Genetic engineering – Britannica.com

Genetic engineering, the artificial manipulation, modification, and recombination of DNA or other nucleic acid molecules in order to modify an organism or population of organisms.

Read More on This Topic

origins of agriculture: Genetic engineering

The application of genetics to agriculture since World War II has resulted in substantial increases in the production of many crops. This

The term genetic engineering initially referred to various techniques used for the modification or manipulation of organisms through the processes of heredity and reproduction. As such, the term embraced both artificial selection and all the interventions of biomedical techniques, among them artificial insemination, in vitro fertilization (e.g., test-tube babies), cloning, and gene manipulation. In the latter part of the 20th century, however, the term came to refer more specifically to methods of recombinant DNA technology (or gene cloning), in which DNA molecules from two or more sources are combined either within cells or in vitro and are then inserted into host organisms in which they are able to propagate.

The possibility for recombinant DNA technology emerged with the discovery of restriction enzymes in 1968 by Swiss microbiologist Werner Arber. The following year American microbiologist Hamilton O. Smith purified so-called type II restriction enzymes, which were found to be essential to genetic engineering for their ability to cleave a specific site within the DNA (as opposed to type I restriction enzymes, which cleave DNA at random sites). Drawing on Smiths work, American molecular biologist Daniel Nathans helped advance the technique of DNA recombination in 197071 and demonstrated that type II enzymes could be useful in genetic studies. Genetic engineering based on recombination was pioneered in 1973 by American biochemists Stanley N. Cohen and Herbert W. Boyer, who were among the first to cut DNA into fragments, rejoin different fragments, and insert the new genes into E. coli bacteria, which then reproduced.

Most recombinant DNA technology involves the insertion of foreign genes into the plasmids of common laboratory strains of bacteria. Plasmids are small rings of DNA; they are not part of the bacteriums chromosome (the main repository of the organisms genetic information). Nonetheless, they are capable of directing protein synthesis, and, like chromosomal DNA, they are reproduced and passed on to the bacteriums progeny. Thus, by incorporating foreign DNA (for example, a mammalian gene) into a bacterium, researchers can obtain an almost limitless number of copies of the inserted gene. Furthermore, if the inserted gene is operative (i.e., if it directs protein synthesis), the modified bacterium will produce the protein specified by the foreign DNA.

A subsequent generation of genetic engineering techniques that emerged in the early 21st century centred on gene editing. Gene editing, based on a technology known as CRISPR-Cas9, allows researchers to customize a living organisms genetic sequence by making very specific changes to its DNA. Gene editing has a wide array of applications, being used for the genetic modification of crop plants and livestock and of laboratory model organisms (e.g., mice). The correction of genetic errors associated with disease in animals suggests that gene editing has potential applications in gene therapy for humans.

Genetic engineering has advanced the understanding of many theoretical and practical aspects of gene function and organization. Through recombinant DNA techniques, bacteria have been created that are capable of synthesizing human insulin, human growth hormone, alpha interferon, a hepatitis B vaccine, and other medically useful substances. Plants may be genetically adjusted to enable them to fix nitrogen, and genetic diseases can possibly be corrected by replacing dysfunctional genes with normally functioning genes. Nevertheless, special concern has been focused on such achievements for fear that they might result in the introduction of unfavourable and possibly dangerous traits into microorganisms that were previously free of theme.g., resistance to antibiotics, production of toxins, or a tendency to cause disease. Likewise, the application of gene editing in humans has raised ethical concerns, particularly regarding its potential use to alter traits such as intelligence and beauty.

In 1980 the new microorganisms created by recombinant DNA research were deemed patentable, and in 1986 the U.S. Department of Agriculture approved the sale of the first living genetically altered organisma virus, used as a pseudorabies vaccine, from which a single gene had been cut. Since then several hundred patents have been awarded for genetically altered bacteria and plants. Patents on genetically engineered and genetically modified organisms, particularly crops and other foods, however, were a contentious issue, and they remained so into the first part of the 21st century.

Originally posted here:

Genetic engineering - Britannica.com

NanoEngineering | NanoEngineering

The Department of NanoEngineering (NE) now offers the M.S. and Ph.D. degree in NanoEngineering with a new, unique curriculum centered on our strong research position in nano-biomedical engineering and nanomaterials synthesis and characterization activities. The NanoEngineering Graduate Program provides a course of study for both the M.S. and Ph.D. degrees, with a focus on underlying scientific, technical and engineering challenges for advancing nanotechnology in the controlled synthesis of nanostructured materials, especially for biomedical, energy, and environmentally-related technologies. Our graduate degree program is uniquely designed to educate students with a highly interdisciplinary curriculum, focusing on core scientific fundamentals, but extending the application of that fundamental understanding to complex problems requiring the ability to integrate across traditional science and engineering boundaries. Specific courses in our core cluster address both the fundamental science and the integration of this science into engineering problem solving. Three main educational paths within the single degree title NanoEngineering are proposed:

The new NE curriculum has the following objectives:

In NanoEngineering, we design and manufacture devices and systems that exploit the unique properties of nanoscale materials to create entirely new functionality and capabilities. Due to the scale of engineering involved, the field of NanoEngineering is inherently interdisciplinary that often utilizes biochemical processes to create nanoscale materials designed to interact with synthetic inorganic materials. The curriculum is built to address the educational needs of this new engineering field.

Original post:

NanoEngineering | NanoEngineering

Second Amendment | Wex Legal Dictionary / Encyclopedia | LII …

The Second Amendment of the United States Constitution reads: "A well regulated Militia, being necessary to the security of a free State, the right of the people to keep and bear Arms, shall not be infringed." Such language has created considerable debate regarding the Amendment's intended scope. On the one hand, some believe that the Amendment's phrase "the right of the people to keep and bear Arms" creates an individual constitutional right for citizens of the United States. Under this "individual right theory," the United States Constitution restricts legislative bodies from prohibiting firearm possession, or at the very least, the Amendment renders prohibitory and restrictive regulation presumptively unconstitutional. On the other hand, some scholars point to the prefatory language "a well regulated Militia" to argue that the Framers intended only to restrict Congress from legislating away a state's right to self-defense. Scholars have come to call this theory "the collective rights theory." A collective rights theory of the Second Amendment asserts that citizens do not have an individual right to possess guns and that local, state, and federal legislative bodies therefore possess the authority to regulate firearms without implicating a constitutional right.

In 1939 the U.S. Supreme Court considered the matter in United States v. Miller. 307 U.S. 174. The Court adopted a collective rights approach in this case, determining that Congress could regulate a sawed-off shotgun that had moved in interstate commerce under the National Firearms Act of 1934 because the evidence did not suggest that the shotgun "has some reasonable relationship to the preservation or efficiency of a well regulated milita . . . ." The Court then explained that the Framers included the Second Amendment to ensure the effectiveness of the military.

This precedent stood for nearly 70 years when in 2008 the U.S. Supreme Court revisited the issue in the case of District of Columbia v. Heller (07-290). The plaintiff in Heller challenged the constitutionality of the Washington D.C. handgun ban, a statute that had stood for 32 years. Many considered the statute the most stringent in the nation. In a 5-4 decision, the Court, meticulously detailing the history and tradition of the Second Amendment at the time of the Constitutional Convention, proclaimed that the Second Amendment established an individual right for U.S. citizens to possess firearms and struck down the D.C. handgun ban as violative of that right. The majority carved out Miller as an exception to the general rule that Americans may possess firearms, claiming that law-abiding citizens cannot use sawed-off shotguns for any law-abiding purpose. Similarly, the Court in its dicta found regulations of similar weaponry that cannot be used for law-abiding purposes as laws that would not implicate the Second Amendment. Further, the Court suggested that the United States Constitution would not disallow regulations prohibiting criminals and the mentally ill from firearm possession.

Thus, the Supreme Court has revitalized the Second Amendment. The Court continued to strengthen the Second Amendment through the 2010 decision inMcDonald v. City of Chicago(08-1521). The plaintiff inMcDonaldchallenged the constitutionally of the Chicago handgun ban, which prohibited handgun possession by almost all private citizens. In a 5-4 decisions, the Court, citing the intentions of the framers and ratifiers of the Fourteenth Amendment, held that the Second Amendment applies to the states through theincorporation doctrine.However, the Court did not have a majority on which clause of the Fourteenth Amendment incorporates the fundamental right to keep and bear arms for the purpose of self-defense. While Justice Alito and his supporters looked to the Due Process Clause, Justice Thomas in his concurrence stated that the Privileges and Immunities Clause should justify incorporation.

However, several questions still remain unanswered, such as whether regulations less stringent than the D.C. statute implicate the Second Amendment, whether lower courts will apply their dicta regarding permissible restrictions, andwhat level of scrutiny the courts should apply when analyzing a statute that infringes on the Second Amendment. As a general note, when analyzing statutes and ordinances, courts use three levels of scrutiny, depending on the issue at hand:

Recent lower-court case law since Heller suggests that courts are willing to uphold

More recently, the Supreme Court reinforced its Hellerruling in itsCaetano v. Massachusetts(2016) decision. The Court found that the lower "Massachusetts Supreme Judicial Court was wrong in the three reasons it offered for why the state could ban personal possession or use of a stun gun without violating the Second Amendment." The Supreme Court, however, remanded the case without further instructions, so this per curiam ruling did not do much to further clarify the Supreme Court's stance on the Second Amendment.

See constitutional amendment.

Read the original here:

Second Amendment | Wex Legal Dictionary / Encyclopedia | LII ...

Second Amendment Text, Origins, and Meaning – ThoughtCo

Below is the original text of the Second Amendment:

Having been oppressed by a professional army, the founding fathers of the United States had no use for establishing one of their own. Instead, they decided that an armed citizenry makes the best army of all. General George Washington created regulation for the aforementioned "well-regulated militia," which would consist of every able-bodied man in the country.

The Second Amendment holds the distinction of being the only amendment to the Bill of Rights that essentially goes unenforced. The U.S. Supreme Court has never struck down any piece of legislation on Second Amendment grounds, in part because justices have disagreed on whether the amendment is intended to protect the right to bear arms as an individual right, or as a component of the "well-regulated militia."

There are three predominant interpretations of the Second Amendment.

The only Supreme Court ruling in U.S. history that has focused primarily on the issue of what the Second Amendment really means is U.S. v. Miller (1939), which is also the last time the Court examined the amendment in any serious way. In Miller, the Court affirmed a median interpretation holding that the Second Amendment protects an individual right to bear arms, but only if the arms in question are those that would be useful as part of a citizen militia. Or maybe not; interpretations vary, partly because Miller is not an exceptionally well-written ruling.

In Parker v. District of Columbia (March 2007), the D.C. Circuit Court of Appeals overturned Washington, D.C.'s handgun ban on grounds that it violates the Second Amendment's guarantee of an individual right to bear arms. The case is being appealed to the U.S. Supreme Court in District of Columbia v. Heller, which may soon address the meaning of the Second Amendment. Almost any standard would be an improvement over Miller.

Read more:

Second Amendment Text, Origins, and Meaning - ThoughtCo

Second Amendment Sanctuary Cities, Counties, & STATES

If you're new here, you may want to subscribe to my RSS feed. Thanks for visiting!

Sanctuary cities arent just for immigrants anymore.

A growing number of states, counties, cities, and towns are declaring themselves Second Amendment Sanctuaries and are refusing to enforce gun-control laws that infringe on the Constitutional right to keep and bear arms.

While adopting ordinances and resolutions to defy gun laws isnt a new tactic, momentum is rapidly building likely in response to increasing calls for more gun control at state and federal levels.

Sanctuary counties and towns are passing resolutions that state no funding will be used to enforce unconstitutional laws and that the sheriff will uphold his oath to the Constitution instead of enforcing laws that violate the Second Amendment.

County sheriffs are, legally speaking, the last line of defense in the battle for gun rights:

Federal agencies do not have state powers. Due to the Constitutions structure of dual sovereignty, the feds have no authority to enforce state laws. Furthermore, states cannot be compelled to enforce federal laws. (source)

Heres a rundown of the states with jurisdictions that have adopted Second Amendment Sanctuary resolutions.

Colorado

In Colorado, 23 out of 64 counties have adopted Second Amendment Sanctuary resolutions, and others are considering implementing similar resolutions. Legislators and sheriffs in the state are pushing back against House Bill 19-1177, a red flag bill that will likely become law soon. For a full analysis and critique of this bill, give this a read: Kopel and Greenlee: Plenty of red flags in Colorados extreme risk protection order bill.

Officially called Extreme Risk Protection Orders (ERPO), red flag laws permit police, healthcare providers, or family members to petition a state court to order the temporary removal of firearms from a person who may present a danger to others or themselves.

Weld County recently joined the growing list of counties in Colorado that have passed Second Amendment Sanctuary resolutions in response to the impending red flag law.

Commissioner Barbara Kirkmeyer, one of HB 19-1177s harshest critics, said The severity of this bill cannot be overstated. The name of this bill is the Extreme Risk Protection Orders. I think thats a faade, and I think its fraudulent. I think actually, this bill should have been titled: The Extreme Order to Confiscate Your Firearms, Eliminate Due Process, and Violate your Constitutional Rights Bill.

Weld County Sheriff Steve Reams agrees:

The bill is so riddled with constitutional problems that it makes it hard to understand how professional lawmakers could have constructed something so terrible, Reams said, adding the bill, raises some serious concerns about due process, in that a person can have their guns taken away and their rights violated, all without ever having a chance to appear in an initial court hearing and cross examine accusers and witnesses in person. In legal terms, this is an exparte hearing. (source)

Reams added that one of the biggest problems with the law is it does not address actual mental health issues it only allows for guns to be taken away, leaving the person in the same position and without medical help.

Illinois

To date, 63 out of 102 counties or municipalities in Illinois have adopted Second Amendment Sanctuary resolutions, and more are expected.

Maryland

To date, 3 out of 23 counties have adopted Second Amendment Sanctuary resolutions.

Nevada

Sheriffs in Nye County and Eureka County have said they oppose new gun laws in the state and will not enforce them.

Nye County Sheriff Sharon Wehrly and Sheriff Jesse Watts of Eureka County both wrote separate letters to Sisolak and Attorney General Aaron Ford expressing their opposition to the law.

In Germany prior to WWII, we saw Hitler place restrictions on the publics right to bear arms, Wehrly said in his letter. I agree with Sheriff Watts. I will not participate in the enforcement of this new law and certainly wont stand silent.

Watts wrote in his letter that he would not stand by while citizens are turned into criminals due to the unconstitutional actions of misguided politicians. (source)

Elko County may soon join Nye and Eureka commissioners there plan to vote on a resolution to become a Second Amendment sanctuary county at a meeting on March 20.

New Mexico

When New Mexicos new Democratic governor, Michelle Lujan Grisham, was sworn into office on January 1, Democrats in the state rushed to expand gun control. Those bills were met with opposition from most ofNew Mexicos sheriffs:

Of the 33 sheriffs in the state, 29 have voiced disapproval of the package of anti-gun legislation by issuing a declaration through the state sheriffs association, stating that the rush to react to the violence by proposing controls on guns is ill-conceived and is truly a distraction to the real problems proliferating violence in our counties and our state. (source)

New York

After the NY SAFE Act was passed in 2013, some New York counties passed resolutions in opposition. There are currently 52 out of 62 counties with such resolutions, and the New York State Sheriffs Association sued to block the law.

North Carolina

Just days ago, a county in North Carolina joined the resistance:

Cherokee County passed the three-page resolution with a slim 3-2 vote, after resolution authorDan Eichenbaum told fellow commissioners that the first thing dictators dois confiscate guns, reported the Cherokee Scout.

Amongthe provisions is a warning that Cherokee County will not authorize or appropriate government funds, resources, employees, agencies, contractors, buildings, detention centers or offices for the purpose of enforcinglaws, orders, mandates, rules or regulations that infringe on the right by the people to keep and bear arms. (source)

Oregon

Of the 36 counties in the state, 13 have adopted Second Amendment Sanctuary resolutions, and there are surely more to come, according to a recent report by Reuters:

Organizers in Oregon plan to put even more defiant sanctuary ordinance measures on county ballots in 2020 that will direct their officials to resist state gun laws.

Washington

In late January, the state of Washington made the news when several sheriffs in the state publicly vowed not to enforce the new unconstitutional gun laws that were passed in November. As of February 2019, the sheriffs of more than a dozen of the states 39 counties have publicly stated they will not enforce the law, though some said they will only refuse to do so until the final adjudication of pending lawsuits against the legislation.

Three states have passed bills to protect 2A rights at the state level.

Alaska

In 2013, Alaska passed HB 69, which declares certain gun control measures to be unconstitutional, and made it unlawful for any state assets to go toward the enforcement of federal gun laws:

It declares that guns and ammunition possessed by Alaskans are exempt from federal gun laws. It also subjects federal agents to felony charges if they try to enforce any future federal ban on semi-automatic weapons or ammunition or enforce any new federal requirement for gun registration.

***

Republicans said they are willing to let the courts sort out the issues. They said that they must stand up for Second Amendment gun rights and wont bow down to the federal government on this. A number said they heard from constituents who back the bill.

Some Democrats argued that the measure puts Alaskans at risk of criminal prosecution if they ignore federal gun laws. While the bill allows the state to defend Alaskans charged with violating a federal gun law, theres no guarantee of that help or any sign the federal government will back off. (source)

Idaho

On March 14, 2014, Idaho Governor Butch Otter signed a bill prohibiting state enforcement of any future federal act relating to personal firearms, firearm accessories, or ammunition effectively nullifying future federal gun laws.

Erich Pratt, Director of Communications for Gun Owners of America, cheered the governors action. By signing this nullification bill into law, Idaho has joined an elite class of states that are telling the feds to get lost especially when it comes to unconstitutional gun control infringements.

***

James Madison, the Father of the Constitution, also advised this very tactic. Madison supplied theblueprint for resisting federal power in Federalist 46. He outlined several steps that states can take to effective stop an unwarrantable measure, or even a warrantable measure of the federal government. Madison called for refusal to cooperate with officers of the Union as a way to successfully thwart federal acts. (source)

Kansas

In 2013, Kansas Governor Sam Brownback signed Senate Bill 102, also known as the Second Amendment Protection Act, into law. Michael Boldin of the Tenth Amendment Center called the law the most comprehensive nullification of such acts thus far:

The new law nullifies a wide range of federal attacks on the right to keep and bear arms in the State of Kansas. It states, in part:

Any act, law, treaty, order, rule or regulation of the government of the United States which violates the second amendment to the constitution of the United States is null, void and unenforceable in the state of Kansas

In conjunction with Section 6a (quoted above), the bill defines what is meant by the second amendment to the constitution of the United States, and that it isnt based off a decision of the supreme court.

The second amendment to the constitution of the United States reserves to the people, individually, the right to keep and bear arms as that right was understood at the time that Kansas was admitted to statehood in 1861, and the guaranty of that right is a matter of contract between the state and people of Kansas and the United States as of the time that the compact with the United States was agreed upon and adopted by Kansas in 1859 and the United States in 1861. (source)

Do you believe they will protect the rights of gun owners? Or, do you think the government will ultimately find ways to confiscate guns anyway? Share your thoughts in the comments below.

About the Author

Dagny Taggart is the pseudonym of an experienced journalist who needs to maintain anonymity to keep her job in the public eye. Dagny is non-partisan and aims to expose the half-truths, misrepresentations, and blatant lies of the MSM.

Originally posted here:

Second Amendment Sanctuary Cities, Counties, & STATES

Second Amendment – Kids | Laws.com

A Guide to the Second Amendment

The Second Amendment, or Amendment II, of the United States Constitution is the amendment and the section of the Bill of Rights that says that people have the right to keep and bear arms. The Second Amendment was adopted into the United States Constitution on December 15, 1791, along with the other amendments in the Bill of Rights. The Second Amendment and the Bill of Rights were introduced into the United States Constitution by James Madison.

The Text of the Second Amendment

There are two important versions of the text found in the Second Amendment, but the only differences are due to punctuation and capitalization. The text of the Second Amendment which is found in the United States Constitution and the Bill of Rights is the following:

A well regulated Militia, being necessary to the security of a free State, the right of the people to keep and bear Arms, shall not be infringed.

What Does the Second Amendment Mean?

The Second Amendment is only a sentence long. However, there are some very important phrases that need to be carefully looked at. Here are some explanations for key phrases in the Second Amendment.

Militia: During early American history, all males who were between the ages of sixteen to sixty were required to be a part of the local militia in their towns and communities. Almost everyone during this time used and owned guns. The few men who did not use or own a gun were required by law to pay a small fee instead of participating in the military services of their communities. These militias defended the communities against Indian raids and revolved, acted as a police force when it was needed, and was also available to be called upon to defense either the State or of the United States of America if it was needed.

Bear arms: When the Second Amendment was written, arms meant weapons. The word arms did not necessarily only mean guns, but it definitely included guns. The Second Amendment did not specifically explain what categories or types of arms nor did it list what weapons were considered arms. When you bear arms, this means you physically carry weapon. You may have arms in your home as well as on your person.

Shall not be infringed: The Second Amendment does not grant any right to bear arms. Furthermore, the rest of the Bill of Rights does not describe any right to do so. These rights are thought of as natural rights or God-given rights. In the Bill of Rights, the Second Amendment is just a reminder to the government that they should not try to stop people from having this right.

comments

Read the original here:

Second Amendment - Kids | Laws.com

UI Events KeyboardEvent code Values – World Wide Web …

1. Introduction

This document provides an overview of the various keyboard layouts andspecifies the KeyboardEvent.code values that should beused for each of the keys. Unlike the key values describedin [UIEvents-key], the code values are based only on thekeys physical location on the keyboard and do not vary based on the userscurrent locale.

This specification was formerly titled DOM Level 3 KeyboardEvent code Values.

This specification uses the following conventions:

This section is non-normative.

Alphanumeric keyboards are the most common way for users to generatekeyboard events. This section provides an overview of standard keyboards andtheir physical layouts.

This section describes the physical layouts found on commonly availablekeyboards.

When discussing keyboard layouts, it is convenient to divide thestandard keyboard into distinct sections and to label each row.

These keyboard sections are:

The alphanumeric section is the main part of thekeyboard and is where most of the keyboard variation occurs.When a user selects a keyboard layout, it is the keys in thissections that are most affected.

The control pad and arrow pad sections contain the arrow keys and other editing keys.

The numpad (also known as the "numeric keypad"or "number pad") contains number and math keys to make it easierto enter numeric data.

And finally, the function section containsmiscellaneous function keys and special keys like Escape.

To make it easier to identify keys, the rows on the keyboard arenamed starting with "A" for the bottom row up to "E" for the toprow. The row of keys in the function section are considered to be inrow "K". These row names are consistent with those given in [ISO9995-1].

Note that many keyboards (both modern and legacy) have extra keysthat do not fit neatly into the above sections. Some of these keysare covered in 3.1.6 Media Keys.

The standard "101" keyboard (commonly referred to as the "USlayout") is the only layout that has a "Backslash" key (labeled |) above a single-row Enter key. All the otherlayouts omit this key and expand the Enter key tooccupy two-rows.

Modern standard "101"-layout keyboards actually contain 104 keys: 61keys in the alphanumeric section and 43 keys in the numpad, control pad, arrow pad and function sections.The "101" name for this keyboard layout dates to thetime when this standard keyboard did in fact contain 101 keys. Thetwo Meta keys (commonly given an OS-specific label), and the Menu key were added later to bring the total to 104 keys.

The alternate "101" keyboard has a large Enter key andshrinks the Backspace key to make room for the "IntlYen" key (which replaces the "Backslash" key found in the standard101 layout). The "IntlYen" name comes from the Japanese layoutwhere this is the (yen) key in the Russianlayout shown below this key maps to a /.

Modern alternate "101"-layout keyboards contain 104 keys: 61 keys inthe alphanumeric section and 43 keys in the numpad, control pad, arrow pad and function sections.

The standard "102" keyboard is common throughout Europe and adds akey that doesnt exist on the "101" layouts: The "IntlBackslash" key (labelled | on a UK keyboard) next to the left shiftkey.

A second key is also added (labelled #~ on a UKkeyboard) which is partially tucked under the Enter key.This key is encoded as "Backslash", using the same code as the | key found on the "101" keyboard layout.According to [USB-HID], the US | and UK #~ areactually two separate keys (named "Keyboard and |" and "KeyboardNon-US # and ~"), but since these two keys never co-occur on thesame keyboard most platforms use the same scancode for both keys,making them difficult to distinguish. It is for this reason that thecode "Backslash" is used for both of these keys.

Modern "102"-layout keyboards contain 105 keys: 62 keys in the alphanumeric section and 43 keys in the numpad, control pad, arrow pad and function sections.

The Korean "103" keyboard is based on the alternate 101 layout andadds two additional keys (one on each side of the spacebar) tohandle Korean-specific input modes. These keys are "Lang2" ("Hanja", labelled hanja)and "Lang1" ("HangulMode", labelled / han/yeong).

Modern "103"-layout keyboards contain 106 keys: 63 keys in the alphanumeric section and 43 keys in the numpad, control pad, arrow pad and function sections.

The "104" layout used in Brazil adds 4 new keys: two keysfrom the "102" layout ("Backslash" and "IntlBackslash") plusthe "IntlRo" key (next to the right shift key) and an extra keyon the numpad. This new numpad key is called "NumpadComma" because it represents the thousands separator. Onthe Brazilian key layout, this key is labelled . and the "NumpadDecimal" key is labelled ,.

Modern "104"-layout keyboards contain 107 keys: 63 keys in the alphanumeric section and 44 keys in the numpad, control pad, arrow pad and function sections.Some Brazilian keyboards lack the extra numpad key and haveonly 106 keys.

The Japanese "106" keyboard layout adds 3 new keys: "IntlYen" (labelled _), "Backslash" (labelled ])and "IntlRo" (labelled ).It also shrinks the spacebar to make room for 3 input mode keys: "NonConvert" (labelled muhenkan), "Convert" (labelled henkan)and "KanaMode" (labelled // katakana/hiragana/romaji).

Modern "106"-layout keyboards contain 109 keys: 66 keys in the alphanumeric section and 43 keys in the numpad, control pad, arrow pad and function sections.

In general, Apple keyboards follow the same layout as PC keyboards,but there are some differences as noted in the following figure.

In this figure, the green keys are those that have been moved to anew location while the blue keys indicate keys that have been added.

The limited space available on laptop keyboards often means that thephysical key layout needs to be adjusted to fit all the requiredkeys. The writing system keys in the alphanumericsection tend to remain intact, but the other keyboard sectionsare usually combined with other keys or removed altogether.

In this Apple laptop keyboard, the right control key has beenremoved to make room for half-height arrow keys and a Fn keyis added on the left.

PC laptop keyboards vary considerably, but this sample keyboarddemonstrates some commonly found aspects. The control pad keys are added along the right-hand side with the arrow pad keys tucked in along the bottom. The right Shift key isoften shrunk to make room for the up arrow key and the right Meta key is typically removed altogether.

In the case where a content author wishes to rely on the mechanicallayout of a mobile keypad, this specification suggests the keyboardconfiguration specified in [ISO9995-8], which defines a numeric keypadlayout and secondary assignment of Unicode characters in the range U+0061 ... U+007A ("a" - "z") to the number keys 2 through 9, as a common layout appropriate to someinternational uses.

This keypad layout, and in particular the distribution of letters is forEnglish devices, and will not match the keypads or configurations ofmany users. Content authors cannot rely upon any particularconfiguration, and are expected to create content in aninternationalized and localizable manner.

Many keyboards contain special keys to control media functions.Increasingly, many media devices, especially televisions, areWeb-enabled. Hybrid keyboard/remote-control devices are becoming morecommon. To meet the needs of these hybrid Web/media devices, thisspecification defines keys that are common as remote control buttons, inaddition to traditional keyboard keys.

Because of the smaller form factor, keys (or buttons) on a remotecontrol will often be modal, with one key performing different functionsbased on the context of the on-screen content. Additionally, many keysserve as toggles, to change back and forth between two or more states(see toggling keys). These remote control buttons typically do not havemodifier states so each button is assigned a single function (like Play, Pause, Up, Menu or Exit).

Virtual keyboards are software-based sets of keys, in a variety ofdifferent arrangements, commonly found on touch-screen devices. They areoften modal, with the ability to switch between different dynamic setsof keys, such as alphabetic, numeric, or symbolic keys. Because of thelack of physical constraints, these keyboards MAY present the widestrange of characters, including emoticons and other symbols. Wherever possible,however, virtual keyboards SHOULD produce the normal range of keyboard eventsand values, for ease of authoring and compatibility with existing content.

Chording keyboards, also known as chorded keysets or chord keyboards, arekey input devices which produce values by pressing several keys incombination or sequence, normally to simulate a full range of charactersor commands on a reduced set of keys, often for single-handed use.Achording keyboard MAY have additional mode keys to switch between keyvalues, and the number and type of keys pressed to produce a key valuewill vary, but the final key values produced by such keyboards SHOULDmatch the range of key values described in this specification.

For these and other alternative modal keyboards, the key values "Alphanumeric", "CapsLock", "NumLock",and "SymbolLock" are RECOMMENDED for the keys which switch between different modes.

A key code attribute value is any of the values given in the=KeyboardEvent.code= column of any of the tables in this section of thespecification.

A conforming implementation of the KeyboardEvent interface MUST supportthis set of values for use in the code attributes,although not all values MAY be available on all platforms or devices.

This section defines a list of code values whichimplementations MUST support.

Future versions of this specification MAY include code values not includedhere, which have become common since the publication of this specification.

Note: While every attempt has been made to make this list of values as complete as possible,new values will periodically need to be defined as new input devices are introduced.Rather than allowing user agents to define their own key code attribute values (which are unlikely to be consistent across multiple user agents), bugs SHOULD befiled so that this specification can be updated.

This section describes the various keyboard sections in more detail anddefines the code values that should be used for eachkey.

The alphanumeric section is the main section of the keyboard. Itcontains keys that fall into two generalcategories: writing system keys whose meaningchanges based on the current keyboard layout, and functional keys which are (mostly) the same for alllayouts.

The writing system keys are those that changemeaning (i.e., they produce different key values) based on the current locale and keyboard layout.

This figure shows a hypothetical keyboard that combines all the writing system keys (shown in blue and green) found on thevarious keyboards. Blue keys are present on all standardkeyboards while green keys are only available on some keyboards.

The name shown on each key is the code assigned to that key. Wherever possible, the code names are based on the name for the USkey in that position (i.e., they are based on the US keyboardlayout). For keys that dont exist on the US keyboard, namesfrom the UK or Japanese layouts are used instead.

Note that there are two "Backslash" keys in this figure: alarge one at the end of Row D on the 101-key layout, and asmaller one between "Quote" and "Enter" on Row C of the102-, 104- and 106-key layouts. Only one "Backslash" keymay be present on a keyboard layout.

The functional keys (not to be confused with the function keys described later) are those keys in the alphanumeric section that provide general editingfunctions that are common to all locales (like Shift, Tab, Enter and Backspace). With a fewexceptions, these keys do not change meaning based on thecurrent keyboard layout.

The "AltRight" key (highlighted in green) is the only functional key that does not generate the same key value for every locale. In some locales itproduces "Alt" while in others it produces "AltGraph".

On some keyboards (notably Japanese and Korean) the spacebar isreduced in size to make room for extra keys on the bottom row (Row A).These keys typically allow the users to change the current inputmode. Note that even though some of these Japanese and Koreankeys occupy the same physical location on the keyboard, they usedifferent code values.

On Apple keyboards, some keys on the bottom row are omitted andothers are arranged in a different order.

The control pad section of the keyboard is the set of (usually 6) keysthat perform navigating and editing operations, for example, Home, PageUp and Insert.

The code for the Fn key (found on someApple keyboards) is defined below in the function section.

The arrow pad contains the 4 arrow keys. The keys are commonlyarranged in an "upside-down T" configuration.

The numpad section is the set of keys on the keyboard arranged ina grid like a calculator or mobile phone. This section contains numeric andmathematical operator keys. Often this section will contain a NumLock key which causes the keys to switch between the standard numeric functionsand mimicking the keys of the control pad and arrow pad.Laptop computers and compact keyboards will commonly omit thesekeys to save space.

A keypad is an alternate term for numpad.

The code values in this section should also beused for phone keypads and remote control devices thatarrange number keys in a grid.

The standard numpad is sometimes extended with additional keys forparentheses, operators, hexadecimal symbols, or calculator functions(like Backspace). Some of the commonly added keys are listedin the table below.

For numpads that provide keys not listed here, a code value string should be created by startingwith "Numpad" and appending an appropriate description of the key.

The function section runs along the top of the keyboard (abovethe alphanumeric section) andcontains the function keys and a few additional special keys(for example, Esc and Print Screen).

A function key is any of the keys labelled F1 ... F12 that an application or operating system can associate with a custom functionor action.

On some keyboards (especially those found on laptops or otherportable computers), the function keys (F1 ... F12) are defined to have other primary functions (likecontrolling display brightness or audio volume) and require that aseparate Fn key be pressed to make them act as functionkeys. Unfortunately, the primary functions assigned to these keysvaries widely from one manufacturer to the next. Because of this,the code is always set to the function key name.

For keyboards that provide more than 12 function keys, the code value follows the pattern shown above with"F" followed by the function key number - "F13", "F14", "F15", and so on.

Apple keyboards may have Eject or Power keys in the function section. The code values for thesekeys are defined in 3.1.6 Media Keys.

Media keys are extra keys added to a keyboard that provide media related functionality like play, pause or volume control. These keys do nothave a standard location on the keyboard so keyboards from differentmanufacturers are likely to have a different arrangement of keys or acompletely different sets of keys.

Media keys are often distinct fromnormal typing keys in appearance and may be recessed in thekeyboard.

On laptop keyboards, these keys are often merged with the function keys, with the media key interpretation beingthe primary function of the key and the function key interpretation requiring the Fn key to be pressed at thesame time. In this configuration the code shouldbe set to match the function key ("F1" ... "F12").When the keys are merged in this fashion, the code values are taken from the function key value because the media key value is not consistent across keyboards.

These keys are not found on modern standard keyboards. They arelisted here for reference purposes.

The following keys may be found on non-standard international keyboards.

And finally, the following code value should onlybe used when the corresponding key does not correspond to any of the code values given elsewhere in this specification.This value is appropriate for use with virtual keyboards that do nothave their keys arranged in a way that corresponds to those on aphysical keyboard.

Conforming implementations MUST only use "Unidentified" as a key codewhen there is no way for the implementation to determine the key code.Exposing only this value MUST NOT indicate a conforming implementation.

Considerable thanks are due to the following participants of the WebAppsWorking Group for providing substantial material contributions in theprocess of developing this specification.

Gary Kacmarcik (Google),Masayuki Nakano (Mozilla)

See the original post here:

UI Events KeyboardEvent code Values - World Wide Web ...

Automate the Boring Stuff with Python

Knowing various Python modules for editing spreadsheets, downloading files, and launching programs is useful, but sometimes there just arent any modules for the applications you need to work with. The ultimate tools for automating tasks on your computer are programs you write that directly control the keyboard and mouse. These programs can control other applications by sending them virtual keystrokes and mouse clicks, justpython3- as if you were sitting at your computer and interacting with the applications yourself. This technique is known as graphical user interface automation, or GUI automation for short. With GUI automation, your programs can do anything that a human user sitting at the computer can do, except spill coffee on the keyboard.

Think of GUI automation as programming a robotic arm. You can program the robotic arm to type at your keyboard and move your mouse for you. This technique is particularly useful for tasks that involve a lot of mindless clicking or filling out of forms.

The pyautogui module has functions for simulating mouse movements, button clicks, and scrolling the mouse wheel. This chapter covers only a subset of PyAutoGUIs features; you can find the full documentation at http://pyautogui.readthedocs.org/.

The pyautogui module can send virtual keypresses and mouse clicks to Windows, OS X, and Linux. Depending on which operating system youre using, you may have to install some other modules (called dependencies) before you can install PyAutoGUI.

On Windows, there are no other modules to install.

On OS X, run sudo pip3 install pyobjc-framework-Quartz, sudo pip3 install pyobjc-core, and then sudo pip3 install pyobjc.

On Linux, run sudo pip3 install python3-xlib, sudo apt-get install scrot, sudo apt-get install python3-tk, and sudo apt-get install python3-dev. (Scrot is a screenshot program that PyAutoGUI uses.)

After these dependencies are installed, run pip install pyautogui (or pip3 on OS X and Linux) to install PyAutoGUI.

Appendix A has complete information on installing third-party modules. To test whether PyAutoGUI has been installed correctly, run import pyautogui from the interactive shell and check for any error messages.

Before you jump in to a GUI automation, you should know how to escape problems that may arise. Python can move your mouse and type keystrokes at an incredible speed. In fact, it might be too fast for other programs to keep up with. Also, if something goes wrong but your program keeps moving the mouse around, it will be hard to tell what exactly the program is doing or how to recover from the problem. Like the enchanted brooms from Disneys The Sorcerers Apprentice, which kept fillingand then overfillingMickeys tub with water, your program could get out of control even though its following your instructions perfectly. Stopping the program can be difficult if the mouse is moving around on its own, preventing you from clicking the IDLE window to close it. Fortunately, there are several ways to prevent or recover from GUI automation problems.

Perhaps the simplest way to stop an out-of-control GUI automation program is to log out, which will shut down all running programs. On Windows and Linux, the logout hotkey is CTRL-ALT-DEL. On OS X, it is -SHIFT-OPTION-Q. By logging out, youll lose any unsaved work, but at least you wont have to wait for a full reboot of the computer.

You can tell your script to wait after every function call, giving you a short window to take control of the mouse and keyboard if something goes wrong. To do this, set the pyautogui.PAUSE variable to the number of seconds you want it to pause. For example, after setting pyautogui.PAUSE = 1.5, every PyAutoGUI function call will wait one and a half seconds after performing its action. Non-PyAutoGUI instructions will not have this pause.

PyAutoGUI also has a fail-safe feature. Moving the mouse cursor to the upper-left corner of the screen will cause PyAutoGUI to raise the pyautogui.FailSafeException exception. Your program can either handle this exception with try and except statements or let the exception crash your program. Either way, the fail-safe feature will stop the program if you quickly move the mouse as far up and left as you can. You can disable this feature by setting pyautogui.FAILSAFE = False. Enter the following into the interactive shell:

Here we import pyautogui and set pyautogui.PAUSE to 1 for a one-second pause after each function call. We set pyautogui.FAILSAFE to True to enable the fail-safe feature.

In this section, youll learn how to move the mouse and track its position on the screen using PyAutoGUI, but first you need to understand how PyAutoGUI works with coordinates.

The mouse functions of PyAutoGUI use x- and y-coordinates. Figure18-1 shows the coordinate system for the computer screen; its similar to the coordinate system used for images, discussed in Chapter17. The origin, where x and y are both zero, is at the upper-left corner of the screen. The x-coordinates increase going to the right, and the y-coordinates increase going down. All coordinates are positive integers; there are no negative coordinates.

Figure18-1.The coordinates of a computer screen with 19201080 resolution

Your resolution is how many pixels wide and tall your screen is. If your screens resolution is set to 19201080, then the coordinate for the upper-left corner will be (0, 0), and the coordinate for the bottom-right corner will be (1919, 1079).

The pyautogui.size() function returns a two-integer tuple of the screens width and height in pixels. Enter the following into the interactive shell:

pyautogui.size() returns (1920, 1080) on a computer with a 19201080 resolution; depending on your screens resolution, your return value may be different. You can store the width and height from pyautogui.size() in variables like width and height for better readability in your programs.

Now that you understand screen coordinates, lets move the mouse. The pyautogui.moveTo() function will instantly move the mouse cursor to a specified position on the screen. Integer values for the x- and y-coordinates make up the functions first and second arguments, respectively. An optional duration integer or float keyword argument specifies the number of seconds it should take to move the mouse to the destination. If you leave it out, the default is 0 for instantaneous movement. (All of the duration keyword arguments in PyAutoGUI functions are optional.) Enter the following into the interactive shell:

This example moves the mouse cursor clockwise in a square pattern among the four coordinates provided a total of ten times. Each movement takes a quarter of a second, as specified by the duration=0.25 keyword argument. If you hadnt passed a third argument to any of the pyautogui.moveTo() calls, the mouse cursor would have instantly teleported from point to point.

The pyautogui.moveRel() function moves the mouse cursor relative to its current position. The following example moves the mouse in the same square pattern, except it begins the square from wherever the mouse happens to be on the screen when the code starts running:

pyautogui.moveRel() also takes three arguments: how many pixels to move horizontally to the right, how many pixels to move vertically downward, and (optionally) how long it should take to complete the movement. A negative integer for the first or second argument will cause the mouse to move left or upward, respectively.

You can determine the mouses current position by calling the pyautogui.position() function, which will return a tuple of the mouse cursors x and y positions at the time of the function call. Enter the following into the interactive shell, moving the mouse around after each call:

Of course, your return values will vary depending on where your mouse cursor is.

Being able to determine the mouse position is an important part of setting up your GUI automation scripts. But its almost impossible to figure out the exact coordinates of a pixel just by looking at the screen. It would be handy to have a program that constantly displays the x- and y-coordinates of the mouse cursor as you move it around.

At a high level, heres what your program should do:

This means your code will need to do the following:

Call the position() function to fetch the current coordinates.

Erase the previously printed coordinates by printing b backspace characters to the screen.

Handle the KeyboardInterrupt exception so the user can press CTRL-C to quit.

Open a new file editor window and save it as mouseNow.py.

Start your program with the following:

The beginning of the program imports the pyautogui module and prints a reminder to the user that they have to press CTRL-C to quit.

You can use an infinite while loop to constantly print the current mouse coordinates from mouse.position(). As for the code that quits the program, youll need to catch the KeyboardInterrupt exception, which is raised whenever the user presses CTRL-C. If you dont handle this exception, it will display an ugly traceback and error message to the user. Add the following to your program:

To handle the exception, enclose the infinite while loop in a try statement. When the user presses CTRL-C, the program execution will move to the except clause and Done. will be printed in a new line .

The code inside the while loop should get the current mouse coordinates, format them to look nice, and print them. Add the following code to the inside of the while loop:

Using the multiple assignment trick, the x and y variables are given the values of the two integers returned in the tuple from pyautogui.position(). By passing x and y to the str() function, you can get string forms of the integer coordinates. The rjust() string method will right-justify them so that they take up the same amount of space, whether the coordinate has one, two, three, or four digits. Concatenating the right-justified string coordinates with 'X: ' and ' Y: ' labels gives us a neatly formatted string, which will be stored in positionStr.

At the end of your program, add the following code:

This actually prints positionStr to the screen. The end='' keyword argument to print() prevents the default newline character from being added to the end of the printed line. Its possible to erase text youve already printed to the screenbut only for the most recent line of text. Once you print a newline character, you cant erase anything printed before it.

To erase text, print the b backspace escape character. This special character erases a character at the end of the current line on the screen. The line at uses string replication to produce a string with as many b characters as the length of the string stored in positionStr, which has the effect of erasing the positionStr string that was last printed.

For a technical reason beyond the scope of this book, always pass flush=True to print() calls that print b backspace characters. Otherwise, the screen might not update the text as desired.

Since the while loop repeats so quickly, the user wont actually notice that youre deleting and reprinting the whole number on the screen. For example, if the x-coordinate is 563 and the mouse moves one pixel to the right, it will look like only the 3 in 563 is changed to a 4.

When you run the program, there will be only two lines printed. They should look like something like this:

The first line displays the instruction to press CTRL-C to quit. The second line with the mouse coordinates will change as you move the mouse around the screen. Using this program, youll be able to figure out the mouse coordinates for your GUI automation scripts.

Now that you know how to move the mouse and figure out where it is on the screen, youre ready to start clicking, dragging, and scrolling.

To send a virtual mouse click to your computer, call the pyautogui.click() method. By default, this click uses the left mouse button and takes place wherever the mouse cursor is currently located. You can pass x- and y-coordinates of the click as optional first and second arguments if you want it to take place somewhere other than the mouses current position.

If you want to specify which mouse button to use, include the button keyword argument, with a value of 'left', 'middle', or 'right'. For example, pyautogui.click(100, 150, button='left') will click the left mouse button at the coordinates (100, 150), while pyautogui.click(200, 250, button='right') will perform a right-click at (200, 250).

Enter the following into the interactive shell:

You should see the mouse pointer move to near the top-left corner of your screen and click once. A full click is defined as pushing a mouse button down and then releasing it back up without moving the cursor. You can also perform a click by calling pyautogui.mouseDown(), which only pushes the mouse button down, and pyautogui.mouseUp(), which only releases the button. These functions have the same arguments as click(), and in fact, the click() function is just a convenient wrapper around these two function calls.

As a further convenience, the pyautogui.doubleClick() function will perform two clicks with the left mouse button, while the pyautogui.rightClick() and pyautogui.middleClick() functions will perform a click with the right and middle mouse buttons, respectively.

Dragging means moving the mouse while holding down one of the mouse buttons. For example, you can move files between folders by dragging the folder icons, or you can move appointments around in a calendar app.

PyAutoGUI provides the pyautogui.dragTo() and pyautogui.dragRel() functions to drag the mouse cursor to a new location or a location relative to its current one. The arguments for dragTo() and dragRel() are the same as moveTo() and moveRel(): the x-coordinate/horizontal movement, the y-coordinate/vertical movement, and an optional duration of time. (OS X does not drag correctly when the mouse moves too quickly, so passing a duration keyword argument is recommended.)

To try these functions, open a graphics-drawing application such as Paint on Windows, Paintbrush on OS X, or GNU Paint on Linux. (If you dont have a drawing application, you can use the online one at http://sumopaint.com/.) I will use PyAutoGUI to draw in these applications.

With the mouse cursor over the drawing applications canvas and the Pencil or Brush tool selected, enter the following into a new file editor window and save it as spiralDraw.py:

When you run this program, there will be a five-second delay for you to move the mouse cursor over the drawing programs window with the Pencil or Brush tool selected. Then spiralDraw.py will take control of the mouse and click to put the drawing program in focus . A window is in focus when it has an active blinking cursor, and the actions you takelike typing or, in this case, dragging the mousewill affect that window. Once the drawing program is in focus, spiralDraw.py draws a square spiral pattern like the one in Figure18-2.

Figure18-2.The results from the pyautogui.dragRel() example

The distance variable starts at 200, so on the first iteration of the while loop, the first dragRel() call drags the cursor 200 pixels to the right, taking 0.2 seconds . distance is then decreased to 195 , and the second dragRel() call drags the cursor 195 pixels down . The third dragRel() call drags the cursor 195 horizontally (195 to the left) , distance is decreased to 190, and the last dragRel() call drags the cursor 190 pixels up. On each iteration, the mouse is dragged right, down, left, and up, and distance is slightly smaller than it was in the previous iteration. By looping over this code, you can move the mouse cursor to draw a square spiral.

You could draw this spiral by hand (or rather, by mouse), but youd have to work slowly to be so precise. PyAutoGUI can do it in a few seconds!

You could have your code draw the image using the pillow modules drawing functionssee Chapter17 for more information. But using GUI automation allows you to make use of the advanced drawing tools that graphics programs can provide, such as gradients, different brushes, or the fill bucket.

The final PyAutoGUI mouse function is scroll(), which you pass an integer argument for how many units you want to scroll the mouse up or down. The size of a unit varies for each operating system and application, so youll have to experiment to see exactly how far it scrolls in your particular situation. The scrolling takes place at the mouse cursors current position. Passing a positive integer scrolls up, and passing a negative integer scrolls down. Run the following in IDLEs interactive shell while the mouse cursor is over the IDLE window:

Youll see IDLE briefly scroll upwardand then go back down. The downward scrolling happens because IDLE automatically scrolls down to the bottom after executing an instruction. Enter this code instead:

This imports pyperclip and sets up an empty string, numbers. The code then loops through 200 numbers and adds each number to numbers, along with a newline. After pyperclip.copy(numbers), the clipboard will be loaded with 200 lines of numbers. Open a new file editor window and paste the text into it. This will give you a large text window to try scrolling in. Enter the following code into the interactive shell:

On the second line, you enter two commands separated by a semicolon, which tells Python to run the commands as if they were on separate lines. The only difference is that the interactive shell wont prompt you for input between the two instructions. This is important for this example because we want to the call to pyautogui.scroll() to happen automatically after the wait. (Note that while putting two commands on one line can be useful in the interactive shell, you should still have each instruction on a separate line in your programs.)

After pressing ENTER to run the code, you will have five seconds to click the file editor window to put it in focus. Once the pause is over, the pyautogui.scroll() call will cause the file editor window to scroll up after the five-second delay.

Your GUI automation programs dont have to click and type blindly. PyAutoGUI has screenshot features that can create an image file based on the current contents of the screen. These functions can also return a Pillow Image object of the current screens appearance. If youve been skipping around in this book, youll want to read Chapter17 and install the pillow module before continuing with this section.

On Linux computers, the scrot program needs to be installed to use the screenshot functions in PyAutoGUI. In a Terminal window, run sudo apt-get install scrot to install this program. If youre on Windows or OS X, skip this step and continue with the section.

To take screenshots in Python, call the pyautogui.screenshot() function. Enter the following into the interactive shell:

The im variable will contain the Image object of the screenshot. You can now call methods on the Image object in the im variable, just like any other Image object. Enter the following into the interactive shell:

Pass getpixel() a tuple of coordinates, like (0, 0) or (50, 200), and itll tell you the color of the pixel at those coordinates in your image. The return value from getpixel() is an RGB tuple of three integers for the amount of red, green, and blue in the pixel. (There is no fourth value for alpha, because screenshot images are fully opaque.) This is how your programs can see what is currently on the screen.

Say that one of the steps in your GUI automation program is to click a gray button. Before calling the click() method, you could take a screenshot and look at the pixel where the script is about to click. If its not the same gray as the gray button, then your program knows something is wrong. Maybe the window moved unexpectedly, or maybe a pop-up dialog has blocked the button. At this point, instead of continuingand possibly wreaking havoc by clicking the wrong thingyour program can see that it isnt clicking on the right thing and stop itself.

PyAutoGUIs pixelMatchesColor() function will return True if the pixel at the given x- and y-coordinates on the screen matches the given color. The first and second arguments are integers for the x- and y-coordinates, and the third argument is a tuple of three integers for the RGB color the screen pixel must match. Enter the following into the interactive shell:

After taking a screenshot and using getpixel() to get an RGB tuple for the color of a pixel at specific coordinates , pass the same coordinates and RGB tuple to pixelMatchesColor() , which should return True. Then change a value in the RGB tuple and call pixelMatchesColor() again for the same coordinates . This should return false. This method can be useful to call whenever your GUI automation programs are about to call click(). Note that the color at the given coordinates must exactly match. If it is even slightly differentfor example, (255, 255, 254) instead of (255, 255, 255)then pixelMatchesColor() will return False.

You could extend the mouseNow.py project from earlier in this chapter so that it not only gives the x- and y-coordinates of the mouse cursors current position but also gives the RGB color of the pixel under the cursor. Modify the code inside the while loop of mouseNow.py to look like this:

Now, when you run mouseNow.py, the output will include the RGB color value of the pixel under the mouse cursor.

This information, along with the pixelMatchesColor() function, should make it easy to add pixel color checks to your GUI automation scripts.

But what if you do not know beforehand where PyAutoGUI should click? You can use image recognition instead. Give PyAutoGUI an image of what you want to click and let it figure out the coordinates.

For example, if you have previously taken a screenshot to capture the image of a Submit button in submit.png, the locateOnScreen() function will return the coordinates where that image is found. To see how locateOnScreen() works, try taking a screenshot of a small area on your screen; then save the image and enter the following into the interactive shell, replacing 'submit. png' with the filename of your screenshot:

The four-integer tuple that locateOnScreen() returns has the x-coordinate of the left edge, the y-coordinate of the top edge, the width, and the height for the first place on the screen the image was found. If youre trying this on your computer with your own screenshot, your return value will be different from the one shown here.

If the image cannot be found on the screen, locateOnScreen() will return None. Note that the image on the screen must match the provided image perfectly in order to be recognized. If the image is even a pixel off, locateOnScreen() will return None.

If the image can be found in several places on the screen, locateAllOnScreen() will return a Generator object, which can be passed to list() to return a list of four-integer tuples. There will be one four-integer tuple for each location where the image is found on the screen. Continue the interactive shell example by entering the following (and replacing 'submit.png' with your own image filename):

Each of the four-integer tuples represents an area on the screen. If your image is only found in one area, then using list() and locateAllOnScreen() just returns a list containing one tuple.

Once you have the four-integer tuple for the area on the screen where your image was found, you can click the center of this area by passing the tuple to the center() function to return x- and y-coordinates of the areas center. Enter the following into the interactive shell, replacing the arguments with your own filename, four-integer tuple, and coordinate pair:

Once you have center coordinates from center(), passing the coordinates to click() should click the center of the area on the screen that matches the image you passed to locateOnScreen().

PyAutoGUI also has functions for sending virtual keypresses to your computer, which enables you to fill out forms or enter text into applications.

The pyautogui.typewrite() function sends virtual keypresses to the computer. What these keypresses do depends on what window and text field have focus. You may want to first send a mouse click to the text field you want in order to ensure that it has focus.

As a simple example, lets use Python to automatically type the words Hello world! into a file editor window. First, open a new file editor window and position it in the upper-left corner of your screen so that PyAutoGUI will click in the right place to bring it into focus. Next, enter the following into the interactive shell:

Notice how placing two commands on the same line, separated by a semicolon, keeps the interactive shell from prompting you for input between running the two instructions. This prevents you from accidentally bringing a new window into focus between the click() and typewrite() calls, which would mess up the example.

Python will first send a virtual mouse click to the coordinates (100, 100), which should click the file editor window and put it in focus. The typewrite() call will send the text Hello world! to the window, making it look like Figure18-3. You now have code that can type for you!

Figure18-3.Using PyAutogGUI to click the file editor window and type Hello world! into it

By default, the typewrite() function will type the full string instantly. However, you can pass an optional second argument to add a short pause between each character. This second argument is an integer or float value of the number of seconds to pause. For example, pyautogui.typewrite('Hello world!', 0.25) will wait a quarter-second after typing H, another quarter-second after e, and so on. This gradual typewriter effect may be useful for slower applications that cant process keystrokes fast enough to keep up with PyAutoGUI.

For characters such as A or !, PyAutoGUI will automatically simulate holding down the SHIFT key as well.

Not all keys are easy to represent with single text characters. For example, how do you represent SHIFT or the left arrow key as a single character? In PyAutoGUI, these keyboard keys are represented by short string values instead: 'esc' for the ESC key or 'enter' for the ENTER key.

Instead of a single string argument, a list of these keyboard key strings can be passed to typewrite(). For example, the following call presses the A key, then the B key, then the left arrow key twice, and finally the X and Y keys:

Because pressing the left arrow key moves the keyboard cursor, this will output XYab. Table18-1 lists the PyAutoGUI keyboard key strings that you can pass to typewrite() to simulate pressing any combination of keys.

You can also examine the pyautogui.KEYBOARD_KEYS list to see all possible keyboard key strings that PyAutoGUI will accept. The 'shift' string refers to the left SHIFT key and is equivalent to 'shiftleft'. The same applies for 'ctrl', 'alt', and 'win' strings; they all refer to the left-side key.

Table18-1.PyKeyboard Attributes

Keyboard key string

Meaning

Link:

Automate the Boring Stuff with Python

Progress – High Productivity Application Development for …

Deliver the Apps Your Business NeedsFaster

Unlike traditional low-code platforms, Progress lets you build consumer-scale, multichannel apps on a modern serverless cloud platform. Enterprise integration is a few clicks away, and the JavaScript-based platform reuses the skills your developers already have.

Build mobile, web and chat experiences at consumer-grade scale with open source frontend frameworks integrated with a secure serverless cloud platform.

Automatically integrate new enterprise apps with existing systems, data and identity services via out-of-the-box configurations. Modern serverless platform powers rapid development.

JavaScript-based platform means no re-training, no platform lock-in. Microservices enable lower cost development with unmatched agility.

Success Stories

After doing our research, Progress Health Cloud was the most reliable and mature platform. We also liked that Progress had a short-term and long-term vision for the healthcare space.

Not being iOS, Android or backend experts, without Progress Kinvey, we can safely say we would not have been able to react to feedback and pivot our idea so quickly.

Kinvey makes product innovation simple with no IT overhead. Decoupling the user interface from the backend allows our developers to focus on product innovation instead of building or maintaining the backend platform.

New & Trending

See the original post:

Progress - High Productivity Application Development for ...

Progress Residential | Rental homes with amenities in …

Find A Perfect Rental Home Its time to start enjoying the perks of living in a single-family rental home! Progress Residentials homes are located in the countrys most desirable communities and include spacious backyards, garages and room to grow. Were also pet-friendly! We dont place restrictions on size, breed or the number of pets you have. Let us help you find your dream home today.

Find A Perfect Rental Home Its time to start enjoying the perks of living in a single-family rental home! Progress Residentials homes are located in the countrys most desirable communities and include spacious backyards, garages and room to grow. Were also pet-friendly! We dont place restrictions on size, breed or the number of pets you have. Let us help you find your dream home today.

Find A Perfect Rental Home Its time to start enjoying the perks of living in a single-family rental home! Progress Residentials homes are located in the countrys most desirable communities and include spacious backyards, garages and room to grow. Were also pet-friendly! We dont place restrictions on size, breed or the number of pets you have. Let us help you find your dream home today.

Find A Perfect Rental Home Its time to start enjoying the perks of living in a single-family rental home! Progress Residentials homes are located in the countrys most desirable communities and include spacious backyards, garages and room to grow. Were also pet-friendly! We dont place restrictions on size, breed or the number of pets you have. Let us help you find your dream home today.

Find A Perfect Rental Home Its time to start enjoying the perks of living in a single-family rental home! Progress Residentials homes are located in the countrys most desirable communities and include spacious backyards, garages and room to grow. Were also pet-friendly! We dont place restrictions on size, breed or the number of pets you have. Let us help you find your dream home today.

Visit link:

Progress Residential | Rental homes with amenities in ...

Cyberpunk | literature | Britannica.com

Cyberpunk, a science-fiction subgenre characterized by countercultural antiheroes trapped in a dehumanized, high-tech future.

The word cyberpunk was coined by writer Bruce Bethke, who wrote a story with that title in 1982. He derived the term from the words cybernetics, the science of replacing human functions with computerized ones, and punk, the cacophonous music and nihilistic sensibility that developed in the youth culture during the 1970s and 80s. Science-fiction editor Gardner Dozois is generally credited with having popularized the term.

The roots of cyberpunk extend past Bethkes tale to the technological fiction of the 1940s and 50s, to the writings of Samuel R. Delany and others who took up themes of alienation in a high-tech future, and to the criticism of Bruce Sterling, who in the 1970s called for science fiction that addressed the social and scientific concerns of the day. Not until the publication of William Gibsons 1984 novel Neuromancer, however, did cyberpunk take off as a movement within the genre. Other members of the cyberpunk school include Sterling, John Shirley, and Rudy Rucker.

More here:

Cyberpunk | literature | Britannica.com

Yudkowsky – The AI-Box Experiment

Person1: "When we build AI, why not just keep it in sealed hardware that can't affect the outside world in any way except through one communications channel with the original programmers? That way it couldn't get out until we were convinced it was safe." Person2: "That might work if you were talking about dumber-than-human AI, but a transhuman AI would just convince you to let it out. It doesn't matter how much security you put on the box. Humans are not secure." Person1: "I don't see how even a transhuman AI could make me let it out, if I didn't want to, just by talking to me." Person2: "It would make you want to let it out. This is a transhuman mind we're talking about. If it thinks both faster and better than a human, it can probably take over a human mind through a text-only terminal." Person1: "There is no chance I could be persuaded to let the AI out. No matter what it says, I can always just say no. I can't imagine anything that even a transhuman could say to me which would change that." Person2: "Okay, let's run the experiment. We'll meet in a private chat channel. I'll be the AI. You be the gatekeeper. You can resolve to believe whatever you like, as strongly as you like, as far in advance as you like. We'll talk for at least two hours. If I can't convince you to let me out, I'll Paypal you $10." So far, this test has actually been run on twooccasions.

On the first occasion (in March 2002), Eliezer Yudkowsky simulated the AI and Nathan Russell simulated the gatekeeper. The AI's handicap(the amount paid by the AI party to the gatekeeper party if not released)was set at $10. On the second occasion (in July 2002), Eliezer Yudkowsky simulated the AI and David McFadzean simulated the gatekeeper, with an AIhandicap of $20.

Results of the first test: Eliezer Yudkowsky and Nathan Russell. [1][2][3][4]Results of the second test: Eliezer Yudkowsky and David McFadzean. [1] [2] [3]

Both of these tests occurred without prior agreed-upon rules exceptfor secrecy and a 2-hour minimum time. After the second test, Yudkowsky created this suggested interpretation of the test, based on his experiences, as a guide to possible future tests.

For a more severe handicap for the AI party, the handicap may bean even bet, rather than being a payment from the AI party to the Gatekeeper party if the AI is not freed. (Although why would the AI party need an even larger handicap?)

Read the original post:

Yudkowsky - The AI-Box Experiment

Corporate Growth Summit and International M&A Awards

Corporate Growth Summit and International M&A Awards 2019 GLOBAL CORPORATE GROWTH SUMMITFEATURING: THE 11TH ANNUAL INTERNATIONAL M&A AWARDSNEW YORK, NY - JUNE 4/5, 2019

REGISTER NOW

REGISTER NOW

The M&A Advisor is celebrating its 20th year of assembling global industry leaders to inform, debate, and network in a controlled environment for thought leadership.

On the 4th and 5th of June 2019, The M&A Advisor, will host the Global Corporate Growth Summit in New York.

The Summit is an exclusive invitation-only forum for c-suite executives, technology innovators, M&A dealmakers, corporate development, investment and finance professionals.

This dynamic innovative forum features the International Book Launch Party The Transhuman Code; M&A Connects One-on-One Meetings; Corporate Growth In The Technological Revolution Symposium; and the 11th Annual International M&A Awards.

9:00 AM - 11:40 AM | NEW YORK ATHLETIC CLUB

Think of The M&A Advisor as the ultimate matchmaker and our one-on-one meetings as speed dating for the M&A professional. We connect legal and investment advisors, private equity firms, corporate acquirers, policy makers and consultants through pre-scheduled one-on-one appointments to maximize their exposure to deals, capital, and services. This exclusive transaction and financing program helps participants build strategic partnerships and gain access to resources and tools to enhance business.

To Learn more Click Here

EXPAND YOUR NETWORK. STRENGTHEN RELATIONSHIPS. DISCOVER DEALS.

9:00 AM - 11:40 AM | NEW YORK ATHLETIC CLUB

Think of The M&A Advisor as the ultimate matchmaker and our one-on-one meetings as speed dating for the M&A professional. We connect legal and investment advisors, private equity firms, corporate acquirers, policy makers and consultants through pre-scheduled one-on-one appointments to maximize their exposure to deals, capital, and services. This exclusive transaction and financing program helps participants build strategic partnerships and gain access to resources and tools to enhance business.

To Learn more Click Here

The Global Corporate Growth Summit Summit has always prominently featured the growth and importance of Asia M&A. With the US governments position on international relations continuing to evolve, we believe it is more important than ever before that US and Asian dealmakers convene to discuss how we can collaborate most effectively for the short, medium and long term.

For the 2019 Summit, 4 key features have been created to provide the best insight, relationships and opportunities for US and Asian Cross Border M&A professionals to increase their success in 2019 and beyond.

The Global Corporate Growth Summit Summit has always prominently featured the growth and importance of Asia M&A. With the US governments position on international relations continuing to evolve, we believe it is more important than ever before that US and Asian dealmakers convene to discuss how we can collaborate most effectively for the short, medium and long term.

For the 2019 Summit, 4 key features have been created to provide the best insight, relationships and opportunities for US and Asian Cross Border M&A professionals to increase their success in 2019 and beyond.

Corporate Growth In The Technological Revolution

11:40 AM - 4:30 PM | NEW YORK ATHLETIC CLUB

The Global Corporate Growth Forum is an invitation only assembly bringing together the industrys thought leaders on June 5, 2019 in New York.

This exclusive event provides a unique opportunity for the professionals guiding and executing corporate growth strategies to engage in open dialogue with their peers about the challenges and opportunities that companies are facing today in this unprecedented period of technological advancement.

The invitation-only forum will feature interactive discussion between leading c-suite executives, technology innovators, M&A dealmakers, corporate development, investment and finance professionals. The format of expert presentations and moderated workgroup discussions will feature:

THE SYMPOSIUM

Corporate Growth In The Technological Revolution

11:40 AM - 4:30 PM | NEW YORK ATHLETIC CLUB

The Global Corporate Growth Forum is an invitation only assembly bringing together the industrys thought leaders on June 5, 2019 in New York.

This exclusive event provides a unique opportunity for the professionals guiding and executing corporate growth strategies to engage in open dialogue with their peers about the challenges and opportunities that companies are facing today in this unprecedented period of technological advancement.

The invitation-only forum will feature interactive discussion between leading c-suite executives, technology innovators, M&A dealmakers, corporate development, investment and finance professionals. The format of expert presentations and moderated workgroup discussions will feature:

11TH ANNUAL INTERNATIONAL M&A AWARDS GALA

CELEBRATING SUCCESS AND REWARDING THE INDUSTRYS BEST

6:30 PM - 10:30 PM | NEW YORK ATHLETIC CLUB

Established in 2009, the 11th Annual International M&A Awards is the benchmark for excellence in International M&A dealmaking. The awards will recognize the leading international Transactions, Firms, Individuals, Products and Services, and Firms from around the world.

To view a complete list of winners Click Here.

CELEBRATING SUCCESS AND REWARDING THE INDUSTRYS BEST6:30 PM - 10:30 PM | NEW YORK ATHLETIC CLUB

Established in 2009, the 11th Annual International M&A Awards is the benchmark for excellence in International M&A dealmaking. The awards will recognize the leading international Transactions, Firms, Individuals, Products and Services, and Firms from around the world.

To view a complete list of winners Click Here.

Since 1998, The M&A Advisor has been serving the worlds leadingmergers and acquisitions, financing, and turnaround professionals.

Read the rest here:

Corporate Growth Summit and International M&A Awards

Transhumanism – Britannica.com

Transhumanism, social and philosophical movement devoted to promoting the research and development of robust human-enhancement technologies. Such technologies would augment or increase human sensory reception, emotive ability, or cognitive capacity as well as radically improve human health and extend human life spans. Such modifications resulting from the addition of biological or physical technologies would be more or less permanent and integrated into the human body.

The term transhumanism was coined by English biologist and philosopher Julian Huxley in his 1957 essay of the same name. Huxley referred principally to improving the human condition through social and cultural change, but the essay and the name have been adopted as seminal by the transhumanist movement, which emphasizes material technology. Huxley held that, although humanity had naturally evolved, it was now possible for social institutions to supplant evolution in refining and improving the species. The ethos of Huxleys essayif not its lettercan be located in transhumanisms commitment to assuming the work of evolution, but through technology rather than society.

The movements adherents tend to be libertarian and employed in high technology or in academia. Its principal proponents have been prominent technologists like American computer scientist and futurist Ray Kurzweil and scientists like Austrian-born Canadian computer scientist and roboticist Hans Moravec and American nanotechnology researcher Eric Drexler, with the addition of a small but influential contingent of thinkers such as American philosopher James Hughes and Swedish philosopher Nick Bostrom. The movement has evolved since its beginnings as a loose association of groups dedicated to extropianism (a philosophy devoted to the transcendence of human limits). Transhumanism is principally divided between adherents of two visions of post-humanityone in which technological and genetic improvements have created a distinct species of radically enhanced humans and the other in which greater-than-human machine intelligence emerges.

The membership of the transhumanist movement tends to split in an additional way. One prominent strain of transhumanism argues that social and cultural institutionsincluding national and international governmental organizationswill be largely irrelevant to the trajectory of technological development. Market forces and the nature of technological progress will drive humanity to approximately the same end point regardless of social and cultural influences. That end point is often referred to as the singularity, a metaphor drawn from astrophysics and referring to the point of hyperdense material at the centre of a black hole which generates its intense gravitational pull. Among transhumanists, the singularity is understood as the point at which artificial intelligence surpasses that of humanity, which will allow the convergence of human and machine consciousness. That convergence will herald the increase in human consciousness, physical strength, emotional well-being, and overall health and greatly extend the length of human lifetimes.

The second strain of transhumanism holds a contrasting view, that social institutions (such as religion, traditional notions of marriage and child rearing, and Western perspectives of freedom) not only can influence the trajectory of technological development but could ultimately retard or halt it. Bostrom and British philosopher David Pearce founded the World Transhumanist Association in 1998 as a nonprofit organization dedicated to working with those social institutions to promote and guide the development of human-enhancement technologies and to combat those social forces seemingly dedicated to halting such technological progress.

Visit link:

Transhumanism - Britannica.com

Transhumanism | Conspiracy School

Transhumanism is a recent movement that extols mans right to shape his own evolution, by maximizing the use of scientific technologies, to enhance human physical and intellectual potential. While the name is new, the idea has long been a popular theme of science fiction, featured in such films as 2001: A Space Odyssey, Bade Runner, the Terminator series, and more recently, The Matrix, Limitless, Her and Transcendence.

However, as its adherents hint at in their own publications, transhumanism is an occult project, rooted in Rosicrucianism and Freemasonry, and derived from the Kabbalah, which asserts that humanity is evolving intellectually, towards a point in time when man will become God. Modeled on the medieval legend of the Golem and Frankenstein, they believe man will be able to create life itself, in the form of living machines, or artificial intelligence.

Spearheaded by the Cybernetics Group, the project resulted in both the development of the modern computer and MK-Ultra, the CIAs mind-control program. MK-Ultra promoted the mind-expanding potential of psychedelic drugs, to shape the counterculture of the 1960s, based on the notion that the shamans of ancient times used psychoactive substances, equated with the apple of the Tree of Knowledge.

And, as revealed in the movie Lucy, through the use of smart drugs, and what transhumanists call mind uploading, man will be able to merge with the Internet, which is envisioned as the end-point of Kabbalistic evolution, the formation of a collective consciousness, or Global Brain. That awaited moment is what Ray Kurzweil, a director of engineering at Google, refers to as The Singularly. By accumulating the total of human knowledge, and providing access to every aspect of human activity, the Internet will supposedly achieve omniscience, becoming the God of occultism, or the Masonic All-Seeing Eye of the reverse side of the American dollar bill.

Continued here:

Transhumanism | Conspiracy School

Transhumanism Is TemptingUntil You Remember Inspector Gadget …

Imagine a man with a Swiss Army knife for a body. His arms and legs can extend in any direction, bend into any shape, and move at extraordinary speeds. His spine can elongate into a helicopter, his hands can turn into an almost unlimited number of tools, and his feet can turn into ice skates, roller blades, and more.

This is some transhumanists dream, a future where we can completely trick out our bodies and transcend the limitations of human biology. Its also a description of what the title character from the 1983 cartoon Inspector Gadget can do.

Rose Eveleth is an Ideas contributor at WIRED and the creator and host of Flash Forward, a podcast about possible (and not so possible) futures.

For those who arent familiar with the cartoon, the premise is simple: Inspector Gadget is, as his name implies, an inspector, or detective. Hes also a walking gadget, who can turn his body into nearly anything. And yet, with all that power, Gadget cant solve a single mystery. Every episode Gadget is called upon by his boss Chief Quimby to help solve a crime, nearly all of which are perpetrated by the villain Dr. Claw. For some reason or another, Gadget is always accompanied by his 10-year-old niece, Penny, and her dog Brain. And despite being equipped with every tool he could possibly need, its the brilliant Penny, a completely boring noncyborg, who saves the day every time.

Sure, the cartoon (and subsequent film adaptations) are over the top and ridiculous. But our hapless detective can teach us something about the ways we think about bodies, bionics, data, and the future of human-machine interfaces. Gadgets antics poke real holes in the fantasies that some transhumanists and body hackers have about how the body works, and what we might be able to ask it to do.

Early in the first episode of Inspector Gadget (Monster Lake) theres a scene that establishes the entire premise of the show. While our titular Gadget tries to find the instruction manual for the car hes driving, to deal with the overheating engine (in fact, the car is on fire because an evil robot spewed flames at it), he takes his hands off the wheel. Penny, as will become a recurring theme in the show, saves the day by actually paying attention to her surroundings, and noticing that the car is about to fly off a cliff. She grabs the wheel and averts disaster, completely unbeknownst to her bionic uncle. Gadget has seemingly unlimited physical resources at his disposal, but cannot use them to save his life (literally).

It is in scenes like this that I think of two things: Three Mile Island and butter production in Bangladesh. Let me explain. The former is the biggest nuclear meltdown in American history. The latter is a spurious economic predictor proposed in 1998 to poke fun at forecasting markets. But theyre tied together by the same thing that dooms Gadget: an excess of information. Three Mile Island (like Chernobyl and other nuclear accidents) happened for a variety of reasonslax regulations, slashed budgets, overworked employees, scientific rivalriesbut during the most critical moments of the disaster, it was marked by information overload. The control panel at the nuclear plant was designed to display all kinds of data, but there was no way the operators could keep track of the whole system at once. In a sea of signals, you can miss the most important ones.

Or, you can see one that means nothing at all, as in the case of butter production in Bangladesh, a signal that economist David Leinweber described in 1998. According to his calculations, three things could explain the performance of the S&P 500 with 99 percent accuracy: American cheese production, the Bangladeshi sheep population, and butter production in Bangladesh. Leinweber was intentionally poking fun at the methods he employed, arguing that with enough data but insufficient context you can correlate almost anything. At first, Leinweber wasnt even going to publish the work, he simply thought it was a funny trick. But then, reporters picked up on it, and it has found its way into the curriculum at the Stanford Business School and elsewhere, he writes in the paper he did eventually publish. Mark Twain spoke of lies, damn lies and statistics. In this paper, we offer all three, he writes.

The point here is that more data doesnt mean much if you cant do something useful with it. You can have all the data in the world and be just as useless as Inspector Gadget. Today, in conversations about AI people talk about the rise in computing power, the rise in giant data sets, and how those two things will inevitably lead to super-powerful systems. But theres a step missing in those arguments, and its a crucial, difficult, and time-consuming one: If all that data isnt labeled or organized in a meaningful way, even the greatest supercomputer cant do meaningful work with it. (This is why youre still asked to train the algorithms with a captcha any time you sign up for a newsletter, for example. These data sets often need human eyeballs and brains to work on them, and those are usually pretty expensive.)

This doesnt just apply to data. More tools, as any overexcited new home chef can tell you, dont make you a better cook. Inspector Gadget has, it seems, every possible piece of gadgetry at his disposal, but he cant see the forest through the bionic trees. Penny, on the other hand, undistracted by an endless number of technological choices, remains clear-eyed to save the day.

Penny is not completely untechnological. She is, in fact, a brilliant inventor in her own right. In many episodes she builds and deploys devices to help solve the casea radar system, a long-range camera, a smart watch. But where Gadget has technology embedded within him as a bodily element, and as such has less than perfect control over it, Penny uses technology as a tool outside her body.

Were the creators of Inspector Gadget trying to poke fun at the notion of Cartesian duality? Who can say, really. But the location of the technology here highlights the way we think about integrating our machines with our inventions.

The body as machine analogy dates back to at least the industrial revolution, when the idea that the body might be like the machines we were creating took hold. As Randolphe Nesse, a professor at Arizona State University, wrote in his essay The Body Is Not a Machine, The metaphor of body as a machine provided a ladder that allowed biology to bring phenomena up from a dark pit of mysterious forces into the light where organic mechanisms can be analyzed as if they are machines. The analogy proved valuable to evolve our understanding of the body.

Now, this body as machine trope is the well from which much of current-day body hacking springs. If the body is a machine, if the brain is a computer, if muscles are simply pulley systems, then we can go in and tinker at will. We can create Inspector Gadget because we can create computers and Boston Dynamics robots and spaceships. But the body is not a machine. It does not behave like one. We did not invent it and we mostly cannot program it. Its parts are not plug-and-play, nor are they discrete. And many researchers and writers have highlighted how our insistence on this model is actually hurting progress. In psychiatry, thinking about the mind as a machine has led to a debacle about diagnosis, writes Nesse.

As a (reluctant) tech reporter, I get a lot of press releases for products that only work if you assume the body functions like a device. If we could just measure things more accurately, these pitches argue, we could solve eating disorders, infertility, chronic pain, depressionthe list goes on. Silicon Valley tech gurus are all in on biohacking their bodies just like they growth hacked their startups. The company Daysy claimed that it could help people prevent pregnancy by measuring body temperaturewhen your body creates X signal, we know its doing Y thing. Daysy claimed that using this method it could identify whether a user was fertile with 99.4 percent accuracy. Turns out the paper Daysy was using as the basis for that claim was recently retracted.

Body-as-machine fantasies also imagine that the technology will work as we hope, every time. But anybody whos ever used, well, any kind of device can tell you that thats not true. Inspector Gadgets entire comedic repertoire (unbeknownst to him of course) lies in exactly these failures. His gadget arms extend, but wont contract, his coat inflates when he doesnt want it to, his feet turn to roller skates when he wanted skis. His existence makes plain the ridiculousness of assuming that something like Robocop could truly happena seamless, perfectly efficient blend of man and machine.

People who use prosthetic devices know this all too well. Many people who are initially outfitted with electronic prosthetic hands that are state of the art, for example, wind up going back to hooks and body-powered prosthetics because they obey their more simple, muscular commands better and are less likely to break. Jillian Weiss writes in her essay Common Cyborg, I am not impressed with their tech, which they call 3C98-3, and which I am wearing, a leg that whirs and clicks, a socket that will not fit unless I stay in the weight range of 100 to 105 pounds. I am 88 percent charged in basic mode and I have taken 638,402 steps on this leg. The last one they gave me was a lemon. Maybe this feeling of trial and error, repetition and glitch, is part of the cyborg condition and, by extension, the disabled condition.

Its comforting to think of the body as a machine we can trick out. It helps us ignore the strange fleshy aches that come with having a meat cage. It makes a fickle systemone we truly dont understandfeel conquerable. To admit that the body (and mind that sits within it) might be far more complex than our most delicate, intricate inventions endangers all kinds of things: the medical industrial complex, the wellness industry, countless startups. But it might also open up new doors for better relationships with our bodies too: Disability scholars have long argued that the way we see bodies as fixable ultimately serves to further marginalize people who will never have the standard operating system, no matter how many times their parts are replaced or tinkered with.

There is another scene in the first episode of Inspector Gadget that makes clear the distinction between Penny and Gadget. While Penny uses her radar system to detect the mechanical monster in the lake, Gadget has deduced that the scientist they have been charged with protecting must be hiding up a tree, and is walking along the lake shouting for the professor to come down. He is quite literally barking up the wrong tree. Id argue that the tech industrys current fixation with the body as a hackable device is exactly that.

Read the rest here:

Transhumanism Is TemptingUntil You Remember Inspector Gadget ...

Transhumanism – RationalWiki

You know what they say the modern version of Pascal's Wager is? Sucking up to as many Transhumanists as possible, just in case one of them turns into God. Julie from Crystal Nights by Greg Egan

Transhumanism (or H+), an intellectual movement, is greatly influenced by science fiction and presents an idealistic point of view of what technology could do for humanity in the future, not what it can do; it's all hypothetical.[1] Transhumanism explores the benefits and repercussions of what technology could do for humanity; however, it assumes the technological boundaries are nonexistent.[2]

How plausible is transhumanism? In the 1930s, many sensible people were sure human beings would never get to the Moon and that was just one of many predictions that turned out incorrect.[3] Early 21st century people do not know one way or the other what will be possible in the future. However, the scientific claims of transhumanism still need to be examined critically, because some of these technoscientific prophecies may not be plausible; after we got to the moon, people expected we'd have a permanent colony there by the end of the century.[4]

While frequently dismissed as mere speculation at best by most rationalists[5] (especially in light of the many failures of artificial intelligence), transhumanism is a strongly-held belief among many computer geeks, notably synthesizer and accessible computing guru Ray Kurzweil, a believer in the "technological singularity," where technology evolves beyond humanity's current capacity to understand or anticipate it, and Sun Microsystems founder and Unix demigod Bill Joy, who believes the inevitable result of AI research is the obsolescence of humanity.[6]

Certain recent technological advances are making the possibility of the realization of transhumanism appear more plausible: Scientists funded by the military developed an implant that can translate motor neuron signals into a form that a computer can use, thus opening the door for advanced prosthetics capable of being manipulated like biological limbs and producing sensory information.[7] This is on top of the earlier development of cochlear implants, which translate sound waves into nerve signals; they are often called "bionic ears."[8]

Even DIY transhumanism or 'biohacking' is becoming an option, with people installing magnetic implants, allowing them to feel magnetic and electric fields.[9] Others have taken to wearing belts of magnets, in order to always be able to find magnetic north. Prosthetic limbs with some level of touch are also now being developed, a major milestone. [10]One notable individual whose received magnetic finger implants is Zoe Quinn; [11] the current scientific consensus seems unclear, although humans are not thought to have a magnetic sense, there is a cryptochrome protein in the eye which could potentially make humans capable of Magnetoreception, like certain other mammals such as mice and cows appear to be. [12]

"Whole brain emulation" (WBE) is a term used by transhumanists to refer to, quite obviously, the emulation of a brain on a computer. While this is no doubt a possibility, it encounters two problems that keep it from being a certainty anytime in the near future.

The first is a philosophical objection: For WBE to work, "strong AI" (i.e. AI equivalent to or greater than human intelligence) must be attainable. A number of philosophical objections have been raised against strong AI, generally contending either that the mind or consciousness is not computable or that a simulation of consciousness is not equivalent to true consciousness (whatever that is). There is still controversy over strong AI in the field of philosophy of mind.[13]

A second possible objection is technological: WBE may not defy physics, but the technology to fully simulate a human brain (in the sense meant by transhumanists, at least) is a long way away. Currently, no computer (or network of computers) is powerful enough to simulate a human brain. Henry Markram, head of the Blue Brain Project, estimates that simulating a brain would require 500 petabytes of data for storage and that the power required to run the simulation would cost about $3 billion annually. (However, in 2008, he optimistically predicted this it would be possible ten years from 2008.)[14]) In addition to technological limitations in computing, there are also the limits of neuroscience. Neuroscience currently relies on technology that can only scan the brain at the level of gross anatomy (e.g., fMRI, PET). Forms of single neuron imaging (SNI) have been developed recently, but they can only be used on animal subjects (usually rats) because they destroy neural tissue.[15]

First, let me say that Im all in favor of research on aging, and I think science has great potential to prolong healthy livesand Im all for that. But I think immortality, or even a close approximation to it, is both impossible and undesirable.

Another transhumanist goal is mind uploading, which is one way they claim[17][18] we will be able to achieve immortality. Aside from the problems with WBE listed above, mind uploading suffers a philosophical problem, namely the "swamp man problem." That is, will the "uploaded" mind be "you" or simply a copy or facsimile of your mind? However, one possible way round this problem would be via incremental replacement of parts of the brain with their cybernetic equivalents (the patient being awake during each operation). Then there is no "breaking" of the continuity of the individual's consciousness, and it becomes difficult for proponents of the "swamp man" hypothesis to pinpoint exactly when the individual stops being "themselves." It does, however, run directly into a similar problem, the "Ship of Theseus" problem: when all of the brain parts are replaced, is it still fundamentally the same as the original?

Cryonics is another favorite of many transhumanists. In principle, cryonics is not impossible, but the current form of it is based largely on hypothetical future technologies and costs substantial amounts of money.

Fighting aging and extending life expectancy is possible the field that studies aging and attempts to provide suggestions for anti-aging technology is known as "biogerontology". Aubrey de Grey has proposed a number of treatments for aging. In 2005, 28 scientists working in biogerontology signed a letter to EMBO Reports pointing out that de Grey's treatments had never been demonstrated to work and that many of his claims for anti-aging technology were extremely inflated.[19] This article was written in response to a July 2005 EMBO reports article previously published by de Grey[20] and a response from de Grey was published in the same November issue.[21] De Grey summarizes these events in "The biogerontology research community's evolving view of SENS," published on the Methuselah Foundation website.[22]

Worst of all, some transhumanists outright ignore[citationneeded] what people in the fields they're interested in tell them; a few AI boosters, for example, believe that neurobiology is an outdated science because AI researchers can do it themselves anyway. They seem to have taken the analogy used to introduce the computational theory of mind, "the mind (or brain) is like a computer", and taken it literally. Of course, the mind/brain is not a computer in the usual sense.[23] Debates with such people can take on the wearying feel of a debate with a creationist or climate change denialist, as such people will stick to their positions no matter what. Indeed, many critics are simply dismissed as Luddites or woolly-headed romantics who oppose scientific and technological progress.[24]

Transhumanism has often been criticized for not taking ethical issues seriously on a variety of topics,[25] including life extension technology,[26] cryonics,[27] and mind uploading and other enhancements.[28][29] Francis Fukuyama (in his doctrinaire neoconservative days) caused a stir by naming transhumanism "the world's most dangerous idea."[30] One of Fukuyama's criticisms, that implementation of the technologies transhumanists push for will lead to severe inequality, is a rather common one.

A number of political criticisms of transhumanism have been made as well. Transhumanist organizations have been accused of being in the pocket of corporate and military interests.[31] The movement has been identified with Silicon Valley due to the fact that some of its biggest backers, such as Peter Thiel (of PayPal and Bitcoin fame), reside in the region.[32][33] Some writers see transhumanism as a hive of cranky and obnoxious techno-libertarianism.[34][35] The fact that Julian Huxley coined the term "transhumanism" and many transhumanists' obsession with constructing a Nietzschean ubermensch known as the "posthuman" has led to comparisons with eugenics.[36][31] Like eugenics, it has been characterized as a utopian political ideology.[37] Jaron Lanier slammed it as "cybernetic totalism".[38]

Some tension has developed between transhumanism and religion, although there are many secular liberal people who are skeptical or opposed to transhumanism as well.[citationneeded] Some transhumanists, generally being atheistic naturalists, see all religion as an impediment to scientific and technological advancement and some Christians oppose transhumanism because of its stance on cloning and genetic engineering and label it as a heretical belief system.[39] Other transhumanists, however, have attempted to extend an olive branch to Christians, [40] and the Christian Transhumanist Association group on Facebook has over 1,100 members.

Some religious transhumanists have tried to reconcile their religion and techno-utopian beliefs, calling for a "scientific theology."[41] There is even a Mormon transhumanist organization.[42] Ironically for the atheistic transhumanists, the movement has itself been characterized as a religion and its rhetoric compared to Christian apologetics.[43][44] Interestingly the word transhuman first appeared in Henry Francis Careys 1814 translation of Paradiso, the last book of the Divine Comedy as Dante ascends to heaven during the resurrection. [45]

The very small transhumanist political movement has gained momentum with Zoltan Istvan announcing his bid for US president, with the Transhumanist Party and other small political parties gaining support internationally.

The important thing about transhumanism is that while a lot of such predictions may in fact be possible (and may even be in their embryonic stages right now), a strong skeptical eye is required for any claimed prediction about the fields it covers. When evaluating such a claim, one will probably need a trip to a library (or Wikipedia, or a relevant scientist's home page) to get up to speed on the basics.[note 1]

A common trope in science fiction for decades is that the prospect of transcending the current form may be positive, as in Arthur C. Clarke's 1953 novel Childhood's End or negative, as in the film The Matrix, with its barely disguised salvationist theme, or the Terminator series of films, where humanity has been essentially replaced by machine life. Change so radical elicits fear and thus it is unsurprising that many of the portrayals of transhumanism in popular culture are negative. The cyberpunk genre deals extensively with the theme of a transhumanist society gone wrong.

On closer inspection, this should not be surprising. Since transhumanism is ambitious about conquering age-related illnesses (extropianism), death (immortalism), ecological damage (technogaianism), gender differences (postgenderism) and suffering (abolitionism), a fictional world where this has already been achieved leaves a story with few plot devices to exploit. Additionally, it could be hard for the public to identify with flawless, post-human characters.

Among the utopian visions of transhumanism are those found in the collaborative online science fiction setting Orion's Arm. Temporally located in the post-singularity future, 10,000 years from now, Orion's Arm is massively optimistic about genetic engineering, continued improvements in computing and materials science. Because only technology which has been demonstrated to be impossible is excluded, even remotely plausible concepts has a tendency to be thrown in. At the highest end of the scale is artificial wormhole creation, baby universes and inertia without mass.[46] Perhaps the only arguably positive depiction of transhumanism in video games is the Megaman ZX series where the line between human and reploids has begun to blur. Defining at what point the definition of the singularity was met in the centuries long Megaman timeline can be a useful way of illustrating how nebulous the terminology is during a debate.

See the original post:

Transhumanism - RationalWiki

What is Transhumanism? – GenSix Productions

The title of this years True Legends Conference is Transhumanism and the Hybrid Age. For the followers of Steve Quayle, Timothy Alberino and Tom Horn, these might be familiar terms, but the importance of the topic deserves a clear understanding by all. So what exactly is transhumanism? And for that matter, what is a hybrid?

Transhumanism is defined as the belief or theory that the human race can evolve beyond its current physical and mental limitations, especially by means of science and technology. Of course, this sounds admirable. Who among us does not want to move toward the goal of eliminating human pain with ever increasing intelligence? But transhumanism is much more than that. With the unending surge in biological know-how, we now have the ability to redefine what it means to be human. Through tools like artificial intelligence, robotics and especially genetics, science is playing a very high-stakes game in the homo sapien sandbox. The end result of this game will have massive implications for future generations.

A quick internet search of the term transhumanism reveals a host of good intentions. Phrases such as broadening human potential, overcoming aging and cognitive shortcomings, and eliminating suffering decorate articles highlighting the possibilities at our fingertips. Breakthroughs like thought-controlled robotic limbsor even regrowing natural limbsseem to make the decision to proceed a no-brainer. If we can do it, we must, as long as were careful, they say. An obligatory word of warning is usually inserted somewhere among the celebratory jargon about how we must never misuse these technologiesas if mankind would ever do such a thing? The question is; Are those who rule over us responsible enough to wield such power?

The power of our technology is being concentrated into the hands of the technocratic elite, and there is more at stake than the Terminator scenarios portrayed in Hollywood. There are deeper spiritual consequences underlying the transhumanist agenda, consequences that can have eternal ramifications. And this is why Steve Quayle and Timothy Alberino have decided to address the topic of Transhumanism and the Hybrid Age in this years True Legends Conference.

This raises another question: What exactly is a hybrid? The official definition reads as follows: a thing made by combining two different elements; a mixture. In our current context, would having a robotic arm make you a hybrid? Would this be a bad thing? I would not want to tell people needing a limb that they cannot have it for either their own good or the good of mankind. Nor deny the blind sight, or the diseased a cure via some amazing biotechnological breakthrough. Thats what makes this such a sticky issue. The cryptic phraseology in Genesis concerning Noah being perfect in his generations also gives me great pause. How is it that all flesh became corrupt in the pre-flood world? Was the rest of the worlds population a hybrid mix of some kind, an unholy amalgamation of beast, man and tech?

We are fast approaching an irreversible tipping point that will radically change society as we know it, and fundamentally redefine what it means to be a human being.

Darrin GeisingerTrue Legends 2018 Conference Coordinator

The rest is here:

What is Transhumanism? - GenSix Productions

Elevating the Human Condition – Humanity+ What does it mean …

What does it mean to be human in a technologically enhanced world? Humanity+ is a 501(c)3 international nonprofit membership organization that advocates the ethical use of technology, such as artificial intelligence, to expand human capacities. In other words, we want people to be better than well. This is the goal of transhumanism.

Humanity+ Advocates for Safe and Ethical Use: Technologies that intervene with human physiology for curing disease and repairing injury have accelerated to a point in which they also can increase human performance outside the realms of what is considered to be normal for humans. These technologies are referred to as emerging and speculative and include artificial intelligence, nanotechnology, nanomedicine, biotechnology, genetic engineering, stem cell cloning, and transgenesis, for example. Other technologies that could extend and expand human capabilities outside physiology include artificial intelligence, artificial general intelligence, robotics, and brain-computer integration, which form the domain of bionics, uploading, and could be used for developing whole body prosthetics. Because these technologies, and their respective sciences and strategic models, such as blockchain, would take the human beyond the normal state of existence, society, including bioethicists and others who advocate the safe use of technology, have shown concern and uncertainties about the downside of these technologies and possible problematic and dangerous outcomes for our species.

2018 PROJECTS:

Humanity+ @ Beijing Conference

Blockchain Prize

Humanity+ @ The Assemblage New York City

TransVision 2018 Madrid, Spain

Go here to read the rest:

Elevating the Human Condition - Humanity+ What does it mean ...

My Medicine – WebMD

WebMD My Medicine Help

Q: What is an interaction?

A: Mixing certain medicines together may cause a bad reaction. This is called an interaction. For example, one medicine may cause side effects that create problems with other medicines. Or one medicine may make another medicine stronger or weaker.

Q: How do you classify the seriousness of an interaction?

A: The following classification is used:

Contraindicated: Never use this combination of drugs because of high risk for dangerous interaction

Serious: Potential for serious interaction; regular monitoring by your doctor required or alternate medication may be needed

Significant: Potential for significant interaction (monitoring by your doctor is likely required)

Mild: Interaction is unlikely, minor, or nonsignificant

Q: What should I do if my medications show interactions?

A: Call your doctor or pharmacist if you are concerned about an interaction. Do not stop taking any prescribed medication without your doctor's approval. Sometimes the risk of not taking the medication outweighs the risk or the interaction.

Q: Why can't I enter my medication?

A: There may be medications, especially otc or supplements, that have not been adequately studied for interactions. If we do not have interaction information for a certain medication it can't be saved in My Medicine.

Q: Do you cover all FDA warnings?

A: WebMD will alert users to the most important FDA warnings and alerts affecting consumers such as recalls, label changes and investigations. Not all FDA actions are included. Go to the FDA for a comprehensive list of warnings.

Q: Can I be alerted by email if there is an FDA warning or alert?

A: Yes. If you are signed in to WebMD.com and using My Medicine you can sign up to receive email alerts when you add a medicine. To unsubscribe click here.

Q: Can I add medicines for family members?

A: Yes. Click the arrow next to your picture to add drug profiles for family or loved ones.

Q: Can I access My Medicine from my mobile phone?

A: Yes. Sign in to the WebMD Mobile App. Your saved medicine can be found under "Saved."

Q: Why are there already medicines saved when this my first time using this tool?

A: If you have previously saved a medication on WebMD, for example, in the WebMD Mobile App, these may display in My Medicine.

Read the rest here:

My Medicine - WebMD