New submitter tchernobog writes "An Italian team funded by Telethon and S. Raffaele of Milan, was able to cure six kids affected by lethal genetic diseases (in Italian, English video): the Wiskott-Aldrich syndrome and the metachromatic leukodystrophy. This is the culmination of a project lasted 15 years, and which cost more than 30M €; the researchers published some preliminary results last year in Nature, and are waiting for the results on more patients to submit another. The really interesting part is: they used a mix of advanced genetic techniques to achieve this result. Firstly, the DNA of a defective cell is corrected with a gene assembled in the lab. This procedure has been very dangerous for the past 20 years: that it can even be used is a good achievement alone. Secondly, the corrected DNA is propagated in the patient's body using a stripped-down version of HIV, of which less than 10% of its original genome remains. Might the feared HIV in reality prove to be salvation for some?"
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. ×
schwit1 writes with news that the U.S. Secretary of Homeland Security, Janet Napolitano, has resigned her post. Napolitano entered the office at the beginning of President Obama's first term, and she was only the third person to hold the position since it was created in response to the September 11th attacks. In a statement, she said the Department of Homeland Security "has improved the safety of travelers; implemented smart steps that make our immigration system more fair and focused while deploying record resources to protect our nation's borders; worked with states to build resiliency and make our nation's emergency and disaster response capabilities more robust; and partnered with the private sector to improve our cybersecurity." Napolitano will be taking over the presidency of the University of California's 10-campus education system. "UC officials believe that her Cabinet experiences –- which include helping to lead responses to hurricanes and tornadoes and overseeing some anti-terrorism measures — will help UC administer its federal energy and nuclear weapons labs and aid its federally funded research in medicine and other areas."
Koreantoast writes "As a recent Slashdot article showed, interest in Malcolm Gladwell's theory on the impact of culture on airline crashes has come up again following the tragic accident of Asiana Flight 214. Yet how good was Gladwell's analysis of the Korean Air Flight 801 accident which is the basis of his theory? A recent analysis by the popular Ask a Korean! blog shows serious flaws in Gladwell's presentation: ignorance of the power dynamics amongst the flight crew, mischaracterizations of Korean Air's flight accident record (three of the seven deadly incidents characterized as 'accidents' were actually military attacks or terrorism) and manipulative omissions in the pilot transcripts to falsely portray the situation. 'Even under the most kindly light, Gladwell is guilty of reckless and gross negligence. Under a harsher light, Gladwell's work on the connection between culture and plane crashes is a shoddy fraud.' Perhaps Gladwell should have asked a Korean before writing the chapter."
An anonymous reader writes "Australian telecommunications giant Telstra has for a decade been storing huge volumes of electronic communications carried between Asia and America for surveillance by U.S. intelligence agencies. This includes not just the metadata, but the actual content of emails, online messages and phone calls. With the blessing of the Australian government Telstra agreed to route data through a 'U.S. point of contact through a secure storage facility on U.S. soil that was staffed exclusively by U.S. citizens.' The contract was prompted by Telstra's decision to expand its business in Asia by taking control of hundreds of kilometers of undersea telecommunications cables. The deal started under the Liberal Party and continued under Labor. The Greens have demanded an explanation."
dcblogs writes "The number of electrical engineers in the workforce has declined over the last decade. It's not a steady decline, and it moves up and down, but the overall trend is not positive. In 2002 the U.S. had 385,000 employed electrical engineers; in 2004, post dot.com bubble, it was at 343,000. It reached 382,000 in 2006, but has not risen above 350,000 since then, according to U.S. Labor Data. In 2012, there were 335,000 electrical engineers in the workforce. Of the situation, one unemployed electrical engineer said: 'I am getting interviews but, they have numerous candidates to choose from. The employers are very fussy. They are really only interested in a perfect match to their needs. They don't want the cost to develop talent internally. They are even trying to combine positions to save money. I came across one employer trying to combine a mechanical and electrical engineer.'"
jfruh writes "M-Pesa is a wildly popular mobile payment system in Kenya, which allows citizens of a country with a poor banking infrastructure to easily transfer money to each other using ubiquitous dumbphones. Currently the system only works in the local currency, but there are plans afoot to allow users to transfer Bitcoin — which would help Kenyans working abroad send money back home without paying high international bank transfer fees."
PolygamousRanchKid writes "Pope Francis overhauled the laws that govern the Vatican City State on Thursday, criminalizing leaks of Vatican information and specifically listing sexual violence, prostitution and possession of child pornography as crimes against children that can be punished by up to 12 years in prison. But without the leaks, how would we find out about those crimes against children? Many of the new provisions were necessary to bring the city state's legal system up to date after the Holy See signed international treaties, such as the U.N. Convention on the Rights of the Child. Others were necessary to comply with international norms to fight money-laundering, part of the Vatican's push toward financial transparency. One new crime stands out, though, as an obvious response to the leaks of papal documents last year that represented one of the gravest Vatican security breaches in recent times. Paolo Gabriele, the butler for then-Pope Benedict XVI, was tried and convicted by a Vatican court of stealing Benedict's personal papers and giving them to an Italian journalist, Gianluigi Nuzzi. Using the documents, Nuzzi published a blockbuster book on the petty turf wars, bureaucratic dysfunction and allegations of corruption and homosexual liaisons that afflict the highest levels of Catholic Church governance. Gabriele, who said he wanted to expose the 'evil and corruption' that plagued the Holy See, was convicted of aggravated theft and sentenced to 18 months in the Vatican's police barracks."
redletterdave writes "Salty Dog 502 flew from the Patuxent River Naval Station in Maryland to the USS George H.W. Bush operating off the Virginian coast, but unlike other drones, Salty Dog was piloted entirely by computer without a human operator. The unmanned operation is considered one of the most difficult operations due to navigating the air and a moving ship, and many have said it's a major milestone in the development of drone warfare. Navy Secretary Ray Mabus described the event as witnessing the future and compared it to the first manned aircraft landed on a carrier in 1911."
Nerval's Lobster writes "For the second time in a month, Hewlett-Packard has been forced to admit it built secret backdoors into its enterprise storage products. The admission, in a security bulletin posted July 9, confirms reports from the blogger Technion, who flagged the security issue in HP's StoreOnce systems in June, before finding more backdoors in other HP storage and SAN products. The most recent statement from HP, following another warning from Technion, admitted that 'all HP StoreVirtual Storage systems are equipped with a mechanism that allows HP support to access the underlying operating system if permission and access is provided by the customer.' While HP describes the backdoors as being usable only with permission of the customer, that restriction is part of HP's own customer-service rules—not a limitation built in to limit use of backdoors. The entry points consist of a hidden administrator account with root access to StoreVirtual systems and software, and a separate copy of the LeftHand OS, the software that runs HP's StoreVirtual and HP P4000 products. Even with root access, the secret admin account does not give support techs or hackers access to data stored on the HP machines, according to the company. But it does provide enough access and control over the hardware in a storage cluster to reboot specific nodes, which would 'cripple the cluster,' according to information provided to The Register by an unnamed source. The account also provides access to a factory-reset control that would allow intruders to destroy much of the data and configurations of a network of HP storage products. And it's not hard to find: 'Open up your favourite SSH client, key in the IP of an HP D2D unit. Enter in yourself the username HPSupport, and the password which has a SHA1 of 78a7ecf065324604540ad3c41c3bb8fe1d084c50. Say hello to an administrative account you didn't know existed,' according to Technion, who claims to have attempted to notify HP for weeks with no result before deciding to go public."
adeelarshad82 writes "Nokia's new phone, Lumia 1020, feels very similar in the hand to Nokia's Lumia 900 and 920, with one exception: it has a camera bump. The 41-megapixel uber-camera projects out very slightly as a black disc on the back. In terms of functionality, though, the camera provides for smooth zooming only a pinch away. However, it takes a noticeable amount of time to lock focus and save images. At one point during hands-on testing, the camera app crashed so hard that it required a phone reboot, which is hopefully just a pre-release firmware issue. The phone itself carries a brightly colored polycarbonate body that rolls around the edges to cradle a 4.5-inch, 1,280-by-768 screen. Lumia 1020 is powered by a dual-core, 1.5-GHz Qualcomm MSM8960 processor which plows through apps well. Speaking of apps, there's a ton of bloatware on here, as you'd expect from any AT&T device. AT&T adds four apps right at the top of the app list. Nokia Lumia is set to hit AT&T shelves on July 26th for $299."
transporter_ii writes "So what does it cost the government to snoop on us? Paid for by U.S. tax dollars, and with little scrutiny, surveillance fees charged by phone companies can vary wildly. For example, AT&T, imposes a $325 'activation fee' for each wiretap and $10 a day to maintain it. Smaller carriers Cricket and U.S. Cellular charge only about $250 per wiretap. But snoop on a Verizon customer? That costs the government $775 for the first month and $500 each month after that, according to industry disclosures made last year to Congressman Edward Markey."
An anonymous reader writes "Winthrop University in South Carolina is testing out iris scanning technology during freshman orientation this summer. Students had their eyes scanned as they received their ID cards in June. 'Iris scanning has a very high level of accuracy, and you don't have to touch anything, said James Hammond, head of Winthrop University's Information Technology department. 'It can be hands free security.'" I wouldn't want to be locked out a building because of a scratched lens or a system outage, though.
darthcamaro writes "Earlier today it, Slashdot had a story about DEF CON's position on not allowing U.S. Federal agents to attend the annual hacking conference. We're now starting to see the backlash from the hacker community itself with at least two well respected hackers pulling out of the DEF CON speaking sessions so far: "'The issue we are struggling with, and the basis of our decision, is that we feel strongly that DEF CON has always presented a neutral ground that encouraged open communication among the community, despite the industry background and diversity of motives to attend,' security researcher Kevin Johnson wrote. 'We believe the exclusion of the "feds" this year does the exact opposite at a critical time.'" Meanwhile, Black Hat welcomes Federal attendees; this year's conference will feature as a speaker former NSA head Keith Alexander.
First time accepted submitter HonorPoncaCityDotCom writes "Khadeeja Safdar reports in the WSJ that researchers who surveyed 655 incoming college students found that while math and science majors drew the most interest initially, not many students finished with degrees in those subjects. Students who dropped out didn't do so because they discovered an unexpected amount of the work and because they were dissatisfied with their grades. "Students knew science was hard to begin with, but for a lot of them it turned out to be much worse than what they expected," says Todd R. Stinebrickner, one of the paper's authors. "What they didn't expect is that even if they work hard, they still won't do well." The authors add that the substantial overoptimism about completing a degree in science can be attributed largely to students beginning school with misperceptions about their ability to perform well academically in science. ""If more science graduates are desired, the findings suggest the importance of policies at younger ages that lead students to enter college better prepared (PDF) to study science.""
An anonymous reader writes "As promised, Mozilla today announced the release of Firefox OS Simulator 4.0 with a focus on developers who want to make money in the Firefox Marketplace. You can download the new version now for Windows, Mac, and Linux from Mozilla Add-Ons. First and foremost, the new simulator supports test receipts for paid apps: each app's dashboard features a drop-down menu where you can select a receipt type. Choosing one of these will have the simulator add-on downloading a test receipt from a Marketplace receipt service and reinstalling the app using it. This lets developers test receipt verification with whatever receipts types they may require (valid, invalid, and refunded)."