are comprised of old weekly reports from the DHS' Control System Security Program (CSSP) from 2007. Other pages that were released included information about possible examples of facilities that could be vulnerable to attack, such as water plants and gas pipelines.
Science

Physicists Spot Potential Source of 'Oh-My-God' Particles 144

sciencehabit (1205606) writes For decades, physicists have sought the sources of the most energetic subatomic particles in the universe — cosmic rays that strike the atmosphere with as much energy as well-thrown baseballs. Now, a team working with the Telescope Array, a collection of 507 particle detectors covering 700 square kilometers of desert in Utah, has observed a broad 'hotspot' in the sky in which such cosmic rays seem to originate. Although not definitive, the observation suggests the cosmic rays emanate from a distinct source near our galaxy and not from sources spread all over the universe.
Programming

Normal Humans Effectively Excluded From Developing Software 608

theodp (442580) writes Over at Alarming Development, Jonathan Edwards has an interesting rant entitled Developer Inequality and the Technical Debt Crisis. The heated complaints that the culture of programming unfairly excludes some groups, Edwards feels, is a distraction from a bigger issue with far greater importance to society.

"The bigger injustice," Edwards writes, "is that programming has become an elite: a vocation requiring rare talents, grueling training, and total dedication. The way things are today if you want to be a programmer you had best be someone like me on the autism spectrum who has spent their entire life mastering vast realms of arcane knowledge — and enjoys it. Normal humans are effectively excluded from developing software. The real injustice of developer inequality is that it doesn't have to be this way." Edwards concludes with a call to action, "The web triumphalists love to talk about changing the world. Well if you really want to change the world, empower regular people to build web apps. Disrupt web programming! Who's with me?" Ed Finkler, who worries about his own future as a developer in The Developer's Dystopian Future, seconds that emotion. "I think about how I used to fill my time with coding," Finkler writes. "So much coding. I was willing to dive so deep into a library or framework or technology to learn it. My tolerance for learning curves grows smaller every day. New technologies, once exciting for the sake of newness, now seem like hassles. I'm less and less tolerant of hokey marketing filled with superlatives. I value stability and clarity."
The Courts

Climate Change Skeptic Group Must Pay Damages To UVA, Michael Mann 497

ideonexus (1257332) writes In January of 2014, the American Traditions Institute (ATI) sought climate scientist Micheal Mann's emails from his time at the University of Virginia, a request that was denied in the courts. Now the Virginia Supreme Court has upheld a lower court ruling that ATI must pay damages for filing a frivolous lawsuit. Thus ends "Climategate." Hopefully.

Submission + - Climate Change Skeptic Group Must Pay Damages to UVA, Michael Mann (southernstudies.org)

ideonexus writes: In January of 2014, the American Traditions Institute (ATI) sought Climate Scientist Micheal Mann's emails from his time at the University of Virginia (UVA), a request that was denied in the courts. Now the Virginia Supreme court has upheld a lower court ruling that ATI must pay damages for filing a frivolous lawsuit.

Submission + - TEPCO planning to use Windows XP up to 2019

AmiMoJo writes: TEPCO, operator of the stricken Fukushima nuclear plant, plans to continue using 48,000 copies of Windows XP until 2018-19, when they will be replaced. The Japanese government has urged companies in charge of critical infrastructure to upgrade from XP due to the risk of cyberattack. When asked about potential problems TEPCO said that it has "taken technical measures of various kinds", but declined to detail them "for security reasons."

Submission + - Straight-up operant conditioning (theguardian.com)

An anonymous reader writes: When the University of Victoria in Canada opened a new campus bike centre in the parkade located under the University Centre last November, motion-activated doors were installed to discourage swallows from nesting in the new facility. But when the swallows returned to their familiar nest sites a few weeks ago, they were undeterred by this peculiar impediment: they quickly learned how to open the doors by flying in front of the infrared motion detector, as you see in this video:

Submission + - UK told to charge electronic devices for screening. (bbc.co.uk)

gridl0ck writes: UK has been advised that certain flights out of UK require your electronic device to be charged in order for it to be screened. US has been identified as one of the paths which now require devices such as tablets and phones to be charged in order for them to be vetted. What happens if you don't? You either rebook your flight for a later date or leave your device which may be expensive at the airport. You can then collect it on return or have it posted to another address. Wonder if they provide insurance in case the device is stolen or damaged.

Submission + - How Google Map Hackers Can Destroy a Business at Will (wired.com)

An anonymous reader writes: Wired reports, "Beneath its slick interface and crystal clear GPS-enabled vision of the world, Google Maps roils with local rivalries, score-settling, and deception. Maps are dotted with thousands of spam business listings for nonexistent locksmiths and plumbers. Legitimate businesses sometimes see their listings hijacked by competitors or cloned into a duplicate with a different phone number or website. In January, someone bulk-modified the Google Maps presence of thousands of hotels around the country, changing the website URLs to a commercial third-party booking site ... Small businesses are the usual targets. .... These attacks happen because Google Maps is, at its heart, a massive crowdsourcing project, a shared conception of the world that skilled practitioners can bend and reshape in small ways using tools like Google’s Mapmaker or Google Places for Business. .... Google has gotten much better at policing malicious edits, to the point where they’re rare today. ... The system has loopholes though, and troves of money-hungry spammers looking for weaknesses. In February, an SEO consultant-turned-whistleblower named Bryan Seely demonstrated the risk dramatically when he set up doppelganger Google Maps listings for the offices of the FBI and Secret Service. Seely channeled the incoming phone calls through to the real agencies while recording them. The stunt got a lot of attention. The Secret Service told Seely he was “a hero” for showing them the vulnerability."
Privacy

Blue Shield Leaks 18,000 Doctors' Social Security Numbers 74

itwbennett (1594911) writes "The Social Security numbers of roughly 18,000 California physicians and health-care providers were inadvertently made public after a slip-up at health insurance provider Blue Shield of California, the organization said Monday. The numbers were included in monthly filings on medical providers that Blue Shield is required to make to the state's Department of Managed Health Care (DMHC). The provider rosters for February, March and April 2013 included the SSNs and other sensitive information and were available under the state's public records law." Ten copies were requested under the public records law.

Slashdot Top Deals

"No matter where you go, there you are..." -- Buckaroo Banzai

Working...