By samzenpus from Slashdot's up-to-the-jury department
George Zimmerman, the neighborhood watch volunteer who shot Trayvon Martin, was charged with second-degree murder
. He faces up to life in prison if convicted in the shooting. From the article: "Special prosecutor Angela Corey announced the charges but would not discuss how she arrived at them or disclose other details of her investigation, saying: 'That's why we try cases in court.'
Second-degree murder is typically brought in cases when there is a fight or other confrontation that results in death and but does involve a premeditated plan to kill.
Corey would not disclose Zimmerman's whereabouts for his safety but said that he will be in court within 24 hours."Read Replies (0)
By samzenpus from Slashdot's read-all-about-it department
writes "It is a well known fact that the United States has an obesity problem.. There are numerous causes that ultimately lead to an imbalance in the ratio between the number of calories taken in to the number of calories burned. The size of the American diet industry is another good indicator of how widespread the problem has become. Clay Johnson believes that the issues the U.S. has with food, have become mirrored in how we consume information."
Read below for the rest of stoolpigeon's review. The Information Diet
author Clay A. Johnson
publisher O'Reilly Media
summary A Case for Conscious ConsumptionRead Replies (0)
By Unknown Lamer from Slashdot's udp-reunion-tour department
An anonymous reader writes "Launched in 1995, SSH quickly became the king of network login tools, supplanting the old insecure mainstays TELNET and RLOGIN. But 17 years later, a group of MIT hackers have come out with "mosh", which claims to modernize the most annoying parts of SSH. Mosh keeps its connection alive when clients roam among WiFi networks or switch to 3G, and gives instant feedback on typing (and deleting). No more annoying network lag on typing, the MIT boffins say, citing Bufferbloat, which has been increasing latencies."
The folks involved have a pre-press research paper
with the gritty details (to be presented at USENIX later this year). Mosh itself is not particularly exciting; the new State Synchronization Protocol it is based upon might be: "This is accomplished using a new protocol called the State Synchronization Protocol, for which Mosh is the first application. SSP runs over UDP, synchronizing the state of any object from one host to another. Datagrams are encrypted and authenticated using AES-128 in OCB mode. While SSP takes care of the networking protocol, it is the implementation of the object being synchronized that defines the ultimate semantics of the protocol."Read Replies (0)