Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Submission Summary: 0 pending, 3 declined, 2 accepted (5 total, 40.00% accepted)

Submission + - Taste your game - the digital lollipop! (newscientist.com)

Tutter writes: Possible applications in healthcare and gaming — it works by using electrodes on your tongue to stimulate salty, sweet, bitter and sour. It can produce the taste of virtual foods or drinks, allowing you to enjoy the taste without the calories (or chewing...)! They are also good reasons to do this, for example, a diabetic can now taste sweets without actually affecting their blood sugar levels!

Quote:"The team is also working on a spin-off called a digital lollipop that will give the effect of a continuous sugar hit – but without sugar. For taste messaging they have developed TOIP – taste over internet protocol. This is a data format that makes it easy to transmit information on how to recreate the different tastes via the electrode.

It is early days. The four major taste components, plus the fifth, the savoury "umami" tang, are only a part of what we call flavour. Smell and texture are important, too – and the team now wants to work on adding those effects.." A video on youtube to show what it can do: http://www.youtube.com/watch?v=38u3e_WT4H4

Submission + - Europe simulates total cyber war (bbc.co.uk)

Tutter writes: The first-ever cross-European simulation of an all out cyber attack was planned to test how well nations cope as the attacks slow connections.

The simulation steadily reduced access to critical services to gauge how nations react. The exercise also tested how nations work together to avoid a complete shut-down of international links. Neelie Kroes, European commissioner for the digital agenda, said the exercise was designed to test preparedness and was an "important first step towards working together to combat potential online threats to essential infrastructure". The exercise is intended to help expose short-comings in existing procedures for combating attacks. As the attacks escalated, cyber security centres had to find ever more ways to route traffic through to key services and sites. The exercise also tested if communication channels, set up to help spread the word about attacks, were robust in the face of a developing threat and if the information shared over them was relevant.

Slashdot Top Deals

Disc space -- the final frontier!

Working...