Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Define living being (Score 1) 341

Are prions alive? For the purposes of this discussion, why do you think they are they more or less alive than viruses, or why do you think they are the same as viruses with respect to being alive?

If a soul is more or less how we collectively imagine it to be, what possible value is having a soul if some classes of living beings can exist without it?

Many people would substitute the phrase "beings of a type (i.e. species) which at their peak intellect are typically sufficiently intelligent" or "... sufficiently self-aware" for "living", using their own definition of "sufficiently."

Comment This could lead to death (Score 5, Funny) 270

A malicious attacker could substitute toxic fake coffee or hot chocolate for the real thing.

A malicious attacker could also substitute a coffee or hot chocolate that is tainted with a chemical that creates slight etchings in the surface of the coffee cup or other cup used to hold the end product. For certain types of cups, the result will be a cup that will be more likely to harbor bacterial growth than one with a smooth surface. Assuming a successful attack, the risk of illness or fatality is low for a healthy adult but it might be significant for a person with a suppressed or compromised immune system.

Recommended mitigation:
Keep people who want to kill you away from your coffee maker.

Submission + - Excuse Me While I Kiss This Guy: The Science of Misheard Song Lyrics

HughPickens.com writes: Maria Konnikova writes in The New Yorker that mondegreens are funny but they also give us insight into the underlying nature of linguistic processing, how our minds make meaning out of sound, and how in fractions of seconds, we translate a boundless blur of sound into sense. One of the reasons we often mishear song lyrics is that there’s a lot of noise to get through, and we usually can’t see the musicians’ faces. Other times, the misperceptions come from the nature of the speech itself, for example when someone speaks in an unfamiliar accent or when the usual structure of stresses and inflections changes, as it does in a poem or a song. Another common cause of mondegreens is the oronym: word strings in which the sounds can be logically divided multiple ways. One version that Steven Pinker describes goes like this: Eugene O’Neill won a Pullet Surprise. The string of phonetic sounds can be plausibly broken up in multiple ways—and if you’re not familiar with the requisite proper noun, you may find yourself making an error.

Other times, the culprit is the perception of the sound itself: some letters and letter combinations sound remarkably alike, and we need further cues, whether visual or contextual, to help us out. In a phenomenon known as the McGurk effect, people can be made to hear one consonant when a similar one is being spoken. “There’s a bathroom on the right” standing in for “there’s a bad moon on the rise” is a succession of such similarities adding up to two equally coherent alternatives.

Finally along with knowledge, we’re governed by familiarity: we are more likely to select a word or phrase that we’re familiar with, a phenomenon known as Zipf’s law. One of the reasons that “Excuse me while I kiss this guy” substituted for Jimi Hendrix’s “Excuse me while I kiss the sky” remains one of the most widely reported mondegreens of all time can be explained in part by frequency. It’s much more common to hear of people kissing guys than skies.

Comment Multiple "central" servers (Score 2) 67

And yet somehow, there is always a key - some centralized process somewhere that is the Achilles' heel.

And this is why there are hundreds of root DNS servers with over a dozen "names" (list).

TOR has (or had) "directory servers." Although it was discarded as not being practical, TOR or its predecessors considered using fully-distributed directory information (see 2004 documentation). TOR now has the option of using bridge-nodes. The addresses of these nodes are typically distributed "out of band" (e.g. by email or personal contact) on a need-to-use basis.

In short, "centralized servers" are not a bad thing as long as there are enough of them without any significant risk of common failure (short of a catastrophic event that would take down the whole Internet or for that matter the whole planet).

Comment Imagining torrented streaming (Score 1) 67

(except that I can't imagine now 'bit-torrent streaming' would work.)

Imagine a video broken into small chunks of 1-2 seconds. Imagine a torrent-ified web browser that used the torrent protocol to verify that all chunks were available for download from somewhere then proceeded to download the first few seconds of the video ("buffering") and while doing so figure out how big of an initial buffer it needed (latency, sigh), then after filling the initial buffer displayed them in order, downloading subsequent chunks while the first chunks were displaying.

Oh, that large and ever-changing latency? That's not your imagination, that's real.

Comment Re:Akami is dead (Score 1) 67

Tor isn't anonymous anymore, and just using it probably puts you on a watch list somewhere. Insert tinfoil hat joke below.

I'm not laughing, and I doubt you are either. Sigh.

On a slightly different topic:
Tor increases anonymity by making it much harder for someone to track you down. In practical terms, if neither you nor anyone using your ISP are currently being monitored, you don't use it to visit sites that are being actively monitored by an adversary (including any site that shares an ISP with such a site), and you use it only sparingly (maybe a few MB today e.g. to visit a blocked-from-your-country news or web-mail site, then none at all for a few weeks, changing IP addresses and devices in the meantime) it is much more likely than not that your actual traffic will not be de-anonymized. But there is still a good chance that you could be. Of course, if you live in certain non-free countries, ALL TOR and similar traffic probably triggers alarms at your country's or ISP's border-routers and even of the police can't decode WHAT you are viewing, they can probably throw you in the gulag just for daring to use TOR. In countries that pretend to be free, you won't be arrested but as the parent-posting AC said, you might be put on a watch-list so the NEXT time you use TOR you can be traced much easier. So be sure that your second trip through TOR you pretend to be a good citizen and only visit www.ILoveMyGloriousLeader.[yourcountrycode] and that you post all kinds of kinds words to the public blog.

Comment The code is the documentation (Score 1) 67

The third, more of a security/philosophical flaw, is that the base protocol was not documented in any significant fashion. To review the protocol's security, you'd need to have an expert understanding of Java and a large part of the codebase. So it never really had many eyes on it looking for flaws.

I know what you are trying to say - that the protocol was not documented in any significant fashion in a popular human language, but I must point out that computer code, to the extent that it is non-ambiguous,* is "documentation in a significant fashion" of the protocol's implementation. Unless there is other documentation to that contradicts it (such as a human-language protocol spec) it is also the de facto documentation for the protocol.

Now all we need is a few million people who can understand Java as well as most people understand their native human language.

*Some computer languages have ambiguities/undefined-behavior in their spec (these are frequently unintentional oversights). Some computer languages have popular implementations that "go against the spec," introducing de facto ambiguities where the original specification had none.

Comment Netflix et al (Score 1) 67

Netflix could too, if they can get authorization to actually use the system (insert MPAA members howling about their IP being on a P2P network

I can see the MPAA accepting "partial" distribution (say, 75% or maybe even 90% or 99%+ of the bits) over hard-to-track torrent-like protocols as long as enough of the bits are distributed "directly" to ensure that those having only the "partial" distribution either get a useless (e.g. encrypted or compressed-with-key-bits-missing) bits or they get bits that result in such an unpleasant viewing experience (drop-outs/noise, segments that have key plot elements removed, or missing audio) that it won't be an economic threat.

Heck, if the recording-industry was smart, they would set up their own "stripped-to-the-point-of-useless" torrent-like system then invite customers to buy/rent unique-per-customer versions of the missing data. Of course there would have to be some incentive/compensation for your average viewer for them to allow others to "upload" from their computer, such as "fan bucks" usable at the movie's official web site online store or some such.

From a marketing perspective, it would also be smart for the recording industry to use existing BitTorrent-type networks to seed sample TV episodes (complete with ads of course, sigh).

Submission + - Scientists produce new type of ice (sciencemag.org)

sciencehabit writes: Researchers today unveiled a new solid phase of ice that’s the lowest density version known. Known as ice XVI, the 17th solid phase of ice discovered to date, it has a cagelike structure that can trap other molecules. Such ice cages, known as clathrates, are known to store enormous quantities of methane on the deep ocean floor. The new clathrate, by contrast, is empty, though it didn’t start that way. The cagelike structure originally formed surrounding neon atoms. The neon was then leached out of the clathrate through rings of water molecules. The new form of ice may help researchers better understand clathrates in general, and perhaps ease the flow of oil and gas through pipelines at low temperatures.

Submission + - SPAM: This dad made his kid play through all video game history in chronological order

An anonymous reader writes: Andy Baio, aka @waxpancake, indy video game enthusiast and founder of the XOXO conference and other cool stuff, played a weird/cool experiment on his four-year-old, teaching him about gaming by making him play and master all of the old video games and gaming systems in the exact order they were actually released. In other words, this 21st century kid learned gaming the same way the generation that grew up in the 1970s and 1980s experienced them, but in compressed time. Can you guess how good this kid is at gaming today, at age eight? Published in The Message on Medium.

Submission + - US Navy authorizes use of laser in combat (usni.org)

mi writes: The U.S. Navy is has declared an experimental laser weapon on its Afloat Forward Staging Base (AFSB) in the Persian Gulf an operational asset and U.S. Central Command has given permission for the commander of the ship to defend itself with the weapon.

The 30 kilowatt Laser Weapon System (LaWS) was installed aboard USS Ponce this summer as part of a $40 million research and development effort from ONR and Naval Sea Systems Command (NAVSEA) to test the viability of directed energy weapons in an operational environment.

No word yet on a smaller, shark-mounted version.

Submission + - James Watson's Nobel Prize Medal Will Be Returned To Him

Dave Knott writes: Following the recent auction of James Watson's Nobel Prize medal, the winning bidder will return the medal to Watson. The $4.7 million winning bid was made by Alisher Usmanov, Russia's wealthiest man, a metal and telecommunications tycoon worth $15.8 billion US. In remarks carried by Russian television Tuesday, Usmanov hailed Watson one of the greatest biologists in the history of mankind, and stated that when he learned that Watson was selling the medal for charity, he decided to purchase it and immediately give it back to him.

Slashdot Top Deals

Anyone can make an omelet with eggs. The trick is to make one with none.

Working...