a possible to have. e.u. regulations impose heavy fines for companies that don t protect identity related data. but what if the data protection software has security loopholes that make it vulnerable to hackers. who. says that the manufacturers are not liable for this problem. and. there has to be a point where somebody in the chain sells a non-secure product that does not meet data protection stipulations with it off and they have to be made liable somehow. do you see a chance of comprehensive i-t. liability after. a moment is that right now it s not politically expedient to keep monitoring the situation like a. professor is on his way to the e.u.
software to upload and share images of ancient inscriptions to the platform. so the first book in the project will be extracting the card with a promise from a wide variety of original sources before working on the tools and algorithms that come to recognize in the darkness ultimately then we can analyze existing translations matching card sequences to unlock them meaning. that could be a boon for tony or sebastian rishta a professor of egypt on a g. at the free university in berlin. his team has been working on an electronic dictionary of an ancient egyptian for some thirty years it s still unfinished as hieroglyphs are far more complex than letters in a modern alphabet. and dozens of which is that unlike our abstract letters hieroglyphs or pictorial so you could draw them like tiny logos and make very.
you protect all of these these little territories against an event like this which will happen again yeah it is a difficult challenge and i think i mean given the limited funds it is really important to concentrate on this last mile so how to get the warning actually to the people and then also prepare on the ground for possibility to vacate because sometimes it is very difficult the topography is such that people might not be able to get away from endangered so in a short time and so this is i think where if where indonesia should put its efforts there are ways that can make a technical part of the system better but that sort of dotting the i s ok i think i understand that thanks so much for explaining that to us a professor frederick to with thank you. police here in germany have detained seven men on suspicion of forming a far right terror group in the eastern city of can it s one of the man was
that through genetic manipulation. when the neurons are being externally activated because they ve been exposed to an odor the flies associate that odor with an imaginary electric shock so the yoda serves as a warning signal the odor creates an artificial and traumatic memory despite the fact that nothing happened to cause it the manipulation of a few neurons creates the illusion of an electric shock and the unpleasant memory associated with it. indeed the next time that the fly is exposed to this node tries to get away from a. professor turn him otoh believes that these artificial memories are not merely an end in themselves
weapons. ok let s find out more about this now with scott lucas a professor of international paul turks and american studies at the university of birmingham thanks for being with us this morning scott now the syrian government saying it was not behind this alleged chemical attack do we have any evidence at this point and what does the evidence show. yes i mean the evidence is almost conclusive that this was an assad regime attack on the school to remember of course this is the same area that five years ago that is saad regime attacked a certain nerve agent killing more than fourteen hundred people on this occasion and we have evidence from doctors from first responders from citizen journalist and from residents themselves that helicopters were over the air dropping both conventional and also chemical munitions at the time of the time there were two attacks the first was on saturday afternoon with chlorine the second was with a substance which is stronger we don t know what type of chem