Synopsis: Security:


impactlab_2013 00409.txt

and limitless ambition sees itself as the only company willing to take big risks like this. not proposing that we spend all of our money on those kinds of speculative things,


impactlab_2013 00953.txt

and environmental protection. e are also seeing a changing of the guard, writes TNC manager of Idaho Silver Creek Preserve. he old timers are retiring


impactlab_2014 00010.txt

and the threat it poses to agriculture were part of the original inspiration for creating a robotic bee,


impactlab_2014 00011.txt

especially when it came to the threat of government intrusion. Of all of the responses to the Snowden affair by the American public, the most interesting and distinctive was its approach to technology.


impactlab_2014 00039.txt

A mobile phone can be the device that saves you in an emergency, even if you aren t able to make a call.


impactlab_2014 00076.txt

and not go through hassles of intense security checks and the need to travel outside of cities to reach airports hours in advance.


impactlab_2014 00103.txt

including Social security numbers, job placement results, and attendance and grade changes, of students. This was part of compliance with federal regulations designed to make sure that colleges that don t offer a good value to students,


impactlab_2014 00129.txt

Furthermore, investors looking for options in a down economy wanted stability, transparency, shorter duration and less credit risk,

it doesn t have the same balance sheet risk as other traditional lenders might have. Mobile and the Disintermediation of Bill Pay, Processing & More Of course, the opportunities for disruption at the hands of disintermediation extend beyond lending.


impactlab_2014 00147.txt

On the security front, Google will offer encryption at rest on its servers. In addition to encryption in transit and between data centers,

which was already in place.)Overall, the improvements are an important indication that Google has given not up on the enterprise.


impactlab_2014 00166.txt

the Defence Web news site has published a photo of the drone after it was unveiled at a security trade show near Johannesburg in May.

some security companies in South africa and outside South africa, some police units outside South africa and a number of other industrial customers.


impactlab_2014 00172.txt

Nearly half of U s. jobs could be at risk of computerization over the next two decades, according to a new study from the Oxford Martin Program on the#Impacts of Future Technology.

Naysayers, though, see allowing machines to make choices for humans as a threat to our dignity.


impactlab_2014 00195.txt

but their outcomes were also at risk. The ACA turned this on its heel by enforcing thetriple Aim of healthcare improving the experience of care,


impactlab_2014 00214.txt

as well as burglaries, leading to an overall decrease in crime of 10.6 percent, according to the Denver Department of Public Safety.

The number of murders, sexual assaults, violent robberies and other assaults fell by 5. 6 percent.


impactlab_2014 00237.txt

The game is balanced very finely risk versus reward, he says. There s a collective risk of somebody dying,

but at the same time there are all these incentives to collaborate. That really transforms the classroom. The history teacher Ricardo Higuera teaches seventh grade world history in a rural corner of Southern California called Thermal.


impactlab_2014 00259.txt

If the users think they are taking a disproportionate share of the risks while firms are getting an excessive chunk of the benefits,


impactlab_2014 00271.txt

reducing the risks and potential failures of medications and procedures used today. Instead of looking at pages of a patient medical history,


impactlab_2014 00288.txt

sex or genetic risk factors for Alzheimer disease. Another of the study authors, Roderick Corriveau, said:


impactlab_2014 00336.txt

and weren seen as a serious threat to the big integrated mills. Nevertheless, as the technology improved


impactlab_2014 00364.txt

they developed keratinocytes, the cells that make up the skin protective barrier. They positioned the cells into layers


impactlab_2014 00484.txt

If the captain happens to be on the bow or the stern rather than up on the bridge when there an emergency,

In an age of rampant hacking and password pilfering, you don have to be clinically paranoid to find something worrying in the prospect of a highly automated warship that can be controlled by anyone who has the right login information.

Asked how the ship will be guarded against hackers, Knudson replies: t the same ways that we protect information in classified networks,

it unlikely a hacker could fire the weaponshat process involves more than one person. Of course, not all hackers work alone.

Perhaps the greatest comfort for those who fear the idea of an agile, 15,000-ton naval drone with stealth technology and missiles is won that there be too many of them.


impactlab_2014 00516.txt

It also has built-in security features such as cameras and alarms to mitigate theft Fox, who is from the town of Ashbourne,


impactlab_2014 00538.txt

or televised mention about its dangers, risks, and dubious mainstream appeal.####Many in the mainstream seem set in their beliefs that bitcoin is a fad,


impactlab_2014 00540.txt

and was supercharged by the backlash last year to revelations about National security agency surveillance. The change would end the long-running contract between the Commerce department and the Internet Corporation for Assigned Names and Numbers (ICANN), a California-based nonprofit group.

This risks foreign dictatorships defining the internet. The practical consequences of the decision were harder to immediately discern, especially with the details of the transition not yet clear.

said Garth Bruen, a security fellow at the Digital Citizens Alliance, a Washington-based advocacy group that combats online crime.

inclusive process to find a new international oversight structure for the group. othing will be done in any way to jeopardize the security and stability of the Internet,


impactlab_2014 00553.txt

and security guard robotsin the demilitarized zone that buffers it from North korea. Although there is an automatic mode available on the Samsung machines,

the Raven is primarily a surveillance vehicle but among its capabilities is arget acquisition. No one knows for sure what other technologies may be in development. ransparency

nonetheless addresses the risk of nintended engagements, as a spokesman put it in an email interview with Singularity Hub.

but there are some risks that military robot operators may never be able to eliminate. Some issues are the same ones that plague the adoption of any radically new technology:

the chance of hacking, for instance, or the legal question of who responsible if a war robot malfunctions

The U s. sometimes programs its semi-autonomous drones to locate a terrorist based on his cell phone SIM CARD.

The terrorists, knowing that, often offload used SIM CARDS to unwitting civilians. Would an autonomous killing machine be able to plan for such deception?

the history of the web suggests that terrorists could find others. Of course, most technologies stumble at first


impactlab_2014 00599.txt

Tesla factory will also be a competitive threat to Chinese battery production dominance and will help lower the overall price of lithium ion batteries globally. ust the threat of (Tesla CEO) Elon musk building this huge factory will lower prices,

says Wartena, as the companies will be willing to lower their margins to compete. Like Tesla has done with many of its strategies


impactlab_2014 00612.txt

This is a problem that adds risk to many of the common medical procedures the elderly face.


impactlab_2014 00626.txt

These new services rely on the same innovative proof-of-work model of distributed security and record-keeping that has kept the bitcoin currency secure as its value ballooned well past $10 billion.

Middleton says they eliminate counterparty risk while also subtracting conventional banking and brokerage fees. The most immediate function Middleton envisions for his system is for hedging bitcoin against existing national currencies.

And the entire system relies on decentralization for its security and integrity: My contracts are peer-to-peer,

bitcoin s threat to existing financial institutions would still be substantial. But with a full array of commission-free financial services on the horizon, there is even more reason to take heed.

I m doing right now is a direct threat to fiat merchant banking. For him

It s not a threat as people sit there and ponder whether bitcoin is a bubble or not.


livescience_2013 00056.txt

An expert on sustainable agriculture and the potential environmental risks of biotechnology Mellon holds a doctorate in molecular biology and a law degree.

and the risk of cover crops using too much soil moisture. Despite the challenges the surveyed farmers had increased steadily their use of cover crops over the last decade.


mininginnovationnews.com 2014 00002.txt

#Technology improves tool store security and efficiency Tool and equipment management systems using radio-frequency identification (RFID),

. is improving efficiency, security and productivity at a Canadian diamond mine. According to a company statement, the unnamed mining operation was facing a security challenge as its tools are utilised 24/7,

which required constant access to the store housing valuable equipment and it had been determined that having a full time staffing of the room was impractical.

and management for convenient access without sacrificing security, reducing tool loss and increasing productivity. All tools and handheld equipment are tagged with both RFID-on-metal tags

The implementation of the technology has improved security as tools can only be accessed using company ID badges, with each worker accountable for their inventories.


mininginnovationnews.com 2014 000077.txt

These new capabilities reduce risk by: Overcoming acquisition limitations in seismic surveys by mathematically regularising sources


mininginnovationnews.com 2015 00006.txt

Atlas copco says that risks of working close to unstable and hazardous benches close to the wall are well known


mnn.com 2014 0000123.txt

The bee bacteria beat every pathogen they faced a promising result given the global threat posed by superbugs.

and at least some stingless bees from the microbial threats they face while gathering nectar. Although the exact mechanisms remain a mystery the researchers say the secret to such strong results is likely the variety of active substances involved.

When used alive these 13 lactic acid bacteria produce the right kind of antimicrobial compounds as needed depending on the threat.

and microbial threats that varies with season and honeybee health. This study bodes well for developing countries given the availability of fresh honey


mnn.com 2014 000020.txt

the laser can deter the threat with an effect known as optical"dazzling.""This nonlethal option which amounts to a very bright glare is meant to serve as a warning,

But, if a threat keeps coming, sailors aboard the Ponce can increase the strength of the laser's highly concentrated beam,

making it capable of destroying the threat altogether. In recent tests, Laws successfully hit targets aboard a small boat that was speeding toward the Navy ship.


mnn.com 2014 0000271.txt

and their propensity for cracking when they bend or are stressed otherwise. The new polymers solve these problems.


mnn.com 2014 0000486.txt

If an emergency occurs or the vehicle loses power underwater, it will simply float back to the surface."


mnn.com 2014 000050.txt

Plans are for Sierra to be the exclusive domain of The National Nuclear Security Administration,

which will use its new super-toy for ensuring"the safety, security and effectiveness of the nation nuclear deterrent without testing,"


mnn.com 2015 000028.txt

or 2g connections) the Oneweb network would also give much-needed global emergency and first responder access for natural disasters refugee camps and other humanitarian needs.


Nature 00027.txt

The new money will go to vaccination programmes, better disease surveillance and research on new vaccines.

and so risk undoing the progress already made. The existence of residual pockets of infection is the main reason why the drive to completely erase the disease has failed so far,


Nature 00043.txt

whether the FDA has the necessary expertise to evaluate the environmental risks posed by transgenic animals,


Nature 00081.txt

"says Paul Nelson at the Nuclear Security Science and Policy Institute of Texas A&m University in College Station.


Nature 00133.txt

The risks involved with a bone-marrow transplant far outweigh those that come with years of antiretroviral drug therapy


Nature 00160.txt

The government agencies Environment Canada and Health Canada will use the data to make risk assessments for the materials

reported in July 2008 that very little information existed about the risks associated with nanomaterials."


Nature 00207.txt

Any federal reliance on cloud computing, for example, will have to be evaluated in the light of security requirements.


Nature 04299.txt

"And risks always exist when it comes to a new finding in science, and the investment on the research and development has been made based on the estimation of such risks.

Moreover, Lee adds, "we are willing to take risks, and need to innovate to survive o


Nature 04303.txt

#Ceramics surprise with durable dryness Coatings that repel water are found in myriad applications#they keep car windscreens clear in storms, for example,


Nature 04307.txt

The mechanism of the hijacking is unclear, but reproducing it could lead to new stem-cell-based therapeutic strategies.


Nature 04308.txt

Perhaps it s a burglary that involves cutting into a case made of diamond#which,


Nature 04318.txt

she felt particularly vulnerable to the threat of ES-cell funding being stopped. So she switched to ips cells in 2010,


Nature 04325.txt

a vaccinologist at THE WHO. But it carries no risk of causing polio. By giving children an inactivated vaccine that protects against all three subtypes of polio,


Nature 04346.txt

the threat alone achieved some of its intended effect#to instil enough uncertainty to keep some researchers from entering the field e


Nature 04369.txt

while shifting focus to prevention in patients at risk of a heart attack.""We can t just assume that modifying the risk factor is modifying risk,

says Harlan Krumholz, a cardiologist at Yale university in New haven, Connecticut.""We ve been burned so many times in the past decade by that assumption.

Clinical trials have shown repeatedly that statins reduce the risk of heart attack and stroke, but lowering LDL with other medications does not work as well.

including fighting inflammation, another risk factor for heart disease. Krumholz s scepticism is rooted in experience. In 2008 and 2010, the Action to Control Cardiovascular Risk in Diabetes (ACCORD) clinical trial challenged dogma

when it reported that lowering blood pressure or blood sugar to prespecified targets did not reduce the risk of heart attack or stroke.

In the case of blood sugar, the risks were worsened. The trial demonstrated the folly of assuming that risk factors must have a causal role in disease,

says Robert Vogel, a cardiologist at the University of Colorado, Denver.""Short people have a higher risk of heart disease,

he says.""But wearing high heels does not lower your risk. Jay Cohn, a cardiologist at the University of Minnesota Medical school in Minneapolis, also worries that the focus on LDL levels offers up the wrong patients for statin therapy.

Most of those who have a heart attack do not have high LDL, he notes. Cohn advocates treating patients with statins based on the state of health of their arteries,

as revealed by noninvasive tests such as ultrasound.""If your arteries and heart are healthy, I don t care

"We can t just assume that modifying the risk factor is modifying risk. Not all cardiologists want to abolish LDL targets.


Nature 04407.txt

A comparison with traditional surveillance data showed that Google Flu Trends, which estimates prevalence from flu-related Internet searches,

but not substitute for, traditional epidemiological surveillance networks.""It is hard to think today that one can provide disease surveillance without existing systems,

says Alain-Jacques Valleron, an epidemiologist at the Pierre and Marie Curie University in Paris,

With its creation of the Sentinelles network in 1984, France was the first country to computerize its surveillance.

Its estimates have matched almost exactly the CDC s own surveillance data over time ###and it delivers them several days faster than the CDC can.

and has been extended to include surveillance for a second disease, dengue. Sources: Google Flu Trends (www. google. org/flutrends;

including the declaration of a public-health emergency by New york state last month. The press reports may have triggered many flu-related searches by people who were not ill.


Nature 04490.txt

During a visit to Argonne National Laboratory, he will call for $2-billion energy security trust fund dedicated to research to boost automobile efficiency,

Obama had mentioned briefly the idea of an energy security trust in his State of the Union address in January,


Nature 04492.txt

which restricts trade in species not at immediate risk of extinction but in need of protection.


neurosciencenews.com 2015 0000113.txt

and can therefore be offered to those suffering from paraplegia without exposing them to any particular medical risks


neurosciencenews.com 2015 000044.txt

#Tau Associated MAPT Gene Increases Risk for Alzheimer's disease A international team of scientists, led by researchers at the University of California,

San diego School of medicine, has identified the microtubule associated-protein protein tau (MAPT) gene as increasing the risk for developing Alzheimer disease (AD).

have suggested that MAPT is associated with increased risk for AD, other studies have found no association.

they found that carriers of the deleterious MAPT allele (an alternative form of the gene) are increased at risk for developing AD

Thanks to our collaborators from the Consortium, the International Parkinson Disease Genetics Consortium, the Genetic and Environmental Risk in Alzheimer Disease, the Cohorts for Heart and Aging research in Genomic Epidemiology, decode Genetics and the Demgene cohort,

Until this year no one had shown convincingly that the MAPT (tau) gene altered the risk of AD and this,

The recent association of genetic variation in the MAPT gene with AD risk and the emerging availability of tau imaging are now leading to a recognition that perhaps tau changes are key in the pathophysiologic pathway of AD


news.discovery.com 2015 01137.txt.txt

"In addition to tighter lab security and tougher laws, the trio called for yeast strains to be engineered to produce drugs with limited street value,


news.discovery.com 2015 01165.txt.txt

Scientists are also investigating the risk of earthquake -and landslide-triggered tsunamis in Alpine lakes.


news.discovery.com 2015 01289.txt.txt

Credit card security breaches are becoming more and more common, and customers'personal information is being exposed. Could biometric payment methods replace credit cards altogether?

Researchers from Tsinghua University and Tzekwan technology, a financial security protection firm, have announced the first ATM that works with facial recognition capabilities, reports the South China Morning Post.


news.discovery.com 2015 01523.txt.txt

prompting clerics to urge those at risk of heatstroke not to fast. Doctor Qaiser Sajjad of the Pakistan Medical Association in Karachi said that a lack of understanding of heatstroke among the public how to spot symptoms


news.discovery.com 2015 01645.txt.txt

and added that here a very heavy security feature to our business. Manufacturing these structures is part of an elaborate process that involves breaking down the nanopore structures into niform-sized particlesthat are fabricated ompletely

but people health is put at risk. Imagine someone being treated for diabetes. You want to make sure they have the right medication. n an interconnected world where smartphones

that the tags are tarting to get adoptedand that a lot of the company ustomers are oriented very security.


news.discovery.com 2015 01744.txt.txt

but with hackers having the ability to take over vehicles, we don't know if one connected to your heart is such a great ides.


news.sciencemag.org 2015 02771.txt.txt

and 27"other contacts"are under medical surveillance. None of those quarantined or under surveillance in Hong kong and China have showed any signs of illness so far.

With reporting by Dennis Normile in Tokyo o


news.sciencemag.org 2015 02794.txt.txt

#New test could reveal every virus that's ever infected you Can remember every viral infection youe ever had?


newscientist 00150.txt

We could also use other sensors to assess methane outgassing levels and explosion risk. Initially the firm plans to use information collected by European space agency satellites


newscientist 00238.txt

Such dependence inherently carries risk. Given Russia's democratic government though (democratic only if you squinted hard

when looking at it) it seemed a reasonable risk. Enter the egotistic ambitious and maybe ruthless Putin.


newscientist 00245.txt

"It must be an emergency if you would consider surgery in space, "says team member Shane Farritor at the University of Nebraska-Lincoln.

Medical emergency For now, the only humans in space venture no further than the International space station.

and the ISS has an escape capsule standing by in case of emergencies, so home is just hours away.


newscientist 00316.txt

Then there is the risk that the net will run into operational satellites. The engineers also worry that the debris they are fighting could fight back.

There is a growing trend for organisations to put forward a concept for a debris removal device without considering fully the potential risks involved in deploying


newscientist 00572.txt

and dimensions as Cygnus to avoid putting the real thing at risk. About 10 minutes into the mission the Cygnus dummy successfully separated from the rocket


newsoffice 00006.txt

and Flora Hewlett Foundation to establish an initiative aimed at laying the foundations for a smart sustainable cybersecurity policy to deal with the growing cyber threats faced by governments businesses and individuals.

and security have profound implications for the future. To make those choices well it is imperative that they be made with a sense of

And UC Berkeley s Center for Internet Security and Policy will be organized around assessing the possible range of future paths cybersecurity might take.

Engineering is vital to understanding the architectural dynamics of the digital systems in which risk occurs.

Developing a more formal understanding of the security behavior of large-scale systems is a crucial foundation for sound public policy.

How policymakers should address security risks to personal health information; How financial institutions can reduce risk by sharing threat intelligence;

Developing cybersecurity policy frameworks for autonomous vehicles like drones and self-driving cars; andhow to achieve regional and even global agreements on both privacy and security norms in online environments.

To address these issues CPI will not only bring to bear different disciplines from across MIT from computer science to management to political science


newsoffice 00106.txt

#Underwater robot for port security Last week at the International Conference on Intelligent Robots and Systems MIT researchers unveiled an oval-shaped submersible robot a little smaller than a football with a flattened

It s very expensive for port security to use traditional robots for every small boat coming into the port says Sampriti Bhattacharyya a graduate student in mechanical engineering who designed the robot together with her advisor Ford Professor of Engineering


newsoffice 00119.txt

The research was funded by the National institutes of health the Defense Threat Reduction Agency the U s army Research Laboratory the U s army Research Office the Office of Naval Research and the Ellison Medical Foundation n


newsoffice 00144.txt

If a company decides to use a surveillance drone for crop management, for instance, it can easily add software that stitches together different images to determine which areas of a field are overwatered

At the time, drones were used primarily for military surveillance, powered by a lack boxthat could essentially fly the drones and control the camera.


newsoffice 00159.txt

and take the risk. Mint launched in 2009 with an initial concept design for Medeye.


newsoffice 00175.txt

limiting the risk of lead contamination of the environment. When the panels are retired eventually, the lead can simply be recycled into new solar panels. he process to encapsulate them will be the same as for polymer cells today,


newsoffice 00195.txt

You know that the killer has admitted his guilt because there surveillance footage of his potato chip bag vibrating.


newsoffice 00214.txt

Since 2004 Ted Stanley and his late wife Vada Stanley have been instrumental to the progress made thus far in identifying the genetic risk factors for schizophrenia and bipolar disorder and the initiation of therapeutic efforts based on those discoveries.

Yet in the past few years scientists have begun to find genes that shape the risk of schizophrenia bipolar disorder and other illnesses thanks in large part to Stanley s support.


newsoffice 00232.txt

but the National security agency isn t the only organization that collects information about people s online behavior.


newsoffice 00270.txt

At the IEEE s Conference on Privacy Security and Trust in July Oshani Seneviratne an MIT graduate student in electrical engineering and computer science and Lalana Kagal a principal research scientist at CSAIL will present a paper

Remote access to a Web server would be controlled much the way it is now through passwords and encryption.


newsoffice 00321.txt

and self-docks in case of emergencies eliminating the need for manual labor. When winds are low typically we want to go as high as possible

Because the BAT is advanced an aerostat platform Glass says customers can use it to lift additional payloads such as weather monitoring and surveillance equipment.


newsoffice 00339.txt

which is already familiar from airport security checkpoints has a number of other promising applications from explosives detection to collision avoidance in cars.


newsoffice 00360.txt

Some of these differences have been linked with cancer vulnerability; for example, a genetic defect in a type of DNA repair called nucleotide excision repair often leads to a condition called xeroderma pigmentosum, in

allowing researchers to identify people who are at higher risk and potentially enabling prevention or earlier diagnosis of diseases linked to DNA repair.


newsoffice 00373.txt

and food can pose safety risks and cost governments and private companies hundreds of billions of dollars annually.


newsoffice 00495.txt

but this can leave the servers outdated or vulnerable to cyber attacks. In 2008 Jeff Arnold 07 MENG 08 along with a team of MIT computer scientists and engineers began solving this issue by developing

and commercializing software called Ksplice that automatically applies patches (security updates or bug fixes) to an operating system on the fly without requiring a reboot.

and risk of error Arnold says. The aim is to allow administrators the benefit of the update

Although today s computer technology risks becoming obsolete within a few years Ksplice (now 5 years old) is still a novel product says Daher who was Ksplice s chief operations officer.

The source of Kspliceksplice s roots trace back to 2006 when Arnold was charged with implementing a security update for MIT s Student Information Processing Board that arrived on a weekday.

This wait unfortunately resulted in a cyber attack that required reinstalling all the system software. That s what motivated


newsoffice 00499.txt

and they don have the tools we have to deal with risk, Suri says. hey also don have government programs like unemployment insurance or health insurance,

and use those contacts as part of their risk-sharing networks. But that proximity means that the same environmental


newsoffice 00520.txt

In addition to Finkelstein and Baicker, the co-authors of the Science paper, titled edicaid Increases Emergency Department Use:


newsoffice 00535.txt

A global agreement on carbon emissions would be most effective at reducing the risks of climate change


newsoffice 00613.txt

but also with code that actually performs vital security checks. At the ACM Symposium on Operating systems Principles in November, MIT researchers will present a new system

And sometimes, that can mean dispensing with a security check that guarantees the program proper execution.


< Back - Next >


Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011