Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment This is better how? (Score 1) 146

From the summary (no, I didn't read the article): "Currently, the best of those established treatment options can only improve symptoms in 60 to 70 percent of patients" and " the drug had completely erased all traces of symptoms in two-thirds of PTSD patients." To me, the 60 to 70 percent sounds very close to the two-thirds of patients (roughly 66.667%). So, this is better how? I did see in the summary that this drug is reaching some patients who were not helped by other therapy (perhaps part of the 30-40 percent?), so that is a good thing, but the rate of help is not better. What are the (projected) long-term side-effects? Is it worth the long-term costs?

Submission + - Clinton's data-driven campaign relied heavily on an algorithm named Ada... (washingtonpost.com)

Jeff Socia writes: Inside Hillary Clinton's campaign, she was known as Ada. Like the candidate herself, she had a penchant for secrecy and a private server. As blame gets parceled out Wednesday for the Democrat's stunning loss to Republican President-elect Donald Trump, Ada is likely to get a lot of second-guessing.

Ada is a complex computer algorithm that the campaign was prepared to publicly unveil after the election as its invisible guiding hand. Named for a female 19th-century mathematician — Ada, Countess of Lovelace — the algorithm was said to play a role in virtually every strategic decision Clinton aides made, including where and when to deploy the candidate and her battalion of surrogates and where to air television ads — as well as when it was safe to stay dark.

Submission + - An In-Depth Look at Nvidia's Own Internal DGX-1 Deep Learning Supercomputer (nextplatform.com)

kipperstem77 writes: The Saturn V cluster is comprised of 124 of Nvidia’s own DGX-1 hybrid CPU-GPU systems, which were launched last April by the company and which were explicitly created to foster the use of its high-end “Pascal” Tesla P100 GPU accelerators, which also debuted at that time. The Tesla P100s come in two flavors, the original that mounts directly on the motherboard and that links to the processing complex over NVLink interconnects, called the SXM2 form factor, and the other having roughly the same performance and HBM2 stacked memory capabilities – and unfortunately the same name – but hooking to the CPU complex in a system over normal PCI-Express 3.0 x16 links.

Submission + - NASA's Orbiting Carbon Observatory (OCO-2) Sees Carbon Emissions From Space (nasa.gov)

dryriver writes: Scientists have produced the first global maps of human emissions of carbon dioxide ever made solely from satellite observations of the greenhouse gas. The maps, based on data from NASA's Orbiting Carbon Observatory-2 (OCO-2) satellite and generated with a new data-processing technique, agree well with inventories of known carbon dioxide emissions. No satellite before OCO-2 was capable of measuring carbon dioxide in fine enough detail to allow researchers to create maps of human emissions from the satellite data alone. Instead, earlier maps also incorporated estimates from economic data and modeling results. The new (OCO-2 based) maps show widespread carbon dioxide across major urban areas and smaller pockets of high emissions. Human emissions of carbon dioxide have grown at a significant rate since the Industrial Revolution, and the greenhouse gas lingers in the atmosphere for a century or more.

Submission + - Android Spyware Targets Business Executives (helpnetsecurity.com)

Orome1 writes: Researchers from mobile security outfit Skycure have recently analyzed a malicious app they found on an Android 6.0.1 device owned by a VP at a global technology company. The name of the malicious package is “com.android.protect”, and it comes disguised as a Google Play Services app. It disables Samsung’s SPCM service in order to keep running, installs itself as a system package to prevent removal by the user (if it can get root access), and also hides itself from the launcher. The spyware is able to collect chats and messages sent and received via SMS, MMS, and popular email and IM apps; record audio and telephone calls; collect pictures and take screenshots; collect contacts, browser histories, the contents of the calendar, and so on.

Submission + - Mimicking nature turns sewage into biocrude oil in minutes (newatlas.com) 1

Big Hairy Ian writes: Biofuels are often touted as an alternative to fossil fuels, but many depend on raw materials that would quickly become scarce if production were scaled up. As an alternative to these alternatives, the US Department of Energy's Pacific Northwest National Laboratory (PNNL) has found a way to potentially produce 30 million barrels of biocrude oil per year from the 34 billion gal (128 billion liters) of raw sewage that Americans create every day.

Comment Re:Arrrrrrrr (Score 1) 105

Rei, I spent 4 years in Iceland thirty years ago, and I have been in some of those forests. At that time, they could have been measured in square yards, and I don't think any of the trees were over 15 feet tall, most being under 5 feet tall. I am glad to hear that some reforestation is being done, and I hope it goes well, but most of the trees that (used to be) planted there grow pretty slowly, so I don't see the "self-sufficient on lumber in a decade or two" claim as being accurate (but we can hope). I hope to get back over there one of these years....

Submission + - Senator Asks FCC if ISPs Can Ban Insecure IoT Devices From Networks

Trailrunner7 writes: Sen. Mark Warner on Tuesday sent a letter to the chairman of the FCC expressing concern about the emergence of the Mirai botnet and asking whether ISPs should have the ability to prevent compromised IoT devices from connecting to their networks.

In his letter, Warner (D-Va.) said that the weak security of many embedded devices is at the heart of the success of Mirai, and pointed to poor security practices in the global supply chain as a big part of the problem. Warner, a leader of the Senate Cybersecurity Caucus, echoed concerns that many security experts have raised about IoT devices and the effect that their lax security can have not just on their users, but on the Internet in general.

“Would it be a reasonable network management practice for ISPs to designate insecure network devices as ‘insecure’ and thereby deny them connections to their networks, including by refraining from assigning devices IP addresses? Would such practices require refactoring of router software, and if so, does this complicate the feasibility of such an approach?” Warner asks.

Submission + - SPAM: White House urges ban on non-compete agreements for many workers

schwit1 writes: The Obama administration on Tuesday called on U.S. states to ban agreements prohibiting many workers from moving to their employers' rivals, saying it would lead to a more competitive labor market and faster wage growth.

The administration said so-called non-compete agreements interfere with worker mobility and states should consider barring companies from requiring low-wage workers and other employees who are not privy to trade secrets or other special circumstances to sign them.

Nearly every state allows non-compete agreements, and legal battles over their validity are common. Courts in determining whether the agreements are lawful generally focus on the length of time they are in effect, their geographical limits and whether employees had access to trade secrets.

The Obama administration on Tuesday also urged states to ban non-compete agreements that are not proposed before a job offer or promotion is accepted and said employers should not be able to enforce the agreements when workers are laid off.

Link to Original Source

Submission + - Google Identified Major Kernel Vulnerability In Apple's OS And iOS Systems (thestack.com)

An anonymous reader writes: In June Google’s Project Zero team identified a devastatingly effective exploit in Apple’s XNU kernel, and was able to develop perfect privilege escalation attacks by targeting a task port process thread called 'owningTask'. Project Zero member Ian Beer became dubious about the name of the task: 'OwningTask implies an ownership relationship which might lead kernel extension developers to believe that behind the scenes IOKit is actually maintaining an ownership relationship which will ensure that the lifetime of this userclient will always be dominated by the lifetime of the owningTask. This is a dangerous assumption.' Project Zero apprised Apple of the vulnerability at the beginning of June, and initially refused Apple's request for sixty days' grace, but eventually settled on September 21st for disclosure. But when Apple's last-minute September fix turned out to be ineffective, Project Zero agreed to keep quiet, eventually granting Apple nearly five months of silence about the task_t bug — which has now been fixed in the latest updates to Mac OS and iOS.

Submission + - Seagate Releases Its Last High Performance HDD For The Data Center Market (thestack.com)

An anonymous reader writes: Seagate has released the fastest HDD in the world — and for the company, it will be the last, in the light of SSD's dominance in the data center. The 6th-gen range of drives (300-900gb) have write speeds of up to 315mb/s, backed up with 256mb of multisegmented cache and 8mb of non-volatile write cache in support of Seagate’s Advanced Write Caching feature, a notable benefit in random write performance. Despite its dependence on Micron for its own range of SSD offerings, Seagate is prepared to take on competitors with native stock, such as Toshiba and HGST; producers who either have plans to abandon the data center HDD market or are looking to benefit from the last 5 years of a legacy market.

Submission + - Met Office Accurately Predicts Winter Weather A Year In Advance

An anonymous reader writes: The UK’s Met Office has revealed new seasonal forecasting capabilities which enable the weather service to predict winter climate changes up to a year in advance. The development has been made possible thanks to supercomputer technology granted by the UK Government in 2014. The £97 million high-performance computing facility has allowed researchers to increase the resolution of climate models and to test the retrospective skill of forecasts over a 35-year period starting from 1980. The forecasters claim that new supercomputer-powered techniques have helped them develop a system to accurately predict North Atlantic Oscillation (NAO) – the climatic phenomenon which heavily impacts winters in the UK. Lead researcher Nick Dunstone commented that the ability to now understand and predict the NAO could have significant economic benefits for a range of sectors, including transport, energy, water management, and the insurance industry.

Submission + - Quantum Research Achieves 10-Fold Boost In Superposition Stability

An anonymous reader writes: A team of Australian researchers has developed a qubit offering ten times the stability of existing technologies. The computer scientists claim that the new innovation could significantly increase the reliability of quantum computing calculations. The new technology, developed at the University of New South Wales (UNSW), has been named a ‘dressed’ quantum bit as it combines a single atom with an electromagnetic field. This process allows the qubit to remain in a superposition state for ten times longer than has previously been achieved. The researchers argue that this extra time in superposition could boost the performance stability of quantum computing calculations. Previously fragile and short-lived, retaining a state of superposition has been one of the major barriers to the development of quantum computing. The ability to remain in two states simultaneously is the key to scaling and strengthening the technology further.

Slashdot Top Deals

Dreams are free, but you get soaked on the connect time.

Working...