Category: Science &Technology

  • Apple takes on Dropbox and WhatsApp

    Apple takes on Dropbox and WhatsApp

    {{Apple has taken on Dropbox and WhatsApp with a series of software upgrades that mimic the rival apps’ services.}}

    At its annual conference for software developers, the firm unveiled iCloud Drive, an internet-based storage app, which works on Apple systems and PCs.

    In an effort to keep customers using all its technologies, Apple improved integration for calls and messages across its devices.

    It also unveiled new mobile and desktop operating systems.

    Apple’s iMessage app was given extra features, some of which are similar to rival service WhatsApp, recently acquired by Facebook for $19bn (£11.3bn).

    Users will be able to easily create and modify group messages, send voice clips with a single swipe, and even create and exchange short video clips.

    The ability to send and receive text messages across all Apple devices was also introduced.

    Jan Koum, WhatsApp’s co-founder, reacted to Apple’s announcement by tweeting:

    “Very flattering to see Apple “borrow” numerous WhatsApp features into iMessage in iOS 8 #innovation”

  • Google Self Drive Car.‘Serious Competitive Threat’

    Google Self Drive Car.‘Serious Competitive Threat’

    {{Google Inc. could become a “serious competitive threat” to the auto industry if it continues to push its self-driving cars, said Mark Reuss, product-development chief at General Motors Co.}}

    GM, which is developing its own autonomous vehicle technology, isn’t in a race with Google to create driverless cars, he told reporters yesterday in Detroit.

    Google announced May 27 that it plans to deploy at least 100 fully autonomous vehicles that it designed in tests starting this year.

    The two-seat cars will have a top speed of 25 miles (40 kilometers) per hour and no steering wheel. The Mountain View, California-based company previously had been testing its technology in other vehicles, such as Toyota Motor Corp.’s Prius.

    “Anybody can do anything with enough time and money,” Reuss said. “If they set their mind to it, I have no doubt” that they could become “a very serious competitive threat.”

    GM demonstrated last year what it calls Super Cruise technology, which will support semi-automated driving features including hands-off lane following, braking and speed control under certain conditions.

    GM also has an autonomous vehicle project called EN-V that it’s been developing in China. The soda machine-sized pods don’t look like normal cars.

    {{Creeping Change}}

    The industry will phase in autonomous vehicles over years, Reuss said.

    “It’s going to be a creep, it’s not going to be a mind- bending thing,” Reuss said. “I don’t think you’re going to see an autonomous vehicle take over the city anytime soon.”

    Reuss, saying he’s only seen Google’s little car in a photograph, described it as “kind of cool” adding that it looked similar to an old Volkswagen Beetle.

    Over the next two decades, self-driving cars are going to get a bigger share of the market. Such vehicles will reach 11.8 million in 2035, according to Egil Juliussen, an analyst at IHS Automotive.

    And by 2050, he expects almost all cars to become self-driving. They are estimated to fetch premiums that will start at $7,000 to $10,000 in 2025, he said.

  • Scientists Use Lasers to Regrow Teeth

    Scientists Use Lasers to Regrow Teeth

    Scientists have come up with a bright idea – literally – to repair teeth.

    And they say their concept – using laser light to entice the body’s own stem cells into action – may offer enormous promise beyond just dentistry in the field of regenerative medicine.

    The researchers used a low-power laser to coax dental stem cells to form dentin, the hard tissue similar to bone that makes up most of a tooth, demonstrating the process in studies involving rats and mice and using human cells in a laboratory.

    They did not regenerate an entire tooth in part because the enamel part was too tricky. But merely getting dentin to grow could help alleviate the need for root canal treatment, the painful procedure to remove dead or dying nerve tissue and bacteria from inside a tooth, they said.

    “I’m a dentist by training. So I think it has potential for great impact in clinical dentistry,” researcher Praveen Arany of the National Institute of Dental and Craniofacial Research, part of the U.S. National Institutes of Health, said on Friday.

    Arany expressed hope that human clinical trials could get approval in the near future.

    “Our treatment modality does not introduce anything new to the body, and lasers are routinely used in medicine and dentistry, so the barriers to clinical translation are low,” added Harvard University bioengineering professor David Mooney. “It would be a substantial advance in the field if we can regenerate teeth rather than replace them.”

    Using existing regeneration methods, scientists must take stem cells from the body, manipulate them in a lab and put them back into the body. This new technique more simply stimulates action in stem cells that are already in place.

  • UN Wants Wider Use of Drones

    UN Wants Wider Use of Drones

    {{UN peacekeeping missions should deploy more drones and state-of the art technology to become more effective, limit boots on the ground and keep aid workers safer, their chief said on Thursday.}}

    On the International Day of UN Peacekeepers, staff paid tribute to more than 3 000 peacekeepers who have died since 1948, including 106 last year, and to those still serving on the frontline.

    The head of UN peacekeeping, Herve Ladsous, said that a peacekeeper died on average once every three days in 2013, and that technology needs to be upgraded to assist a record number of UN boots on the ground.

    The Security Council last month approved a new mission in the Central African Republic and in December voted to send an extra 5 500 soldiers to war-torn South Sudan.

    “Clearly we cannot continue to afford to work with 20th century tools in the 21st century,” Ladsous told reporters in New York.

    He said drones had already helped in the Democratic Republic of Congo and could be vital in improving humanitarian access.

    “They [convoys] can use the images of the machines to make sure they are not going to be attacked or hijacked on the way. That, I think, is a very significant development,” Ladsous said.

    “We do need them [drones] in countries like Mali, like Central African Republic and clearly in South Sudan it would be my desire that we might deploy them,” he said.

    Surveillance drones could replace some military observers and make a big difference.

    wirestory

  • Google Launches ‘Right to Be Forgotten’

    Google Launches ‘Right to Be Forgotten’

    {{Google has launched a service to allow Europeans to ask for personal data to be removed from online search results.}}

    The move comes after a landmark European Union court ruling earlier this month, which gave people the “right to be forgotten”.

    Links to “irrelevant” and outdated data should be erased on request, it said.

    Google said it would assess each request and balance “privacy rights of the individual with the public’s right to know and distribute information”.

    “When evaluating your request, we will look at whether the results include outdated information about you, as well as whether there’s a public interest in the information,” Google says on the form which applicants must fill in.

    Google said it would look at information about “financial scams, professional malpractice, criminal convictions, or public conduct of government officials” while deciding on the request.

    Earlier this month, the BBC learned that more than half of requests sent to Google from UK individuals involved convicted criminals.

    This included a man convicted of possessing child abuse images who had also asked for links to pages about his conviction to be wiped.

    On 13 May, the EU’s court of justice ruled that links to “irrelevant” and outdated data on search engines should be erased on request.

    The case was brought by a Spanish man who complained that an auction notice of his repossessed home, which appeared on Google’s search results, infringed his privacy.

    On Friday, Google said that EU citizens who want their private details removed from the search engine will be able to do so by filling out an online form.

    However, they will need to provide links to the material they want removed, their country of origin, and a reason for their request.

    Individuals will also have to attach a valid photo identity.

    “Google often receives fraudulent removal requests from people impersonating others, trying to harm competitors, or improperly seeking to suppress legal information,” the firm said.

    “To prevent this kind of abuse, we need to verify identity.”

    agencies

  • Tea Firm Opens East Africa’s Largest Solar Plant

    Tea Firm Opens East Africa’s Largest Solar Plant

    {{Williamson Tea has inaugurated East Africa’s largest solar plant at the Changoi Tea Farm in western Kenya}}

    The 1MW solar plant will be expected to reduce Williamson Tea’s energy costs by 30 per cent by supplying solar power to production facility.

    The project was designed by UK-based Solarcentury and developed by solar specialists East African Solar and Azimuth Power.

    Dan Davies, director for Solarcentury in East Africa, said, “We applaud Williamson Tea for investing in solar to support the company’s sustainable business growth. In a country blessed with plentiful irradiance and land space, solar is a perfect solution and reduces dependence on fossil fuels while improving energy security.”

    Williamson Tea’s solar farm will work in parallel with the national grid, reducing the amount of grid electricity imported.

    When the grid is down, the solar power system will work with standby diesel generators, with the project’s design making it the sixth solar plant of its kind globally, according to Solarcentury.

    The solar farm forms part of Williamson Tea’s commitment to renewable energy and reducing carbon emissions, which includes initiatives to install solar street lamps for local communities and solar-powered heat exchangers at its factories.

    africanreview

  • ‘First Drafts’ of Human Protein Catalogue Published

    ‘First Drafts’ of Human Protein Catalogue Published

    {{The first two attempts at a database of every single human protein – the “proteome” – have been made public.}}

    This builds on our knowledge of the genome by showing which genes actually produce proteins in which tissues.

    One team in Germany and one spanning the US and India have published their proteome maps in the journal Nature, and on searchable, public websites.

    Some of the 17-to-18,000 reported proteins arise from stretches of DNA previously thought to be “non-coding”.

    Along the vast length of DNA packed inside each of our cells, our genes are the sections which contain the instructions, or code, for making proteins.

    “While we have a good idea of what the genome looks like, we didn’t know how many of those potentially 20,000 protein-coding genes would actually make protein,” said Prof Bernhard Kuester, who led the German team at the University of Technology, Munich.

    {{Unexpected results}}

    To find out, the researchers extracted all of the protein from many different samples of human tissues, as well as a number of cell lines.

    The proteins in that purified mixture were then chopped into small pieces and a technique called mass spectrometry revealed the sequence of amino acids forming each of those pieces.

    With a lot of computing power and patience, these batches of protein fragments can be compared with the human genome to make a map, showing which genes in which tissues are “expressed” and producing protein.

    “This is the first inventory, if you like,” Prof Kuester told media, “like a dozen years ago with the first draft of the human genome.”

    And just like the results of the Human Genome Project, these data contain some surprises.

    Both groups found hundreds of unexpected proteins, produced by fragments of ancient genes (called “pseudogenes”) or by lengths of DNA that were not thought to be genes at all.

    As well as the newcomers, there were notable absences. “We have good reason to believe that there are hundreds of known, annotated genes that perhaps are redundant,” said Prof Kuester.

    The team based in the US and India, led by Prof Akhilesh Pandey of Johns Hopkins University in Baltimore, found evidence for only 84% of the proteins that might be predicted from looking at the genome.

    {{Beyond genetics}}

    Prof Pandey told the media it was important to study the proteins themselves, as well as the genes that encode them.

    He offered an example of how a researcher, investigating a particular gene, might use one of the new databases: “They can look at the expression and get clues about what it could be doing.

    For example if a protein is expressed in the foetal gut and not the adult gut, then they might think of some sort of developmental process.”

    The tissue-by-tissue breakdown could also help scientists trying to figure out the actions and side effects of drugs.

    By comparing the proteome of various cancer cell lines, Prof Kuester and his team have already identified certain clusters of proteins that could increase or decrease sensitivity to cancer drugs.

    Dr Kevin Mills, who uses proteomics to study rare diseases at the UCL Institute of Child Health, agrees that it is crucial to look “beyond genomics” at protein levels and how they vary.

    “Genetics can’t tell us everything,” said Dr Mills, who was not involved in either study. “This is really important. We’re not static – we’re fluid and dynamic and our proteome changes continually.”

    BBC

  • Iranian Hackers Use Facebook to Spy on U.S

    Iranian Hackers Use Facebook to Spy on U.S

    {{In an unprecedented, three-year cyber espionage campaign, Iranian hackers created false social networking accounts and a fake news website to spy on military and political leaders in the United States, Israel and other countries, a cyber intelligence firm said on Thursday.}}

    ISight Partners, which uncovered the operation, said the hackers’ targets include a four-star U.S. Navy admiral, U.S. lawmakers and ambassadors, members of the U.S.-Israeli lobby, and personnel from Britain, Saudi Arabia, Syria, Iraq and Afghanistan.

    The firm declined to identify the victims and said it could not say what data had been stolen by the hackers, who were seeking credentials to access government and corporate networks, as well as infect machines with malicious software.

    “If it’s been going on for so long, clearly they have had success,” iSight Executive Vice President Tiffany Jones told media. The privately held company is based in Dallas, Texas and provides intelligence on cyber threats.

    ISight dubbed the operation “Newscaster” because it said the Iranian hackers created six “personas” who appeared to work for a fake news site, NewsOnAir.org, which used content from the Associated Press, BBC, Reuters and other media outlets.

    The hackers created another eight personas who purported to work for defense contractors and other organizations, iSight said.

    The hackers set up false accounts on Facebook and other online social networks for these 14 personas, populated their profiles with fictitious personal content, and then tried to befriend target victims, according to iSight.

    The operation has been active since at least 2011, iSight said, noting that it was the most elaborate cyber espionage campaign using “social engineering” that has been uncovered to date from any nation.

    To build credibility, the hackers would approach high-value targets by first establishing ties with the victims’ friends, classmates, colleagues, relatives and other connections over social networks run by Facebook Inc, Google Inc and its YouTube, LinkedIn Corp and Twitter Inc.

    The hackers would initially send the targets content that was not malicious, such as links to news articles on NewsOnAir.org, in a bid to establish trust.

    Then they would send links that infected PCs with malicious software, or direct targets to web portals that ask for network log-in credentials, iSight said.

    The hackers used the 14 personas to make connections with more than 2,000 people, the firm said, adding that it believed the group ultimately targeted several hundred individuals.

    “This campaign is not loud. It is low and slow,” said Jones. “They want to be stealth. They want to be under the radar.”

  • Microsoft Claims Breakthrough in Real-time Translation

    Microsoft Claims Breakthrough in Real-time Translation

    {{Microsoft has announced what it called a breakthrough in real-time voice translation and said it would offer a test version through its Skype messaging unit before the end of 2014.}}

    The US tech giant demonstrated the new Skype Translator at the Code Conference, saying it fulfills a vision of the “universal translator” in the Star Trek science fiction series.

    “The Star Trek vision for a Universal Translator isn’t a galaxy away, and its potential is every bit as exciting as those Star Trek examples,” said a blog post from Gurdeep Pall, vice president of Skype and Lync at Microsoft.

    “Skype Translator opens up so many possibilities to make meaningful connections in ways you never could before in education, diplomacy, multilingual families and in business.”

    The product, the result of years of research at Microsoft, will be available as a Windows 8 beta app before the end of 2014, Pall said.

    At the California conference, the team demonstrated near-simultaneous translation between English and German.

    “There have been many attempts over the years, several within Microsoft Research, to demonstrate such aspects of translating human speech,” said a Microsoft Research blog post.

    “But delivering something that is usable in real life, to fit the voice and utterances of many different users and the nuances of different languages — all of it built at scale to serve Skype users — has been considered a nearly impossible task.”

    Microsoft said project leader Arul Menezes and Microsoft colleagues “have addressed significant system and user-interface design challenges, including reducing latency and developing visual feedback so the translation system is continuously improving itself using user feedback.”

    “The technology is only as good as the data,” Menezes says. “One big focus has been to scale up the amount and kinds of data that go into the machine-learning training of these systems.”

    AFP

  • EAC Meeting on Cybercrime Underway

    EAC Meeting on Cybercrime Underway

    {{A regional planning meeting of stakeholders in the East African Community (EAC) to chart a way forward in the fight against cybercrime is underway at the Speke Resort Munyonyo in Kampala.}}

    Hodar Addou, the acting UN resident coordinator in Uganda drew the attention of the participants to the threat posed to vulnerable groups like children and women as internet connectivity improves in the region.

    “ICTs will only become more widely embedded in the lives of the children in the region, whether through use of computers in schools, in the home or through personal devices. While the internet can enrich the lives of children in many ways, including as a vehicle for education and civic engagement, it can assist perpetrators of child abuse to make contact with children either to obtain or create abusive materials or to arrange real world meetings,” she said.

    Addou added: “Children may also be bullied, threatened or blackmailed in online environments, or exposed to age inappropriate material.”

    She also weighed in on the insecurities faced by women online.

    “Similarly, while women benefit from using new digital and internet technologies for business, self-expression, and networking, cyber victimisation remains an underexplored barrier to their participation,” she said.

    “Numerous studies have shown that women often outnumber men in surveys on cyber victimisation and that cybercrime perpetrators are overwhelmingly male.”

    John Nasasira, the ICT minister, who opened the meeting, reiterated Uganda’s commitment to fighting cybercrimes.

    The aim of this meeting is to develop initiatives that will be used effectively across the East African Community and further build the countries’ capacity to prevent and combat cybercrime and thereby strengthen the ICT legal and regulatory environment through the exchange of knowledge and expertise

    The two day meeting, organised by the National Information Technology Authority of Uganda (NITA-U) in partnership with the United Nations Office on Drugs and Crime (UNODC) and the Commonwealth Cybercrime Initiative (CCI) will end on Wednesday May 28.