Pages

Showing posts with label Science. Show all posts
Showing posts with label Science. Show all posts

Wednesday, November 7, 2012

UFO enthusiasts admit the truth may not be out there after all


Declining numbers of “flying saucer” sightings and failure to establish proof of alien existence has led UFO enthusiasts to admit they might not exist after all.

Dozens of groups interested in unidentified flying objects
have closed due to lack of interest
 Photo: ALAMY
For decades, they have been scanning the skies for signs of alien activity.
But having failed to establish any evidence for the existence of extraterrestrial life, Britain’s UFO watchers are reaching the conclusion that the truth might not be out there after all.
Enthusiasts admit that a continued failure to provide proof and a decline in the number of “flying saucer” sightings suggests that aliens do not exist after all and could mean the end of “Ufology” – the study of UFOs – within the next decade.
Dozens of groups interested in the flying saucers and other unidentified craft have already closed because of lack of interest and next week one of the country’s foremost organisations involved in UFO research is holding a conference to discuss whether the subject has any future.
Dave Wood, chairman of the Association for the Scientific Study of Anomalous Phenomena (Assap), said the meeting had been called to address the crisis in the subject and see if UFOs were a thing of the past.
“It is certainly a possibility that in ten years time, it will be a dead subject,” he added.
“We look at these things on the balance of probabilities and this area of study has been ongoing for many decades.
“The lack of compelling evidence beyond the pure anecdotal suggests that on the balance of probabilities that nothing is out there.
“I think that any UFO researcher would tell you that 98 per cent of sightings that happen are very easily explainable. One of the conclusions to draw from that is that perhaps there isn’t anything there. The days of compelling eyewitness sightings seem to be over.”
He said that far from leading to an increase in UFO sightings and research, the advent of the internet had coincided with a decline.
Assap’s UFO cases have dropped by 96 per cent since 1988, while the number of other groups involved in UFO research has fallen from well over 100 in the 1990s to around 30 now.
Among those to have closed are the British Flying Saucer Bureau, the Northern UFO Network, and the Northern Anomalies Research Organisation.
As well as a fall in sightings and lack of proof, Mr Wood said the lack of new developments meant that the main focus for the dwindling numbers of enthusiasts was supposed UFO encounters that took place several decades ago and conspiracy theories that surround them.
In particular, he cited the Roswell incident, in 1947 when an alien spaceship is said to have crashed in New Mexico, and the Rendlesham incident in 1980, often described as the British equivalent, when airmen from a US airbase in Suffolk reported a spaceship landing.
Mr Wood added: “When you go to UFO conferences it is mainly people going over these old cases, rather than bringing new ones to the fore.
“There is a trend where a large proportion of UFO studies are tending towards conspiracy theories, which I don’t think is particularly helpful.”
The issue is to be debated at a summit at the University of Worcester on November 17 and the conclusions reported in the next edition of the association’s journal, Anomaly.
The organisation, which describes itself as an education and research charity, was established in 1981. Its first president was Michael Bentine, the comedian and member of the Goons.
It contains both sceptics and believers in UFOs and has been involved in several notable sightings and theories over the years.
Its current president Lionel Fanthorpe has claimed in its journal that King Arthur was an alien who came to Earth to save humans from invading extraterrestrials.
The summit follows the emergence earlier this year of the news that the Ministry of Defence was no longer investigating UFO sightings after ruling there is “no evidence” they pose a threat to the UK.
David Clark, a Sheffield Hallam University academic and the UFO adviser to the National Archives, said: “The subject is dead in that no one is seeing anything
evidential.
“Look at all the people who now have personal cameras. If there was something flying around that was a structured object from somewhere else, you would have thought that someone would have come up with some convincing footage by now – but they haven’t.
“The reason why nothing is going on is because of the internet. If something happens now, the internet is there to help people get to the bottom of it and find an explanation.
“Before then, you had to send letters to people, who wouldn’t respond and you got this element of mystery and secrecy that means things were not explained.
“The classic cases like Roswell and Rendlesham are only classic cases because they were not investigated properly at the time.”
But Nick Pope, who ran the MoD’s UFO desk from 1991 to 1994 and now researches UFO sightings privately, said there was a future for the subject: “There’s a quantity versus quality issue here.
“So many UFO sightings these days are attributable to Chinese lanterns that more interesting sightings are sometimes overlooked.
“The same is true with photos and videos. There are so many fakes on YouTube and elsewhere, it would be easy to dismiss the whole subject out of hand.
“The danger is that we throw out the baby with the bathwater. And as I used to say at the MoD, the believers only have to be right once.”

Monday, October 22, 2012

Windows 7: Take control of system security


The Control Panel in Windows 7 provides a number of options for securing your system, configuring backups, adjusting firewall settings and so on.

Jorge Orchilles

Adapted from “Microsoft Windows 7 Administrator’s Reference” (Syngress, an imprint of Elsevier)
Windows 7 comes with a variety of security and system management tools. There are tools for managing the local system, managing hardware and devices, and managing disks and file systems. The Control Panel is one of the most commonly used ones. The Control Panel has long been a central place to go to configure your Windows system. The look has changed over the years, but the tools have remained similar. We’ll take a closer look at the system and security aspects and functions of the Control Panel.
The System and Security category contains applets to help you secure, fine-tune and optimize your system. The subcategories under the System and Security category are Action Center, Windows Firewall, System, Windows Update, Power Options, Backup and Restore, BitLocker Drive Encryption and Administrative Tools. Here’s a brief overview.

Action Center

The Action Center helps you resolve basic system issues. It can help troubleshoot security, maintenance and performance issues. In the Action Center, you have four options: Review your computer’s status and solve issues, Change User Account Control (UAC) settings, Troubleshoot common computer problems, and Restore your computer to an earlier time.
If you choose Review your computer’s status and solve issues, the Action Center will display any issues that your system has detected. These could be issues with security, Windows Update, Windows Backup or a host of other issues.
If you choose Change User Account Control settings, the UAC Settings window will open. UAC is used to control whether programs can make changes to your system. This is important because you don’t want malicious programs to be able to make system changes.
The UAC Settings window includes four options:
  • Always notify: The user will always be notified when either the user or a program attempts to make changes to the system.
  • Notify me only when programs attempt to make changes to my desktop: The desktop will be dimmed when these attempts are made. This is the default option.
  • Notify me only when programs attempt to make changes to my desktop (do not dim my desktop): The desktop will not be dimmed when these attempts are made.
  • Never notify: The user is never notified when either the user or programs attempt to make changes to the system.
If you choose Troubleshoot common computer problems, the troubleshooting applet will open. The troubleshooting applet helps you troubleshoot issues with programs, hardware, Internet connections, appearance, personalization and security.
Choosing Restore your computer to an earlier time will open the Recovery window. In the Recovery window, you can open the System Restore wizard. System Restore lets you restore system files and settings without losing your personal files and data. You can select a restore point, and Windows 7 will restore your system to the state it was when the restore point was created.
The Recovery window also has an option for Advanced Recovery Methods. These will restore your system, but everything will be replaced, including your personal files and data. You can restore your system using a previously created image. You can also choose to reinstall Windows 7 using the original installation media. If you choose either of these methods, you’ll be able to back up your important files and data.

Windows Firewall

The Windows Firewall protects your Windows system from network-based threats. You can control who has access to your system and what level of access they have. The Windows Firewall applet lets you configure these firewall settings.
You have two options in the Windows Firewall section of the Control Panel: Check firewall status and Allow a program through Windows Firewall. Check firewall status will bring up the Windows Firewall window. This option lets you see if the Windows Firewall is enabled or disabled on your system. You can also see Windows Firewall settings for incoming connections and notifications.
Allow a program through Windows Firewall will bring up the Allowed Programs window. Here you can see what programs the Windows Firewall allows. If you want to change these settings, you must choose the Change settings option. Then you can select a program to allow and specify the networks with which the program is allowed to communicate.
The Details option will show you the path to the executable for the allowed application. If you want to allow a program not listed, you can choose the Allow another program option. You can then specify the location of another program you want to allow through the firewall.

System

The System section of the Control Panel lets you view and configure basic system settings. This section has five options: View amount of RAM and processor speed, Check the Windows Experience Index, Allow remote access, See the name of the computer and Device Manager. View amount of RAM and processor speed will launch the System window. Here you can view basic system information. You can see the processor speed, the amount of RAM in the system, the system type, computer name and other important information.
Check the Windows Experience Index will launch the Performance Information and Tools window. You can see your system’s Windows Experience Index. The Windows Experience Index is a number between 1.0 and 7.9 that represents the overall performance of your system.
Your index is based on five components: processor, memory, graphics, gaming graphics and primary hard disk. Each of these components is given a rating. Your index is based on the lowest individual score for the components. You can rerun the assessment any time you wish. This will help you determine if changes made to the system increased or decreased overall performance.
The Allow Remote Access option brings up the Remote tab of the System Properties window. You can use this tab to enable or disable Remote Assistance. You can also use it to enable or disable Remote Desktop.
Selecting See the name of this computer will launch the System window. You can view the name and description of the computer. In addition, you can view the workgroup or domain in which the computer resides. You can also use this window to change the name of the computer or change the system’s workgroup or domain.
You can use the Device Manager to manage the hardware devices in your system. You can install, disable and uninstall devices. You can update drivers. You can also use Device Manager to determine when there’s a problem with one of your hardware devices and when one of your devices isn’t functioning properly.

Windows Update

Windows Update keeps your system up-to-date with the latest updates and patches. Windows Update can automatically download and install device drivers, OS patches and application patches. There are three options in this section: Turn automatic updating on or off, Check for updates and View installed updates. The option named Turn Automatic Updating on or off will bring up the Windows Update Change Settings window.
You can enable or disable Windows Update on your system. You can also control how updates are handled. You can set whether updates are automatically downloaded and installed, or whether user intervention is necessary.
The Check for updates option brings up the Windows Update window. Windows Update will check and see what updates are available for your system. It will also let you know when your system was last updated. Selecting View installed updates will bring up the Installed Updates window.
The Installed Updates window will list all the updates installed on your system. You can see OS updates, application updates and security updates. The Installed Updates window also lets you uninstall updates from your system.

Power Options

The Power Options section includes the following options: Change battery settings, Require a password when the computer wakes, Change what the power buttons do and Change when the computer sleeps.
The Change battery settings option brings up the Power Options window. This is where you choose a power plan. Power plans determine how your system will manage energy consumption, especially when running on battery power. A good power plan will help extend the amount of time your system can run on battery power.
Choosing Require a password when the computer wakes brings up the Power Options System Settings window. This lets you configure whether a user has to enter a password when the system comes out of sleep mode. Take note that in order to make changes to this setting, you have to first select the Change settings that are currently unavailable option. Choosing Change what the power buttons do also brings up the Power Options System Settings window. You can configure what your system does when you press the power or sleep buttons. You can also configure what happens when you close the lid on your laptop.
Change when the computer sleeps launches the Edit Plan Setting window. This lets you change the settings for your current power plan. You can control when the display will dim or turn off. You can configure when the system will enter sleep mode. You can also adjust the screen brightness.

Backup and Restore

The Backup and Restore section of the Control Panel includes two options: Back up your computer and Restore files from a backup. The Back up your computer option will launch the Backup and Restore window. You can use the Backup and Restore window to create a system image, create a system repair or perform a backup of your system.
Back up now starts a new system backup. The backup will use your current backup device and location. Turn on schedule lets you set up periodic backups of your system. You should schedule these backups for a time when the system will be online, but not in use. The Change settings option will allow you to change the default settings for your backups. For example, you can use this to change the default backup location.
The Restore files from a backup option will bring up the Backup and Restore window. At the bottom of the window, there’s a Restore section. The Select another backup to restore files from option will bring up the Restore Files wizard. The Restore Files wizard will walk you through the process of doing a restore. You’ll have to specify the location of the backup to restore from, the files you want to restore and what you want to do with the restored files.

Administrative Tools

The Administrative Tools section includes the following options: Free up disk space, Defragment your hard drive, Create and format hard disk partitions, View event logs and Schedule tasks. Choosing Free up disk space launches the Disk Cleanup applet. This will scan your system and determine what can be done to free up space on your disks. You can delete Downloaded Program Files, Temporary Internet Files, Offline Web pages, files in the Recycle Bin, Setup Log Files, Temporary Files, Thumbnails, Per-user archived Windows Error Reports and System-archived Windows Error Reports.
The Disk Cleanup applet also includes an option to Clean up system files. This opens the Disk Cleanup applet with a tab called More Options. On the More Options tab, you have the option to remove programs you don’t use. You also have to option to remove older system restore points.
Choosing Free up disk space will bring up the Disk Defragmenter. This can help improve performance of your drives. Fragmentation occurs when files split all over your disks. When this happens, your disk has to do more work to access files. The Disk Defragmenter will move your files to a contiguous location. This will speed disk-access performance.
Create and format hard disk partitions will bring up the Disk Management console. You can use the Disk Management console to manage your hard disks and disk partitions. You can create partitions and format partitions. You can also configure fault tolerance for your disks.
Choose View event logs to open the Windows Event Viewer. You can view the Windows logs Application, Security, Setup and System. You can also view individual logs for certain Windows applications and Windows services. You can use Event Viewer to view logs on the local system or a remote system.
Schedule tasks launches Task Scheduler. Use this to schedule tasks to run at specified times. This is great for administrative and maintenance tasks that must be run on a regular basis. Task Scheduler offers great flexibility. You can use the Create Basic Task wizard or manually create a task.
You can schedule tasks to run once, daily, weekly, monthly, when the computer starts, when a user logs on or when a specific event is logged. The task can be to run a program or script, send an e-mail or display a message. Task Scheduler also lets you import and export tasks. This is useful if you want to run the same task on multiple systems.
I’ll cover other aspects of the Control Panel features and functions—such as the myriad options for network and hardware settings, personalization, establishing credentials and so on—in future articles.

Cloud Computing: Developing unique cloud solutions

When developing cloud solutions for specialized organizations such as government agencies, there are a number of areas to consider, including security, mobility and interoperability.

Niten Malik

Developing enterprise-class cloud computing solutions for unique functions such as supporting government agencies is a challenge. While traditional strategies have involved custom development or modifying off-the-shelf enterprise resource planning (ERP) systems, using a stable development platform based on Microsoft Dynamics CRM and SharePoint gives you significant flexibility and scalability.
Last month, I looked at the higher-level considerations for developing customized cloud solutions for specific purposes. Here I’ll examine some of the specific areas you have to keep in mind, such as mobility, security and interoperability.

Mobility management

Users have increasing expectations for access to systems and information through any type of device, whether it’s their desktop PC, laptop, tablet or phone. They require anytime, anywhere access to data, applications and people.
Through a platform like Dynamics CRM Mobile, users can have access to the full breadth of Microsoft Dynamics CRM functionality, including its dashboard capabilities. And they can do so on the mobile device of their choice. There’s no need to load multiple apps onto their device. Microsoft Dynamics CRM Mobile provides a single, consistent application experience.
It provides device-specific application experiences that are natural and intuitive across a range of platforms and targeted UXs. Because it’s based on HTML5, it can structure and present content on different Web browsers. The solution adapts so the look and feel is optimized for different hardware platforms.
You centrally manage Microsoft Dynamics CRM Mobile. You can configure record types, forms, views, offline synchronization rules and navigation structure for the mobile application. You only have to publish these configurations once, regardless of the range of devices that users employ. This simplifies and streamlines mobile CRM management.
To cater to your users’ different needs, you can establish multiple profiles that expose role-specific data and functionality. The result is a mobile experience tailored and optimized for every type of user, whether their job function is sales, marketing or finance, for example. You can also remotely wipe devices of CRM data should a device be lost or stolen, or if an employee leaves the company.

Platform adoption

Having consistent and familiar UIs across multiple, widely used Microsoft applications such as SharePoint, Office and Outlook results in high user adoption rates for a Dynamics CRM-based line-of-business (LOB) application. These friendly and intuitive UIs boost user-adoption rates, which in turn improves data quality.
The seamless integration between Dynamics CRM and other Microsoft Office products further increases adoption. For example, you can add a Dynamics CRM-based solution as a widget within Outlook. This eliminates the need to switch back and forth between applications.
Integration with Word provides an easy mail-merge capability. Excel offers powerful, self-service visualization and analysis tools for enterprise data. Multiple-device support enables access to information through the Web or through mobile devices, further expanding the usability of Dynamics CRM-based solutions.

Collaborative operations

Optimizing operations with the seamless out-of-the-box integration between Microsoft Dynamics CRM and SharePoint with Outlook, Lync and Office can fundamentally change how you work. Optimized business process operations can deliver a significant productivity improvement.
Consider these potential scenarios. In a typical credential-management use case, adjudicators often need to consult on eligibility questions or documentation provided by the customer. This consultation typically involves creating escalation and problem solving via e-mail or a meeting. This creates unpredictable delay in case resolution.
On a factory floor, if a high-speed, highly automated machine is followed by a machine that involves a lot of manual intervention, the factory’s overall productivity and output will suffer. When manual intervention is impossible to avoid, a collaborative process is required to solve problems more efficiently.
One example may be designing operations to leverage integration between SharePoint and Dynamics CRM, such that an adjudicator has easy access to expertise on SharePoint My Site or can use embedded search to find a relevant blog. The presence of the individual expert is automatically synchronized with his Outlook calendar.
You can have the adjudicator connected to an expert within SharePoint or a CRM workflow via Lync and be actively collaborating within minutes. The Lync platform facilitates collaboration in multiple ways, from instant messaging and video conferencing to desktop sharing and in-browser co-editing of documents.

Development considerations

The Microsoft Dynamics CRM development platform offers many features to rapidly deploy LOB applications. These capabilities include:
Data Model: The Dynamics CRM framework includes an extensive list of predefined data entities common to many business applications. Common processes won’t require that you build these entities from scratch. You can easily customize most entities or define completely custom entities.
UI: Dynamics CRM provides HTML-based pages to browse and manage data. You can easily customize the form content, layout and site navigation. You can integrate external UIs and applications as part of the navigation embedded within CRM forms.
Workflows: The Windows Workflow Foundation is integrated with the Dynamics CRM framework to implement business process automation as a single step or complex series of steps, checks, waits and rules. You can execute workflows manually or automatically when records or a data value changes. You can also use workflows to create activities, update records, create alerts, send e-mail on a user’s behalf or implement other custom tasks.
Your users can easily create new workflows and edit parameters using an intuitive interface to control how they work and when they run. They can define workflows at the organizational level to apply to everyone, or to apply to individuals as personal workflows.
Security: At its most basic level, the security model maintains access control over data and services. It allows user profiles and rules for each piece of data to secure sensitive information and meet data privacy requirements.
For single sign-on, authentication and authorization, the framework leverages Microsoft Active Directory. This lets a user enter and exit multiple tenants to which they’ve been granted access without having to log in multiple times. When the user is within a certain tenant, they won’t be able to view information in another tenant even if they have access to that tenant. They’ll need to exit and reenter the other tenant to access that data. This is how the framework guarantees data won’t be improperly combined. Once user access has been granted, the per-tenant security model provides a highly efficient means of establishing and changing security privileges to ensure users always have appropriate access.
Role-based security defines privileges based on business roles within each tenant, rather than on individual users. Users can have one or many roles associated with them, with additive privileges across roles. They can perform many roles within a tenant and the system will automatically recognize the correct security privileges.
Business units group users together and grant authorization based on roles. Business unit design can mirror or help facilitate company structure within the security model. Each business unit defines roles inherited from the organizational hierarchy or specific to it’s the unit’s needs. Each user is then allocated to a single business unit, and assigned one or more security roles within that unit.
Security for reports is just as important, but can typically be more challenging to implement. Microsoft Dynamics CRM uses a concept called filtered database views to provide consistency for the security model. Framework metadata creates and maintains filtered views for each built-in and custom entity defined in the data model. Filtered views incorporate security roles, business unit design and record ownership to enforce access control. You control the reports using the framework security model to determine who can see, run and modify each report.

Social media

Emerging social technologies provide people-centric experiences that can fundamentally impact how people and organizations communicate and collaborate both internally and externally. Social networks such as Twitter and Facebook provide a micro-blogging UX to post information, ask questions and find expertise. About 82 percent of the Facebook users in the 18-to-24 age group check Facebook more than once a day. Content is distributed in many social networks such as Twitter, Facebook and YouTube. It doesn’t follow any set standard.
Social intelligence, based on data patterns and streams, enhances customer service and decision-making. Micro-blogging in Dynamics CRM encompasses activity feeds, status updates and notifications regarding business events and actions. Business activity feeds deliver configurable real-time notifications regarding important relationships and business events.
Social media enables continuous engagement, which is often the end goal of social outreach and collaboration. It provides social sites and other forums such as blogs to share experiences and interests. Social media engages stakeholders in an ongoing dialog to solicit suggestions and address issues. Specific social media strategies will continue to evolve over time.
By itself, SharePoint won’t address the complexity inherent in developing digital outreach tactics. However, it will enable a cost-effective platform to implement social outreach strategies as they evolve. SharePoint has social media connectors, as well as predefined components from which you can launch social sites, wikis and blogs.

Interoperability

The success of any program or initiative depends on the reliability and speed at which you can analyze data from multiple systems and subsequently identify potential risks. Solutions need to be centered on a service-oriented architecture, Web services and an enterprise service bus to quickly and reliably pull together relevant information.
Dynamics CRM is designed to work seamlessly with these and other systems. It natively integrates with any application that can expose and consume Web services. It provides a dynamic Web service interface for applications to access and manipulate data, as well as interact with other framework services. The Web services are interoperable with non-Microsoft platforms.
Dynamics CRM also has out-of-the-box integration with Outlook, which lets you exchange Outlook e-mail, contact, appointment and task objects. You can automatically incorporate CRM content into Microsoft Word documents. Dynamics CRM includes integration with SharePoint, so your users can store unstructured content in a SharePoint workspace. The SharePoint information will appear within the CRM data form. Dynamics CRM lets you add iframes to a CRM form to integrate Web-based applications in-line and use scripting to pass data via URL strings.

Hybrid cloud

You can use Windows Azure to develop new applications or services in the cloud that don’t depend on a specific platform and are widely available. Windows Azure also delivers cloud-based application development tools for testing, deploying, hosting and maintaining applications. The architecture comes with concurrency management, scalability, failover and security. Its open architecture supports integration with legacy applications and interoperability with other systems.
The Windows Azure platform can provide Infrastructure as a Service or on-demand compute and storage to host, scale, build and manage applications. On-demand storage and compute provisioning helps optimize infrastructure costs during non-peak usage.
You can also use this platform to provide different levels of data security. There are numerous security considerations such as location, access and what other data resides in the same environment. Because data security requirements differ, one way to optimize costs while managing security is to operate applications on a hybrid cloud infrastructure consisting of public cloud, government cloud, and private cloud or on-premises infrastructure.
You could host some solution components on a public cloud while having your data reside on the government community cloud and private cloud. By distributing data and solution components across public, government and private cloud, you can optimize storage and compute costs. Solution components hosted in the government cloud have fewer users and a lower infrastructure cost. The government cloud will optimize those costs to a lesser extent compared to the public cloud.
Applying the same logic, you could explore an on-premises or private cloud infrastructure for components and data with the highest security requirement. Because of the smaller user base, these functions have the lowest infrastructure cost to begin with and are appropriate for a private cloud-hosting model.
Any cloud solution should come with enterprise-level tools, such as the ability to designate files as confidential or encrypt messages to avoid add-ons that increase complexity and cost. Solutions built or originated as consumer cloud solutions often lack enterprise-level tools that are standard in government cloud solutions.
Many cloud offerings don’t effectively manage data integrity as data moves between on-premises and the cloud data repository. For example, documents should maintain a consistent format and all key features, such as watermarks. All data retention, management and archival regulations must be followed in the public or government cloud as if those cloud environments are on-premises.
A solution that enables real-time collaboration between officials and customers will result in a responsive program, leading to a rich and impactful ongoing customer relationship. Reliable and robust information exchange with other departments and agencies, combined with actionable analytics that draw insight from contextual data, will increase mission reliability.

Wednesday, October 10, 2012

British Nobel winner once written off by teacher


London, Oct 9 (IANS) A British researcher who won the 2012 Nobel Prize for Medicine was once dismissed by his school teacher about his ambition to become a scientist as "quite ridiculous", the Guardian reported Tuesday.
Sir John Gurdon, 79, of Cambridge University, Monday shared the prize in physiology or medicine - and 744,000-pound cash - withJapanese scientist Shinya Yamanaka, 50.
Their ground-breaking work has given scientists fresh insights into how cells and organisms develop.
The research may pave the way for radical advances in medicine that allow damaged or diseased tissues to be regenerated in the lab, or even inside patients' bodies.
According to his Eton schoolmaster, Gurdon, at an age of 15, did not stand out as a potential scientist.
Writing in 2006, Gurdon quoted a school report as saying: "I believe Gurdon has ideas about becoming a scientist; on his present showing this is quite ridiculous.
"If he can't learn simple biological facts, he would have no chance of doing the work of a specialist, and it would be a sheer waste of time, both on his part and of those who would have to teach him."
His fellow researcher Yamanaka holds academic posts at Kyoto and San Francisco Universities.
Speaking to reporters in London, Gurdon said it was "very gratifying" to be recognised for what has been his life's work.
Prior to the duo's research, scientists believed adult cells were committed irreversibly to their specialist role, for example, as skin, brain or beating heart cells.
Gurdon showed that essentially all cells contained the same genes, and so held all the information needed to make any tissue.
Building on Gurdon's work, Yamanaka developed a chemical cocktail to reprogramme adult cells into more youthful states, from which they could grow into many other tissue types.
In a statement, the Nobel Assembly at Stockholm's Karolinska Institute in Sweden, said the scientists had "revolutionised our understanding of how cells and organisms develop".

Depression a key cause for suicides


The underlying cause of 70 per cent of suicides is depression. For every suicide, around ten more attempted suicides would have occurred.
M. Chandrasekharan Nair, city-based psychiatrist, speaking to The Hindu, said that a government directive on treating a patient jointly by a general physician and a psychiatrist for every attempted suicide case could perhaps help in detecting depression and bringing down cases of suicides.
The stigma of getting treated by a psychiatrist continues to be the hurdle in people reaching out for support and care for better mental health, said Dr. Nair.
Depression is a worldwide phenomenon and about 30 per cent of patients reaching for primary care and specialty care have this problem, he said. However, the patients never realise it nor are the treating physicians oriented towards understanding depression in patients.
Intervention at the right time can help morbidity and mortality of attempted suicides.
The attempt is actually a call for help which goes unnoticed, Dr. Nair said.
There are various socially accepted reasons that people attach for suicides — like failure in examinations or broken relationships. Depression hides behind a mask of bodily symptoms like abdominal pain or other body pains and when investigated they reveal nothing, he said.
He said that it is purely lack of awareness on the part of the primary care physician that depression goes undetected at these stages.
The Indian Psychiatric Association had been asking the Medical Council of India to include an examination paper in psychiatry in the MBBS curriculum, said the president of the Association, Roy Abraham Kallivayalil.
The World Health Organisation has said that the treatment of mental health should begin at primary care, he said. Unfortunately, the primary care physicians are not trained to recognise such symptoms, he added.
Depression is a disease that can be treated, said Dr. Nair. Expression of depression comes through the brain. Recognising it early and treating it would help prevent suicides.

Saturday, October 6, 2012

Life on the Edge - Felix Baumgartner - Red Bull Stratos 2012

Mission delayed due to weather. Target launch now 5AM PT/12PM GMT on October 9! Watch it LIVE 

Friday, October 5, 2012

Australia unveils powerful radio telescope

Antennas of the powerful telescope that aims to discover more about outer pace

Australia has launched one of the world's fastest telescopes tasked with surveying outer space and probing the origins of stars and galaxies.


The Australian Square Kilometre Array Pathfinder (Askap) in Western Australia's outback has 36 antennas with a diameter of 12m (40ft) each.
The A$152m ($155m, £96m) telescope is expected to capture radio images, starting from Friday.
Askap forms part of the world's biggest radio telescope project.
The telescope is located at the Murchison Radio-astronomy Observatory, 315km (196 miles) north-east of Geraldton in the Western Australian desert.
Dr John O'Sullivan, from Australia's Commonwealth Scientific and Industrial Research Organisation, says that while the telescope is not very big, "it is still a very, very powerful survey instrument to start to get a look [at] the origins of galaxies".
"It is the beginning of a great new period, I think," he said.
It will be able to scan the sky much faster than existing telescopes. The location, in a remote area, means there is limited interference from man-made radio signals.
Scientists say that the telescope will generate a huge amount of information. One of the research projects it will be used for is to look for black holes.
The Askap is part of the bigger Square Kilometre Array (SKA) that is set to begin construction in 2016.
SKA, set to become the world's biggest radio telescope project based in South Africa, Australia and New Zealand, aims to answer key questions about the Universe.

Sunday, September 30, 2012

Sun shoots off big flare towards Earth


Nasa has captured the image of a particularly wide Earth-directed coronal mass ejection (CME) or flare, erupting from the Sun and spewing billions of tonnes of solar particles. Experimental Nasa research models estimate that the CME, travelling around 1,120 km per second, reached the Earth on Saturday. CMEs of these speeds are usually benign.

Many nations lag in plan to slow extinctions by 2020: UN


Many nations need to do more to slow extinctions of animals and plants under U.N. targets for 2020 that would also save the world economy billions of dollars a year, U.N. experts say.

M
any nations need to do more to slow extinctions of animals and plants under U.N. targets for 2020 that would also save the world economy billions of dollars a year, U.N. experts say.

Only a few countries -- including France and Guatemala -- have so far adopted new national plans to tackle threats such as pollution or climate change in line with a sweeping pact agreed in Japan in 2010.

"There is a lot more to do," David Cooper, head of the scientific, technical and technological unit at the Secretariat of the U.N. Convention on Biological Diversity (CBD) in Montreal, told Reuters by phone.

Almost 200 nations will meet in Hyderabad, India, from October 8-19 to review progress towards goals to protect life on earth that U.N. reports say is suffering the biggest wave of extinctions since the dinosaurs vanished 65 million years ago.

Governments agreed in 2010 to 20 targets including phasing out damaging subsidies and expanding protected areas, for instance to save valuable coral reefs that are nurseries for fish or to slow deforestation from the Congo to the Amazon.

"There is substantial progress. Is it fast enough to achieve the targets by 2020 for most of them? Probably not overall," Cooper said. Biodiversity is threatened by a projected rise in the human population to 9 billion by 2050 from 7 billion now.

"We need a step up in the activities," he said as part of a series of interviews on the outlook for Hyderabad. Biodiversity underpins everything from food to timber production.

Many other countries, such as Australia, Brazil or China, were making progress. China, for instance, has made big strides in reforestation, Cooper said. The United States is not a member of the CBD.

Nations have also been sluggish in ratifying a protocol laying out rules for access to genetic resources, such as rare tropical plants used in medicines, and ways to share benefits among companies, indigenous peoples or governments.

So far, 92 nations have signed the Nagoya Protocol but just six have ratified, well short of the 50 needed for it to gain legal force. The target is for the protocol to be up and running by 2015.

OVER-OPTIMISTIC

"We were a bit too optimistic," said Valerie Normand, senior programme officer for access and benefit sharing at the CBD, who said the Secretariat had hoped for it to come into force this year. The Secretariat now expected entry into force in 2014.

Cooper said many of the targets set for 2020 would save billions of dollars a year, by ensuring that farming, logging or fishing can be managed sustainably. Some fisheries, for instance, have been exploited to the point of collapse.

In Nagoya, experts estimated that annual funding to safeguard biodiversity totalled about $3 billion a year but some developing countries wanted it raised to about $300 billion.

"These are big numbers but they are trivial compared to the benefits we are getting from biodiversity. If we don't act the costs will be very much greater," Cooper said.

Among concerns, 32 percent of livestock breeds are under threat of extinction within the next 20 years, the U.N. Food and Agriculture Organization says. And 75 percent of the genetic diversity of agricultural crops has been lost since 1900.

"Because we don't really know the full impacts of climate change down the line, we don't really know what's going to happen in terms of growing conditions around the world. It's just safer for us to have a lot of these other varieties in our pocket," said David Ainsworth, spokesman of the CBD Secretariat.

Cooper said the pace of extinctions among the planet's estimated 9 million species -- plants, animals from insects to whales but excluding legions of tiny bacteria -- was perhaps 100 times the background rate estimated in fossil records.

"If you project the rates into the future, the rest of the century, they are likely to be 100 times larger still," he said. The rising human population threatens ever more habitats with expanding cities, farms and roads.

Among goals set in 2010 were to increase protected areas for wildlife to 17 percent of the world's land area by 2020 and to raise marine areas to 10 percent of those under national control. In 2010, respective sizes were 12.7 and 4 percent.

"I am optimistic" that the goal can be reached, said Sarat Babu Gidda, the CBD official who oversees protected areas.