Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
Robotics

Artificial Intelligence at Human Level by 2029? 678

Gerard Boyers writes "Some members of the US National Academy of Engineering have predicted that Artificial Intelligence will reach the level of humans in around 20 years. Ray Kurzweil leads the charge: 'We will have both the hardware and the software to achieve human level artificial intelligence with the broad suppleness of human intelligence including our emotional intelligence by 2029. We're already a human machine civilization, we use our technology to expand our physical and mental horizons and this will be a further extension of that. We'll have intelligent nanobots go into our brains through the capillaries and interact directly with our biological neurons.' Mr Kurzweil is one of 18 influential thinkers, and a gentleman we've discussed previously. He was chosen to identify the great technological challenges facing humanity in the 21st century by the US National Academy of Engineering. The experts include Google founder Larry Page and genome pioneer Dr Craig Venter."

Comment Re:Maybe an age thing? (Score 1) 371

Yes, Harvest Moon is a series of games where you run a farm, there's an optional romance subplot, and has scripted events.

I think the original SNES version was very good, but the sequels have been mediocre.
Biotech

Adult Stem Cell Growth Treats Cornea Disorders 128

stemcellar writes with a link to the ScienceDaily site, reporting on a method for adult stem cells to grow cornea stem cells. This use of differentiated stem cells in therapies on specific parts of the body is fairly novel, the article states, and could have numerous applications in medicine. "The research undertaken by the ophthalmologist has shown that, from a small biopsy sample, the new growth technique enables the growth of the number of stem cells thus obtained to the point of obtaining sufficient for the treatment to be effective. The cell sample is taken from the limb of the healthy eye - the ocular structure responsible for the transparency of the cornea. The importance of this growth method lies in the fact that it enables the characterization of the cells obtained, i.e. determining the quantity and viability of the units to be used."
Communications

Preparing for the Worst in IT 172

mplex writes "How vulnerable is the internet to terrorist attack? Is it robust enough to handle an outage on a massive scale? Should the commercial infrastructure that powers the internet be kept secret? These are the sorts of questions raised by Mark Gibbs in his latest column in Network World. 'There is an alternate route available for nearly all services through Las Vegas or Northern California serving all facilities-based carriers in Los Angeles -- all interconnected at numerous L.A. and L.A.-area fiber-optic terminals supporting both metro and long-distance cable.' Given that the internet thrives on open networks, it's hard to imagine keeping them a secret. At best, we must be prepared to deal with the worst."
Wireless Networking

GPL Code Found In OpenBSD Wireless Driver 671

NormalVisual writes "The mailing lists were buzzing recently when Michael Buesch, one of the maintainers for the GPL'd bc43xx Broadcom wireless chip driver project, called the OpenBSD folks to task for apparently including code without permission from his project in the OpenBSD bcw project, which aims to provide functionality with Broadcom wireless chips under that OS. It seems that the problem has been resolved for now with the BSD driver author totally giving up on the project and Theo De Raadt taking the position that Buesch's posts on the subject were 'inhuman.'" More commentary from the BSD community is over at undeadly.org.
Education

Professors To Ban Students From Citing Wikipedia 507

Inisheer writes "History professors at Middlebury College are tired of having all their students submit the same bad information on term papers. The culprit: Wikipedia — the user-created encyclopedia that's full of great stuff, and also full of inaccuracies. Now the the entire History department has voted to ban students from citing it as a resource. An outright ban was considered, but dropped because enforcement seemed impossible. Other professors at the school agree, but note that they're also enthusiastic contributors to Wikipedia. The article discusses the valuable role that Wikipedia can play, while also pointed out the need for critical and primary sources in college-level research." What role, if any, do you think Wikipedia should play in education?
The Courts

Are DMCA Abuses a Temporary or Permanent Problem? 163

Regular Slashdot contributor Bennett Haselton wrote in with a story about the DMCA. He starts "On January 16, a man named Guntram Graef who invoked the Digital Millennium Copyright Act to ask YouTube to remove a video of giant penises attacking his wife's avatar/character in the virtual community "Second Life", retracted the claim and stated that he now believes the video was not a copyright violation. (He had sent similar notices to BoingBoing and the Sydney Morning Herald just for posting screen shots of the video.) His statements in a C-Net interview suggest that he didn't mean to alienate the anti-censorship community and was probably angry over what he saw as a sexually explicit attack on his wife. But the event sparked renewed debate over the DMCA and what constitutes abuse of it. I sympathize with Graef and I admire him for admitting an error, but I still think the incident shows why the DMCA is a bad law." Hit that link below to read the rest of his story.

DieHard, the Software 230

Roland Piquepaille writes "No, it's not another movie sequel. DieHard is a piece of software which helps programs to run correctly and protects them from a range of security vulnerabilities. It has been developed by computer scientists from the University of Massachusetts Amherst — and Microsoft. DieHard prevents crashes and hacker attacks by focusing on memory. Our computers have thousands times more memory than 20 years ago. Still, programmers are privileging speed and efficiency over security, which leads to the famous "buffer overflows" which are exploited by hackers."

Slashdot Top Deals

As you will see, I told them, in no uncertain terms, to see Figure one. -- Dave "First Strike" Pare

Working...