An anonymous reader writes: A new survey published in JAMA Pediatrics found that 95% of doctors believe patients are put at risk when doctors work while sick. Despite that, 83% of respondents said they had "come to work with symptoms like diarrhea, fever and respiratory complaints during the previous year." The researchers doing the survey dug into the reasons for this: first of all, given the heavy workload of most doctors, it's very difficult to find others who can take up the slack when one is recovering from an illness. Beyond that, the profession is pervaded by a culture of working through the discomfort and pain of minor maladies. According to a commentary on the research, hospital policies don't help matters — they often incentivize long hours and don't encourage ill workers to leave the premises.
The BBC has revealed the final design for its Micro Bit computer, a programmable board the size of a credit card they hope will inspire the same love of technology that the BBC Micro did in 1981. The Micro Bit includes an array of LEDs, buttons, and a motion sensor. It can be powered via USB, or by an addon pack with AA batteries. It's not intended as a competitor to devices like the Raspberry Pi or the Arduino — it is intended to complement them while remaining simple for educational purposes. In October, the BBC will begin distributing the Micro Bit to students in grade 7. They expect to give away about a million of them. Afterward, the device will go on sale, and its specs will be open sourced.
Advocatus Diaboli sends news that the Senate Intelligence Committee has unanimously approved draft legislation that would requires email providers and social media sites to report any suspected terrorist activities to the government. While the legislation itself is classified until it reaches the Senate floor, Committee chairman Richard Burr (R-NC) said, "America’s security depends on our intelligence community’s ability to detect and thwart attacks on the homeland, our personnel and interests overseas, and our allies. This year’s legislation arms the intelligence community with the resources they need, and reinforces congressional oversight of intelligence activities." The legislation is based on 2008's Protect Our Children Act, which required companies to report information about child porn to an agency that would act on it. One industry official told the Washington Post, "Considering the vast majority of people on these sites are not doing anything wrong, this type of monitoring would be considered by many to be an invasion of privacy. It would also be technically difficult."
New submitter alaskana writes: According to Starwars.com, Han Solo will be getting his own movie prequel. The film will purportedly tell the story of a young Han Solo and how he came to be the wily smuggler that shows up in Star Wars: Episode IV A New Hope. The film is set to be directed by Christopher Miller and Phil Lord (of The Lego Movie fame) and written by Lawrence and Jon Kasdan. Get your popcorn and tickets ready, as the movie is set to debut May 25, 2018.
it says here, "is a framework for robotics, physical computing, and the Internet of Things, written in the Go programming language." And in today's video, interviewee Adrian Zankich (AKA "Serious Programming Guy at The Hybrid Group") says that an unadorned robot ball -- in this case the Sphero -- is about the least threatening robot you can possibly use to teach entry-level robot programming. Start with Go language? Cylon.js? Use whichever you prefer, Adrian says. Mix and match. It's all fun, and they're both great ways to get into programming for robotics and Internet of Things applications. Open source? You bet. Here's the Hybrid Group's gobot GitHub repository for your perusing pleasure. This (and more) is all in the video, which Tim Lord shot at the recent Solid Conference, where there was a rather high background noise level (but thankfully not high enough to make Adrian hard to understand). And besides the video, there's even more material in the transcript.
dkatana writes: You may call Jun an ancient town — it was founded by Romans 2,200 years ago. But Jun's mayor is known worldwide for using the latest technology to run the city. Back in 1999, when he was deputy mayor, the town declared internet a basic universal right for its citizens. And now political parties run "virtual" campaigns without printing posters. But the most impressive accomplishment of Jun's mayor is running the entire town administration and public services using Twitter. He has more followers (350 k) than the mayor of NY. A third of the 3,800 residents have Twitter accounts, and they use the platform to interact with the city administration at all levels.
jfruh writes: Artificial intelligence typically requires heavy computing power, which can only help manufacturers of specialized chip manufacturers like NVIDIA. That's why the company is pushing its Digits software, which helps users design and experiment with neural networks. Version 2 of digits moves out of the command line and comes with a GUI interface in an attempt to move interest beyond the current academic market; it also makes programming for multichip configurations possible.
An anonymous reader writes: An article at Bloomberg relates the story of two IT professionals who reluctantly teamed up with an organized criminal network in building a sophisticated drug smuggling operation. "[The criminals were] clever, recruiting Van De Moere and Maertens the way a spymaster develops a double agent. By the time they understood what they were involved in, they were already implicated." The pair were threatened, and afraid to go to the police. They were asked to help with deploying malware and building "pwnies" — small computers capable of intercepting network traffic that could be disguised as power strips and routers. In 2012, authorities lucked into some evidence that led them to investigate the operation. "Technicians found a bunch of surveillance devices on [the network of large shipping company MSC]. There were two pwnies and a number of Wi-Fi keyloggers—small devices installed in USB ports of computers to record keystrokes—that the hackers were using as backups to the pwnies. MSC hired a private investigator, who called PricewaterhouseCoopers' digital forensics team, which learned that computer hackers were intercepting network traffic to steal PIN codes and hijack MSC's containers."
An anonymous reader links to Flyer's coverage of a squabble that seems to feature the aircraft giant Airbus aiming bad sportsmanship in the form of corporate pull against much smaller light aircraft maker Pipistrel, thereby "squashing the ambitions of light aircraft maker Pipistrel to be the first to fly an electric aircraft across the English Channel." Though Pipistrel acquired the flight permissions it anticipated needing in connection with its announced ambition to cross the channel, they've been grounded by allegedly underhanded means: Siemens, which supplies the electric motor used in the craft which was to make the journey, contacted Pipistrel to prohibit over-water flight with that motor (partly German). U.S. Pipistrel dealer Michael Coates believes he knows why (as quoted by Flyer): "Airbus managed to flex their muscle with Siemens who are supplying motors to Pipistrel and have the Pipistrel motor agreement immediately terminated," he said. "The Airbus E-Fan project does not use Siemens motors but it does have Siemens stickers over the side of their aircraft.
MojoKid writes: With the advent of solid state storage and faster, lower-powered processors that require less complex cooling solutions, the average mainstream notebook is rather svelte. Recently, however, Lenovo announced their LaVie Z and LaVie Z 360 ultrabooks and at 1.87 and 2.04 pounds respectively, they're almost ridiculously light. Further, with Core i7 mobile processors and fast SSDs on board, these machines perform impressively well in the benchmarks and real world usage. If you actually pick one up though, both models are so light they feel almost empty, like there's nothing inside. Lenovo achieved this in part by utilizing a magnesium--lithium composite material for the casing of the machines. Though they're incredibly light, the feeling is almost too light, such that they tend to feel a little cheap or flimsy. With a tablet, you come to expect a super thin and light experience and when holding them in one hand, the light weight is an advantage. However, banging on a full-up notebook keyboard deck is a different ball of wax.
An anonymous reader writes: The Register reports that upcoming OpenSSL versions 1.0.2d and 1.0.1p are claimed to fix a single security defect classified as "high" severity. It is not yet known what this mysterious vulnerability is — that would give the game away to attackers hoping to exploit the hole before the patch is released to the public. Some OpenSSL's examples of "high severity" vulnerabilities are a server denial-of-service, a significant leak of server memory, and remote code execution. If you are a system administrator, get ready to patch your systems this week. The defect does not affect the 1.0.0 or 0.9.8 versions of the library.
An anonymous reader writes: Swiss Post has beat Amazon, Alibaba and other researchers into drone-based delivery by launching practical drops using a Matternet four-rotored drone this month. However the company says that five years of testing and negotiation with regulators lie ahead before it will be able to offer a commercial drone-based delivery service. Like Google's Project Wing, the Matternet drone in question is mooted as a potential lifeline in post-disaster situations, but from a business point of view the release notes its potential for 'express delivery of goods' — a further indicator that the future of postal drone delivery may be an exclusive and expensive one.
loid_void writes with a link to a New York Times report about some of the world's best-known cryptography experts, who have prepared a report which concludes that there is no viable technical solution which "would allow the American and British governments to gain "exceptional access" to encrypted communications without putting the world's most confidential data and critical infrastructure in danger." From the article: [T]he government’s plans could affect the technology used to lock financial institutions and medical data, and poke a hole in mobile devices and the countless other critical systems — including pipelines, nuclear facilities, the power grid — that are moving online rapidly. ... “The problems now are much worse than they were in 1997,” said Peter G. Neumann, a co-author of both the 1997 report and the new paper, who is a computer security pioneer at SRI International, the Silicon Valley research laboratory. “There are more vulnerabilities than ever, more ways to exploit them than ever, and now the government wants to dumb everything down further.” The authors include Neumann, Harold Abelson, Susan Landau, and Bruce Schneier.
1sockchuck writes: Parachuting a container full of IT gear into a war zone is challenging enough. In the mountains of Afghanistan, helicopters had to deliver modular data centers in three minutes or less, lest the choppers be targeted by Taliban rockets. UK vendor Cannon recently spoke with DataCenterDynamics, sharing some of the extreme challenges and lessons learned from deploying portable data centers for military units in deserts and mountains. The same lessons (except, hopefully, with a lower chance of being shot) would apply in lots of other extreme enviroments, too.
cold fjord writes with the report at Yahoo that Former Attorney General Eric Holder said today that a "possibility exists" for the Justice Department to cut a deal with ... Edward Snowden that would allow him to return to the United States ... Holder said "we are in a different place as a result of the Snowden disclosures" and that "his actions spurred a necessary debate" that prompted President Obama and Congress to change policies ... "I certainly think there could be a basis for a resolution that everybody could ultimately be satisfied with. I think the possibility exists." A representative of current Attorney General Loretta Lynch, though, said that there has been no change in the government's position ("This is an ongoing case so I am not going to get into specific details but I can say our position regarding bringing Edward Snowden back to the United States to face charges has not changed."), Holder's musings aside. As the article points out, too, "any suggestion of leniency toward Snowden would likely run into strong political opposition in Congress as well as fierce resistance from hard-liners in the intelligence community."
An anonymous reader writes: Who hacked Hacking Team, the Milan-based company selling intrusion and surveillance software to governments, law enforcement agencies and (as it turns out) companies? A hacker who goes by "Phineas Fisher" claims it was him (her? them?). In the meantime, Hacking Team is scrambling to minimize the damage this hack and data leak is doing to the company. They sent out emails to all its customers, requesting them to shut down all deployments of its Remote Control System software ("Galileo") — even though it seems they could do that themselves, as the customer software apparently has secret backdoors. Perhaps they chose the first route because they hoped to keep that fact hidden from the customers? And because every copy of Hacking Team's Galileo software is secretly watermarked, the leaked information could allow researchers to link a certain backdoor to a specific customer.
HughPickens.com writes: Ever notice at your high school reunions how some classmates look ten years older than everybody else — and some look ten years younger. Now BBC reports that a study of people born within a year of each other has uncovered a huge gulf in the speed at which human bodies bodies age. The report tracked traits such as weight, kidney function and gum health and found that some of the 38-year-olds in the study were aging so badly that their "biological age" was on the cusp of retirement. "They look rough, they look lacking in vitality," says Prof Terrie Moffitt. The study says some people had almost stopped aging during the period of the study, while others were gaining nearly three years of biological age for every twelve months that passed. "Any area of life where we currently use chronological age is faulty, if we knew more about biological age we could be more fair and egalitarian," says Moffitt. The researchers studied aging in 954 young humans, the Dunedin Study birth cohort, tracking multiple biomarkers across three time points spanning their third and fourth decades of life. They developed and validated two methods by which aging can be measured in young adults, one cross-sectional and one longitudinal. According to Moffit the science of healthspan extension may be focused on the wrong end of the lifespan; rather than only studying old humans, geroscience should also study the young. "Eventually if we really want to slow the process of ageing to prevent the onset of disease we're going to have to intervene with young people."
itwbennett writes: Back in May, former Goldman Sachs programmer Sergey Aleynikov was convicted by a jury for stealing 32MB of code for Goldman's high-frequency trading system, code that Aleynikov maintained he copied for intellectual pursuits and was, in fact, open-source. On Monday, Judge Daniel P. Conviser of New York's State Supreme Court dismissed the conviction, saying that Aleynikov acted wrongfully by taking the code, but his actions did not meet the standard under the law in which he was charged. "The evidence did not prove he intended to appropriate all or a major portion of the code's economic value," Conviser wrote.
theodp writes: "A few months ago," writes Steph Rhee, "I was at a dinner with a dozen students and a 60-year-old entrepreneur who made himself a fortune on Wall Street. At the time, I was a junior at Yale and the only person at the table studying a computer-related major. We went around saying what our big dreams were. When I said that I'm studying computer science because I want to be a software engineer and hope to start my own company one day, he said, 'Why waste so many years learning how to code? Why not just pay someone else to build your idea?'" But Rhee isn't buying into the idea of the look-Ma-no-tech-skills "idea person." "We must not neglect the merits of technical skills in the conception of the 'idea person,'" she argues. "What the 60-year old entrepreneur and others of his generation — the people in control of the education we receive — don't realize is this: for college students dreaming of becoming unicorns in Silicon Valley, being an 'idea person' is not liberating at all. Being able to design and develop is liberating because that lets you make stuff. This should be a part of what we see in the 'idea person' today and what it means to be 'right' when designing an undergraduate curriculum."