Obama Still an 'Optimist' on Cliff Deal


gty barack obama ll 121221 wblog With Washington on Holiday, President Obama Still Optimist on Cliff Deal

Mandel Ngan/AFP/Getty Images


WASHINGTON D.C. – Ten days remain before the mandatory spending cuts and tax increases known as the “fiscal cliff” take effect, but President Obama said he is still a “hopeless optimist” that a federal budget deal can be reached before the year-end deadline that economists agree might plunge the country back into recession.


“Even though Democrats and Republicans are arguing about whether those rates should go up for the wealthiest individuals, all of us – every single one of us -agrees that tax rates shouldn’t go up for the other 98 percent of Americans, which includes 97 percent of small businesses,” he said.


He added that there was “no reason” not to move forward on that aspect, and that it was “within our capacity” to resolve.


The question of whether to raise taxes on incomes over $250,000 remains at an impasse, but is only one element of nuanced legislative wrangling that has left the parties at odds.


For ABC News’ breakdown of the rhetoric versus the reality, click here.


At the White House news conference this evening, the president confirmed he had spoken today to Senate Majority Leader Harry Reid, D-Nev., and House Speaker John Boehner, R-Ohio, although no details of the conversations were disclosed.


The talks came the same day Speaker Boehner admitted “God only knows” the solution to the gridlock, and a day after mounting pressure from within his own Republican Party forced him to pull his alternative proposal from a prospective House vote. That proposal, ”Plan B,” called for extending current tax rates for Americans making up to $1 million a year, a far wealthier threshold than Democrats have advocated.


Boehner acknowledged that even the conservative-leaning “Plan B” did not have the support necessary to pass in the Republican-dominated House, leaving a resolution to the fiscal cliff in doubt.


“In the next few days, I’ve asked leaders of Congress to work towards a package that prevents a tax hike on middle-class Americans, protects unemployment insurance for 2 million Americans, and lays the groundwork for further work on both growth and deficit reduction,” Obama said. ”That’s an achievable goal.  That can get done in 10 days.”


Complicating matters: The halls of Congress are silent tonight. The House of Representatives began its holiday recess Thursday and Senate followed this evening.


Meanwhile, the president has his own vacation to contend with. Tonight, he was embarking for Hawaii and what is typically several weeks of Christmas vacation.


However, during the press conference the president said he would see his congressional colleagues “next week” to continue negotiations, leaving uncertain how long Obama plans to remain in the Aloha State.


The president said he hoped the time off would give leaders “some perspective.”


“Everybody can cool off; everybody can drink some eggnog, have some Christmas cookies, sing some Christmas carols, enjoy the company of loved ones,” he said. “And then I’d ask every member of Congress, while they’re back home, to think about that.  Think about the obligations we have to the people who sent us here.


“This is not simply a contest between parties in terms of who looks good and who doesn’t,” he added later. “There are real-world consequences to what we do here.”


Obama concluded by reiterating that neither side could walk away with “100 percent” of its demands, and that it negotiations couldn’t remain “a contest between parties in terms of who looks good and who doesn’t.”


Boehner’s office reacted quickly to the remarks, continuing recent Republican statements that presidential leadership was at fault for the ongoing gridlock.


“Though the president has failed to offer any solution that passes the test of balance, we remain hopeful he is finally ready to get serious about averting the fiscal cliff,” Boehner said. “The House has already acted to stop all of the looming tax hikes and replace the automatic defense cuts. It is time for the Democratic-run Senate to act, and that is what the speaker told the president tonight.”


The speaker’s office said Boehner “will return to Washington following the holiday, ready to find a solution that can pass both houses of Congress.”

Read More..

Van-sized space rock is a cosmic oddball








































The shattered remains of a high-profile space rock are oddly low in organic materials, the raw ingredients for life. The discovery adds a slight wrinkle to the theory that early Earth was seeded with organics by meteorite impacts.












In April a van-sized meteor was seen streaking over northern California and Nevada in broad daylight. The fireball exploded with a sonic boom and sprayed the region with fragments. Videos, photographs and weather radar data allowed the meteor's trajectory to be reconstructed, and teams quickly mobilised to search for pieces in the foothills of the Sierra Nevada in northern California.













Researchers readily identified the meteorites as rare CM chondrites, thought to be one of the oldest types of rock in the universe. "Because the meteorites were discovered so freshly, for the first time we had a chance to study this type of meteorite in a pristine form," says Peter Jenniskens of the SETI Institute in Mountain View, California, who led the search effort and the subsequent study of the space rocks.












Jenniskens personally found a fragment in a parking lot, where it remained relatively free of soil contaminants. "That's the best you could hope for, other than landing in a freezer," says Daniel Glavin of NASA's Goddard Space Flight Center in Greenbelt, Maryland.











Battered past












CM chondrites make up only about 1 per cent of known meteorites. Most of them contain plenty of organic materials, including amino acids, the building blocks of life on Earth.













Jenniskens and colleagues found that the California fragments also have amino acids, including some not found naturally on Earth. But in three rocks collected before a heavy rainstorm, which bathed the other pieces in earthly contaminants, organics are less abundant by a factor of 1000 than in previously studied CM chondrites.












These three rocks could not have lost organics due to space "weathering": analysis of the meteorites' exposure to cosmic rays suggests the original meteor was flying through space for only about 50,000 years before hitting Earth.












Based on its trajectory and its relatively short flight time, Jenniskens thinks the meteor can be traced back to a family of asteroids dominated by 495 Eulalia, a group known as a possible source of CM chondrites. It is probably a piece that broke off during an impact, revealing the relatively pristine material inside.












So what happened to its organics? Jenniskens' team found that the meteorites are breccia – smaller rocks cemented together – which suggests that the asteroid from which they came took a series of beatings. Those impacts, or possibly other processes inside the asteroid, could have heated it enough to destroy most organic material.











Limited delivery













The result might have implications for the organics delivery theory, says Bill Bottke of the Southwest Research Institute in Boulder, Colorado.












"It shows that not all asteroids can deliver sufficient quantities. One of the disappointments is that, from a prebiotic organic chemistry perspective, it was very limited," says Bottke. "But this is an unusual case. Most [CM chondrites] are loaded with organic compounds."











Still, studying the space rocks will help us prepare future missions to asteroids such as OSIRIS-Rex, scheduled to take off for asteroid 1999 RQ36 in 2016 and bring a sample back in 2023.













"In some ways, we've had a sample, a very fresh one, come to us," says Bottke. "This is a test bed for the techniques we'll use in that mission."












Journal reference: Science, DOI: 10.1126/science.1227163


















































If you would like to reuse any content from New Scientist, either in print or online, please contact the syndication department first for permission. New Scientist does not own rights to photos, but there are a variety of licensing options available for use of articles and graphics we own the copyright to.




































All comments should respect the New Scientist House Rules. If you think a particular comment breaks these rules then please use the "Report" link in that comment to report it to us.


If you are having a technical problem posting a comment, please contact technical support.








Read More..

User revolt causes Instagram to keep old rules






SAN FRANCISCO: Instagram on Thursday tried to calm a user rebellion by nixing a change that would have given the Facebook-owned mobile photo sharing service unfettered rights to people's pictures.

"The concerns we heard about from you the most focused on advertising, and what our changes might mean for you and your photos," Instagram co-founder and chief Kevin Systrom said in a blog post.

"There was confusion and real concern about what our possible advertising products could look like and how they would work," he continued.

Protests prompted Instagram to stick with wording in its original terms of service and privacy policies regarding advertising and to do away with some changes that were to take effect in January, according to Systrom.

"You also had deep concerns about whether under our new terms, Instagram had any plans to sell your content," the Instagram chief said.

"I want to be really clear: Instagram has no intention of selling your photos, and we never did. We don't own your photos, you do."

Instagram on Tuesday backed off a planned policy change that appeared to clear the way for the mobile photo sharing service to sell pictures without compensation, after users cried foul.

Changes to the Instagram privacy policy and terms of service had included wording that appeared to allow people's pictures to be used by advertisers at Instagram or Facebook worldwide, royalty-free.

Twitter and Instagram forums buzzed over the phrasing, as users debated whether to delete their accounts before the new rules kicked in.

Originally proposed portions of the new policy that rankled users included "You hereby grant to Instagram a non-exclusive, fully paid and royalty-free, transferable, sub-licensable, worldwide license to use the content that you post on or through the service."

The terms also stated that "a business or other entity may pay us to display your username, likeness, photos, and/or actions you take, in connection with paid or sponsored content or promotions, without any compensation to you."

Instagram said that the policy changes to take effect in January were part of a move to better share information with Facebook, which bought the company this year.

The original price was pegged at US$1 billion but the final value was less because of a decline in the social network's share price.

"I'm proud that Instagram has a community that feels so strongly about a product we all love," Systrom said while apologising to users and promising the offensive policy changes were gone.

-AFP/fl



Read More..

Four security trends defined 2012, will impact 2013




The Internet is slowly changing, and security experts say that today's security issues will continue to be major players in driving that change. Here are four trends that dominated headlines in 2012, and will continue to play a major role in 2013.


The Internet as governmental tool
The collective realization by governments around the world that the Internet is an excellent network for conducting surveillance, monitoring, espionage, and war, says Finnish computer security firm F-Secure's Chief Technical Officer Mikko Hypponen, may not come to full fruition in 2013. But the foundation for that change is already underway.


"There will be more operations along the lines of Olympic Games, also from other sources than US and Israel. Later on, we might look back at these first 20 years of the Web as the Golden Days, when the net was still free," he wrote in an e-mail to CNET. "Olympic Games" is the covert inter-govenrment project that birthed Stuxnet, Duqu, and Flame.




Information security expert Chris Wysopal agreed that "cyber-warfare" is becoming commonplace. "When there's a political or actual war event, we're seeing cyber-attacks parallel that. It does seem to be more pronounced. It's almost not newsworthy, as if we expect it to happen alongside a political event."


Take that in for a moment. Government-sponsored, computer-based attacks, as "almost not newsworthy," he said.


But just because these attacks are becoming more frequent doesn't mean that they don't stymie security researchers. Tomer Teller, a security evangelist and researcher at Check Point, said that he was surprised this year by the rise of "precision-targeted attacks."


"We saw that with Gauss this year, from the Stuxnet family. It had an encrypted payload, and researchers couldn't decrypt it."


Tim Rains, the director of Microsoft's Trustworthy Computing division, pointed out that these governmental actions have consequences beyond the nuclear reactors of Iran and other industrial targets.


"Eighty-five percent of the exploits against operating systems tried to take advantage of one of the vulnerabilities that Stuxnet used. A very small fraction of malware uses "zero-days", so we're seeing commodity malware writers benefits from the research of professionals," he said. "It was a trend in 2012, and we'll continue to see that in the next year."




More mobile devices, bigger targets
Experts have been talking up mobile security for several years now, and as mobile device proliferation continues, so will the security problems associated with them. Because of their very mobile, always-connected nature, experts told me that the problems will become more complex in 2013.


Lookout Mobile Security's Senior Product Manager, Derek Halliday, noted two interesting trends that his company saw in 2012. Lookout predicted and saw in 2012, "only a few dominant kinds of mobile malware," he said.


Microsoft's Rains agreed. "[The Looter exploit] is responsible for the second-most highest number of mobile threats we saw."


Halliday added, "The other thing was how geographic specific these threats were. We were surprised by the stark contrast between the U.S. and say Russia or China. If you try to run a toll fraud application at scale in the U.S., you'll encounter some problems -- a double-opt in message, government intervention," he said.


Another point Halliday made was that while
Android 4.2 is the most secure yet, with numerous security improvements, operating system fragmentation will prevent it from reaching most people until late 2013.




On the other hand, said Wysopal, the impact of mobile malware is definitely growing. "In 2012, half a percent of all mobile users got hurt by mobile malware in the U.S. That's a million people, not an insignificant number. It's a trend that is happening slower than expected, but it's not going to go away."


The malware problem is likely to remain isolated from Apple's iOS, according to Hypponen. "There's still no iPhone malware. Five years after shipping one of the most popular systems, they have no malware problem at all. That's a major accomplishment by Apple. Job well done."


Desktop threat, still a threat
Mobile is booming, with Android devices outselling Windows computers in Q3 2012, but that doesn't mean that we'll see a downturn in desktop-focused attacks.


One story that Hypponen says was underreported in 2012 was the rootkit known as ZeroAccess. "Zero Access is almost totally under the radar, yet it's a massive, massive outbreak. It's almost as big in size as Conficker, which was headline material for weeks. [Zero Access] is a commercial kit, being developed and sold by a Russian coder. [It] installs itself to the [master boot record] so it boots before Windows.


While Hypponen noted that
Windows 8 and Macs use UEFI to create secure boot procedures that prevent rootkits like Zero Access, Microsoft's Rains cautioned that eventually, and possibly in the coming year, this will force rootkits to evolve.




Mac malware got a lot of attention in the second half of 2011 and in 2012 with Flashback, and that's expected to continue. Hypponen said, "The author of the Flashback Trojan is still at large and is rumored to be working on something else. And while there have been smart security changes to the Mac OS," likely alluding to Mountain Lion's Gatekeeper, "there's a segment of the Mac-using population who are basically oblivious to the threats facing Macs, making them vulnerable to a new malware outbreak."


And across platforms, browsers remain a broad surface to attack despite ongoing improvements. Jeremiah Grossman of WhiteHat Security said that new exploits and vulnerabilities, such as CSS sniffing attacks, will continue to cause turmoil in the most popular kind of desktop program. "Let's say you just downloaded Chrome or Firefox. If I can get you to click somewhere on the screen, I can get you. These browsers are not really secure, it's death by 1,000 cuts."
we have 15 years of broken, faulty web code, we have a lot of garbage websites out there that are protecting a lot of interesting data.


Privacy and data breaches
One of the big notables in information security over the past year was the rise of awareness in data mining. Brought on by numerous privacy policy changes to high-profile social networks like Facebook, Google, and Instagram, by fast and loose trendy mobile app policies, and by shockingly large data breaches at companies that just can't be bothered investing in better database protection, privacy is becoming a key security topic.



Lookout's Halliday said that he expects privacy to be a hot topic in the coming year. Not only has the California attorney general been pushing for companies to take a stance more favorable to consumers before the government is forced to step in, he said, but consumers are more aware in general.


"Devices are collecting not just location information, but contacts and your historical record of talking to them. We'd be more than happy if there was significant progress towards [better privacy] as a goal," he said.


WhiteHat Security's Grossman pointed out that it's not just malware writers who are using exploits. Difficult to detect until recently, "CSS sniffing was being done data aggregators," he said.


Holistic security
One trend that's impossible to deny is that these security problems may start in discretely different realms, but the nature of the Internet is making them more intertwined than ever before. Malware-writing techniques pioneered for Stuxnet inspire consumer-targeted malware writers, who in turn are forced to develop new social engineering techniques as app stores, browsers, and Web site owners play Whac-a-Mole with vulnerabilities.


And issues like the potential for exploiting devices connected directly to the Internet, like smart TVs and DVD players; more creative, harder to stop social engineering; the commercialized selling of all manner of exploits; and utility and medical device hacks are expected to grow in impact.


As much as we don't want to admit it, security is becoming an issue of ongoing education. 2013 would be a good year to get going on that.

Read More..

Hollies Get Prickly for a Reason



With shiny evergreen leaves and bright red berries, holly trees are a naturally festive decoration seen throughout the Christmas season.


They're famously sharp. But not all holly leaves are prickly, even on the same tree. And scientists now think they know how the plants are able to make sharper leaves, seemingly at will. (Watch a video about how Christmas trees are made.)


A new study published in the Botanical Journal of the Linnean Society suggests leaf variations on a single tree are the combined result of animals browsing on them and the trees' swift molecular response to that sort of environmental pressure.


Carlos Herrera of the National Research Council of Spain led the study in southeastern Spain. He and his team investigated the European holly tree, Ilex aquifolium. Hollies, like other plants, can make different types of leaves at the same time. This is called heterophylly. Out of the 40 holly trees they studied, 39 trees displayed different kinds of leaves, both prickly and smooth.



Five holly leaves from the same tree.

Five holly leaves from the same tree.


Photographs by Emmanuel Lattes, Alamy




Some trees looked like they had been browsed upon by wild goats and deer. On those trees, the lower 8 feet (2.5 meters) had more prickly leaves, while higher up the leaves tended to be smooth. Scientists wanted to figure out how the holly trees could make the change in leaf shape so quickly.


All of the leaves on a tree are genetic twins and share exactly the same DNA sequence. By looking in the DNA for traces of a chemical process called methylation, which modifies DNA but doesn't alter the organism's genetic sequence, the team could determine whether leaf variation was a response to environmental or genetic changes. They found a relationship between recent browsing by animals, the growth of prickly leaves, and methylation.


"In holly, what we found is that the DNA of prickly leaves was significantly less methylated than prickless leaves, and from this we inferred that methylation changes are ultimately responsible for leaf shape changes," Herrera said. "The novelty of our study is that we show that these well-known changes in leaf type are associated with differences in DNA methylation patterns, that is, epigenetic changes that do not depend on variation in the sequence of DNA."


"Heterophylly is an obvious feature of a well-known species, and this has been ascribed to browsing. However, until now, no one has been able to come up with a mechanism for how this occurs," said Mike Fay, chief editor of the Botanical Journal of the Linnean Society and head of genetics at the Kew Royal Botanic Gardens. "With this new study, we are now one major step forward towards understanding how."


Epigenetic changes take place independently of variation in the genetic DNA sequence. (Read more about epigenetics in National Geographic magazine's "A Thing or Two About Twins.")


"This has clear and important implications for plant conservation," Herrera said. In natural populations that have their genetic variation depleted by habitat loss, the ability to respond quickly, without waiting for slower DNA changes, could help organisms survive accelerated environmental change. The plants' adaptability, he says, is an "optimistic note" amidst so many conservation concerns. (Related: "Wild Holly, Mistletoe, Spread With Warmer Winters.")


Read More..

Police Chief Wants to Ban High-Capacity Firepower












High-capacity magazines are the deadliest of gun cartridges. They come in cases of 30, 40, 60 and even 120 rounds.


These magazines are maximum, economy-sized firepower packed into a steel cartridge. When strapped into a pistol or semi-automatic rifle, a shooter can fire non-stop until the magazine is empty. By then, the damage can be devastating.


That is why the Baltimore County Police Chief Jim Johnson wants to outlaw all but the smallest of these magazines. Johnson wants to limit them to a capacity of 10 rounds.


The fewer the bullets, the more often the shooter has to stop firing, eject the empty cartridge and load another one.


A lot can happen in the window of time it takes to reload, Johnson said.


"Folks that are being attacked have time to react, to close that distance in," he said. "I think any football player in America would like to have four-and-a-half seconds to get to the quarterback without any of the offensive players."




An expert shooter like a police officer can switch magazines in less than two seconds. But for a nervous, scared adolescent, it would take much longer, Johnson said, which can be crucial.


During the Tucson, Ariz., attack on Rep. Gabby Giffords, gunman Jared Loughner was wrestled down when he stopped shooting to reload his 9-millimeter pistol.


During the Aurora, Colo., movie theater shooting spree last July, police say James Holmes' assault came to an end when his semi-automatic rifle jammed.


"As we've seen in America today, there have been several attacks where that reload is vital," Johnson said. "Tragically, in the shooting of a congresswoman, the reload was instrumental.


"We've also seen this in Baltimore County, in a school shooting that we had, where the reload became very instrumental in allowing the teacher to actually tackle a student that was trying to reload a double-barreled shotgun," he said.


Last week at Sandy Hook Elementary School in Newtown, Conn., police believe Adam Lanza was armed with high-capacity magazines. He fired at least 30 times before having to stop to reload.


Johnson said there is no reason that the general public should have access to high-capacity magazines.


"I have to advise you that even for law enforcement, 100-round magazines, 50-round magazines, have no place for law enforcement," Johnson said. "Certainly, we believe that limiting a magazine to 10 rounds, what was in place from '94 to 2004, is wise and certainly could save lives in America."



Read More..

Human hands evolved so we could punch each other









































Forget toolmaking, think fisticuffs. Did evolution shape our hands not for dexterity but to form fists so we could punch other people? That idea emerges from a new study, although it runs counter to conventional wisdom.











About the same time as we stopped hanging from trees and started walking upright, our hands become short and square, with opposable thumbs. These anatomical changes are thought to have evolved for tool manipulation, but David Carrier at the University of Utah in Salt Lake City has an alternative explanation.













He says there are several possible hand shapes that would have allowed greater dexterity, making it less clear why we ended up with the hands we have. But only one hand shape lets us make a fist with a thumb as buttress.












Among primates' hands, ours is unique for its ability to form a fist with the thumb outside the fingers. The fingers of other primates' hands are too long to curl into their palms, and their thumbs are too short to reach across the fingers. So when apes fight, they are far more likely to wrestle or hold their opponent down while others stomp on him, says Carrier.












To test the importance of fists, Carrier and his colleagues recruited 10 athletes and measured how hard they could hit a punching bag using a normal fist, a fist with the thumb stuck out, and with an open palm.












The athletes could generate more than twice the force with a normal fist as with the thumb-stuck-out fist, because of thumb's buttressing role. There was no difference in the force they could generate with a normal fist and with an open palm, but Carrier says it's possible that a fist concentrates the force into a smaller area and so does more damage.











Cause or effect?













Mary Marzke of Arizona State University in Tempe says the study is interesting, but it far from proves that the ability to make a strong fist was the main driver behind the evolution of our hands' shape. It is more likely that it was a useful side effect of a whole suite of modifications.












She points out that apes strike with the heel of their hand when knocking fruit out of trees. Carrier's study didn't assess the force that the heel of the hand generates, but if it turns out to be as good as a fist, it becomes less clear that our hands evolved so as to be perfect for fist-making, Marzke says.











But if the hypothesis is true, Carrier thinks it could explain another mystery. It has long been unclear why high levels of testosterone cause men's ring fingers to be longer than their index fingers. He says the finger-length ratio makes sense if it generates a better fist. This would make dominant males even better fighters.













Journal reference: Journal of Experimental Biology, doi:10.1242/jeb.075713


















































If you would like to reuse any content from New Scientist, either in print or online, please contact the syndication department first for permission. New Scientist does not own rights to photos, but there are a variety of licensing options available for use of articles and graphics we own the copyright to.




































All comments should respect the New Scientist House Rules. If you think a particular comment breaks these rules then please use the "Report" link in that comment to report it to us.


If you are having a technical problem posting a comment, please contact technical support.








Read More..

Review slams BBC over Savile report but says no cover-up






LONDON: An official report strongly criticised the BBC's handling of allegations of child sex abuse against late presenter Jimmy Savile, but cleared the world's biggest broadcaster of a cover-up.

The findings by an independent inquiry sparked the resignation of the BBC's deputy director of news, and led to the editor and deputy editor of the programme at the centre of the scandal being replaced.

The report exposed the "chaos and confusion" at the BBC although it dismissed claims that its flagship current affairs programme Newsnight dropped an investigation into Savile so as not to jeopardise Christmas tribute shows to him.

The BBC commissioned the inquiry by former Sky News executive Nick Pollard in October during a major crisis at the corporation that cost then-director-general George Entwistle his job.

Savile, who died last year at the age of 84, was one of the BBC's top TV and radio presenters.

The child abuse claims were first made public by rival broadcaster ITV two months ago and since then police have identified 199 crimes in which Savile is a suspect, including 31 alleged rapes.

Newsnight first had evidence of the allegations a year ago, shortly after Savile's death, but it dropped the story after just a few weeks.

The Pollard report found no evidence to support claims that this was to avoid an embarrassing clash with planned Christmas tributes to the late star.

But it criticised the decision to drop the probe and the BBC's failure to deal with the ensuing crisis at the broadcaster, which it said was plagued by infighting and a "critical lack of leadership and coordination".

"The decision to drop the original investigation was flawed and the way it was taken was wrong but I believe it was done in good faith. It was not done to protect the Savile tribute programmes or for any improper reason," Pollard said.

"In my view, the most worrying aspect of the Jimmy Savile story for the BBC was not the decision to drop the story itself. It was the complete inability to deal with the events that followed."

BBC Trust chairman Chris Patten, the former governor of Hong Kong, said the BBC accepted the review in its "entirety" and looked at the failings of the corporation with "pretty searing honesty".

In an email to staff, acting director-general Tim Davie welcomed the finding that there was no cover-up but acknowledged the report had exposed "clear failings" which must now be addressed.

He announced a shake-up of staff at Newsnight, saying the programme's editor, Peter Rippon, and deputy editor, Liz Gibbons, would move to other BBC jobs.

And he said Stephen Mitchell was resigning as deputy director of BBC news and would leave next year after 38 years with the corporation.

Mitchell had stood aside pending the Pollard review, and was criticised in Wednesday's report for removing Newsnight's Savile investigation from an internal BBC list that flagged up controversial stories.

Mitchell's boss, director of news Helen Boaden, keeps her job despite being criticised for failing to take greater responsibility as the crisis grew.

Davie later told Newsnight that it had been a "particularly bad and sorry saga" but defended the lack of sackings.

"My job is not to just dismiss people, my job is to make a fair and balanced assessment of the facts," he said.

"The idea that you have to sack someone to lead to cultural change I think is just flawed."

The report also revealed that when Savile was ill a BBC executive had emailed Entwistle before he became director general to urge against preparing an obituary for the late presenter because of concerns about "the darker side" of his life.

Entwistle said he never read that email and Pollard said he found nothing to suggest anyone preparing the tribute programmes was aware of the rumours or allegations about Savile.

London police on Wednesday arrested an eighth person in connection with the Savile abuse probe, who was identified by media as the star's former producer.

The scandal over Newsnight's dropped investigation was compounded when the programme broadcast a television report last month which wrongly implicated a senior former Conservative politician, Alistair McAlpine, in child sex abuse.

The BBC was forced to apologise and pay substantial damages to McAlpine, and Entwistle resigned as director-general after only 54 days in the job.

He will be replaced by former BBC news chief and current Royal Opera House chief Tony Hall in March.

A further investigation is ongoing into what the BBC knew about Savile's activities during his time there.

- AFP/al



Read More..

Redbox Instant launches private beta for video streaming



Redbox Instant -- Verizon's stab at a video-streaming service to compete with Netflix -- was rolled out into private beta today. For the first time, users can sign up for the service and see what it has to offer.

The service will give new users, who sign up to try it in beta, unlimited streaming and four DVD credits for free for one month, according to the Web site. Once the month-long trial ends, the service will cost $8 per month.

Redbox Instant is a joint venture announced in February between Verizon and Coinstar -- the company that owns the Redbox DVD rental business. The companies have been working on developing an on-demand video-streaming service with DVD rentals. Redbox Instant will also supposedly be available on a variety of operating systems and devices, such as
Android, iOS,
Xbox 360, some Samsung TVs, and Blu-ray players.

Earlier this month, rumors leaked that the service would be fully available by the end of the year. However, it was actually the private beta that became available. The new date for the public launch of Redbox Instant is now scheduled for the end of 2013's first quarter or the beginning of the second quarter.

The service is undercutting key rival Netflix's monthly rates by charging just $6 a month for unlimited streaming -- $2 less than Netflix's comparable offer. If users want the four-DVD plan also, it costs $8 a month. A plan that includes Blu-Ray discs costs $9 a month.

While the service is more affordable than Netflix's offering, Redbox Instant won't have the same access to movies and shows. It has an agreement to get content from Epix, as well as studios such as Paramount, Lionsgate, and MGM, but it will still fall short of the breadth of offerings that Netflix boasts.

Read More..

Detecting Rabid Bats Before They Bite


A picture is worth a thousand words—or in the case of bats, a rabies diagnosis. A new study reveals that rabid bats have cooler faces compared to uninfected colony-mates. And researchers are hopeful that thermal scans of bat faces could improve rabies surveillance in wild colonies, preventing outbreaks that introduce infections into other animals—including humans.

Bats are a major reservoir for the rabies virus, according to the Centers for Disease Control and Prevention (CDC) in Atlanta. Previous research shows that bats can transmit their strains to other animals, potentially putting people at risk. (Popular Videos: Bats share the screen with creepy co-stars.)

Rabies, typically transmitted in saliva, targets the brain and is almost always fatal in animals and people if left untreated. No current tests detect rabies in live animals—only brain tissue analysis is accurate.

Searching for a way to detect the virus in bats before the animals died, rabies specialist James Ellison and his colleagues at the CDC turned to a captive colony of big brown bats (Eptesicus fuscus). Previous studies had found temperature increases in the noses of rabid raccoons, so the team expected to see similar results with bats.

Researchers established normal temperature ranges for E. fuscus—the bat species most commonly sent for rabies testing—then injected 24 individuals with the virus. The 21-day study monitored facial temperatures with infrared cameras, and 13 of the 21 bats that developed rabies showed temperature drops of more than 4ÂșC.

"I was surprised to find the bats' faces were cooler because rabies causes inflammation—and that creates heat," said Ellison. "No one has done this before with bats," he added, and so researchers aren't sure what's causing the temperature changes they've discovered in the mammals. (Related: "Bats Have Superfast Muscles—A Mammal First.")

Although thermal scans didn't catch every instance of rabies in the colony, this method may be a way to detect the virus in bats before symptoms appear. The team plans to fine-tune their measurements of facial temperatures, and then Ellison hopes to try surveillance in the field.

This study was published online November 9 in Zoonoses and Public Health.


Read More..