Feeds

Boffins: Dolphins call each other NAMES. Not RUDE ones!

'Oy! Whistle-squeak-whistle! Get your ass over here'

Top three mobile application threats

Boffins have piled on yet more evidence that dolphins call each other by name when they whistle to each other.

Dolphins play in the water

Scientists have reckoned for some time that dolphins have a unique whistle that acts as a distinctive name.

Research by marine biologists Stephanie King and Vincent Janik from the University of St Andrews already figured out that the mammals can learn the signature whistles of close friends and family and use those in conversation. But now the boffins have proved that dolphins definitely respond to their own names.

"Animals have been found to use calls to label predators or food but these calls are inherited and not influenced by learning," King said. "The use of new or learned sounds to label things is rare in the animal kingdom. However, it is ubiquitous in human society and at the heart of human language."

The marine bioboffins followed groups of wild dolphins and recorded them whistling each others' names. They then played the recordings on underwater speakers against control whistles of either an unfamiliar animal from another group or another dolphin in the same population to see if the named creature responded. Each dolphin only reacted when it heard its own whistle, calling its own name back to "answer".

"Our results present the first case of naming in mammals, providing a clear parallel between dolphin and human communication," Jankik said, adding that parrots are the only other animal to show any evidence of learning new sounds to label things.

The study, Bottlenose dolphins can use learned vocal labels to address each other, was published in the Proceedings of the National Academy of Sciences. ®

3 Big data security analytics techniques

More from The Register

next story
Fancy joining Reg hack on quid-a-day challenge?
Recruiting now for charity starvation diet
Red-faced LOHAN team 'fesses up in blown SPEARS fuse fiasco
Standing in the corner, big pointy 'D' hats
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
Opportunity selfie: Martian winds have given the spunky ol' rover a spring cleaning
Power levels up 70 per cent as the rover keeps on truckin'
KILLER ROBOTS, DNA TAMPERING and PEEPING CYBORGS: the future looks bright!
Americans optimistic about technology despite being afraid of EVERYTHING
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.