Feeds

Dolphin talks to humans – but does he love Toughbook or iPad?

‘Don’t eat me’

Remote control for virtualized desktops

Dolphins eat fish, kill porpoises for fun, and try, not always successfully, to hide from Japanese fishermen.

In their spare time, they hang out at Seaworld and help scientists in their ceaseless quest to talk to animals. And for animals to talk to humans.

Take Merlin, aged 2, a dolphin, who is helping researcher Jack Krassewitz codify a symbolic language that “will not only allow humans and dolphins to interact more easily but also potentially lead to a universal translator for humans”.

When they are not killing them, humans bore dolphins – too slow and unable to hear much of their chatter. This is where computers can help out.

Jack is trialling some human-dolphin interfaces on the iPad and the Panasonic Toughbook - encased in waterproof bags. At least we think both are encased in waterproof bags – MSNBC, our source, has a lot to say about the iPad ( sexy!) and nothing about the Toughbook (chartered surveyors!).

Early days yet, but Merlin seems to like the iPad. “For him, it was a new toy.”

Remote control for virtualized desktops

Whitepapers

Free virtual appliance for wire data analytics
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.