Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Submission + - World's first GM humans have been born (dailymail.co.uk)

sea4ever writes: It was officially revealed last night that around 30 healthy babies were in fact the direct result of a series of experiments.
Some of the children have been tested and found to have genetic material from 3 separate parents.
Most importantly, however, the experiments allowed women who typically could not conceive children to conceive, by taking some genetic material from a woman who had no problems conceiving a child.

Here's a link to the medical journal:
http://humrep.oxfordjournals.org/content/16/3/513.full?sid=11dd7f1e-27a5-43f1-87e7-bdf6fe489ca5

Submission + - The first GM humans have been born! (dailymail.co.uk)

sea4ever writes: It was officially revealed last night that around 30 healthy babies were in fact the direct result of a series of experiments.
Some of the children have been tested and found to have genetic material from 3 separate parents.
Most importantly, however, the experiments allowed women who typically could not conceive children to conceive, by taking some genetic material from a woman who had no problems conceiving a child.

Digital

Submission + - Photographers, you're being replaced by software (photo-mark.com)

Mrs. Grundy writes: CGI software, even open-source software like Blender, continues to improve in quality, speed and easy-of-use. Photographer Mark Meyer wonders how long it will be before large segments of the photography industry are replaced by software and become the latest casualty to fall to outsourcing. Some imagery once the domain of photographers has already moved to CGI. Is any segment of the photography market safe? Will we soon accept digital renderings in places where we used to expect photographs?
Hardware

Submission + - Piezoelectric speaker will let researchers talk with dolphins (extremetech.com)

MrSeb writes: "A team of Japanese researchers from the Tokyo University of Marine Science and Technology may become the first people to communicate with dolphins using their own language. Dolphins, with many human-like social and sexual traits, are often regarded as one of the most intelligent animals on the planet. The problem is, despite our own vast intelligence, we don’t actually know how intelligent dolphins (or monkeys or pigs or crows) are because we can’t understand their language. Encoded in those whistles, burst-pulse sounds, and clicks, dolphins might regularly discuss calculus and astrophysics — we just don’t know. Now, however, Japanese researchers have developed a “dolphin speaker,” which uses four piezoelectric elements (which apparently have never been used underwater before), and one silver element, to reproduce a dolphin’s ultra-broadband up-to-150KHz “voice” almost perfectly. Next step: Trying it out to see how dolphins react, and then actually working out the dolphin language."
Hardware Hacking

Submission + - Morse Code can now be decoded from blinking patterns in REM sleep. (lsdbase.org) 6

IAmCoder writes: "I have been training myself to blink in Morse Code patterns and have started writing a new plugin for LSDBase that can decode the patterns in hope that I can transcribe live from within a dream one day.

I also designed a headband, that will be known as a halograph FM, with a motion detector that is sensitive enough to pick up the heartbeat and can thus easily detect rapid eye movements. And I wrote a program, Lucid Scribe, that plays audio tracks when it detects that I am dreaming. I can sometimes hear the songs in my dreams and act on that knowledge – by flying, for example.

Here is a video of the first few characters that I can type just by blinking. Relevant XKCD in 3, 2, 1."

Comment Noooooo! (Score 2) 84

Those idiots!
They should never have shut that down. Sure, it might have been used to support drug cartels etc. and so on, but it is one of the most advanced communications systems available.
Go find a cellular provider that runs their entire infrastructure on solar power, and who has their network de-centralized (meshed) such that it's difficult to take down.
There is no mistaking it, the drug cartels have developed a superior communications system, and it was just shut down. I'm going to build my own version of this thing to cover the island I'm currently on.
Make no mistake, the drug cartels have an incredible amount of financial power, and they are only now starting to use it for potentially good development. Take the hi-tech underground tunnels, the hi-tech submarines, and now the advanced solar mesh network. Someone needs to partner with these guys.

Submission + - Ask Slashdot: Free (speech) e-mail provider

An anonymous reader writes: Most of you probably use free (beer) e-mail providers like gmail. But we all know that such enterprises tend to abuse all data one gives in their hands.
The best solution, of course, would be to just set up one's own server, but in a lot of cases, this would be overkill.
So is there an e-mail provider, for free or not, which is worth supporting because it uses free software and leaves the user all his freedom?
Science

Submission + - Is gravity caused by expanding mass? (thomaswlynch.com)

sea4ever writes: This is a curious essay that shows that crowding resulting from all mass 'exploding' would indeed be perceived as an attractive force by us observers within the system (see the animation below). As an auxiliary postulate, this essay points out that closure in the universe due to it being wrapped around on itself as a sort of hairy manifold Klein bottle would provide the necessary expansion for mass particles if the universe were expanding. The universe itself would then resemble a picture Einstein's head ;-)
Math

Submission + - Cycles in Collatz subsequences (thomaswlynch.com)

sea4ever writes: I am Tom's assistant, he publishes with this summary: "Professor Cadogan at the University of the West Indies identified special starting points that yield long subsequences where the normalization constant, k, is always one. I studied these special sequences and found an implicit mixed integer equation in closed form which if solved would produce seed values in cycling subsequences. Such cycles only occur among extremely large numbers, causing the equation to be difficult to solve numerically."
Paper on Arxiv
Original PDF on Tom's website.

Comment Continuous connection for self-teaching (Score 1) 49

There is no reason for them to be connected to this only 1 hour a day. Perhaps if the patients were connected to their avatars continuously for two or three days, they would quickly grow accustomed to it through personal experimentation in much the same way that self-taught programmers train themselves in a new language. I think that if they are self-taught for controlling the avatar that they might be much more efficient at it.

Submission + - Microengineer on hunger strike for corruption (itio-a-child.org)

sea4ever writes: "One more player in the development of microprocessors is being extorted by attorneys in Texas.
Tom is currently on day 5 of a hunger strike until his son is allowed to speak to him freely.
Tiger mom has been using the child as a weapon against Tom for 10 years through the corrupt legal system of Texas.
She has requested a fund which Tom hasn't paid, and thus not allowed their son to even speak to him for over two years.
In addition, she has been paying lawyers, professionals, and a corrupt judge to use the child to continuously extort more money from Tom, who has paid all of his money to said lawyers.
Tom has written a book on corruption in Texas citing several documents and transcripts over the last 10 years which exposes this corruption in action.
There is a companion website, (http://www.itio-a-child.org) which hosts all documents and audio recordings to further expose the corruption.
In addition, he has started a company 'Reasoning Technology' (http://www.reasoningtechnology.com) which produces legal software using his insight into the system gained through this experience to help legal clients and to alleviate some of the corruption.

This post seeks to fire an investigation into this corruption with the aid of these documents so that the unfairly treated Tom can see his son again, and so that the legal corruption in Texas can be investigated."

Submission + - Tiger mom gets tiger diorce revenge (itio-a-child.org)

sea4ever writes: One more player in the development of microprocessors is being extorted by attorneys in Texas.
Tom is currently on day 5 of a hunger strike until his son is allowed to speak to him freely.
Tiger mom has been using the child as a weapon against Tom for 10 years through the corrupt legal system of Texas.
She has requested a fund which Tom hasn't paid, and thus not allowed their son to even speak to him for over two years.
In addition, she has been paying lawyers, professionals, and a corrupt judge to use the child to continuously extort more money from Tom, who has paid all of his money to said lawyers.
Tom has written a book on corruption in Texas citing several documents and transcripts over the last 10 years which exposes this corruption in action.
There is a companion website, (http://www.itio-a-child.org) which hosts all documents and audio recordings to further expose the corruption.
In addition, he has started a company 'Reasoning Technology' (http://www.reasoningtechnology.com) which produces legal software using his insight into the system gained through this experience to help legal clients and to alleviate some of the corruption.

This post seeks to fire an investigation into this corruption with the aid of these documents so that the unfairly treated Tom can see his son again, and so that the legal corruption in Texas can be investigated.

Comment My university is questioning this (Score 1) 245

I work with some university professors on research projects regularly.
I don't want to use too many 'buzz-words' or anything, but I also don't want to give away our research before we publish it.
One of our projects (we have developed a patentable method) involves a method of distributing control messages of X length to N computers by using only X bandwidth on the sender side, with built-in error recovery and automatic redundancy by virtue of a propagating message source. Combine that with public-key crypto and you have a super-resilient propagating message with no 'source point'.
We make use of the DNS protocol to accomplish this.

You can see when we publish the paper, I will make it available to slashdot at that time. We've found that there is no clear way to stop the messages from reaching the destinations, and no way of impersonating the sender. There is also no way to detect the true source of the message.
Essentially, an alternative to P2P transmissions which is probably just as good.
There might be a flaw somewhere that we haven't noticed though, but at the moment it seems to be that we will finish the paper soon.

Slashdot Top Deals

"Given the choice between accomplishing something and just lying around, I'd rather lie around. No contest." -- Eric Clapton

Working...