Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
The Courts

Submission + - New York Judge rules 6-year-old can be sued (reuters.com) 4

suraj.sun writes: A girl can be sued over accusations she ran over an elderly woman with her training bicycle when she was 4 years old, a New York Supreme Court justice has ruled.

The ruling by King's County Supreme Court Justice Paul Wooten stems from an incident in April 2009 when Juliet Breitman and Jacob Kohn, both aged four, struck an 87-year-old pedestrian, Claire Menagh, with their training bikes.

Menagh underwent surgery for a fractured hip and died three months later.

In a ruling made public late Thursday, the judge dismissed arguments by Breitman's lawyer that the case should be dismissed because of her young age. He ruled that she is old enough to be sued and the case can proceed.

"For infants above the age of 4, there is no bright-line rule," Wooten wrote, adding that the girl had been three months shy of turning 5.

Reuters: http://www.reuters.com/article/idUSTRE69S4ZE20101029

Image

Own Your Own Fighter Jet 222

gimmebeer writes "The Russian Sukhoi SU-27 has a top speed of Mach 1.8 (more than 1,300 mph) and has a thrust to weight ratio greater than 1 to 1. That means it can accelerate while climbing straight up. It was designed to fight against the best the US had to offer, and now it can be yours for the price of a mediocre used business jet."
Science

Submission + - Aussie scientists find coconut-carrying octopus (myway.com)

An anonymous reader writes: Australian scientists have discovered an octopus in Indonesia that collects coconut shells for shelter — unusually sophisticated behavior that the researchers believe is the first evidence of tool use in an invertebrate animal. The scientists filmed the veined octopus, Amphioctopus marginatus, selecting halved coconut shells from the sea floor, emptying them out, carrying them under their bodies up to 65 feet (20 meters), and assembling two shells together to make a spherical hiding spot. "I was gobsmacked," said Finn, a research biologist at the museum who specializes in cephalopods. "I mean, I've seen a lot of octopuses hiding in shells, but I've never seen one that grabs it up and jogs across the sea floor. I was trying hard not to laugh."
The Internet

Why the Semantic Web Will Fail 179

Jack Action writes "A researcher at Canada's National Research Council has a provocative post on his personal blog predicting that the Semantic Web will fail. The researcher notes the rising problems with Web 2.0 — MySpace blocking outside widgets, Yahoo ending Flickr identities, rumors Google will turn off its search API — and predicts these will also cripple Web 3.0." From the post: "The Semantic Web will never work because it depends on businesses working together, on them cooperating. There is no way they: (1) would agree on web standards (hah!) (2) would adopt a common vocabulary (you don't say) (3) would reliably expose their APIs so anyone could use them (as if)."
Software

Submission + - Wikipedia Used for Artificial Intelligence

eldavojohn writes: "It may be no surprise but Wikipedia is now being used in the field of artificial intelligence. The applications for this may be endless. For instance, the front of spam fighting is a tough one and it looks as though researchers are now turning towards an ontology or taxonomy based solution to fight spammers. The concept is also on the forefront of artificial intelligence and progress towards an application passing the Turing Test and creating semantically aware applications. The article comments on uses of Wikipedia in this manner:
"... spam filters block all messages containing the word 'vitamin,' but fail to block messages containing the word 'B12.' If the program never saw 'B12' before, it's just a word without any meaning. But you would know it's a vitamin," Markovitch said. "With our methodology, however, the computer will use its Wikipedia-based knowledge base to infer that 'B12' is strongly associated with the concept of vitamins, and will correctly identify the message as spam," he added.
"

File Sharing Ruled Legal In Spain 136

stupid_is writes "As a follow-up to a previous discussion a judge in Spain has ruled that under Spanish law a person who downloads music for personal use can not be punished or branded a criminal. This seems to be a teeny bit clearer than the first article, which points out that downloading is a civil, and not criminal, offense for individuals. The Spanish recording industry federation Promusicae is predictably a bit peeved, and says it will appeal against the decision." From the article: "The state prosecutor's office and two music distribution associations had sought a two year sentence against the man, who downloaded songs and then allegedly offered them on a CD through email and chat rooms. However, there was no direct proof he made money from selling the CDs. Justice Minister Juan Fernando Lopéz Aguilar says Spain is drafting a new law to abolish the existing right to private copies of material. Due to different regulatory regimes in Europe, the proceedings against file sharers differ greatly in each country. However, most European judges tend to take a harder stance on file sharing. Twenty two people in Finland were fined €427,000 last week for illegally sharing movies, music, games and software, while courts in Sweden also fined two men who had downloaded movies and music for personal use."

Comment Credit Card Security Impact (Score 1) 96

I can't help but wonder whether the payment card industry will adjust their security standards in the face of this kind of threat. Currently, the security standards stipulate that a credit card number has been sufficiently protected/destroyed if only the last four digits of the account number are kept. In the face of this kind of attack, would that be enough? All of a sudden, what information is left is being used to obtain whatever was missing.

I can see security requirements being adjusted in a couple of ways: First, require complete obliteration of the credit card account number when it is no longer needed. Don't even keep the last four digits. Second, require that various pieces of information be kept in separate logical or physical databases. If card numbers are stored separate from addresses and other personal information, it's one more barrier for an attacker to overcome.

Slashdot Top Deals

To get something done, a committee should consist of no more than three persons, two of them absent.

Working...