Slashdot videos: Now with more Slashdot!
We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
According to Beau Lotto, the brain is doing something remarkable and that's why people are so fascinated by this dress. "It's entertaining two realities that are mutually exclusive. It's seeing one reality, but knowing there's another reality. So you're becoming an observer of yourself. You're having tremendous insight into what it is to be human. And that's the basis of imagination." As usual xkcd has the final word. It would make the comments more informatively scannable if you include your perceived color pair in the title of any comments below.
Most of use are aware of not-invented-here syndrome, but the opposite problem is perhaps equally troublesome. We can get stuck in the mindset that there must be a product, library, or code sample, that already does what we want. Instead of just writing the code we need a lot of effort is spent testing out modules and trying to accommodate our own code. At some point we need to just say, 'stop!', and write the code ourselves.
Head transplants has been tried before. In 1970, Robert White led a team at Case Western Reserve University in Cleveland, US, that tried to transplant the head of one monkey on to the body of another. The surgeons stopped short of a full spinal cord transfer, so the monkey could not move its body. Despite Canavero's enthusiasm, many surgeons and neuroscientists believe massive technical hurdles push full body transplants into the distant future. The starkest problem is that no one knows how to reconnect spinal nerves and make them work again. "This is such an overwhelming project, the possibility of it happening is very unlikely," says Harry Goldsmith."
The accuracy of these portraits is still an area of hot debate — most of them look rather generic. The NY Times staff tested it with a couple of their employees, circulating the DNA-inspired portraits and seeing if people could guess who it was supposed to be. None of the ~50 employees were able to identify reporter John Markoff, and only about 10 were able to identify video journalist Catherine Spangler. But even though the accuracy for a person's entire face is low, techniques for specific attributes, like eye color, have improved greatly. Of course, the whole situation raises a slew of civil liberties questions: "What traits are off limits? Should the authorities be able to test whether a suspect has a medical condition or is prone to violence should such testing be possible?"
The biggest challenge however is one that both Apple and Google face: Only a small fraction of the 10 million or so retail outlets in the U.S.–220,000 at last count–have checkout readers that can accept payments from either system. Both wallets use a radio technology called Near Field Communication to send payment, and it's expected to take years for most stores to be upgraded. What's at play? The big tech companies and carriers seem convinced that our phones will eventually replace our wallets. For carriers, that could make mobile wallet technology table stakes over the next few years as they compete for consumers.
Peters alleged that her personal information had been exposed in the breach and then disseminated in the public domain, where it was being "misused by unauthorized and unknown third parties." Specifically: Peters reported that, subsequent to the breach at St. Josephs, her Discover credit card was used to make a fraudulent purchase and that hackers had tried to infiltrate her Amazon.com account — posing as her son. Also: telemarketers were using the stolen information. Peters claimed that, after the breach, she was besieged with calls and solicitations for medical products and services companies, with telemarketers asking to speak to her and with specific family members, whose contact information was part of the record stolen from St. Joseph's.
As a result, Peters argued that she faced an "imminent injury" due to "increased risk" of future identity theft and fraud because of the breach at St. Joseph, and wished to sue the hospital for violations of the Fair Credit Reporting Act (FCRA). But the court found otherwise, ruling that Peters lacked standing to bring the case in federal court under Article III of the Constitution.
Press and Dyson's new solution to the problem, however, threw that rosy perspective into question (abstract). It suggested the best strategies were selfish ones that led to extortion, not cooperation.
[Theoretical biologist Joshua] Plotkin found the duo's math remarkable in its elegance. But the outcome troubled him. Nature includes numerous examples of cooperative behavior. For example, vampire bats donate some of their blood meal to community members that fail to find prey. Some species of birds and social insects routinely help raise another's brood. Even bacteria can cooperate, sticking to each other so that some may survive poison. If extortion reigns, what drives these and other acts of selflessness?"