Lucas123 writes "Researchers at UCLA have created an online crowdsourcing game designed to let players help doctors in key areas of the world speed the lengthy process of distinguishing malaria-infected red blood cells from healthy ones. So far, those playing the game have collectively been able to accurately diagnose malaria-infected blood cells within 1.25% of the accuracy of a pathologist performing the same task (PDF). The researchers hope that users of the game can help eliminate the high cost and sometimes poor accuracy of diagnosis in areas like sub-Saharan Africa, where malaria accounts for some 20% of all childhood deaths."
Catch up on stories from the past week (and beyond) at the Slashdot story archive
New submitter horselight writes "Recent data obtained from Mars indicates the environment is not as hostile to life as once thought. 'An examination of data gathered by NASA's Mars Exploration Rover Opportunity reveals deposits that, on Earth, are only created by water moving through the rock.' The study's lead author, Steve Squyres, said, 'From landing until just before reaching the Endeavour rim, Opportunity was driving over sandstone made of sulfate grains that had been deposited by water and later blown around by the wind. These gypsum veins tell us about water that flowed through the rocks at this exact spot. It's the strongest evidence for water that we've ever seen with Opportunity.' Gypsum veins and other features indicating water movement on the surface of Mars have been observed to be much more common than previously thought."
suraj.sun sends this quote from an article at the BBC: "Russia says it is prepared to use 'destructive force pre-emptively' if the U.S. goes ahead with controversial plans for a missile defense system based in Central Europe. The warning came after the Russian defense minister said talks on missile defense were nearing a dead end. Moscow fears that missile interceptors would be a threat to Russia's security. But the U.S. and NATO say they are intended to protect against attacks from Iran or North Korea. 'A decision to use destructive force pre-emptively will be taken if the situation worsens,' chief of the Russian defense staff Gen Nikolai Makarov said. President Barack Obama ... scrapped plans for a network of bases spread across Poland and the Czech Republic with the capacity to intercept long-range missiles. But in 2010, the U.S. signed an agreement with Poland to use an old airstrip at Redzikowo, near the Baltic coast, as a missile defense base."
gbjbaanb writes in with a story about plans to introduce an electronic identity system in Europe. "On Wednesday, the European Commission published a strategy document aimed at setting up systems to protect children online. In the document — but not in the accompanying press release nor the citizens' summary — the Commission mentioned that it will soon propose a 'pan-European framework for electronic authentication,' full details will be announced on 30th May. The launch of the strategy follows a push to strengthen internet security in the EU. It also outlined legal measures to make it easier for people to use a single e-ID for online services across borders, which would underpin a move toward a pan-European framework for electronic identification, authentication and signature (Pefias) framework."
judgecorp writes "A report from the London School of Economics says that funding for superfast broadband in Britain faces a £1.1 billion shortfall. It's a government priority, but rural areas are uneconomic to cable up. From the article: 'Britain is in danger of missing out on the economic and social benefits of superfast broadband due to a lack of government funding and e-skills, according to a new report. Research by the London School of Economics (LSE) and Convergys claims a funding gap of £1.1 billion could cause the government to miss its target of having the “best superfast broadband network” in Europe by 2015.'"
Harperdog writes "Tom Jacobs has a very cool little story about an Israeli research team introducing a novel way of verifying a computer is being operated by its rightful user. Its method, described in the journal Information Sciences, 'continuously verifies users according to characteristics of their interaction with the mouse.'"
First time accepted submitter kongshem writes "According to Symantec's annual Internet Security Threat Report, religious and ideological websites have far more security threats per infected site than adult/pornographic sites. Why is that? Symantec's theory: 'We hypothesize that this is because pornographic Web site owners already make money from the Internet and, as a result, have a vested interested in keeping their sites malware-free — it's not good for repeat business,'"
First time accepted submitter rebelwarlock writes "McAfee lives in Belize and he says that he has become a target of the Gang Suppression Unit. He says the GSU came busting into his research facility in Orange Walk, killed his dog, took his passport, handcuffed him and arrested him on a bogus weapons charge. McAfee says he's a victim because he didn't donate money to a known U.D.P. Orange Walk politician."
jmcbain writes "Scott Thompson, Yahoo!'s CEO who was hired on January 4 of this year, was found to have lied about his CS degree from Stone Hill College. Investigation from an activist shareholder revealed that his degree was actually in accounting, and apparently Thompson had been going with this lie since the time he served as president of PayPal's payments unit."
MojoKid writes "NVIDIA has lifted the embargo on benchmarks and additional details of their GeForce GTX 690 card today. According to a few folks at NVIDIA, company CEO Jen Hsun Huang told the team to spare no expense and build the best graphics card they possibly could, using all of the tools at their disposal. As a result, in addition to a pair of NVIDIA GK104 GPUs and 4GB of GDDR5 RAM, the GeForce GTX 690 features laser-etched lighting, a magnesium fan housing, a plated aluminum frame, along with a dual vapor chamber cooler with ducted airflow channels and a tuned axial fan. The sum total of all of these design enhancements results in not only NVIDIA's fastest graphics card to date, but also one of its quietest. In the performance benchmarks, NVIDIA's new dual-GPU powerhouse is easily the fastest graphics card money can buy right now, but of course it's also the most expensive." The GeForce GTX 690 has been reviewed lots of different places today, Tom's Hardware and AnandTech to name a few.
An anonymous reader writes "A security researcher believes that Microsoft has overhauled Skype, with thousands of Linux boxes serving as the 'supernodes' that route calls between users of the voice-over-IP service. Kostya Kortchinsky of Immunity Security 'discovered the Linux supernodes using a Skype probing technique he and colleague Fabrice Desclaux first demonstrated in 2006,' according to Ars Technica. The drastic infrastructure change doesn't affect the peer-to-peer nature of the calls between Skype users."
jfruh writes "Even as an EU court rules that APIs can't be copyrighted, tech observers are waiting for the Oracle v. Google trial jury to rule on the same question under U.S. law. Blogger Brian Proffitt spoke with Groklaw's Pamela Jones on the issue, and her take is that a victory for Oracle would be bad news for developers. Essentially, Oracle is claiming that, while an individual API might not be copyrightable, the collection of APIs needed to use a language is. Such a decision would, among other things, make Java's open source nature essentially meaningless, and would have lots of implications for any programming language you can name."
An anonymous reader writes "If you're running a terrorist organization, it might make sense to encrypt your files. Clearly Osama Bin Laden didn't realize that — as some of the documents seized during the raid on his hideout in Pakistan have been made public for the first time. 17 electronic documents, which were found on USB sticks, memory cards and computer hard drives after US Navy Seals killed the terrorist chief in the May 2011 raid, are being released in their original Arabic alongside English translations by the Combating Terrorism Center, reports Sophos."
milbournosphere writes "New York Judge Gary Brown has found that IP addresses don't provide enough evidence to identify pirates, and wrote an extensive argument explaining his reasoning. A quote from the judge's order: 'While a decade ago, home wireless networks were nearly non-existent, 61% of U.S. homes now have wireless access. As a result, a single IP address usually supports multiple computer devices – which unlike traditional telephones can be operated simultaneously by different individuals. Different family members, or even visitors, could have performed the alleged downloads. Unless the wireless router has been appropriately secured (and in some cases, even if it has been secured), neighbors or passersby could access the Internet using the IP address assigned to a particular subscriber and download the plaintiff's film.' Perhaps this will help to stem the tide of frivolous mass lawsuits being brought by the RIAA and other rights-holders where IP addresses are the bulk of the 'evidence' suggested."
An anonymous reader writes "I have at least 10 assorted hard drives ranging from 100 GB to 3 TB, including external drives, IDE desktop drives, laptop drives, etc. What's the best way to setup a home NAS to utilize all this 'excess' space? And could it be set up with redundancy built-in so a single drive failure would cause no data loss? I don't need anything fancy. Visibility to networked Windows PCs is great; ability to streak to Roku / iPad / Toshiba etc would be great but not necessary. What's the best way to accomplish this goal?"