Bio-high-tech treatment for Ebola may have saved two US citizens

The Ebola virus consists of small but lethal filament of RNA containing only seven genes. CDC Today, CNN is reporting that the two US citizens who were flown back to the states after contracting Ebola virus were given an extremely experimental treatment, one that’s still undergoing animal testing. While the treatment involves antibodies, it’s not a vaccine and can work effectively even after an infection has started. The process that produced it is a testament to the impressive capabilities developed in the field of biotechnology. The Ebola virus, known for its horrific symptoms and high fatality rate, currently has no established treatment. Which means that health care workers who are fighting the disease, and thus at high risk for becoming infected themselves, can do little more than put themselves in isolation and try to compensate for the damage the virus causes. That was apparently the case for two Americans who contracted the virus while working in Liberia. In this case, however, both were apparently given an experimental treatment developed in part by a company called Mapp Biopharmaceutical. Complicating matters, Mapp licenses its developments to a company called LeafBio for production and distribution. But LeafBio has also licensed an Ebola treatment from a second company, called Defyrus, and plans on combining the two. It’s unclear whether the Americans received the original or combined therapy. In either case, both therapies were based on the same developmental process outlined below. Read 9 remaining paragraphs | Comments

View original post here:
Bio-high-tech treatment for Ebola may have saved two US citizens

Mount your hard drive… on your RAM?

A weird place for an SSD. Apacer PC makers do all kinds of things to save space inside their cases, but this is a new one to us: Apacer  is apparently sampling sticks of DDR3 desktop RAM that include slots for M.2 SSD add-in boards and CFast  CompactFlash cards, allowing you to mount storage devices directly to your RAM rather than using slots on the motherboard. The slots will still use the SATA III interface to transfer data—they’re just mounted to the RAM and they draw power through the RAM slot. These sticks will support all three lengths of M.2 SSD boards (2242, 2260, and 2280). That’s especially useful because, as AnandTech points out , only one mini-ITX desktop motherboard can directly support full-length M.2 boards. Full-length M.2 boards are necessary to accommodate higher storage capacities—currently available drives top out at 512GB, but 1TB drives are on the horizon . Connectors visible on top of the DIMMs would likely need to be connected to the SATA connectors on your motherboard; unfortunately it doesn’t look like these can take advantage of the faster PCI-Express flavor of M.2. Read 2 remaining paragraphs | Comments

Read More:
Mount your hard drive… on your RAM?

Updated Qi 1.2 standard makes wireless charging more wireless

The Qi-compatible Nexus 5 on the Nexus Wireless Charger. New chargers will be able to increase the space between the device and the pad. Andrew Cunningham The Wireless Power Consortium’s Qi wireless charging standard is wireless in that the phone is not physically plugged into anything, but it still requires your device and the wireless charging pad to be touching each other to work. Today, the WPC announced ( PDF ) that version 1.2 of the Qi standard will add support for resonant charging, making it possible for your phone to be charged when near a Qi pad rather than directly on top of it. A small image showing Qi 1.2 in action. WPC It’s a minor enough change that current Qi 1.1 receivers will be able to take advantage of it with no extra hardware, but it opens up a few different possibilities for companies that want to build Qi support into their products. The WPC says that Qi chargers can now be embedded within tables and desks rather than placed on the surface, making them less obtrusive. “New low power transmitter designs” will make it easier to build Qi chargers into cars, and a single Qi 1.2 transmitter will be able to charge multiple Qi devices simultaneously.  Qi can also now supply up to 2,000 watts of power to household appliances (the release specifically mentions “kitchen applications”). Current Qi devices will be able to draw power from these new transmitters at distances of up to 30 mm (around 1.2 inches), while devices with purpose-build Qi 1.2 receivers increase the distance to 45 mm (about 1.8 inches). Engadget reports that the resonant version of Qi is roughly 70 to 80 percent efficient, while the old inductive version is around 85 percent efficient, and Qi 1.1 and 1.2 transmitters and receivers will be able to interoperate, so inductive charging pads like the Nexus Wireless Charger will still be able to charge Qi 1.2 phones. Just know that resonant charging will require a Qi 1.2 transmitter. Read 1 remaining paragraphs | Comments

More:
Updated Qi 1.2 standard makes wireless charging more wireless

This thumbdrive hacks computers. “BadUSB” exploit makes devices turn “evil”

Saurabh R. Patil When creators of the state-sponsored Stuxnet worm used a USB stick to infect air-gapped computers inside Iran’s heavily fortified Natanz nuclear facility , trust in the ubiquitous storage medium suffered a devastating blow. Now, white-hat hackers have devised a feat even more seminal—an exploit that transforms keyboards, Web cams, and other types of USB-connected devices into highly programmable attack platforms that can’t be detected by today’s defenses. Dubbed BadUSB, the hack reprograms embedded firmware to give USB devices new, covert capabilities. In a demonstration scheduled at next week’s Black Hat security conference in Las Vegas, a USB drive, for instance, will take on the ability to act as a keyboard that surreptitiously types malicious commands into attached computers. A different drive will similarly be reprogrammed to act as a network card that causes connected computers to connect to malicious sites impersonating Google, Facebook or other trusted destinations. The presenters will demonstrate similar hacks that work against Android phones when attached to targeted computers. They say their technique will work on Web cams, keyboards, and most other types of USB-enabled devices. “Please don’t do anything evil” “If you put anything into your USB [slot], it extends a lot of trust,” Karsten Nohl, chief scientist at Security Research Labs in Berlin, told Ars. “Whatever it is, there could always be some code running in that device that runs maliciously. Every time anybody connects a USB device to your computer, you fully trust them with your computer. It’s the equivalent of [saying] ‘here’s my computer; I’m going to walk away for 10 minutes. Please don’t do anything evil.” Read 10 remaining paragraphs | Comments

Read More:
This thumbdrive hacks computers. “BadUSB” exploit makes devices turn “evil”

LibreOffice 4.3 upgrades spreadsheets, brings 3D models to presentations

A 3D duck in the latest version of LibreOffice Impress. Document Foundation LibreOffice’s latest release provides easier ways of working with spreadsheets and the ability to insert 3D models into presentations, along with dozens of other changes. LibreOffice was created as a fork from OpenOffice in September 2010 because of concerns over Oracle’s management of the open source project. LibreOffice has now had eight major releases and is powered by “thousands of volunteers and hundreds of developers,” the Document Foundation, which was formed to oversee its development, said in an announcement today . ( OpenOffice  survived the Oracle turmoil by being transferred to the Apache Software Foundation and continues to be updated.) In LibreOffice 4.3, spreadsheet program Calc “now allows the performing of several tasks more intuitively, thanks to the smarter highlighting of formulas in cells, the display of the number of selected rows and columns in the status bar, the ability to start editing a cell with the content of the cell above it, and being able to fully select text conversion models by the user,” the Document Foundation said. Read 3 remaining paragraphs | Comments

See the article here:
LibreOffice 4.3 upgrades spreadsheets, brings 3D models to presentations

Chinese military “hacked” Israel’s Iron Dome

Iron Dome The technology behind Iron Dome, the missile defense system Israel has been using since 2011, was allegedly stolen by Chinese military hackers. That claim was made by Cyber Engineering Services   to  Brian Krebs of security news site Krebs On Security , and it identifies Elisra Group, Israel Aerospace Industries (IAI), and Rafael Advanced Defense Systems as the three defense companies that were compromised during the cyber assault. The perpetrators, Cyber Engineering Services says, are the same ones behind a spate of attacks that have come to light in the past few years, all attributed to Unit 61398, a Shanghai-based arm of the Chinese army. The five Chinese military officers indicted by the US earlier this year  for allegedly hacking energy firms in the country also belong to the same unit. The hacks took place from October 2011, some six months after Iron Dome became operational, and continued up until August 2012. Israel Defense Forces (IDF) has said that many hundreds of rockets fired from Gaza, particularly during the current military operation and a series of clashes in 2012, have been scuppered by the system, which is thought to be one of the most effective missile-defense technologies in the world. Read 7 remaining paragraphs | Comments

Read More:
Chinese military “hacked” Israel’s Iron Dome

Robotic glove gives you extra fingers for grabbing

Melanie Gonick / MIT Four fingers and a thumb on each hand is pretty useful. Humans have gone from caves to sprawling cities in part because of our dexterous digits. But researchers at MIT think we could do even better if we had an upgrade. They have developed a glove with two extra robotic fingers that respond intelligently to your movements, allowing you to perform two-handed tasks with just one robot-enhanced hand. “You do not need to command the robot, but simply move your fingers naturally. Then the robotic fingers react and assist your fingers,” said the glove’s creator Harry Asada, of MIT’s Department of Mechanical Engineering . Read 10 remaining paragraphs | Comments

Read more here:
Robotic glove gives you extra fingers for grabbing

DOE, commercial partners start world’s largest carbon capture project

Earlier this week, the US Department of Energy announced that work has started on what when finished will be the world’s largest carbon capture facility. Located in Thompsons, Texas, the project will capture a portion of the emissions from the coal-fired W.A. Parish Generating Station. The CO 2 will then be compressed and piped to the West Ranch oil field, where it will be injected under ground. This will help liberate oil that’s otherwise difficult to extract, but has the added benefit that the carbon dioxide typically stays underground, sequestered. The project was originally planned as a small pilot that would only extract CO 2 from the equivalent of 60 megawatts of the plant’s 3,500MW of generating capacity. When it was realized that the amount of CO 2 from 60MW of would be too little CO 2 to supply the oil field’s needs, the project scope was expanded to 240MW. At that scale, the facility would become the largest of its type in the world. The exhaust gas will have its sulfates removed before being bubbled through a solution of amines, which will bind the CO 2 . Once separated from the rest of the gasses, the carbon dioxide will be released by heating the amine solution, which can be recycled. The CO 2 is then sent under pressure via a pipeline. Read 1 remaining paragraphs | Comments

See more here:
DOE, commercial partners start world’s largest carbon capture project

Why Google took years to address a battery-draining “bug” in Chrome

Aurich Lawson A recent Forbes report  says that Chrome on Windows uses up more battery than competing browsers, thanks to a high system timer setting. Unlike Linux or Mac OS X, Windows uses a timer to schedule tasks. At idle, the timer on Windows is set to about 15 ms, so if it has no work to do, it will go to sleep and only wake up every 15 ms to check if it needs to do something. Applications can change this timer, and other browsers like Firefox and Internet Explorer don’t mess with it until they need to do something processor intensive, like playing a video. After the video is done, the timer is set to return to 15 ms so that the computer can idle again. Chrome, though, boosts the timer to 1 ms and keeps it there forever. The difference means that on Firefox at idle, the CPU only wakes 64 times a second. On Chrome, it wakes up 1,000 times a second. In its Windows documentation, Microsoft notes that setting the system timer to a high value can increase power consumption by “as much as 25 percent.” This means that on a laptop, you’ll get a shorter runtime with Chrome than you will on a competing browser. And the issue has been around for a long time. Forbes links to a bug report documenting the problem that was first filed in 2010. Read 7 remaining paragraphs | Comments

View article:
Why Google took years to address a battery-draining “bug” in Chrome

Faulty red light cameras produced thousands of bogus traffic tickets

At least 13,000 Chicago motorists have been cited with undeserved tickets thanks to malfunctioning red-light cameras, according to a 10-month investigation published Friday by the Chicago Tribune . The report found that the $100 fines were a result of “faulty equipment, human tinkering or both.” According to the investigation: Cameras that for years generated just a few tickets daily suddenly caught dozens of drivers a day. One camera near the United Center rocketed from generating one ticket per day to 56 per day for a two-week period last summer before mysteriously dropping back to normal. Tickets for so-called rolling right turns on red shot up during some of the most dramatic spikes, suggesting an unannounced change in enforcement. One North Side camera generated only a dozen tickets for rolling rights out of 100 total tickets in the entire second half of 2011. Then, over a 12-day spike, it spewed 563 tickets—560 of them for rolling rights. Many of the spikes were marked by periods immediately before or after when no tickets were issued—downtimes suggesting human intervention that should have been documented. City officials said they cannot explain the absence of such records. City officials and Redflex Traffic Systems of Arizona, the report said, “acknowledged oversight failures and said the explosions of tickets should have been detected and resolved as they occurred. But they said that doesn’t mean the drivers weren’t breaking the law, and they defended the red light camera program overall as a safety success story. The program has generated nearly $500 million in revenue since it began in 2003.” Read 1 remaining paragraphs | Comments

View post:
Faulty red light cameras produced thousands of bogus traffic tickets