What Is Ethereum? Here’s What You Need To Know

Ethereum has taken the world by storm...but how does it work and why is it becoming so popular?

This guide will teach you everything you need to know about Ethereum.

Read on or skip to the section you're interested in...

1. What is Ethereum?

Ethereum can be thought of as a virtual supercomputer.

It's designed as a platform to host applications that can run without the need for human interference.

These applications are called 'Decentralized Apps', and I'll explain how they work later in this guide.

The cryptocurrency, Ether (usually referred to as Ethereum) is the currency or utility token that you pay to use this virtual network.

2. How Ethereum Works.

2.1. Ethereum Blockchain.

Like Bitcoin and other cryptocurrencies, Ethereum has it's own blockchain.

This is like a record of all transactions on the Ethereum network. It's stored on nodes (computers, miners, etc.) across the world.

However, while Bitcoins blockchain just stores transaction records, Ethereums blockchain also hosts smart contracts and decentralized applications (DApps).

Smart contracts are contracts programmed to run by themselves. In simple terms, this means: If x happens, y results.

(I'll explain Smart Contracts in more detail below).

The Ethereum blockchain keeps a record of the latest execution of each smart contract.

2.2. How Do Transactions Work?

Transactions, whether they are simple money transfers or executions of smart contracts or DApps, require gas.

Gas can be thought of as transaction fees. You pay for gas using Ether.

Transaction fees go to miners (explained below).

2.3. What is Ethereum Used for?

Since you can program different smart contracts and DApps on the Ethereum blockchain, Ethereum use cases are only limited by the imagination.

Ethereums innovation in this regard has even led to copycats trying to mimic Ethereums popularity and success.

Note: Want to see how Ethereum works in the 'real world'?

Check out section 7 of this guide for some examples.

2.4. Smart Contracts.

As mentioned, smart contracts are contracts that are programmed to run by themselves.

So why is this helpful?

Smart contracts can eliminate the inefficiencies often caused by middlemen.

Smart contracts get rid of middlemen like banks and even service providers like Airbnb and Uber.

For example, banks are usually the ones that give people loans.

Instead of having a bank, smart contracts could be written so that loans are disbursed once certain conditions are fulfilled.

For instance, once you pay your loan amount, funds could be disbursed into your account automatically without the need for a loan collector.

For something like Airbnb, instead of having Airbnb connect renters and landlords, smart contracts could grant a renter access to an apartment once he or she makes a payment.

The examples are endless.

Smart contracts could be revolutionary and have the potential to upend many industries and business models.

2.5. Mining Ethereum.

When you make a transaction, this transaction is broadcast to the Ethereum network.

Miners verify transactions and group them into blocks (groups of transactions), which are added to the blockchain (groups of blocks or all Ethereum transactions).

The way that miners verify Ethereum transactions is via proof of work. However, they are planning to move towards "proof of stake".

Miners, using their mining devices, such as computers or specialized mining devices, perform computationally difficult work.

Whoever finishes this work first gets to add a new block to the blockchain.

For their efforts, miners are paid in transaction fees (gas paid for in Ether) and newly created Ether (if they finish the work first).

3. History of Ethereum.

3.1 Who Created Ethereum?

The founder of Ethereum, Vitalik Buterin, published the idea of Ethereum in late 2013 in a whitepaper.

Buterin had originally pushed for application development (DApps) on Bitcoins blockchain, but others in the Bitcoin community didnt share his vision.

This led him to create Ethereum.

Ethereum was officially announced in January 2014 and other team members included influential cryptocurrency figures:

Ethereums ICO took place from July 2014 to August 2014. Crowd sale participants paid for Ether using Bitcoin.

A year later, in July 2015, Ethereum went live.

3.2. Ethereums Growth.

People realized the potential of Ethereum (Blockchain 2.0), and Ethereum quickly gained in popularity.

3.3 Ethereum Hacks.

While Ethereum has risen quickly in the cryptocurrency sphere, its unfortunately suffered some high profile hacks.

Here's a couple of examples.

Though The DAO was the largest crowdfunding campaign in history (at the time), it was unfortunately hacked.

One third of The DAOs funds were stolen (valued at about $50 million at the time).

The community was split with regards to how to deal with the hack, which led to the split of Ethereum (discussed below).

Parity is an Ethereum wallet provider thats had a run of bad publicity.

In July 2017, $30 million in Ether was stolen from Parity wallets.

3.4. Ethereum Classic.

The aforementioned DAO hack was the first of its kind in the Ethereum community.

People werent sure with how to deal with the hack and two camps emerged.

On the one hand, some wanted to hard fork (split) the Ethereum blockchain to restore the stolen funds.

The other side argued doing so would go against the immutability ethos of blockchain.

This disagreement led to the split of Ethereum into Ethereum (forked blockchain) and Ethereum Classic (unchanged blockchain).

4. Benefits Of Ethereum.

Here's a few of Ethereum's benefits (we'll come onto it's disadvantages next)

Nothing can be censored on Ethereum because of blockchain technology.

Data is hosted on nodes across the world so censorship or changing of data wouldnt be possible without controlling thousands of nodes.

Since Ethereum isnt held on one server (centralized) and is instead hosting on thousands of nodes (decentralized), there's no downtime.

(Unless all nodes crash at the same time which is rare).

With the introduction of Smart Contracts, Ethereum is a very versatile platform and could revolutionise many industries (as mentioned earlier with banking and Airbnb.

Ethereum is one of the most popular platforms for launching ICOs.

Ethereum's blockchain makes it relatively easy for developers to create DApps, DAOs and other crypto-assets.

Therefore it's become an increasingly more popular and convenient platform for ICOs and developers to launch from.

Mining and transferring tokens is faster on the Ethereum blockchain, especially when compared to Bitcoin.

Transferring Bitcoin can take 10 minutes (or even longer) - whereas transferring Ethereum takes a matter of seconds.

5. The Disadvantages Of Ethereum.

Ethereum uses its own programming language, Solidity.

Developers unfamiliarity with Solidity has led to code being written incorrectly, which led to problems like The DAO hack.

Projects similar to Ethereum have emerged addressing this issue and allow programmers to use more familiar languages like Javascript.

Ethereum, like Bitcoin, is facing problems, as it grows more popular.

The fact that games like CryptoKitties can cause network congestion is a cause for concern.

If Ethereum cant handle many transactions, some critics are wondering how will it ever scale to meet the demands of a mainstream user base?

Transaction fees on the Ethereum platform are paid in Gas - and they can quickly inflate.

In fact, transaction fees increased by up to 70% for Ethereum at peak usage.

As you can see in the chart below, transaction fees have fluctuated dramatically over the last few months.

Another technical problem with Ethereum is that sometimes the Ethereum wallet won't sync properly with the blockchain.

This means sometimes users can't see their wallet's actual balance - and the figures are can be inaccurate.

As you can imagine, that's a bit worrying for some users!

You can find more details about this here.

6. Ethereum vs. Bitcoin.

So what are the biggest differences between Ethereum and Bitcoin?

Smart Contracts the main difference between Ethereum and Bitcoin is that Ethereum allows for smart contracts and DApps instead of just payments.

Faster Transactions the time for a single Ethereum block to be mined is measured in seconds vs. minutes (Bitcoin).

Purpose Bitcoin is more like a store of value, whereas Ethereum allows decentralised apps to be developed on it's platform.

Functionality Ethereum's technology is designed to allow DApps and smart contracts for developers. Ethereum is more versatile than Bitcoin in this respect.

Proof Of Work Vs Proof Of Stake Whilst Bitcoin and Ethereum are both currently mined using Proof Of Work, this could change soon.

The rest is here:

What Is Ethereum? Here's What You Need To Know

Ethereum News | Ethereum News today | Latest Ethereum News

Ethereum is the largest open-source, blockchain based platform for decentralised applications. It serves as digital currency and can be traded like any other cryptocurrency. If you want to get a better idea of what Ethereum is and how it works, check out the Ethereum News category where you will find all kinds of topics you might be interested in. Even though it is a digital coin just as Bitcoin, Ethereum operates smart contracts and and has its token, known as ether (ETH). Take a look at Ethereum News and learn more about smart contracts and distributed applications (shortly called Apps). This peer-to-peer platform is famous for its free-fraud and free-third-party interference nature. You can find out more about it in Ethereum News today. The network is suitable for running transactions very fast in only a matter of seconds which is much more efficient than Bitcoin transactions, that runs in minutes. Ethereum News today will explain you the processes and nature of this cryptocurrency in detail. Its definitely an advanced type of digital currency and contracting solution read more about the future of this cryptocurrency in the Latest Ethereum News. It is classified as Crypto 2.0 for a reason, so if you are interested in digital coins, get to know what is going on in the Ethereum ecosystem. You simply cannot miss the Latest Ethereum News, therefore take a quick look and get prepared for the future of trading and transactioning. Its going to be exciting!

Read the original:

Ethereum News | Ethereum News today | Latest Ethereum News

Ethereum (ETH) – Price, Chart, Info | CryptoSlate

Ethereum (ETH) - Price, Chart, Info | CryptoSlate

1H -0.15%

24H -2.15%

7D +21.1%

$148.293 Market Pairs: 4,824

-2.15% -$3.19

24h Price Change

Market Cap $15,448,494,919

Volume 24h $2,892,628,283

Circ. Supply 104.18M ETH

Ethereum is a decentralized platform that runs smart contracts: applications that run exactly as programmed without any possibility of downtime, censorship, fraud or third party interference.

Market Cap $15,448,494,919

Volume 24H $2,892,628,283

Circulating Supply 104,175,176 ETH

Total Supply 104,175,176 ETH

Proof Type Proof of Work (PoW)

Block Time ~14 seconds

Algorithm Ethhash

Team Location Zug, Switzerland

First Announced January 23, 2014

Status | Crowdsale Ended

ICO Start Date Jul 22, 2014

ICO End Date Sep 2, 2014

Total Raised $15.57M USD

Contributors 6041

Total Supply 50,000,000 ETH

1 ETH = $0.31 USD

Founder and Inventor

Founder and Go-Ethereum Lead

Researcher

Founder

Founder

Founder and CTO

Thanks for reaching out to us. We'll get back to you as soon as possible. In the meantime, please connect with us on social media.

Your message has been sent. We will get back to you as soon as possible. In the meantime, please connect with us on social media.

Your message has been sent. We will get back to you as soon as possible. In the meantime, please connect with us on social media.

This is a custom display ad paid for by Quadency for a total of $2,000 USD. For more information on our advertising rates and policies click here.

Read the original:

Ethereum (ETH) - Price, Chart, Info | CryptoSlate

Ethereum: JPMorgan, Microsoft, Banks Form … – fortune.com

Thirty big banks, tech giants, and other organizationsincluding J.P. Morgan Chase, Microsoft, and Intelare uniting to build business-ready versions of the software behind Ethereum, a decentralized computing network based on digital currency.

The group, called the Enterprise Ethereum Alliance, is set to debut at a summit in Brooklyn, New York on Tuesday, during which members J.P. Morgan Chase (jpm) and Banco Santander (san) are scheduled to demonstrate a pilot of the financial technology as it exists today. The pair plan to show off a spot trade on the foreign exchange market for global currencies using an adaptation of Ethereum as the settlement layer.

Ethereum uses a blockchain, often referred to as a distributed ledger, to record and execute transactions without the need of a middleman. Instead of a centrally managed database, copies of the cryptographic balance book are spread across the network and automatically updated as any payment takes place.

Satoshi Nakamoto, the mysterious inventor of Bitcoin, first introduced the concept of a blockchain to the world in a foundational white paper nearly a decade ago. (You can read more about Ethereum, a more flexible and developer-friendly alternative to Bitcoin with its native cryptocurrency, Ether, in this Fortune feature.)

Get Data Sheet, Fortunes technology newsletter.

The Ethereum alliance arrives as a challenger to several other extant blockchain ventures. The R3 consortium, for example, counts scores of partnering banks among its members, despite recent high-profile departures by Goldman Sachs, Santander, and Morgan Stanley. It has created Corda, its own take on a blockchain.

IBM (ibm), meanwhile, has spearheaded another initiative known as the Hyperledger Project, part of the non-profit Linux Foundation. That group maintains the fabric blockchain codebase, which as been used in supply chain trials with Wal-Mart (wmt).

Much of the interest to date from traditional financial firms involves private blockchains, meaning permission from an authority is required before a party can join the network. The original versions of Bitcoin and Ethereum have public networks that anyone can join. (At press time, the market caps of their cryptocurrencies were approximately $19 billion and $1.4 billion, respectively.)

Alex Batlin, blockchain lead at Bank of New York Mellon, said that while the Ethereum alliance will focus on the development of private blockchains, the hope is that these will one day link up with the public Ethereum blockchain, which is open to all.

That interconnection of public and private chains actually creates a very strong network, Batlin said on a call with Fortune. Each chain strengthens the other at an exponential level.

In the view of its proponents, Ethereums public and private networks will become analogous to intranets versus internets; they will share standard protocols, but have different configurations for privacy and security, depending on each organizations needs.

Members of the Ethereum alliance include Accenture, BBVA, BNY Mellon, BNP Paribas, BP, Cisco, Credit Suisse, ING, Thomson Reuters, and UBS. Also joining is IC3, or the Initiative for Cryptocurrencies and Contracts, an academic group consisting of researchers from universities such as Cornell University, UC Berkeley, and Israels Technion.

Several representatives from alliance firms cited the energy surrounding Devcon2, Ethereums fall developer conference in Shanghai, as the focal point that led to their collaboration on this effort. Despite multiple hacks on Ethereum-based applications and a controversial splitting of the Ethereum network, enthusiasm in the network has apparently not diminished.

J.P. Morgan is responsible for developing the basis of the blockchain tech for the alliance. Called Quorum, the banks code has been designed to add privacy protections into the mix, among other tweaks.

The partners will help each other develop the foundations for different use cases, such as post-trade settlement, payments between banks, and supply chain tracking, while competing on applications and services built atop the networks. The top priorities for the alliance now include ensuring scalability and security.

The other founding members of the alliance are BlockApps, Nuco, AMIS, Andui, CME Group, ConsenSys, Fubon Financial, brainbot technologies, Chronicled, Cryptape, The Institutes, Monax, String Labs, Telindus, Tendermint, VidRoll, and Wipro.

Link:

Ethereum: JPMorgan, Microsoft, Banks Form ... - fortune.com

Careers – Home – Peterson and Control Union – Peterson and …

We think it is important for you to discover where your passions and strengths lie. In addition to the opportunity to explore different areas under the guidance of a line manager, we will also assign you a 'buddy' (normally a former trainee who has been through the process, a mentor (who will be an experienced manager) and a talent manager to support you in your development.

Read more

Whichever area holds your interest, you will need to demonstrate that you share our values and have your own distinct strengths. Peterson andControl Unionhave a reputation based on mutual entrepreneurial attitude, winning partnerships, honesty, integrity and cooperation; this is how we wish to continue growing.

Read more

If you recognise yourself in the outline profile, please apply for the traineeship. We have three starting dates: January 1,May 1 and September 1. The application date will determine the start date of the Global Graduate Program.

Read more

Once atrainee has successfully completed the global graduate program, ourintention is to offer a challenging position within Peterson orControl Union where we will continue to support your growth within the company.

Read more

See original here:

Careers - Home - Peterson and Control Union - Peterson and ...

Brave Wilderness – YouTube

Please SUBSCRIBE - http://bit.ly/BWchannelWatch More - http://bit.ly/BTwolverine

Here is the new Brave Wilderness trailer for 2017!

GET READYthis year is going to be the WILDEST one yet!

The Brave Wilderness Channel is your one stop connection to a wild world of adventure and amazing up close animal encounters!

Follow along with adventurer and animal expert Coyote Peterson and his crew as they lead you on three exciting expedition series - Breaking Trail, Dragon Tails and Coyotes Backyard - featuring everything from Grizzly Bears and Crocodiles to Rattlesnakes and Tarantulaseach episode offers an opportunity to learn something new.

So SUBSCRIBE NOW and join the adventure that brings you closer to the most beloved, bizarre and misunderstood creatures known to man!

GET READY...things are about to get WILD! New Episodes Every Tuesday at 9AM EST!

Subscribe Now! https://www.youtube.com/Bra...

Find more info at: http://www.CoyotePeterson.com

Coyote Peterson on Twitter: https://twitter.com/CoyoteP...

Coyote Peterson on Facebook: https://www.facebook.com/Co...

Coyote Peterson on Instagram: https://www.instagram.com/C...

Coyote Peterson G+: https://plus.google.com/100...... Show less

Continue reading here:

Brave Wilderness - YouTube

Basic income could end food insecurity – Upstream

Eating is an essential act of survival that we do every day. But eating is much more than biology. It's also social, cultural, psychological, emotional and political.

The food we eat and the circumstances we eat it in tell us who we are and where we belong in our society.

What does it tell us about who we are, and where we belong, when we cant afford to buy the food we need and want for ourselves and our families? All of us have had the experience of being hungry, having skipped a meal or as we await our next. But for most of us, we know that food will soon be available. That is an entirely different experience than having no food in the cupboard and no money to buy more. This condition of food insecurity affects at least 4 million Canadians, including more than a million kids. What does it tell us about who we are as a society that we tolerate this in a land of such wealth and abundance?

Most Canadians cannot bear the thought that so many in this country are hungry. That's why we have food banks, an effort started by ordinary Canadians in their communities, distributing food to those who didnt have enough to eat. But after more than thirty years of trying, food banks have been unable to solve the problem of hunger. When they started in the 80s, food banks saw themselves as a temporary measure. They expected to fold up and disappear once the economy improved. But even though we are vastly more wealthy as a country, the number of Canadians using food banks remains high, and the number of food insecure Canadians is even higher.

"What does it tell us about who we are as a society that we tolerate this in a land of such wealth and abundance?"

Its not surprising that food banks havent been able to eliminate hunger, because the upstream problem is poverty. Food insecurity is one of the many symptoms of poverty and will disappear only when we effectively tackle its source.

As an academic and researcher who has studied food insecurity for more than twenty years, I yearn for the day when food banks can close because they are no longer needed. Two years ago, I learned about an exciting new national campaign to promote an unconditional basic income guarantee to eliminate poverty. I became a founding member of the Kingston Action Group for a Basic Income Guarantee and have watched this idea take off. While there have been national conversations off and on about basic income for many years, it now appears basic incomes time has finally come.

As part of a progressive package of social supports including programs like pharmacare and affordable housing, an effective basic income guarantee really could eliminate poverty. In doing so it would also eliminate food insecurity and a host of other social determinants of stress, poor health, suffering and premature death. Some of us believe there is a strong moral and ethical imperative for us to look after each other. There is also a strong economic case. We know that for every dollar we invest in reducing poverty, eventually we will save about two dollars in health care, education and the justice system.

"Its not surprising that food banks havent been able to eliminate hunger, because the upstream problem is poverty."

For these reasons, even those uninterested in poverty reduction have become supporters. A basic income guarantee could help alleviate the pervasive sense of insecurity that we are experiencing, as full-time jobs with benefits disappear and climate change creates uncertainty. At Queens university where I teach, at least 40% of the undergraduate students are on anti-anxiety or anti-depressant medications. That anxiety has in part been created by the systematic underfunding and dismantling of social programs, and years of being told that we are on our own to face the uncertainties of life. Intense individualism and competition for allegedly scarce resources (like a decent, stable job) have taken an immense toll.

All across the country health professionals, non-governmental organizations, elected officials and ordinary citizens are becoming enthusiastic about basic income. Food Banks Canada has endorsed basic income. Mayors Nenshi (Calgary) and Iveson (Edmonton) are fans, as well as mayors in many other cities. The recently elected premier of PEI, Wade McLaughlin, has pledged his support. Kingston City Council recently became the first elected body to endorse basic income, and did so unanimously. Now other municipal governments are following suit.

"It now appears basic incomes time has finally come."

Just last month Minister Jean-Yves Duclos, Minister of Families, Children and Social Development, has begun seriously considering a federal basic income guarantee, and newly appointed Quebec Minister of Employment and Social Solidarity, Franois Blais, has been mandated to explore a basic income for Quebecers. Former Senator Hugh Segal is one of Canadas biggest (and most persistent) champions of basic income. The Ontario Public Health Association, the Canadian Public Health Association, the Canadian Medical Association, and many other health professionals and their associations are calling for a basic income guarantee to eliminate poverty, improve health, and save Medicare.

Well-known author and activist Naomi Klein recommends the implementation a basic income as the most important step in solving global climate change. She believes it will foster a sense of collectivity, enabling us to work together to tackle this urgent public health problem.

From solving poverty and food insecurity to facilitating action on global climate change, a basic income guarantee can give us a solid collective footing to work together again, to find new ways to live together and more sustainably on the planet, and reimagine our collective future. Implementing a basic income guarantee would tell us a lot about who we imagine ourselves to be as Canadians a compassionate and pragmatic people who understand that addressing the upstream causes of poor health and premature death is a nations most urgent and important goal.

---

Elaine Power is an associate professor in the School of Kinesiology & Health Studies at Queens University. She teaches social determinants of health to several hundred undergraduate students and does research about food and eating, especially in the context of poverty. She is a co-founder of the Kingston Action Group for a Basic Income Guarantee and a member of the Basic Income Canada Network.

The rest is here:

Basic income could end food insecurity - Upstream

Censorship | Define Censorship at Dictionary.com

[sen-ser-ship]

ExamplesWord Origin

Show More

Dictionary.com UnabridgedBased on the Random House Unabridged Dictionary, Random House, Inc. 2019

The CDA was passed not in the name of censorship but in the name of protecting children from stumbling across sexual material.

Jordan also banned it, and Malaysia, Egypt, and Indonesia subjected it to their censorship boards.

To many of us, that smacks of censorship, the highest offense to our pride in self-publicity.

So this startling move towards Internet censorship should come as no surprise.

Ironically, Trotter had succeeded in tightening a censorship bill but failed to stop the movie.

Show More

Collins English Dictionary - Complete & Unabridged 2012 Digital Edition William Collins Sons & Co. Ltd. 1979, 1986 HarperCollins Publishers 1998, 2000, 2003, 2005, 2006, 2007, 2009, 2012

1590s, "office of a censor," from censor (n.) + -ship. Meaning "action of censoring" is from 1824.

Show More

Online Etymology Dictionary, 2010 Douglas Harper

See original here:

Censorship | Define Censorship at Dictionary.com

First Amendment Center | Freedom Forum Institute

* { padding: 10px; flex: 1 100%;}.headerDiv { box-shadow: 0 0 4px 1px rgba(0, 0, 0, 0.3); background: #fff; color: #FFFFFF!important; background: #00baf2!important;text-align: center; margin: 0 auto; }.headerDiv a{color: #fae100!important;}.headerDiv ul{ list-style-type: none; font-weight: normal!important; font-size: 18px!important; margin: 0 10%; }.headerDiv p{font-weight: normal!important; font-size: 18px!important; margin: 0 10%;}.main { text-align: center; padding: 1%; margin: 1%; box-shadow: 0 0 4px 1px rgba(0, 0, 0, 0.3);}.sections { padding: 0; margin: 0; list-style: none; display: -webkit-box; display: -moz-box; display: -ms-flexbox; display: -webkit-flex; display: flex; -webkit-flex-flow: row wrap; justify-content: center; }#primers { background: url(https://www.freedomforuminstitute.org/wp-content/uploads/2016/10/understanding-e1476278290453.png) center no-repeat; transition: background-color 2s ease; -moz-transition:background-color 2s ease; -webkit-transition:background-color 2s ease; }#primers.chameleon { background:rgba(212,15,125,0.9);}#topics { background: url(https://www.freedomforuminstitute.org/wp-content/uploads/2014/08/building-e1476276251199.jpg) center no-repeat;transition: background-color 2s ease; -moz-transition:background-color 2s ease; -webkit-transition:background-color 2s ease;}#topics.chameleon { background:rgba(212,15,125,0.9); }#faq{ background: url(https://www.freedomforuminstitute.org/wp-content/uploads/2014/08/fac_faq_promo.jpg) center no-repeat; transition: background-color 2s ease; -moz-transition:background-color 2s ease; -webkit-transition:background-color 2s ease;}#faq.chameleon { background:rgba(212,15,125,0.9); }#podcast { background: url(https://www.freedomforuminstitute.org/wp-content/uploads/2017/06/Podcast_share_TheFirstFive.jpg) center no-repeat; transition: background-color 2s ease; -moz-transition:background-color 2s ease; -webkit-transition:background-color 2s ease; }#podcast.chameleon { background:rgba(212,15,125,0.9); }#survey { background: url(https://www.freedomforuminstitute.org/wp-content/uploads/2018/06/FAC_share_SOFA.jpg) center no-repeat; transition: background-color 2s ease; -moz-transition:background-color 2s ease; -webkit-transition:background-color 2s ease; }#survey.chameleon { background:rgba(212,15,125,0.9); }#reportcard { background: url(https://www.freedomforuminstitute.org/wp-content/uploads/2017/07/News_FAC_Summer2017_ReportCard_sm-300x182.jpg) center no-repeat; transition: background-color 2s ease; -moz-transition:background-color 2s ease; -webkit-transition:background-color 2s ease; }#reportcard.chameleon { background:rgba(212,15,125,0.9); }#column { background: url(https://www.freedomforuminstitute.org/wp-content/uploads/2016/10/CuBx_vwXYAAJz5K-1.jpg) center no-repeat; transition: background-color 2s ease; -moz-transition:background-color 2s ease; -webkit-transition:background-color 2s ease; }#column.chameleon { background:rgba(212,15,125,0.9); }#scotus { background: url(https://www.freedomforuminstitute.org/wp-content/uploads/2014/10/carousel_supreme-court-e1474319131299.jpg) center no-repeat; transition: background-color 2s ease; -moz-transition:background-color 2s ease; -webkit-transition:background-color 2s ease; }#scotus.chameleon { background:rgba(212,15,125,0.9); }#moot { background: url(https://www.freedomforuminstitute.org/wp-content/uploads/2015/08/FAC_MootCourt2016_Promo.jpg) center no-repeat; transition: background-color 2s ease; -moz-transition:background-color 2s ease; -webkit-transition:background-color 2s ease; }#moot.chameleon { background:rgba(212,15,125,0.9); }#scholarship { background: url(https://www.freedomforuminstitute.org/wp-content/uploads/2014/08/FAC_publications_promo.jpg) center no-repeat; transition: background-color 2s ease; -moz-transition:background-color 2s ease; -webkit-transition:background-color 2s ease; }#scholarship.chameleon { background:rgba(212,15,125,0.9); }.asset { font-size: 14px; text-align: center; box-shadow: 0 0 4px 1px rgba(0, 0, 0, 0.3); -webkit-transition: .125s linear; -moz-transition: .125s linear; -ms-transition: .125s linear; -o-transition: .125s linear; transition: .125s linear; position: relative; width: 250px; height: 180px;}.asset p {margin:1%;}.asset h3{font-weight: bold;}.asset a {position: relative; opacity: 0; text-decoration: none!important; color: #FFFFFF; text-align: center;} @media all and (min-width: 800px) { .main { flex: 2 0px; } .news { order: 3; } .headerDiv {order: 1;} .main { order: 2; } .footerDiv { order: 4; } width:30%; margin:auto 10%; } .textbox {display:block; background:rgba(0,0,0,0.8); color: #FFFFFF; position: absolute; bottom: 0; font-size: 16px;}#founder{ background: url('https://www.freedomforuminstitute.org/wp-content/uploads/2014/08/FAC_founder_promo.jpg') center no-repeat; transition: background-color 2s ease; -moz-transition:background-color 2s ease; -webkit-transition:background-color 2s ease; } #founder.chameleon { background:rgba(212,15,125,0.9); }#fac { background: url('https://www.freedomforuminstitute.org/wp-content/uploads/2017/02/News_Newseum_bldg_2017.jpg') center no-repeat; transition: background-color 1s ease; -moz-transition:background-color 1s ease; -webkit-transition:background-color 1s ease; }#fac.chameleon { background:rgba(212,15,125,0.9); }.footerDiv { background: #fff; box-shadow: 0 0 4px 1px rgba(0, 0, 0, 0.3);}]]>

Our mission: providing resources to help the public understand how

work, and how these freedoms can be protected.

Visit link:

First Amendment Center | Freedom Forum Institute

Liberty High School

We hope all of our students and staff had a restful holiday break and are returning to school ready to learn. In an effort to minimize lost instructional time, Keystone testing will occur on January 8th & 9th. Only test takers will report to school on Tuesday, January 8th. Students in special programs who have been previously notified will also attend. On Wednesday, January 9th, all students are to report to school for a regular school day. Test takers will report to the amphitheater for testing. Regular busing and meals will be provided on January 8th for test-takers. All of this information was sent home by mail for test-takers or taken home by your student.

Liberty High School strives to create a positive learning community, dedicated to a culture of excellence, where all relationships are valued. All members of the Liberty family have a responsibility to uphold the spirit of accountability through open communication, consistency, mutual respect, and school wide safety. Through collaboration, our school will provide growth and develop independent thinkers for our 21st century global family.

Read the original post:

Liberty High School

Find A Doctor or Dentist | UnitedHealthOne

Please Note:

Important Notice:

Network availability may vary by state, and a specific health care provider's contract status can change at any time. In addition, only the office locations listed are in your network. Visiting a physician at any other location may result in reduced benefits. Therefore, before you receive care, it is recommended that you verify with the health care provider that he or she is still contracted with your network and at the location where you are planning to visit the physician.

State Disclaimers

California:

California Medical Necessity Review Process for Mental Health: Licensed nurses perform the initial clinical review for pre-service, concurrent and/or post service/retrospective requests consistently using clinical review criteria to determine medical necessity of the mental healthcare services. All requests that cannot be certified through an initial review are sent to a clinical peer for determination. The reviewer will request only information reasonably necessary to make a determination.

In the case of a review of pre-service or concurrent care, the decision not to approve the service based on medical necessity will be made within 5 business days of receipt of information reasonably necessary to perform the review. A decision regarding services that have been completed will be made within 30 days of receipt of information reasonably necessary to perform the review. Expedited reviews will be performed when the insureds condition is such that they face an imminent and serious threat to his or her health or could jeopardize the insureds ability to regain maximum function. An expedited review determination will be completed within 72 hours of receipt of information reasonably necessary to perform the review. The decision will be communicated verbally, by fax or email within 24 hours to the provider and in writing within 2 business days to the insured. Notifications will provide an explanation of the reasons for the decision, a name and number to contact for questions and instructions on how to file an appeal.

In the case of a concurrent review, care shall not be discontinued until the treating provider has been notified of the insurers decision and a care plan has been agreed upon with the treating provider that is appropriate for the medical needs of the patient.

The information provided to you is a guideline used by this insurer to authorize, modify, or deny health care benefits for persons with similar illnesses or conditions. Specific care and treatment may vary depending on individual need and the benefits covered under your insurance plan.

Click Here for the Golden Rule Insurance Company California Grievance Procedures.

Colorado:

UnitedHealthcare Choice Plus has providers in every Colorado county except Gilpin and San Juan.

UnitedHealthcare Options PPO has providers in every Colorado county except Gilpin and San Juan.

Connecticut:

UnitedHealthOne performs an annual survey in the state of Connecticut. Click here for results.

Delaware:

You may request a printed copy of a network provider directory by:

Every Delaware provider that you use must clearly disclose to you in writing if they (or any provider practicing in their group practice or facility) are not in your network (non-network). Each non-network provider in Delaware must obtain your written consent prior to treating you, and require you to sign a network disclosure statement indicating you will accept financial responsibility for any non-network services which may not be covered by your plan. You cannot be balanced billed by a non-network provider if the non-network provider (or the facility based provider employing non-network facility based providers) fails to provide you with the required network disclosure statement and obtain your written consent. This requirement includes the disclosure of non-network lab services ordered by your provider or facility.

Florida:

For Florida Residents, Legislation Effective 7/1/2004: Direction on appropriate utilization of emergency services and alternative urgent care services. Choosing the Right Health Care Setting:

Emergency Rooms: When you or a loved one is hurt, you want the best care. Deciding where to go isn't always easy. You may be tempted to go to the emergency room (ER). But, this may not be the best choice. At the ER, true emergencies are treated first. Other cases must wait--sometimes for hours. And, it may cost you more. Go to the ER for heavy bleeding, large open wounds, sudden change in vision, chest pain, sudden weakness or trouble talking, major burns, spinal injuries, severe head injury or difficulty breathing. Of course, each case is unique. If a situation seems life-threatening, take action. Call 911 or your local emergency number right away.

Urgent Care: Sometimes, you may need care fast. But, a trip to the ER may be unnecessary. You may want to try an urgent care center. They can treat many minor ailments. Chances are, you won't have to wait as long as at the ER. You may pay less, too. An urgent care center can help with: sprains, strains, minor broken bones, mild asthma attacks, minor infections, small cuts, sore throats or rashes.

Clinical Care: If it's not urgent, it's usually best to go to your own doctor's office. Your doctor knows you and your health history. He or she can access your medical records. And, he or she can provide follow-up care or refer you to specialists.

Louisiana:

The Louisiana Hospital-Based Physician Disclosure List is for informational purposes only and contains the names and location of certain hospital-based physicians located in the State of Louisiana as reported to UnitedHealthcare. It is provided in accordance with the Louisiana Consumer Health Care Provider Network Disclosure Act. It is not part of UnitedHealthcare's directory of Network Providers and the physicians on this list may not be contracted with UnitedHealthcare and includes Network and Non-Network Providers.

Health care services may be provided to you at a network health care facility by facility-based physicians who are not in your health plan. You may be responsible for payment of all or part of the fees for those out-of-network services, in addition to applicable amounts due for copayments, coinsurance, deductibles, and non-covered services. Specific information about in-network and out-of-network facility-based physicians can be found by clicking on the link above or by calling the customer service telephone number on the back of your ID card.

North Dakota:

Click here for North Dakota Grievance Procedures.

Texas:

A facility-based physician or health care practitioner may not be a member of your health benefit plan's provider network, even though the physician or health care practitioner provides health care services at an in-network health care facility. If the physician or health care practitioner is not a member of your health benefit plan's provider network, you may be responsible for payment of the physicians or practitioners fees not paid by your health benefit plan.

Click here for a list of UnitedHealthcare in-network health care facilities that may staff facility-based physicians or health care practitioners which may not participate in your health benefit plan's provider network.

Click herefor additional Information for Texas Insureds.

Wisconsin:

You are strongly encouraged to contact us to verify the status of the providers involved in your care including, for example, the anesthesiologist, radiologist, pathologist, facility, clinic or laboratory, when scheduling appointments or elective procedures to determine whether each provider is a participating or nonparticipating provider. Such information may assist in your selection of provider(s) and will likely affect the level of co-payment, deductible and amount of co-insurance applicable to care you receive. The information contained in this directory may change during your plan year. Please call the Customer Service phone number on your ID card to learn more about the participating providers in your network and the implications, including financial, if you decide to receive your care from nonparticipating providers.

See more here:

Find A Doctor or Dentist | UnitedHealthOne

Golden Rule Insurance Review & Complaints | Healthcare

PremiumsClaimsFeedbackFinancial Strength

Golden Rule Insurance was founded in 1940 in Indianapolis, Indiana, and became a part of UnitedHealthCare in 2003. Their products are sold under the UnitedHealthOne banner, which is the branding used for individual products that are underwritten by a variety of subsidiary companies owned by United.

Golden Rules product lineup is centered on individual health insurance plans. The company has a history of political support for candidates pushing the increased use of HSAs in health care reform. Our research, however, did not show any products from Golden Rule that utilize an HSA this may be due to the states in which we looked or a change in their offerings.

Golden Rule underwrites a variety of products under the UnitedHealthCare name. These include dental, vision, short-term medical, supplemental health, and prescription drug plans. Currently, there does not appear to be any major medical plans offered by Golden Rule (although other UnitedHealth companies do offer this type of plan).

Golden Rule continues to operate out of Indianapolis and offers their products in 40 states as well as the District of Columbia.

Which of the companies under the UnitedHealthOne brand will underwrite the insurance depends on the state of residence; for example, when we attempted to get product information for California we found only dental, critical illness, vision, and prescription discount plans available. Hospital and medical indemnity coverage is offered in the state by a different UnitedHealth subsidiary.

Because of the long list of products and the various versions of those products make it difficult to provide details, we have tried to give an overview of each of the products Golden Rule writes. We drew from both California and Indiana to get a look at the products not offered in one single state.

Short Term Medical

Golden Rule has a variety of short-term medical plans designed to provide catastrophic coverage for those that are in between major medical plans for a variety of reasons, including job changes.

The plans we saw in Indiana range from 60/40 coinsurance up to 80/20 coinsurance. Deductibles are either $10,000 or $12,500. These are high because this type of plan is meant to be in place to protect against catastrophic medical bills, and not for regular ongoing medical care.

Hospital and Doctor Insurance

Golden Rules Hospital and Doctor insurance plans pay a flat rate per day to cover fees for inpatient hospital care that are not paid for under major medical insurance.

The plans listed for Indiana start at coverage of $1,000 a day and go up by $1,000 increments to $5,000 a day.

Dental

In both states we looked at, Golden Rule has six different dental insurance plans available. These plans all offer similar basic coverage but differ in terms of copays and coinsurance amounts. Some plans include coverage for major dental service, while others cover only basics. None of the plans we looked at include orthodontia coverage.

Vision

There are two plans available in both states we looked at. The vision plans all include annual exams and benefits for eyeglasses and contacts. These plans can be bundled with the dental plans.

Critical Illness

Golden Rules Critical Illness insurance plans pay a flat rate benefit upon diagnosis with any of the covered critical illnesses.

The payout benefits start at $10,000 and go up to $50,000.

Accident

Golden Rule offers three different accident insurance plans in Indiana. Each of the three plans offers an increasing level of benefits to pay for medical costs arising from an accident. Coverage pays for doctor visits but does not provide any benefits for prescription drugs.

Discount Card

In both of our sample states Golden Rule offers a discount program that provides discounted services for both medical care and for prescription drugs.

Term Life

In Indiana, Golden Rule writes 10 or 20-year term life insurance plans with death benefit amounts going up to $200,000. An optional Critical Illness rider can be added to the plans.

We looked at the rates for a 30-year-old male, which are readily available and easy to locate on the UnitedHealthOne site. Since there are so many different plans, we are listing some of the more common options.

Short-term medical starts at $44.40 (in Indiana, as this coverage is not available in California) and goes up to $64.20.

Dental insurance plans start at $27.95 in California and go up to $76.90 a month. Rates in Indiana are a bit lower which is not surprising and start at $21.03

Hospital and Doctor insurance is not underwritten by Golden Rule in California. The Indiana rates start at $52.59 a month for this product.

The last rates we gathered are for term life insurance. A 10-year term policy with a death benefit of $25,000 came in at $6.81 a month. A 20-year-term policy at $200,000 has a monthly rate of $56.33.

We did not find much in the way of claims information on the companys website. Although most health insurance plans handle claims directly with the provider, some of the policies that are underwritten by Golden Rule will require the filing of claims directly by the insured.

On the contact page, there is both a mailing address and a fax number for claims. A phone number is not listed, but United does have a main customer service line where claims questions can likely be directed. There is also a member portal where existing customers can check on existing claims.

Golden Rule Insurance Company has an A+ rating with the Better Business Bureau (BBB). They have been accredited since 1985 and have a total of 17 complaints on file in the past three years. There are five negative reviews on the BBB page citing issues of claims denial and long wait times on hold with the company.

There are 85 reviews of Golden Rule on Consumer Affairs and an overall one-star rating. The complaints on this site are much the same, including billing issues and claims issues. There are also multiple complaints about the difficulty of getting a person on the phone.

The complaint volume for Golden Rule is not high for the size of the company, and the type of complaints are fairly common to this sort of insurance company. It does seem like there is an issue with hold times for customer service, which is a problem that Golden Rule needs to address, but this is often common to large insurance companies that have outgrown their staff.

Golden Rules branding under UnitedHealthOne is a bit confusing, and the other companies under the same brand add to that confusion, but the brand does provide name recognition. They have a long list of products that differ from state to state and may be a good value depending on your needs.

For a list of companies that we recommend, visit our Best Insurance Companies page.

Summary

Reviewer

Eric Stauffer

Review Date

2018-10-31

Reviewed

Golden Rule

Author Rating

Go here to see the original:

Golden Rule Insurance Review & Complaints | Healthcare

The Golden Rule – Think Humanism

Humanists try to embrace the moral principle known as the Golden Rule, otherwise known as the ethic of reciprocity, which means we believe that people should aim to treat each other as they would like to be treated themselves with tolerance, consideration and compassion.

Humanists like the Golden Rule because of its universality, because it is derived from human feelings and experience and because it requires people to think about others and try to imagine how they might think and feel. It is a simple and clear default position for moral decision-making.

Sometimes people argue that the Golden Rule is imperfect because it makes the assumption that everyone has the same tastes and opinions and wants to be treated the same in every situation. But the Golden Rule is a general moral principle, not a hard and fast rule to be applied to every detail of life. Treating other people as we would wish to be treated ourselves does not mean making the assumption that others feel exactly as we do about everything. The treatment we all want is recognition that we are individuals, each with our own opinions and feelings and for these opinions and feelings to be afforded respect and consideration. The Golden Rule is not an injunction to impose ones will on someone else!

Trying to live according to the Golden Rule means trying to empathise with other people, including those who may be very different from us. Empathy is at the root of kindness, compassion, understanding and respect qualities that we all appreciate being shown, whoever we are, whatever we think and wherever we come from. And although it isnt possible to know what it really feels like to be a different person or live in different circumstances and have different life experiences, it isnt difficult for most of us to imagine what would cause us suffering and to try to avoid causing suffering to others. For this reason, many people find the Golden Rules corollary do not treat people in a way you would not wish to be treated yourself more pragmatic.

The Golden Rule cannot be claimed for any one philosophy or religion; indeed, the successful evolution of communities has depended on its use as a standard through which conflict can be resolved. Throughout the ages, many individual thinkers and spiritual traditions have promoted one or other version of it. Here are some examples of the different ways it has been expressed:

Maria MacLachlanOctober 2007

The rest is here:

The Golden Rule - Think Humanism

Why Its Time to Repeal the Second Amendment Rolling Stone

I teach the Constitution for a living. I revere the document when it is used to further social justice and make our country a more inclusive one. I admire the Founders for establishing a representative democracy that has survived for over two centuries.

But sometimes we just have to acknowledge that the Founders and the Constitution are wrong. This is one of those times. We need to say loud and clear: The Second Amendment must be repealed.

As much as we have a culture of reverence for the founding generation, its important to understand that they got it wrong and got it wrong often. Unfortunately, in many instances, they enshrined those faults in the Constitution. For instance, most people dont know it now, but under the original document, Mitt Romney would be serving as President Obamas vice president right now because he was the runner-up in the last presidential election. That part of the Constitution was fixed by the Twelfth Amendment, which set up the system we currently have of the president and vice president running for office together.

Much more profoundly, the Framers and the Constitution were wildly wrong on race. They enshrined slavery into the Constitution in multiple ways, including taking the extreme step of prohibiting the Constitution from being amended to stop the slave trade in the countrys first 20years. They also blatantly wrote racism into the Constitution by counting slaves as only 3/5 of a person for purposes of Congressional representation. It took a bloody civil war to fix these constitutional flaws (and then another 150 years, and counting, to try to fix the societal consequences of them).

There are others flaws that have been fixed (such as about voting and Presidential succession), and still other flaws that have not yet been fixed (such as about equal rights for women and land-based representation in the Senate), but the point is the same there is absolutely nothing permanently sacrosanct about the Founders and the Constitution. They were deeply flawed people, it was and is a flawed document, and when we think about how to make our country a more perfect union, we must operate with those principles in mind.

In the face of yet another mass shooting, now is the time to acknowledge a profound but obvious truth the Second Amendment is wrong for this country and needs to be jettisoned. We can do that through a Constitutional amendment. Its been done before (when the Twenty-First Amendment repealed prohibition in the Eighteenth), and it must be done now.

The Second Amendment needs to be repealed because it is outdated, a threat to liberty and a suicide pact. When the Second Amendment was adopted in 1791, there were no weapons remotely like the AR-15assault rifle and many of the advances of modern weaponry were long from being invented or popularized.

Sure, the Founders knew that the world evolved and that technology changed, but the weapons of today that are easily accessible are vastly different than anything that existed in 1791. When the Second Amendment was written, the Founders didnt have to weigh the risks of one man killing 49and injuring 53 all by himself. Now we do, and the risk-benefit analysis of 1791 is flatly irrelevant to the risk-benefit analysis of today.

Gun-rights advocates like to make this all about liberty, insisting that their freedom to bear arms is of utmost importance and that restricting their freedom would be a violation of basic rights.

But liberty is not a one way street. It also includes the liberty to enjoy a night out with friends, loving who you want to love, dancing how you want to dance, in a club that has historically provided a refuge from the hate and fear that surrounds you. It also includes the liberty to go to and send your kids to kindergarten and first grade so that they can begin to be infused with a love of learning. It includes the liberty to go to a movie, to your religious house of worship, to college, to work, to an abortion clinic, go to a hair salon, to a community center, to the supermarket, to go anywhere and feel that you are free to do to so without having to weigh the risk of being gunned downby someone wielding a weapon that can easily kill you and countless others.

The liberty of some to own guns cannot take precedence over the liberty of everyone to live their lives free from the risk of being easily murdered. It has for too long, and we must now say no more.

Finally, if we take the gun-rights lobby at their word, the Second Amendment is a suicide pact. As they say over and over, the only way to stop a bad guy with a gun is a good guy with a gun. In other words, please the gun manufacturers by arming even the vast majority of Americans who do not own a gun.

Just think of what would have happened in the Orlando night-club Saturday night if there had been many others armed. In a crowded, dark, loud dance club, after the shooter began firing, imagine if others took out their guns and started firing back. Yes, maybe they would have killed the shooter, but how would anyone else have known what exactly was going on? How would it not have devolved into mass confusion and fear followed by a large-scale shootout without anyone knowing who was the good guy with a gun, who was the bad guy with a gun, and who was just caught in the middle? The death toll could have been much higher if more people were armed.

The gun-rights lobbys mantra that more people need guns will lead to an obvious result more people will be killed. Wed be walking down a road in which blood baths are a common occurrence, all because the Second Amendment allows them to be.

At this point, bickering about the niceties of textual interpretation, whether the history of the amendment supports this view or that, and how legislators can solve this problem within the confines of the constitution is useless drivel that will lead to more of the same. We need a mass movement of those who are fed up with the long-dead Founders view of the world ruling current day politics. A mass movement of those who will stand up and say that our founding document was wrong and needs to be changed. A mass movement of those who will thumb their nose at the NRA, an organization that is nothing more than the political wing of the countrys gun manufacturers, and say enough is enough.

The Second Amendment must be repealed, and it is the essence of American democracy to say so.

Watch four pro-gun arguments were sick of hearing.

More:

Why Its Time to Repeal the Second Amendment Rolling Stone

John McAfee’s Warning About That Presidential Alert – The …

If you're new here, you may want to subscribe to my RSS feed. Thanks for visiting!

Yesterday, the first Presidential Alert was sent to phones all across the country. Theories and screenshots took over the internet shortly thereafter.

But one of these theories, in particular, comes from a source that is especially credible with regard to cybersecurity: John McAfee.

Lets take a quick look at what other folks were saying before we get into McAfees assertion.

Before the alert ever came through, three people in New York were suing to stop it.

The activists filed the suit last week in U.S. District Court in Manhattan, arguing that the system violates their free speech rights and constitutes an unconstitutional seizure of their electronic devices

Wireless phone users have the ability to opt out of most alerts sent under the Integrated Public Alert and Warning System, run by the Federal Emergency Management Agency. While some users can choose not to receive regional messages and so-called Amber Alerts regarding missing or endangered children, under federal rules, receipt of the top-level presidential alerts is mandatory.

In the new lawsuit, J.B. Nicholas, Kristine Rakowsky and Liane Nikitovich contend that the system will effectively turn them into government loudspeakers that would allow Trump or others to disseminate propaganda. (source)

Since the alert went out, it appears that their request for a preliminary injunction was not approved.

The motive behind their suit was political, as opposed to constitutional.

Nicholas, Rakowsky and Nikitovich accuse Trump of disseminating weaponized disinformation on Twitter and say they dont wish to receive text messages, or messages of any kind, on any topic or subject, from Defendant Trump.(source)

And they werent the only ones who were triggered by the alert. All across social media, people bemoaned the fact that the wording was Presidential Alert.

On the opposite side of the political spectrum, members of the group QAnon predicted this would be an announcement that Trump had defeated the Deep State.

They seemto be cheering for a martial-law-like purge of those who dissent against President Trump.

Some speculated that Trump would use the vehicle to announce the imminent confirmation of Supreme Court nominee Brett Kavanaugh, or the firing of Deputy Attorney General Rod Rosenstein, or even the broadcasting of arrests of high-ranking Democrats.(source)

When none of these things was forthcoming, QAnon believers consoled themselves with the belief that the whole thing was a coded message just for them.

Believers inQAnona conspiracy theory based on a series of internet clues posted by an anonymous character named Q that posits a world in which Trump and the military are engaged in ceaseless, secret war with globalist Democratic pedophilesthink the text could mark the start of The Storm, a fantastical MAGA dream in which Trumps political enemies will be arrested and tried at military tribunals.

That is how we will receive orders if all else fails, wrote one QAnon believer on the 8Chan internet forum. We are the next generation Minutemen! Standing by Sir!

SO HAPPY! wrote another. THANK YOU 45!

QAnon diehards cheered it as the perfect way for Trump to test how to deliver earth-shattering news to the entire country. On the internet forum 8Chan, QAnon fans also noted that the test message was 17 words longa significant number for believers in the conspiracy theory, because Q is the 17th letter of the alphabet.

Others focused on the portion of the message that said no action is needed, which they saw as an echo of their motto: Trust the plan. That section of the test message, they believed, was a sign that Trump and the military are in control of the government and would soon settle all the countrys problems. (source)

John McAfee had a different opinion about the Presidential Alert and its positively dystopian.

Well, thats not good.

And this theory has a lot more credibility because McAfee is, in fact, the big Kahuna of cybersecurity. McAfee is a British-American who is a computer programmer and entrepreneur. He created McAfee Antivirus back in the 80s, and though he sold his interest in the company, still keeps his finger on the pulse of cybersecurity and politics.Hes already announced that hes taking a serious run at the 2020 presidential nomination on the Libertarian ticket.

In fact, McAfee is known as one of the top cyber security experts in the world. And hes known for bluntly telling unpleasant truths that nobody wants to believe.

In 2016, he wrote:

Few people are aware of the cybersecurity risks that surround them full time.

If you own a newSamsung TV, its likely constantly recording every word that is spoken in its vicinity, and these recordings are being sent to unnamed third parties.

If you own a car newer than two years old, chances are that hackers have already figured out how to take full control of it while you are driving down the highway. Last year, a brand newJeepwas hacked into by hackers hundreds of miles away and the Jeep was forced off the road by the hackers.

If youfly on an airplane that provides Internet access, hackers anywhere in the world can take control of the plane and alter its course and speed, and perhaps even bring it down.

Medical devicessuch as pacemakers, medical monitors, and other care-critical devices can be hacked into and patients placed into life-threatening situations.

Ourmobile devicesare ubiquitously used as spy devices by everyone from our NSA to bored hackers in Uzbekistan. (source)

And now hes telling us that the Presidential Alert just unlocked access to all our phones.

Given his track record, I tend to believe him.

Do you think theres something dark going on with the whole Presidential alert thing? Are you concerned about the security on your phone now? Did you have any issues after the alert?

Read the original post:

John McAfee's Warning About That Presidential Alert - The ...

Blockchain wins the John McAfee Award for Destroying Time and …

Blockchain gaming is one of those technologies that no one is excited about except for a handful of startups and maybe GamesBeat lead writer Dean Takahashi. Blockchain, of course, is the innovation that powers cryptocurrencies like bitcoin. When it comes to gaming, however, a number of companies are promising that it will well, I dont know. Mostly, it just sounds like people are trying to make new platforms to do a lot of stuff that Steam already handles, like ownership of digital items.

This is why blockchain gaming has won the John McAfee Award for Destroying Time and Wealth. This is one of the accolades we handed out as part of The Bad Awards for our GamesBeat Rewind 2018

You can listen to us discuss this award in the video above, or check it out as part of our entire Bad Awards category in the podcast below:

John McAfee ran the company that created the McAfee antivirus software, and now he doesnt. Instead, he now spends his time like any bizarre billionaire: evading police questioning regarding an alleged murder in Belize, running for president of the United States, and investing in cryptocurrencies.

In December 2017, McAfee grew frustrated with people doubting the long-term viability of cryptocurrencies.

Bitcoin now at $16,600, he tweeted. Those of you in the old school who believe this is a bubble simply have not understood the new mathematics of the blockchain, or you did not care enough to try. Bubbles are mathematically impossible in this new paradigm. So are corrections and all else.

Ignoring that it would be very bad for literally anything if pricing corrections were impossible, that tweet did not age well. Since then, Bitcoin has lost 75 percent of its value. It is now trading at $4,000.

As someone who write about games and the business of games, I get a lot of pitches about blockchain gaming. I started ignoring those emails months ago. And the reason for that is because the technology is almost entirely meaningless at this point. A lot of companies are trying to make it happen, and thats fine. But not a single one of those startups has made a compelling argument to consumers, game developers, or publishers.

That doesnt mean these businesses are short on hypotheticals. They all have big ideas about the potential for the blockchain. It could decentralize ownership of digital items, and that is an interesting idea. Developers could also potentially use blockchain tech to run tamper-resistant online worlds without requiring servers. Instead, games would run on local machines, and then the blockchain would keep track of any changes.

I think these ideas have potential. So now, why arent these startups building products to prove that this is filling a need? I think its likely because that need doesnt exist at least not in a way that is consistent with the amount of noise companies are trying to make about it.

So Im going to continue ignoring blockchain gaming. Ill start paying attention again if anyone makes a product that people actually care about.

See more here:

Blockchain wins the John McAfee Award for Destroying Time and ...

Dr. John McAfee, MD – Book an Appointment – Carson City, NV

Dr. McAfee's conditions and procedures:

Abdominal Disorders

Abdominal Pain

Abscess

Abscess or Cyst Drainage or Aspiration

Abscess or Fluid Incision and Drainage

Anal or Rectal Pain

Anemia

Anoscopy

Autoimmune Diseases

Barrett's Esophagus

Benign Neoplasm of the Digestive System

Benign Tumor

Bile Duct Procedure

Biliary Atresia

Blood Disorders

Cancer

Celiac Disease

Cholecystitis and Gallstones

Cholelithiasis

Cirrhosis

Colonoscopy, Proctosigmoidoscopy, and Sigmoidoscopy

Colorectal Cancer

Constipation

Crohn's Disease

Dehydration

Diaphragmatic and-or Hiatal Hernia

Diarrhea

Diverticulitis, Intestinal

Diverticulosis, Intestinal

Duodenal Ulcer

Duodenitis

Dysentery

Dysphagia

Endoscopy (Esophagus, Stomach, Small Intestine)

Enteritis

ERCP (Endoscopic Retrograde Cholangiopancreatography)

Esophageal Achalasia and Cardiospasm

Esophageal Cancer

Esophageal Diseases

Esophageal Diverticulum

Esophageal Ulcer

Esophageal Varices

Esophagitis

Gas-Bloat Syndrome

Gastric Ulcer

Gastritis

Gastroenterology Procedures

Gastroesophageal Reflux Disease (GERD)

Gastrointestinal Bleeding

Gastrointestinal Diseases

Gastrointestinal Malabsorption

Gastroparesis

Heartburn

Hemochromatosis

Hemorrhoidectomy or Excision of Anal Tags

Hemorrhoids

Hepatitis A

Hepatitis B - Immune Response

Hepatitis C

Hepatorenal Syndrome

Hernia

Ileus

Indigestion

Inflammatory Bowel Disease

Intestinal Abscess

Intestinal Ischemia

Intestinal Obstruction

Irritable Bowel Syndrome

Liver Biopsy

Liver Damage from Alcohol

Malnutrition

Megacolon

Nausea

Neoplasm of Gastrointestinal Tract

Non-Alcoholic Fatty Liver Disease

Noninfectious Gastroenteritis and Colitis

Non-Neonatal Jaundice

Pancreatitis

Pyloric Stenosis

Reflux Esophagitis

Small Intestine Cancer

Stomach and Small Intestine Cancer

Stomach Cancer

Stomach Diseases

Stomal Ulcer

Ulcer

Ulcerative Colitis

Unexplained Weight Loss

Viral Enteritis

Viral Hepatitis

Vomiting Disorders

Read the original:

Dr. John McAfee, MD - Book an Appointment - Carson City, NV

Genetics in fiction – Wikipedia

Aspects of genetics including mutation, hybridisation, cloning, genetic engineering, and eugenics have appeared in fiction since the 19th century.

Genetics is a young science, having started in 1900 with the rediscovery of Gregor Mendel's study on the inheritance of traits in pea plants. During the 20th century it developed to create new sciences and technologies including molecular biology, DNA sequencing, cloning, and genetic engineering. The ethical implications were brought into focus with the eugenics movement.

Since then, many science fiction novels and films have used aspects of genetics as plot devices, often taking one of two routes: a genetic accident with disastrous consequences; or, the feasibility and desirability of a planned genetic alteration. The treatment of science in these stories has been uneven and often unrealistic. The film Gattaca did attempt to portray science accurately but was criticised by scientists.

Modern genetics began with the work of the monk Gregor Mendel in the 19th century, on the inheritance of traits in pea plants. Mendel found that visible traits, such as whether peas were round or wrinkled, were inherited discretely, rather than by blending the attributes of the two parents.[1] In 1900, Hugo de Vries and other scientists rediscovered Mendel's research; William Bateson coined the term "genetics" for the new science, which soon investigated a wide range of phenomena including mutation (inherited changes caused by damage to the genetic material), genetic linkage (when some traits are to some extent inherited together), and hybridisation (crosses of different species).[2]

Eugenics, the production of better human beings by selective breeding, was named and advocated by Charles Darwin's cousin, the scientist Francis Galton, in 1883. It had both a positive aspect, the breeding of more children with high intelligence and good health; and a negative aspect, aiming to suppress "race degeneration" by preventing supposedly "defective" families with attributes such as profligacy, laziness, immoral behaviour and a tendency to criminality from having children.[3][4]

Molecular biology, the interactions and regulation of genetic materials, began with the identification in 1944 of DNA as the main genetic material;[5] the genetic code and the double helix structure of DNA was determined by James Watson and Francis Crick in 1953.[6][7] DNA sequencing, the identification of an exact sequence of genetic information in an organism, was developed in 1977 by Frederick Sanger.[8]

Genetic engineering, the modification of the genetic material of a live organism, became possible in 1972 when Paul Berg created the first recombinant DNA molecules (artificially assembled genetic material) using viruses.[9]

Cloning, the production of genetically identical organisms from some chosen starting point, was shown to be practicable with the creation of Dolly the sheep from an ordinary body cell in 1996 at the Roslin Institute.[10]

Mutation and hybridisation are widely used in fiction, starting in the 19th century with science fiction works such as Mary Shelley's 1818 novel Frankenstein and H. G. Wells's 1896 The Island of Dr Moreau.[11]

In her 1977 Biological Themes in Modern Science Fiction, Helen Parker identified two major types of story: "genetic accident", the uncontrolled, unexpected and disastrous alteration of a species;[12][13] and "planned genetic alteration", whether controlled by humans or aliens, and the question of whether that would be either feasible or desirable.[12][13] In science fiction up to the 1970s, the genetic changes were brought about by radiation, breeding programmes, or manipulation with chemicals or surgery (and thus, notes Lars Schmeink, not necessarily by strictly genetic means).[13] Examples include The Island of Dr Moreau with its horrible manipulations; Aldous Huxley's 1932 Brave New World with a breeding programme; and John Taine's 1951 Seeds of Life, using radiation to create supermen.[13] After the discovery of the double helix and then recombinant DNA, genetic engineering became the focus for genetics in fiction, as in books like Brian Stableford's tale of a genetically modified society in his 1998 Inherit the Earth, or Michael Marshall Smith's story of organ farming in his 1997 Spares.[13]

Comic books have imagined mutated superhumans with extraordinary powers. The DC Universe (from 1939) imagines "metahumans"; the Marvel Universe (from 1961) calls them "mutants", while the Wildstorm (from 1992) and Ultimate Marvel (20002015) Universes name them "posthumans".[14] Stan Lee introduced the concept of mutants in the Marvel X-Men books in 1963; the villain Magneto declares his plan to "make Homo sapiens bow to Homo superior!", implying that mutants will be an evolutionary step up from current humanity. Later, the books speak of an X-gene that confers powers from puberty onwards. X-men powers include telepathy, telekinesis, healing, strength, flight, time travel, and the ability to emit blasts of energy. Marvel's god-like Celestials are later (1999) said to have visited Earth long ago and to have modified human DNA to enable mutant powers.[15]

James Blish's 1952 novel Titan's Daughter (in Kendell Foster Crossen's Future Tense collection) featured stimulated polyploidy (giving organisms multiple sets of genetic material, something that can create new species in a single step), based on spontaneous polyploidy in flowering plants, to create humans with more than normal height, strength, and lifespans.[16]

Cloning, too, is a familiar plot device. In his 1990 novel Jurassic Park, Michael Crichton imagined the recovery of the complete genome of a dinosaur from fossil remains, followed by its use to recreate living animals of an extinct species.[11] Aldous Huxley's 1931 dystopian novel Brave New World imagines the in vitro cloning of fertilised human eggs.[17][18] Huxley was influenced by J. B. S. Haldane's 1924 non-fiction book Daedalus; or, Science and the Future, which used the Greek myth of Daedalus to symbolise the coming revolution in genetics; Haldane predicted that humans would control their own evolution through directed mutation and in vitro fertilisation.[19] Cloning was explored further in stories such as Poul Anderson's 1953 UN-Man.[20]

Cloning is a recurring theme in science fiction films like Jurassic Park (1993), Alien Resurrection (1997), The 6th Day (2000), Resident Evil (2002), Star Wars: Episode II (2002) and The Island (2005). The process of cloning is represented variously in fiction. Many works depict the artificial creation of humans by a method of growing cells from a tissue or DNA sample; the replication may be instantaneous, or take place through slow growth of human embryos in artificial wombs. In the long-running British television series Doctor Who, the Fourth Doctor and his companion Leela were cloned in a matter of seconds from DNA samples ("The Invisible Enemy", 1977) and thenin an apparent homage to the 1966 film Fantastic Voyageshrunk to microscopic size in order to enter the Doctor's body to combat an alien virus. The clones in this story are short-lived, and can only survive a matter of minutes before they expire.[21] Films such as The Matrix and Star Wars: Episode II Attack of the Clones have featured human foetuses being cultured on an industrial scale in enormous tanks.[22]

Cloning humans from body parts is a common science fiction trope, one of several genetics themes parodied in Woody Allen's 1973 comedy Sleeper, where an attempt is made to clone an assassinated dictator from his disembodied nose.[23]

Genetic engineering features in many science fiction stories.[16] Films such as The Island and Blade Runner (1982) bring the engineered creature to confront the person who created it or the being it was cloned from, a theme seen in some film versions of Frankenstein. Few films have informed audiences about genetic engineering as such, with the exception of the 1978 The Boys from Brazil and the 1993 Jurassic Park, both of which made use of a lesson, a demonstration, and a clip of scientific film.[11][24] In 1982, Frank Herbert's novel The White Plague described the deliberate use of genetic engineering to create a pathogen which specifically killed women.[16] Another of Herbert's creations, the Dune series of novels, starting with Dune in 1965, emphasises genetics. It combines selective breeding by a powerful sisterhood, the Bene Gesserit, to produce a supernormal male being, the Kwisatz Haderach, with the genetic engineering of the powerful but despised Tleilaxu.[25]

Genetic engineering methods are weakly represented in film; Michael Clark, writing for The Wellcome Trust, calls the portrayal of genetic engineering and biotechnology "seriously distorted"[24] in films such as Roger Spottiswoode's 2000 The 6th Day, which makes use of the trope of a "vast clandestine laboratory ... filled with row upon row of 'blank' human bodies kept floating in tanks of nutrient liquid or in suspended animation". In Clark's view, the biotechnology is typically "given fantastic but visually arresting forms" while the science is either relegated to the background or fictionalised to suit a young audience.[24]

Eugenics plays a central role in films such as Andrew Niccol's 1997 Gattaca, the title alluding to the letters G, A, T, C for guanine, adenine, thymine, and cytosine, the four nucleobases of DNA. Genetic engineering of humans is unrestricted, resulting in genetic discrimination, loss of diversity, and adverse effects on society. The film explores the ethical implications; the production company, Sony Pictures, consulted with a gene therapy researcher, French Anderson, to ensure that the portrayal of science was realistic, and test-screened the film with the Society of Mammalian Cell Biologists and the American National Human Genome Research Institute before its release. This care did not prevent researchers from attacking the film after its release. Philim Yam of Scientific American called it "science bashing"; in Nature Kevin Davies called it a ""surprisingly pedestrian affair"; and the molecular biologist Lee Silver described the film's extreme genetic determinism as "a straw man".[26][27]

The geneticist Dan Koboldt observes that while science and technology play major roles in fiction, from fantasy and science fiction to thrillers, the representation of science in both literature and film is often unrealistic.[28] In Koboldt's view, genetics in fiction is frequently oversimplified, and some myths are common and need to be debunked. For example, the Human Genome Project has not (he states) immediately led to a Gattaca world, as the relationship between genotype and phenotype is not straightforward. People do differ genetically, but only very rarely because they are missing a gene that other people have: people have different alleles of the same genes. Eye and hair colour are controlled not by one gene each, but by multiple genes. Mutations do occur, but they are rare: people are 99.99% identical genetically, the 3 million differences between any two people being dwarfed by the hundreds of millions of DNA bases which are identical; nearly all DNA variants are inherited, not acquired afresh by mutation. And, Koboldt writes, believable scientists in fiction should know their knowledge is limited.[29]

Original post:

Genetics in fiction - Wikipedia

Gene – Wikipedia

This article is about the heritable unit for transmission of biological traits. For other uses, see Gene (disambiguation).

In biology, a gene is a sequence of DNA or RNA that codes for a molecule that has a function. During gene expression, the DNA is first copied into RNA. The RNA can be directly functional or be the intermediate template for a protein that performs a function. The transmission of genes to an organism's offspring is the basis of the inheritance of phenotypic trait. These genes make up different DNA sequences called genotypes. Genotypes along with environmental and developmental factors determine what the phenotypes will be. Most biological traits are under the influence of polygenes (many different genes) as well as geneenvironment interactions. Some genetic traits are instantly visible, such as eye color or number of limbs, and some are not, such as blood type, risk for specific diseases, or the thousands of basic biochemical processes that constitute life.

Genes can acquire mutations in their sequence, leading to different variants, known as alleles, in the population. These alleles encode slightly different versions of a protein, which cause different phenotypical traits. Usage of the term "having a gene" (e.g., "good genes," "hair colour gene") typically refers to containing a different allele of the same, shared gene. Genes evolve due to natural selection / survival of the fittest and genetic drift of the alleles.

The concept of a gene continues to be refined as new phenomena are discovered.[1] For example, regulatory regions of a gene can be far removed from its coding regions, and coding regions can be split into several exons. Some viruses store their genome in RNA instead of DNA and some gene products are functional non-coding RNAs. Therefore, a broad, modern working definition of a gene is any discrete locus of heritable, genomic sequence which affect an organism's traits by being expressed as a functional product or by regulation of gene expression.[2][3]

The term gene was introduced by Danish botanist, plant physiologist and geneticist Wilhelm Johannsen in 1905.[4] It is inspired by the ancient Greek: , gonos, that means offspring and procreation.

The existence of discrete inheritable units was first suggested by Gregor Mendel (18221884).[5] From 1857 to 1864, in Brno (Czech Republic), he studied inheritance patterns in 8000 common edible pea plants, tracking distinct traits from parent to offspring. He described these mathematically as 2ncombinations where n is the number of differing characteristics in the original peas. Although he did not use the term gene, he explained his results in terms of discrete inherited units that give rise to observable physical characteristics. This description prefigured Wilhelm Johannsen's distinction between genotype (the genetic material of an organism) and phenotype (the visible traits of that organism). Mendel was also the first to demonstrate independent assortment, the distinction between dominant and recessive traits, the distinction between a heterozygote and homozygote, and the phenomenon of discontinuous inheritance.

Prior to Mendel's work, the dominant theory of heredity was one of blending inheritance, which suggested that each parent contributed fluids to the fertilisation process and that the traits of the parents blended and mixed to produce the offspring. Charles Darwin developed a theory of inheritance he termed pangenesis, from Greek pan ("all, whole") and genesis ("birth") / genos ("origin").[6][7] Darwin used the term gemmule to describe hypothetical particles that would mix during reproduction.

Mendel's work went largely unnoticed after its first publication in 1866, but was rediscovered in the late 19th century by Hugo de Vries, Carl Correns, and Erich von Tschermak, who (claimed to have) reached similar conclusions in their own research.[8] Specifically, in 1889, Hugo de Vries published his book Intracellular Pangenesis,[9] in which he postulated that different characters have individual hereditary carriers and that inheritance of specific traits in organisms comes in particles. De Vries called these units "pangenes" (Pangens in German), after Darwin's 1868 pangenesis theory.

Sixteen years later, in 1905, Wilhelm Johannsen introduced the term 'gene'[4] and William Bateson that of 'genetics'[10] while Eduard Strasburger, amongst others, still used the term 'pangene' for the fundamental physical and functional unit of heredity.[11]

Advances in understanding genes and inheritance continued throughout the 20th century. Deoxyribonucleic acid (DNA) was shown to be the molecular repository of genetic information by experiments in the 1940s to 1950s.[12][13] The structure of DNA was studied by Rosalind Franklin and Maurice Wilkins using X-ray crystallography, which led James D. Watson and Francis Crick to publish a model of the double-stranded DNA molecule whose paired nucleotide bases indicated a compelling hypothesis for the mechanism of genetic replication.[14][15]

In the early 1950s the prevailing view was that the genes in a chromosome acted like discrete entities, indivisible by recombination and arranged like beads on a string. The experiments of Benzer using mutants defective in the rII region of bacteriophage T4 (1955-1959) showed that individual genes have a simple linear structure and are likely to be equivalent to a linear section of DNA.[16][17]

Collectively, this body of research established the central dogma of molecular biology, which states that proteins are translated from RNA, which is transcribed from DNA. This dogma has since been shown to have exceptions, such as reverse transcription in retroviruses. The modern study of genetics at the level of DNA is known as molecular genetics.

In 1972, Walter Fiers and his team were the first to determine the sequence of a gene: that of Bacteriophage MS2 coat protein.[18] The subsequent development of chain-termination DNA sequencing in 1977 by Frederick Sanger improved the efficiency of sequencing and turned it into a routine laboratory tool.[19] An automated version of the Sanger method was used in early phases of the Human Genome Project.[20]

The theories developed in the early 20th century to integrate Mendelian genetics with Darwinian evolution are called the modern synthesis, a term introduced by Julian Huxley.[21]

Evolutionary biologists have subsequently modified this concept, such as George C. Williams' gene-centric view of evolution. He proposed an evolutionary concept of the gene as a unit of natural selection with the definition: "that which segregates and recombines with appreciable frequency."[22]:24 In this view, the molecular gene transcribes as a unit, and the evolutionary gene inherits as a unit. Related ideas emphasizing the centrality of genes in evolution were popularized by Richard Dawkins.[23][24]

The vast majority of organisms encode their genes in long strands of DNA (deoxyribonucleic acid). DNA consists of a chain made from four types of nucleotide subunits, each composed of: a five-carbon sugar (2-deoxyribose), a phosphate group, and one of the four bases adenine, cytosine, guanine, and thymine.[25]:2.1

Two chains of DNA twist around each other to form a DNA double helix with the phosphate-sugar backbone spiralling around the outside, and the bases pointing inwards with adenine base pairing to thymine and guanine to cytosine. The specificity of base pairing occurs because adenine and thymine align to form two hydrogen bonds, whereas cytosine and guanine form three hydrogen bonds. The two strands in a double helix must therefore be complementary, with their sequence of bases matching such that the adenines of one strand are paired with the thymines of the other strand, and so on.[25]:4.1

Due to the chemical composition of the pentose residues of the bases, DNA strands have directionality. One end of a DNA polymer contains an exposed hydroxyl group on the deoxyribose; this is known as the 3'end of the molecule. The other end contains an exposed phosphate group; this is the 5'end. The two strands of a double-helix run in opposite directions. Nucleic acid synthesis, including DNA replication and transcription occurs in the 5'3'direction, because new nucleotides are added via a dehydration reaction that uses the exposed 3'hydroxyl as a nucleophile.[26]:27.2

The expression of genes encoded in DNA begins by transcribing the gene into RNA, a second type of nucleic acid that is very similar to DNA, but whose monomers contain the sugar ribose rather than deoxyribose. RNA also contains the base uracil in place of thymine. RNA molecules are less stable than DNA and are typically single-stranded. Genes that encode proteins are composed of a series of three-nucleotide sequences called codons, which serve as the "words" in the genetic "language". The genetic code specifies the correspondence during protein translation between codons and amino acids. The genetic code is nearly the same for all known organisms.[25]:4.1

The total complement of genes in an organism or cell is known as its genome, which may be stored on one or more chromosomes. A chromosome consists of a single, very long DNA helix on which thousands of genes are encoded.[25]:4.2 The region of the chromosome at which a particular gene is located is called its locus. Each locus contains one allele of a gene; however, members of a population may have different alleles at the locus, each with a slightly different gene sequence.

The majority of eukaryotic genes are stored on a set of large, linear chromosomes. The chromosomes are packed within the nucleus in complex with storage proteins called histones to form a unit called a nucleosome. DNA packaged and condensed in this way is called chromatin.[25]:4.2 The manner in which DNA is stored on the histones, as well as chemical modifications of the histone itself, regulate whether a particular region of DNA is accessible for gene expression. In addition to genes, eukaryotic chromosomes contain sequences involved in ensuring that the DNA is copied without degradation of end regions and sorted into daughter cells during cell division: replication origins, telomeres and the centromere.[25]:4.2 Replication origins are the sequence regions where DNA replication is initiated to make two copies of the chromosome. Telomeres are long stretches of repetitive sequence that cap the ends of the linear chromosomes and prevent degradation of coding and regulatory regions during DNA replication. The length of the telomeres decreases each time the genome is replicated and has been implicated in the aging process.[28] The centromere is required for binding spindle fibres to separate sister chromatids into daughter cells during cell division.[25]:18.2

Prokaryotes (bacteria and archaea) typically store their genomes on a single large, circular chromosome. Similarly, some eukaryotic organelles contain a remnant circular chromosome with a small number of genes.[25]:14.4 Prokaryotes sometimes supplement their chromosome with additional small circles of DNA called plasmids, which usually encode only a few genes and are transferable between individuals. For example, the genes for antibiotic resistance are usually encoded on bacterial plasmids and can be passed between individual cells, even those of different species, via horizontal gene transfer.[29]

Whereas the chromosomes of prokaryotes are relatively gene-dense, those of eukaryotes often contain regions of DNA that serve no obvious function. Simple single-celled eukaryotes have relatively small amounts of such DNA, whereas the genomes of complex multicellular organisms, including humans, contain an absolute majority of DNA without an identified function.[30] This DNA has often been referred to as "junk DNA". However, more recent analyses suggest that, although protein-coding DNA makes up barely 2% of the human genome, about 80% of the bases in the genome may be expressed, so the term "junk DNA" may be a misnomer.[3]

The structure of a gene consists of many elements of which the actual protein coding sequence is often only a small part. These include DNA regions that are not transcribed as well as untranslated regions of the RNA.

Flanking the open reading frame, genes contain a regulatory sequence that is required for their expression. First, genes require a promoter sequence. The promoter is recognized and bound by transcription factors and RNA polymerase to initiate transcription.[25]:7.1 The recognition typically occurs as a consensus sequence like the TATA box. A gene can have more than one promoter, resulting in messenger RNAs (mRNA) that differ in how far they extend in the 5'end.[32] Highly transcribed genes have "strong" promoter sequences that form strong associations with transcription factors, thereby initiating transcription at a high rate. Others genes have "weak" promoters that form weak associations with transcription factors and initiate transcription less frequently.[25]:7.2 Eukaryotic promoter regions are much more complex and difficult to identify than prokaryotic promoters.[25]:7.3

Additionally, genes can have regulatory regions many kilobases upstream or downstream of the open reading frame that alter expression. These act by binding to transcription factors which then cause the DNA to loop so that the regulatory sequence (and bound transcription factor) become close to the RNA polymerase binding site.[33] For example, enhancers increase transcription by binding an activator protein which then helps to recruit the RNA polymerase to the promoter; conversely silencers bind repressor proteins and make the DNA less available for RNA polymerase.[34]

The transcribed pre-mRNA contains untranslated regions at both ends which contain a ribosome binding site, terminator and start and stop codons.[35] In addition, most eukaryotic open reading frames contain untranslated introns which are removed before the exons are translated. The sequences at the ends of the introns, dictate the splice sites to generate the final mature mRNA which encodes the protein or RNA product.[36]

Many prokaryotic genes are organized into operons, with multiple protein-coding sequences that are transcribed as a unit.[37][38] The genes in an operon are transcribed as a continuous messenger RNA, referred to as a polycistronic mRNA. The term cistron in this context is equivalent to gene. The transcription of an operons mRNA is often controlled by a repressor that can occur in an active or inactive state depending on the presence of certain specific metabolites.[39] When active, the repressor binds to a DNA sequence at the beginning of the operon, called the operator region, and represses transcription of the operon; when the repressor is inactive transcription of the operon can occur (see e.g. Lac operon). The products of operon genes typically have related functions and are involved in the same regulatory network.[25]:7.3

Defining exactly what section of a DNA sequence comprises a gene is difficult.[1] Regulatory regions of a gene such as enhancers do not necessarily have to be close to the coding sequence on the linear molecule because the intervening DNA can be looped out to bring the gene and its regulatory region into proximity. Similarly, a gene's introns can be much larger than its exons. Regulatory regions can even be on entirely different chromosomes and operate in trans to allow regulatory regions on one chromosome to come in contact with target genes on another chromosome.[40][41]

Early work in molecular genetics suggested the concept that one gene makes one protein. This concept (originally called the one gene-one enzyme hypothesis) emerged from an influential 1941 paper by George Beadle and Edward Tatum on experiments with mutants of the fungus Neurospora crassa.[42] Norman Horowitz, an early colleague on the Neurospora research, reminisced in 2004 that these experiments founded the science of what Beadle and Tatum called biochemical genetics. In actuality they proved to be the opening gun in what became molecular genetics and all the developments that have followed from that.[43] The one gene-one protein concept has been refined since the discovery of genes that can encode multiple proteins by alternative splicing and coding sequences split in short section across the genome whose mRNAs are concatenated by trans-splicing.[3][44][45]

A broad operational definition is sometimes used to encompass the complexity of these diverse phenomena, where a gene is defined as a union of genomic sequences encoding a coherent set of potentially overlapping functional products.[10] This definition categorizes genes by their functional products (proteins or RNA) rather than their specific DNA loci, with regulatory elements classified as gene-associated regions.[10]

In all organisms, two steps are required to read the information encoded in a gene's DNA and produce the protein it specifies. First, the gene's DNA is transcribed to messenger RNA (mRNA).[25]:6.1 Second, that mRNA is translated to protein.[25]:6.2 RNA-coding genes must still go through the first step, but are not translated into protein.[46] The process of producing a biologically functional molecule of either RNA or protein is called gene expression, and the resulting molecule is called a gene product.

The nucleotide sequence of a gene's DNA specifies the amino acid sequence of a protein through the genetic code. Sets of three nucleotides, known as codons, each correspond to a specific amino acid.[25]:6 The principle that three sequential bases of DNA code for each amino acid was demonstrated in 1961 using frameshift mutations in the rIIB gene of bacteriophage T4[47] (see Crick, Brenner et al. experiment).

Additionally, a "start codon", and three "stop codons" indicate the beginning and end of the protein coding region. There are 64possible codons (four possible nucleotides at each of three positions, hence 43possible codons) and only 20standard amino acids; hence the code is redundant and multiple codons can specify the same amino acid. The correspondence between codons and amino acids is nearly universal among all known living organisms.[48]

Transcription produces a single-stranded RNA molecule known as messenger RNA, whose nucleotide sequence is complementary to the DNA from which it was transcribed.[25]:6.1 The mRNA acts as an intermediate between the DNA gene and its final protein product. The gene's DNA is used as a template to generate a complementary mRNA. The mRNA matches the sequence of the gene's DNA coding strand because it is synthesised as the complement of the template strand. Transcription is performed by an enzyme called an RNA polymerase, which reads the template strand in the 3' to 5'direction and synthesizes the RNA from 5' to 3'. To initiate transcription, the polymerase first recognizes and binds a promoter region of the gene. Thus, a major mechanism of gene regulation is the blocking or sequestering the promoter region, either by tight binding by repressor molecules that physically block the polymerase, or by organizing the DNA so that the promoter region is not accessible.[25]:7

In prokaryotes, transcription occurs in the cytoplasm; for very long transcripts, translation may begin at the 5'end of the RNA while the 3'end is still being transcribed. In eukaryotes, transcription occurs in the nucleus, where the cell's DNA is stored. The RNA molecule produced by the polymerase is known as the primary transcript and undergoes post-transcriptional modifications before being exported to the cytoplasm for translation. One of the modifications performed is the splicing of introns which are sequences in the transcribed region that do not encode protein. Alternative splicing mechanisms can result in mature transcripts from the same gene having different sequences and thus coding for different proteins. This is a major form of regulation in eukaryotic cells and also occurs in some prokaryotes.[25]:7.5[49]

Translation is the process by which a mature mRNA molecule is used as a template for synthesizing a new protein.[25]:6.2 Translation is carried out by ribosomes, large complexes of RNA and protein responsible for carrying out the chemical reactions to add new amino acids to a growing polypeptide chain by the formation of peptide bonds. The genetic code is read three nucleotides at a time, in units called codons, via interactions with specialized RNA molecules called transfer RNA (tRNA). Each tRNA has three unpaired bases known as the anticodon that are complementary to the codon it reads on the mRNA. The tRNA is also covalently attached to the amino acid specified by the complementary codon. When the tRNA binds to its complementary codon in an mRNA strand, the ribosome attaches its amino acid cargo to the new polypeptide chain, which is synthesized from amino terminus to carboxyl terminus. During and after synthesis, most new proteins must fold to their active three-dimensional structure before they can carry out their cellular functions.[25]:3

Genes are regulated so that they are expressed only when the product is needed, since expression draws on limited resources.[25]:7 A cell regulates its gene expression depending on its external environment (e.g. available nutrients, temperature and other stresses), its internal environment (e.g. cell division cycle, metabolism, infection status), and its specific role if in a multicellular organism. Gene expression can be regulated at any step: from transcriptional initiation, to RNA processing, to post-translational modification of the protein. The regulation of lactose metabolism genes in E. coli (lac operon) was the first such mechanism to be described in 1961.[50]

A typical protein-coding gene is first copied into RNA as an intermediate in the manufacture of the final protein product.[25]:6.1 In other cases, the RNA molecules are the actual functional products, as in the synthesis of ribosomal RNA and transfer RNA. Some RNAs known as ribozymes are capable of enzymatic function, and microRNA has a regulatory role. The DNA sequences from which such RNAs are transcribed are known as non-coding RNA genes.[46]

Some viruses store their entire genomes in the form of RNA, and contain no DNA at all.[51][52] Because they use RNA to store genes, their cellular hosts may synthesize their proteins as soon as they are infected and without the delay in waiting for transcription.[53] On the other hand, RNA retroviruses, such as HIV, require the reverse transcription of their genome from RNA into DNA before their proteins can be synthesized. RNA-mediated epigenetic inheritance has also been observed in plants and very rarely in animals.[54]

Organisms inherit their genes from their parents. Asexual organisms simply inherit a complete copy of their parent's genome. Sexual organisms have two copies of each chromosome because they inherit one complete set from each parent.[25]:1

According to Mendelian inheritance, variations in an organism's phenotype (observable physical and behavioral characteristics) are due in part to variations in its genotype (particular set of genes). Each gene specifies a particular trait with different sequence of a gene (alleles) giving rise to different phenotypes. Most eukaryotic organisms (such as the pea plants Mendel worked on) have two alleles for each trait, one inherited from each parent.[25]:20

Alleles at a locus may be dominant or recessive; dominant alleles give rise to their corresponding phenotypes when paired with any other allele for the same trait, whereas recessive alleles give rise to their corresponding phenotype only when paired with another copy of the same allele. If you know the genotypes of the organisms, you can determine which alleles are dominant and which are recessive. For example, if the allele specifying tall stems in pea plants is dominant over the allele specifying short stems, then pea plants that inherit one tall allele from one parent and one short allele from the other parent will also have tall stems. Mendel's work demonstrated that alleles assort independently in the production of gametes, or germ cells, ensuring variation in the next generation. Although Mendelian inheritance remains a good model for many traits determined by single genes (including a number of well-known genetic disorders) it does not include the physical processes of DNA replication and cell division.[55][56]

The growth, development, and reproduction of organisms relies on cell division; the process by which a single cell divides into two usually identical daughter cells. This requires first making a duplicate copy of every gene in the genome in a process called DNA replication.[25]:5.2 The copies are made by specialized enzymes known as DNA polymerases, which "read" one strand of the double-helical DNA, known as the template strand, and synthesize a new complementary strand. Because the DNA double helix is held together by base pairing, the sequence of one strand completely specifies the sequence of its complement; hence only one strand needs to be read by the enzyme to produce a faithful copy. The process of DNA replication is semiconservative; that is, the copy of the genome inherited by each daughter cell contains one original and one newly synthesized strand of DNA.[25]:5.2

The rate of DNA replication in living cells was first measured as the rate of phage T4 DNA elongation in phage-infected E. coli and found to be impressively rapid.[57] During the period of exponential DNA increase at 37C, the rate of elongation was 749 nucleotides per second.

After DNA replication is complete, the cell must physically separate the two copies of the genome and divide into two distinct membrane-bound cells.[25]:18.2 In prokaryotes(bacteria and archaea) this usually occurs via a relatively simple process called binary fission, in which each circular genome attaches to the cell membrane and is separated into the daughter cells as the membrane invaginates to split the cytoplasm into two membrane-bound portions. Binary fission is extremely fast compared to the rates of cell division in eukaryotes. Eukaryotic cell division is a more complex process known as the cell cycle; DNA replication occurs during a phase of this cycle known as S phase, whereas the process of segregating chromosomes and splitting the cytoplasm occurs during M phase.[25]:18.1

The duplication and transmission of genetic material from one generation of cells to the next is the basis for molecular inheritance, and the link between the classical and molecular pictures of genes. Organisms inherit the characteristics of their parents because the cells of the offspring contain copies of the genes in their parents' cells. In asexually reproducing organisms, the offspring will be a genetic copy or clone of the parent organism. In sexually reproducing organisms, a specialized form of cell division called meiosis produces cells called gametes or germ cells that are haploid, or contain only one copy of each gene.[25]:20.2 The gametes produced by females are called eggs or ova, and those produced by males are called sperm. Two gametes fuse to form a diploid fertilized egg, a single cell that has two sets of genes, with one copy of each gene from the mother and one from the father.[25]:20

During the process of meiotic cell division, an event called genetic recombination or crossing-over can sometimes occur, in which a length of DNA on one chromatid is swapped with a length of DNA on the corresponding homologous non-sister chromatid. This can result in reassortment of otherwise linked alleles.[25]:5.5 The Mendelian principle of independent assortment asserts that each of a parent's two genes for each trait will sort independently into gametes; which allele an organism inherits for one trait is unrelated to which allele it inherits for another trait. This is in fact only true for genes that do not reside on the same chromosome, or are located very far from one another on the same chromosome. The closer two genes lie on the same chromosome, the more closely they will be associated in gametes and the more often they will appear together (known as genetic linkage).[58] Genes that are very close are essentially never separated because it is extremely unlikely that a crossover point will occur between them.[58]

DNA replication is for the most part extremely accurate, however errors (mutations) do occur.[25]:7.6 The error rate in eukaryotic cells can be as low as 108 per nucleotide per replication,[59][60] whereas for some RNA viruses it can be as high as 103.[61] This means that each generation, each human genome accumulates 12 new mutations.[61] Small mutations can be caused by DNA replication and the aftermath of DNA damage and include point mutations in which a single base is altered and frameshift mutations in which a single base is inserted or deleted. Either of these mutations can change the gene by missense (change a codon to encode a different amino acid) or nonsense (a premature stop codon).[62] Larger mutations can be caused by errors in recombination to cause chromosomal abnormalities including the duplication, deletion, rearrangement or inversion of large sections of a chromosome. Additionally, DNA repair mechanisms can introduce mutational errors when repairing physical damage to the molecule. The repair, even with mutation, is more important to survival than restoring an exact copy, for example when repairing double-strand breaks.[25]:5.4

When multiple different alleles for a gene are present in a species's population it is called polymorphic. Most different alleles are functionally equivalent, however some alleles can give rise to different phenotypic traits. A gene's most common allele is called the wild type, and rare alleles are called mutants. The genetic variation in relative frequencies of different alleles in a population is due to both natural selection and genetic drift.[63] The wild-type allele is not necessarily the ancestor of less common alleles, nor is it necessarily fitter.

Most mutations within genes are neutral, having no effect on the organism's phenotype (silent mutations). Some mutations do not change the amino acid sequence because multiple codons encode the same amino acid (synonymous mutations). Other mutations can be neutral if they lead to amino acid sequence changes, but the protein still functions similarly with the new amino acid (e.g. conservative mutations). Many mutations, however, are deleterious or even lethal, and are removed from populations by natural selection. Genetic disorders are the result of deleterious mutations and can be due to spontaneous mutation in the affected individual, or can be inherited. Finally, a small fraction of mutations are beneficial, improving the organism's fitness and are extremely important for evolution, since their directional selection leads to adaptive evolution.[25]:7.6

Genes with a most recent common ancestor, and thus a shared evolutionary ancestry, are known as homologs.[64] These genes appear either from gene duplication within an organism's genome, where they are known as paralogous genes, or are the result of divergence of the genes after a speciation event, where they are known as orthologous genes,[25]:7.6 and often perform the same or similar functions in related organisms. It is often assumed that the functions of orthologous genes are more similar than those of paralogous genes, although the difference is minimal.[65][66]

The relationship between genes can be measured by comparing the sequence alignment of their DNA.[25]:7.6 The degree of sequence similarity between homologous genes is called conserved sequence. Most changes to a gene's sequence do not affect its function and so genes accumulate mutations over time by neutral molecular evolution. Additionally, any selection on a gene will cause its sequence to diverge at a different rate. Genes under stabilizing selection are constrained and so change more slowly whereas genes under directional selection change sequence more rapidly.[67] The sequence differences between genes can be used for phylogenetic analyses to study how those genes have evolved and how the organisms they come from are related.[68][69]

The most common source of new genes in eukaryotic lineages is gene duplication, which creates copy number variation of an existing gene in the genome.[70][71] The resulting genes (paralogs) may then diverge in sequence and in function. Sets of genes formed in this way compose a gene family. Gene duplications and losses within a family are common and represent a major source of evolutionary biodiversity.[72] Sometimes, gene duplication may result in a nonfunctional copy of a gene, or a functional copy may be subject to mutations that result in loss of function; such nonfunctional genes are called pseudogenes.[25]:7.6

"Orphan" genes, whose sequence shows no similarity to existing genes, are less common than gene duplicates. Estimates of the number of genes with no homologs outside humans range from 18[73] to 60.[74] Two primary sources of orphan protein-coding genes are gene duplication followed by extremely rapid sequence change, such that the original relationship is undetectable by sequence comparisons, and de novo conversion of a previously non-coding sequence into a protein-coding gene.[75] De novo genes are typically shorter and simpler in structure than most eukaryotic genes, with few if any introns.[70] Over long evolutionary time periods, de novo gene birth may be responsible for a significant fraction of taxonomically-restricted gene families.[76]

Horizontal gene transfer refers to the transfer of genetic material through a mechanism other than reproduction. This mechanism is a common source of new genes in prokaryotes, sometimes thought to contribute more to genetic variation than gene duplication.[77] It is a common means of spreading antibiotic resistance, virulence, and adaptive metabolic functions.[29][78] Although horizontal gene transfer is rare in eukaryotes, likely examples have been identified of protist and alga genomes containing genes of bacterial origin.[79][80]

The genome is the total genetic material of an organism and includes both the genes and non-coding sequences.[81]

The genome size, and the number of genes it encodes varies widely between organisms. The smallest genomes occur in viruses,[90] and viroids (which act as a single non-coding RNA gene).[91] Conversely, plants can have extremely large genomes,[92] with rice containing >46,000 protein-coding genes.[93] The total number of protein-coding genes (the Earth's proteome) is estimated to be 5million sequences.[94]

Although the number of base-pairs of DNA in the human genome has been known since the 1960s, the estimated number of genes has changed over time as definitions of genes, and methods of detecting them have been refined. Initial theoretical predictions of the number of human genes were as high as 2,000,000.[95] Early experimental measures indicated there to be 50,000100,000 transcribed genes (expressed sequence tags).[96] Subsequently, the sequencing in the Human Genome Project indicated that many of these transcripts were alternative variants of the same genes, and the total number of protein-coding genes was revised down to ~20,000[89] with 13 genes encoded on the mitochondrial genome.[87] With the GENCODE annotation project, that estimate has continued to fall to 19,000.[97] Of the human genome, only 12% consists of protein-coding genes,[98] with the remainder being 'noncoding' DNA such as introns, retrotransposons, and noncoding RNAs.[98][99] Every multicellular organism has all its genes in each cell of its body but not every gene functions in every cell .

Essential genes are the set of genes thought to be critical for an organism's survival.[101] This definition assumes the abundant availability of all relevant nutrients and the absence of environmental stress. Only a small portion of an organism's genes are essential. In bacteria, an estimated 250400 genes are essential for Escherichia coli and Bacillus subtilis, which is less than 10% of their genes.[102][103][104] Half of these genes are orthologs in both organisms and are largely involved in protein synthesis.[104] In the budding yeast Saccharomyces cerevisiae the number of essential genes is slightly higher, at 1000 genes (~20% of their genes).[105] Although the number is more difficult to measure in higher eukaryotes, mice and humans are estimated to have around 2000 essential genes (~10% of their genes).[106] The synthetic organism, Syn 3, has a minimal genome of 473 essential genes and quasi-essential genes (necessary for fast growth), although 149 have unknown function.[100]

Essential genes include Housekeeping genes (critical for basic cell functions)[107] as well as genes that are expressed at different times in the organisms development or life cycle.[108] Housekeeping genes are used as experimental controls when analysing gene expression, since they are constitutively expressed at a relatively constant level.

Gene nomenclature has been established by the HUGO Gene Nomenclature Committee (HGNC) for each known human gene in the form of an approved gene name and symbol (short-form abbreviation), which can be accessed through a database maintained by HGNC. Symbols are chosen to be unique, and each gene has only one symbol (although approved symbols sometimes change). Symbols are preferably kept consistent with other members of a gene family and with homologs in other species, particularly the mouse due to its role as a common model organism.[109]

Genetic engineering is the modification of an organism's genome through biotechnology. Since the 1970s, a variety of techniques have been developed to specifically add, remove and edit genes in an organism.[110] Recently developed genome engineering techniques use engineered nuclease enzymes to create targeted DNA repair in a chromosome to either disrupt or edit a gene when the break is repaired.[111][112][113][114] The related term synthetic biology is sometimes used to refer to extensive genetic engineering of an organism.[115]

Genetic engineering is now a routine research tool with model organisms. For example, genes are easily added to bacteria[116] and lineages of knockout mice with a specific gene's function disrupted are used to investigate that gene's function.[117][118] Many organisms have been genetically modified for applications in agriculture, industrial biotechnology, and medicine.

For multicellular organisms, typically the embryo is engineered which grows into the adult genetically modified organism.[119] However, the genomes of cells in an adult organism can be edited using gene therapy techniques to treat genetic diseases.

Continue reading here:

Gene - Wikipedia

Tech News Latest Technology Headlines and Trends on CNN …

' : ""},a.getDefinedParams = function(n, e) {return e.filter((function(e) {return n[e]})).reduce((function(e, t) {return r(e, (function(e, t, n) {t in e ? Object.defineProperty(e, t, {value: n,enumerable: !0,configurable: !0,writable: !0}) : e[t] = n;return e})({}, t, n[t]))}), {})},a.isValidMediaTypes = function(e) {var t = ["banner", "native", "video"];if (!Object.keys(e).every((function(e) {return (0,u.default)(t, e)})))return !1;if (e.video && e.video.context)return (0,u.default)(["instream", "outstream"], e.video.context);return !0},a.getBidderRequest = function(e, t, n) {return (0,o.default)(e, (function(e) {return 0 > t / 4).toString(16) : ([1e7] + -1e3 + -4e3 + -8e3 + -1e11).replace(/[018]/g, e)},a.getBidIdParameter = function(e, t) {return t && t[e] ? t[e] : ""},a.tryAppendQueryString = function(e, t, n) {return n ? e + (t + "=") + encodeURIComponent(n) + "&" : e},a.parseQueryStringParameters = function(e) {var t = "";for (var n in e)e.hasOwnProperty(n) && (t += n + "=" + encodeURIComponent(e[n]) + "&");return t},a.transformAdServerTargetingObj = function(t) {return t && 0 ';return t += ''},a.createTrackPixelIframeHtml = function(e) {var t = !(1 n ') : ""},a.getIframeDocument = function(e) {if (e) {var t = void 0;try {t = e.contentWindow ? e.contentWindow.document : e.contentDocument.document ? e.contentDocument.document : e.contentDocument} catch (e) {a.logError("Cannot get iframe document", e)}return t}},a.getValueString = function(e, t, n) {return null == t ? n : a.isStr(t) ? t : a.isNumber(t) ? t.toString() : void a.logWarn("Unsuported type for param: " + e + " required type: String")};a.getHighestCpm = U("timeToRespond", (function(e, t) {return t = u.syncsPerBidder)return c.logWarn('Number of user syncs exceeded for "' + t + '"');if (u.filterSettings) {if (function(e, t) {var n = u.filterSettings;if (function(e, t) {if (e.all && e[t])return c.logWarn('Detected presence of the "filterSettings.all" and "filterSettings.' + t + '" in userSync config. You cannot mix "all" with "iframe/image" configs; they are mutually exclusive.'),!1;var n = e.all ? e.all : e[t], r = e.all ? "all" : t;if (!n)return !1;var i = n.filter, o = n.bidders;if (i && "include" !== i && "exclude" !== i)return c.logWarn('UserSync "filterSettings.' + r + ".filter" setting '" + i + "' is not a valid option; use either 'include' or 'exclude'."),!1;return !!("*" === o || Array.isArray(o) && 0 n n n prebid.org wrappern n " + (n ? "" : "") + "n n n n "),ttlseconds: Number(e.ttl)}}},23: function(e, t) {var n = {}.toString;e.exports = function(e) {return n.call(e).slice(8, -1)}},24: function(e, t) {e.exports = function(e) {if (null == e)throw TypeError("Can't call method on " + e);return e}},25: function(e, t, n) {var r = n(60)("wks"), i = n(62), o = n(19).Symbol, a = "function" == typeof o;(e.exports = function(e) {return r[e] || (r[e] = a && o[e] || (a ? o : i)("Symbol." + e))}).store = r},26: function(e, t) {e.exports = function() {}},27: function(e, t, n) {"use strict";Object.defineProperty(t, "__esModule", {value: !0}),t.default = function(e) {var t = e;return {callBids: function() {},setBidderCode: function(e) {t = e},getBidderCode: function() {return t}}}},28: function(e, t, n) {"use strict";var r, i = n(7), o = (r = i) && r.__esModule ? r : {default: r}, a = (function(e) {{if (e && e.__esModule)return e;var t = {};if (null != e)for (var n in e)Object.prototype.hasOwnProperty.call(e, n) && (t[n] = e[n]);return t.default = e,t}})(n(0));var d = {}, u = ["criteo"];function s(e, t) {var n = document.createElement("script");n.type = "text/javascript",n.async = !0,t && "function" == typeof t && (n.readyState ? n.onreadystatechange = function() {"loaded" !== n.readyState && "complete" !== n.readyState || (n.onreadystatechange = null,t())}: n.onload = function() {t()}),n.src = e;var r = document.getElementsByTagName("head");(r = r.length ? r : document.getElementsByTagName("body")).length && (r = r[0]).insertBefore(n, r.firstChild)}t.loadExternalScript = function(e, t) {if (t && e)if ((0,o.default)(u, t)) {if (!d[e]) {a.logWarn("module " + t + " is loading external JavaScript");var n = document.createElement("script");n.type = "text/javascript",n.async = !0,n.src = e,a.insertElement(n),d[e] = !0}} else a.logError(t + " not whitelisted for loading external JavaScript");else a.logError("cannot load external script without url and moduleCode")},t.loadScript = function(t, e, n) {t ? n ? d[t] ? e && "function" == typeof e && (d[t].loaded ? e() : d[t].callbacks.push(e)) : (d[t] = {loaded: !1,callbacks: []},e && "function" == typeof e && d[t].callbacks.push(e),s(t, (function() {d[t].loaded = !0;try {for (var e = 0; e t.max ? e : t}), {max: 0}), p = (0,v.default)(e.buckets, (function(e) {if (n > g.max * r) {var t = e.precision;void 0 === t && (t = y),i = (e.max * r).toFixed(t)} else if (n = e.min * r)return e}));return p && (t = n,a = r,d = void 0 !== (o = p).precision ? o.precision : y,u = o.increment * a,s = o.min * a,c = Math.pow(10, d + 2),f = (t * c - s * c) / (u * c),l = Math.floor(f) * u + s,i = (l = Number(l.toFixed(10))).toFixed(d)),i}function m(e) {if (o.isEmpty(e) || !e.buckets || !Array.isArray(e.buckets))return !1;var t = !0;return e.buckets.forEach((function(e) {void 0 !== e.min && e.max && e.increment || (t = !1)})),t}t.getPriceBucketString = function(e, t) {var n = 2 (0,S.timestamp)()},function(e) {return e && (e.status && !(0,A.default)([C.BID_STATUS.BID_TARGETING_SET, C.BID_STATUS.RENDERED], e.status) || !e.status)});function U(e, n) {var r = [], i = (0,S.groupBy)(e, "adUnitCode");return Object.keys(i).forEach((function(e) {var t = (0,S.groupBy)(i[e], "bidderCode");Object.keys(t).forEach((function(e) {return r.push(t[e].reduce(n))}))})),r}function u(n) {var g = {};function p(e) {return "string" == typeof e ? [e] : w.isArray(e) ? e : n.getAdUnitCodes() || []}function v() {return U(n.getBidsReceived().filter((function(e) {return "banner" !== e.mediaType || (0,a.sizeSupported)([e.width, e.height])})).filter(d).filter(t.isBidNotExpired), S.getOldestHighestCpmBid)}function y() {return n.getStandardBidderAdServerTargeting().map((function(e) {return e.key})).concat(R).filter(S.uniques)}function m(r, i, e, t) {return Object.keys(i.adserverTargeting).filter(o()).forEach((function(e) {var t, n;r.length && r.filter((n = e,function(e) {return e.adUnitCode === i.adUnitCode && e.adserverTargeting[n]})).forEach((t = e,function(e) {w.isArray(e.adserverTargeting[t]) || (e.adserverTargeting[t] = [e.adserverTargeting[t]]),e.adserverTargeting[t] = e.adserverTargeting[t].concat(i.adserverTargeting[t]).filter(S.uniques),delete i.adserverTargeting[t]}))})),r.push(i),r}function o() {var t = y();return function(e) {return -1 === t.indexOf(e)}}function b(t) {return _({}, t.adUnitCode, Object.keys(t.adserverTargeting).filter(o()).map((function(e) {return _({}, e.substring(0, O), [t.adserverTargeting[e]])})))}return g.resetPresetTargeting = function(e) {if ((0,S.isGptPubadsDefined)()) {var t = p(e), r = n.getAdUnits().filter((function(e) {return (0,A.default)(t, e.code)}));window.googletag.pubads().getSlots().forEach((function(n) {B.forEach((function(t) {r.forEach((function(e) {e.code !== n.getAdUnitPath() && e.code !== n.getSlotElementId() || n.setTargeting(t, null)}))}))}))}},g.getAllTargeting = function(e) {var r, t, i, n, o, a, d, u, s, c = 1 i && (r = !1)),!r})),r && e.run(),r}function u(e, t) {void 0 === e[t] ? e[t] = 1 : e[t]++}},addWinningBid: function(e) {o = o.concat(e),R.callBidWonBidder(e.bidder, e, f)},setBidTargeting: function(e) {R.callSetTargetingBidder(e.bidder, e)},getWinningBids: function() {return o},getTimeout: function() {return E},getAuctionId: function() {return m},getAuctionStatus: function() {return b},getAdUnits: function() {return s},getAdUnitCodes: function() {return l},getBidRequests: function() {return g},getBidsReceived: function() {return p}}},t.auctionCallbacks = W,t.getStandardBidderSettings = d,t.getKeyValueTargetingPairs = V,t.adjustBids = s;var _ = n(0), h = n(31), i = n(17), S = n(228), E = n(12), w = n(3), r = n(18), o = n(20), T = a(n(10)), C = a(n(7)), A = n(41);function a(e) {return e && e.__esModule ? e : {default: e}}var B = r.userSync.syncUsers, O = n(0), R = n(8), U = n(9), N = n(4), D = t.AUCTION_STARTED = "started", j = t.AUCTION_IN_PROGRESS = "inProgress", P = t.AUCTION_COMPLETED = "completed";U.on(N.EVENTS.BID_ADJUSTMENT, (function(e) {s(e)}));var k = 4, x = {}, M = {}, G = [];var q = t.addBidResponse = (0,o.createHook)("asyncSeries", (function(e, t) {this.auctionAddBidResponse(e, t)}), "addBidResponse");function W(e, p) {var v = 0, t = !1, n = (0,_.delayExecution)((function() {t = !0}), p.getBidRequests().length);function y() {v--,t && 0 === v && e()}return {addBidResponse: function(e, t) {v++;var n = p.getBidRequests(), r = p.getAuctionId(), i = (0,_.getBidderRequest)(n, t.bidderCode, e), o = (function(e) {var t = e.adUnitCode, n = e.bid, r = e.bidRequest, i = e.auctionId, o = r.start, a = b({}, n, {auctionId: i,responseTimestamp: (0,_.timestamp)(),requestTimestamp: o,cpm: parseFloat(n.cpm) || 0,bidder: n.bidderCode,adUnitCode: t});a.timeToRespond = a.responseTimestamp - a.requestTimestamp,U.emit(N.EVENTS.BID_ADJUSTMENT, a);var d = r.bids && (0,T.default)(r.bids, (function(e) {return e.adUnitCode == t})), u = d && d.renderer;u && u.url && (a.renderer = E.Renderer.install({url: u.url}),a.renderer.setRender(u.render));var s, c = w.config.getConfig("mediaTypePriceGranularity." + n.mediaType), f = (0,h.getPriceBucketString)(a.cpm, "object" === (void 0 === c ? "undefined" : m(c)) ? c : w.config.getConfig("customPriceBucket"), w.config.getConfig("currency.granularityMultiplier"));return a.pbLg = f.low,a.pbMg = f.med,a.pbHg = f.high,a.pbAg = f.auto,a.pbDg = f.dense,a.pbCg = f.custom,a.bidderCode && (0 e.getTimeout() + w.config.getConfig("timeoutBuffer") && e.executeCallback(!0)}function z(e, t) {U.emit(N.EVENTS.BID_RESPONSE, t),e.addBidReceived(t),I(e, t)}function d(e) {var t = w.config.getConfig("mediaTypePriceGranularity." + e), n = "string" == typeof e && t ? "string" == typeof t ? t : "custom" : w.config.getConfig("priceGranularity"), r = pbjs.bidderSettings;return r[N.JSON_MAPPING.BD_SETTING_STANDARD] || (r[N.JSON_MAPPING.BD_SETTING_STANDARD] = {}),r[N.JSON_MAPPING.BD_SETTING_STANDARD][N.JSON_MAPPING.ADSERVER_TARGETING] || (r[N.JSON_MAPPING.BD_SETTING_STANDARD][N.JSON_MAPPING.ADSERVER_TARGETING] = [{key: N.TARGETING_KEYS.BIDDER,val: function(e) {return e.bidderCode}}, {key: N.TARGETING_KEYS.AD_ID,val: function(e) {return e.adId}}, {key: N.TARGETING_KEYS.PRICE_BUCKET,val: function(e) {return n === N.GRANULARITY_OPTIONS.AUTO ? e.pbAg : n === N.GRANULARITY_OPTIONS.DENSE ? e.pbDg : n === N.GRANULARITY_OPTIONS.LOW ? e.pbLg : n === N.GRANULARITY_OPTIONS.MEDIUM ? e.pbMg : n === N.GRANULARITY_OPTIONS.HIGH ? e.pbHg : n === N.GRANULARITY_OPTIONS.CUSTOM ? e.pbCg : void 0}}, {key: N.TARGETING_KEYS.SIZE,val: function(e) {return e.size}}, {key: N.TARGETING_KEYS.DEAL,val: function(e) {return e.dealId}}, {key: N.TARGETING_KEYS.SOURCE,val: function(e) {return e.source}}, {key: N.TARGETING_KEYS.FORMAT,val: function(e) {return e.mediaType}}]),r[N.JSON_MAPPING.BD_SETTING_STANDARD]}function V(e, t) {if (!t)return {};var n = {}, r = pbjs.bidderSettings;r && (u(n, d(t.mediaType), t),e && r[e] && r[e][N.JSON_MAPPING.ADSERVER_TARGETING] && (u(n, r[e], t),t.sendStandardTargeting = r[e].sendStandardTargeting));return t.native && (n = b({}, n, (0,i.getNativeTargeting)(t))),n}function u(r, i, o) {var e = i[N.JSON_MAPPING.ADSERVER_TARGETING];return o.size = o.getSize(),O._each(e, (function(e) {var t = e.key, n = e.val;if (r[t] && O.logWarn("The key: " + t + " is getting ovewritten"),O.isFn(n))try {n = n(o)} catch (e) {O.logError("bidmanager", "ERROR", e)}(void 0 === i.suppressEmptyKeys || !0 !== i.suppressEmptyKeys) && t !== N.TARGETING_KEYS.DEAL || !O.isEmptyStr(n) && null != n ? r[t] = n : O.logInfo("suppressing empty key '" + t + "' from adserver targeting")})),r}function s(e) {var t = e.bidderCode, n = e.cpm, r = void 0;if (pbjs.bidderSettings && (t && pbjs.bidderSettings[t] && "function" == typeof pbjs.bidderSettings[t].bidCpmAdjustment ? r = pbjs.bidderSettings[t].bidCpmAdjustment : pbjs.bidderSettings[N.JSON_MAPPING.BD_SETTING_STANDARD] && "function" == typeof pbjs.bidderSettings[N.JSON_MAPPING.BD_SETTING_STANDARD].bidCpmAdjustment && (r = pbjs.bidderSettings[N.JSON_MAPPING.BD_SETTING_STANDARD].bidCpmAdjustment),r))try {n = r(e.cpm, b({}, e))} catch (e) {O.logError("Error during bid adjustment", "bidmanager.js", e)}0 (eg mediaTypes.banner.sizes)."), e.sizes = n);if (t && t.video) {var i = t.video;if (i.playerSize)if (Array.isArray(i.playerSize) && 1 === i.playerSize.length && i.playerSize.every(d)) e.sizes = i.playerSize;else if (d(i.playerSize)) {var o = [];o.push(i.playerSize),w.logInfo("Transforming video.playerSize from " + i.playerSize + " to " + o + " so it's in the proper format."),e.sizes = i.playerSize = o} else w.logError("Detected incorrect configuration of mediaTypes.video.playerSize. Please specify only one set of dimensions in a format like: [[640, 480]]. Removing invalid mediaTypes.video.playerSize property from request."), delete e.mediaTypes.video.playerSize}if (t && t.native) {var a = t.native;a.image && a.image.sizes && !Array.isArray(a.image.sizes) && (w.logError("Please use an array of sizes for native.image.sizes field. Removing invalid mediaTypes.native.image.sizes property from request."),delete e.mediaTypes.native.image.sizes),a.image && a.image.aspect_ratios && !Array.isArray(a.image.aspect_ratios) && (w.logError("Please use an array of sizes for native.image.aspect_ratios field. Removing invalid mediaTypes.native.image.aspect_ratios property from request."),delete e.mediaTypes.native.image.aspect_ratios),a.icon && a.icon.sizes && !Array.isArray(a.icon.sizes) && (w.logError("Please use an array of sizes for native.icon.sizes field. Removing invalid mediaTypes.native.icon.sizes property from request."),delete e.mediaTypes.native.icon.sizes)}})),e},h.callBids = function(e, t, r, i, o, a) {if (t.length) {var n = t.reduce((function(e, t) {return e[Number(void 0 !== t.src && t.src === C.S2S.SRC)].push(t),e}), [[], []]), d = b(n, 2), u = d[0], s = d[1];if (s.length) {var c = (0,E.ajaxBuilder)(a, o ? {request: o.request.bind(null, "s2s"),done: o.done} : void 0), f = U.bidders, l = R[U.adapter], g = s[0].tid, p = s[0].adUnitsS2SCopy;if (l) {var v = {tid: g,ad_units: p};if (v.ad_units.length) {var y = s.map((function(e) {return e.start = (0,S.timestamp)(),i})), m = v.ad_units.reduce((function(e, t) {return e.concat((t.bids || []).reduce((function(e, t) {return e.concat(t.bidder)}), []))}), []);w.logMessage("CALLING S2S HEADER BIDDERS ==== " + f.filter((function(e) {return (0,A.default)(m, e)})).join(",")),s.forEach((function(e) {B.emit(C.EVENTS.BID_REQUESTED, e)})),l.callBids(v, s, r, (function() {return y.forEach((function(e) {return e()}))}), c)}}}u.forEach((function(e) {e.start = (0,S.timestamp)();var t = R[e.bidderCode];w.logMessage("CALLING BIDDER ======= " + e.bidderCode),B.emit(C.EVENTS.BID_REQUESTED, e);var n = (e.doneCbCallCount = 0,E.ajaxBuilder)(a, o ? {request: o.request.bind(null, e.bidderCode),done: o.done} : void 0);t.callBids(e, r, i, n)}))} else w.logWarn("callBids executed with no bidRequests. Were they filtered by labels or sizing?")},h.videoAdapters = [],h.registerBidAdapter = function(e, t) {var n = (2 n

n

n

n

Excerpt from:

Tech News Latest Technology Headlines and Trends on CNN ...