Annals of Emergency Medicine (January 2010 Summary)
Summary of January 2010 issue of Annals of Emergency Medicine. Highlights include: * How accurate is noncontrast CT for the diagnosis of appendicitis? A meta-analysis * International experiences - the ethical challenge of short-term medical excursions * Impact of a mobile pediatric emergency response team for an influenza epidemic * How often are emergency physicians testing and treating for influenza? * Informed consent - are media messages accurate for "community consent" in high risk trials? And in low risk, observational studies how often do subjects read the consent document? And from the EBM section... * How ...
Source: Annals of Emergency Medicine (Summary - Audio) - January 26, 2010 Category: Emergency Medicine Authors: Annals of Emergency Medicine Source Type: podcasts

Lifting the Veil: Technology, Policy, Law and the Ethics of Cyberattack
The United States is increasingly dependent on information and information technology for both civilian and military purposes, as are many other nations. Although there is a substantial literature on the potential impact of a cyberattack on the societal infrastructure of the United States, little has been written about the use of cyberattack as an instrument of U.S. policy. In this podcast, cyberattacks- -actions intended to damage or adversary computer systems or networks-- are looked at from a variety of angles. (Source: The Sounds of Science from the National Academies)
Source: The Sounds of Science from the National Academies - June 5, 2009 Category: Science Authors: The National Academies Source Type: podcasts

Lifting the Veil: Technology, Policy, Law and the Ethics of Cyberattack
The United States is increasingly dependent on information and information technology for both civilian and military purposes, as are many other nations. Although there is a substantial literature on the potential impact of a cyberattack on the societal infrastructure of the United States, little has been written about the use of cyberattack as an instrument of U.S. policy. In this podcast, cyberattacks- -actions intended to damage or adversary computer systems or networks-- are looked at from a variety of angles. (Source: The Sounds of Science from the National Academies)
Source: The Sounds of Science from the National Academies - June 5, 2009 Category: Science Authors: The National Academies Source Type: podcasts

The Difference Between Adult Stem Cells and Embryonic Stem Cells
This is Ken Aldrich.  I am Chairman of International Stem Cell Corporation and thought I’d talk for just a minute, or maybe a couple of minutes, about the different kinds of stem cells.  People are always asking, “What’s the difference between an adult stem cell and an embryonic stem cell?”   Let me try to make this as simple as possible.  Adult stem cells are those that are derived from the human body any time after the first, probably, week or two of development of the fetus in the womb. So, cells that come from cord blood, or cells that come from embryonic tissue as well as cells that come from an adult hum...
Source: International Stem Cell Corporation - April 16, 2009 Category: Stem Cells Authors: internationalstemcell Tags: biotechnology health medicine parthenogenesis stem cell bank pluripotent international stem cell corporation alzheimers parkinsons leukemia vectors Source Type: podcasts