“Perhaps unsurprisingly, we found that when we gave THC to these rats, they basically became cognitively lazy,” said Mason Silveira, the study’s lead author and a PhD candidate in UBC’s department of psychology. “What’s interesting, however, is that their ability to do the difficult challenge was unaffected by THC. The rats could still do the task— they just didn’t want to.”
phantomfive writes: Rosetta’s dust-analysing COSIMA (COmetary Secondary Ion Mass Analyser) instrument has made the first unambiguous detection of solid organic matter in the dust particles ejected by Comet 67P/Churyumov-Gerasimenko, in the form of complex carbon-bearing molecules.
While organics had already been detected in situ on the comet’s surface by instruments on-board Philae and from orbit by Rosetta’s ROSINA , those were both in the form of gases resulting from the sublimation of ices. By contrast, COSIMA has made its detections in solid dust.
Their presence was only ever hinted at in previous comet missions.
phantomfive writes: Mikko Hypponen, chief research officer for Finland-based F-Secure, said that infections of critical infrastructure were surprisingly common, but that they were generally not dangerous unless the plant had been targeted specifically.
phantomfive writes: For years, Windows was the cash cow for Microsoft, the crown jewel. Now, it accounts for less than 10% of Microsoft's revenue. Microsoft's cloud service is the biggest segment of revenue, prompting CEO Nadella to say, "The enterprise cloud opportunity is larger than any market we've ever participated in." This could explain why Microsoft has been porting software to Android.
phantomfive writes: We've seen password frequency lists, here is an analysis of PIN frequency, with a nice heatmap towards the bottom. There is a line for numbers starting with 19*, which is the year of birth, a cluster around MM/DD for people's birthdays, and a hard diagonal line for the same digit repeated four times.
phantomfive writes: A post about programming, pointing out that all code you write (assuming it's successful) will be soon called "legacy code" by someone else. With trillions of dollars of code in existence, including billions written in COBOL, rewriting it all is not cost effective.
phantomfive writes: Uncle Bob Martin (the author of Clean Code and huge advocate of unit tests) has written a proposed code of conduct for programmers, things all professional programmers should do.
It start's with "I will not produce harmful code." Do you wish your coworkers would follow this list?
phantomfive writes: Bruce Schneier wrote a post asking about the LA Schools DOS attack. He says, "given the choice between overreacting to a threat and wasting everyone's time, and underreacting and potentially losing your job, it's easy to overreact," and calls it CYA security. He contrasts it with the more reasonable approach of the NY School system, to a similar threat.
The email address that was used to send in the bomb threat: firstname.lastname@example.org