The Prometheus League
Breaking News and Updates
- Abolition Of Work
- Ai
- Alt-right
- Alternative Medicine
- Antifa
- Artificial General Intelligence
- Artificial Intelligence
- Artificial Super Intelligence
- Ascension
- Astronomy
- Atheism
- Atheist
- Atlas Shrugged
- Automation
- Ayn Rand
- Bahamas
- Bankruptcy
- Basic Income Guarantee
- Big Tech
- Bitcoin
- Black Lives Matter
- Blackjack
- Boca Chica Texas
- Brexit
- Caribbean
- Casino
- Casino Affiliate
- Cbd Oil
- Censorship
- Cf
- Chess Engines
- Childfree
- Cloning
- Cloud Computing
- Conscious Evolution
- Corona Virus
- Cosmic Heaven
- Covid-19
- Cryonics
- Cryptocurrency
- Cyberpunk
- Darwinism
- Democrat
- Designer Babies
- DNA
- Donald Trump
- Eczema
- Elon Musk
- Entheogens
- Ethical Egoism
- Eugenic Concepts
- Eugenics
- Euthanasia
- Evolution
- Extropian
- Extropianism
- Extropy
- Fake News
- Federalism
- Federalist
- Fifth Amendment
- Fifth Amendment
- Financial Independence
- First Amendment
- Fiscal Freedom
- Food Supplements
- Fourth Amendment
- Fourth Amendment
- Free Speech
- Freedom
- Freedom of Speech
- Futurism
- Futurist
- Gambling
- Gene Medicine
- Genetic Engineering
- Genome
- Germ Warfare
- Golden Rule
- Government Oppression
- Hedonism
- High Seas
- History
- Hubble Telescope
- Human Genetic Engineering
- Human Genetics
- Human Immortality
- Human Longevity
- Illuminati
- Immortality
- Immortality Medicine
- Intentional Communities
- Jacinda Ardern
- Jitsi
- Jordan Peterson
- Las Vegas
- Liberal
- Libertarian
- Libertarianism
- Liberty
- Life Extension
- Macau
- Marie Byrd Land
- Mars
- Mars Colonization
- Mars Colony
- Memetics
- Micronations
- Mind Uploading
- Minerva Reefs
- Modern Satanism
- Moon Colonization
- Nanotech
- National Vanguard
- NATO
- Neo-eugenics
- Neurohacking
- Neurotechnology
- New Utopia
- New Zealand
- Nihilism
- Nootropics
- NSA
- Oceania
- Offshore
- Olympics
- Online Casino
- Online Gambling
- Pantheism
- Personal Empowerment
- Poker
- Political Correctness
- Politically Incorrect
- Polygamy
- Populism
- Post Human
- Post Humanism
- Posthuman
- Posthumanism
- Private Islands
- Progress
- Proud Boys
- Psoriasis
- Psychedelics
- Putin
- Quantum Computing
- Quantum Physics
- Rationalism
- Republican
- Resource Based Economy
- Robotics
- Rockall
- Ron Paul
- Roulette
- Russia
- Sealand
- Seasteading
- Second Amendment
- Second Amendment
- Seychelles
- Singularitarianism
- Singularity
- Socio-economic Collapse
- Space Exploration
- Space Station
- Space Travel
- Spacex
- Sports Betting
- Sportsbook
- Superintelligence
- Survivalism
- Talmud
- Technology
- Teilhard De Charden
- Terraforming Mars
- The Singularity
- Tms
- Tor Browser
- Trance
- Transhuman
- Transhuman News
- Transhumanism
- Transhumanist
- Transtopian
- Transtopianism
- Ukraine
- Uncategorized
- Vaping
- Victimless Crimes
- Virtual Reality
- Wage Slavery
- War On Drugs
- Waveland
- Ww3
- Yahoo
- Zeitgeist Movement
-
Prometheism
-
Forbidden Fruit
-
The Evolutionary Perspective
Monthly Archives: February 2017
CF Orr Stakes – An Early Look – Racing.com
Posted: February 7, 2017 at 10:27 pm
Brad Rawiller and Black Heart Bart (Image: Racing Photos)
Several weeks ago, you might have got a funny look if you suggested the Apollo Stakes would attract a bigger field than the other 1400-metre weight-for-age race to be run this Saturday, the C.F. Orr Stakes.
The Group 2 Apollo, which will be run at Randwick in Sydney, heralds the return of the seemingly invincible Winx, while the Orr is the first Group 1 of the calendar year in Melbourne, where the talent pool is generally more evenly spread.
Yet, connections of 13 runners have put their hand up for a crack at Winx with a field of 12 to go around in the Orr.
There's little doubt, however, about which shapes as the more competitive contest.
Just under an hour after Winx resumes in the Apollo at 3:10pm, where she is the $1.18 favourite to make it 14 wins in a row, a crack field will go around in the Orr (4:05pm).
Nine of the 12 Orr Stakes runners have won at Group 1 level and the three that haven't aren't exactly making up the numbers.
Arod won the Group 2 Summer Mile at Ascot before coming to Australia, where he is now trained by Chris Waller and Ecuador (Waterhouse/Bott) is two-from-two this campaign and boasts a 2.3-length second to Winx in an Epsom Handicap, while Miss Rose De Lago (Danny O'Brien) is a dual Group 2 winner, including a first-up win last campaign in the Lawrence Stakes over the Orr Stakes course.
Of the Group 1 winners, seven are winners at the highest level at 1600m or below.
Black Heart Bart, who will carry the No 1 saddlecloth, has developed into one of the country's most consistent gallopers and his two starts over 1400m at Caulfield have produced wins in the Group 1 Memsie Stakes and Group 3 Easter Cup.
He will renew hostilities with dual Group 1 winner Malaguerra, who had his measure in the Group 2 Australia Stakes (1200m) at Moonee Valley.
They both drew wide when the barrier draw was conducted on Wednesday morning with Black Hart Bart, who will be ridden by Brad Rawiller, to start from gate 11 and Malaguerra (Ben Melham) alley 12.
Palentino (fourth) and Turn Me Loose (seventh), who finished fourth in last year's Orr when a $3.80 favourite, are the other Orr Stakes runners who contested the Australia Stakes. They drew barriers seven and two respectively.
Lucky Hussler (barrier four) is another runner engaged this year who contested last year's Orr and connections will be hoping for more luck than 12 months ago, when a luckless second behind Suavito.
The Hawkes stable is looking to win another Orr with a Caulfield Guineas winner resuming from a spell, as they did with All Too Hard in 2013, and Divine Prophet's quest for victory will be carried out from gate six.
Divine Prophet will be ridden by Dwayne Dunn, which has presented Regan Bayliss with an opportunity in the first Group 1 race to be run since he became a senior rider.
He has been gifted the mount aboard Toorak Handicap winner He's Our Rokkii, who drew barrier nine.
The depth of quality among the sprinter/milers in this year's Orr provide for stiff competition for Caulfield Cup heroine Jameka (10), who will be ridden for the first time by Luke Nolen with Nick Hall injured, and Emirates Stakes victor Awesome Rock (three), who both launch Australian Cup campaigns.
The Orr Stakes is a highlight of a super Caulfield card that also features a pair of Blue Diamond Preludes for the two-year-olds and the reappearance of Australia's premier sprinter, Chautauqua.
The five-time Group 1 winner resumes in the $200,000 Group 2 Rubiton Stakes (1100m), a race he won two years ago, but has to carry 59.5kg against talented types including Group 1 winner I Am A Star (53.5kg), leading Oakleigh Plate fancy Hellbent (56kg), the speedy Wild Rain (55.5kg) and a rejuvenated El Divino (54kg).
View post:
Posted in Cf
Comments Off on CF Orr Stakes – An Early Look – Racing.com
How Does CF Industries Holdings, Inc. (CF) Stack Up Right Now? – StockNewsJournal
Posted: at 10:27 pm
CF Industries Holdings, Inc. (CF) is an interesting player in the Basic Materials space, with a focus on Agricultural Chemicals. The stock has been active on the tape, currently trading at $35.49, down from yesterdays close by -0.53%. Given the stocks recent action, it seemed like a good time to take a closer look at the companys recent data.
Does this stock stack up well when compared to its peers in the industry space? Lets take a look. CF Industries Holdings, Inc. (CF) currently trades with a market capitalization of $8.26 Billion. That value represents a market adjusting for revenues that have been falling by -26.68 % on a quarterly year/year basis as of the companys last quarterly report.
The balance sheet health of any company plays a key role in its ability to meet its obligations and maintain the faith of its investment base. For CF, the company currently has $1.56 Billion of cash on the books, which is offset by $- current liabilities. You can get a sense of how sustainable that is by a levered free cash flow of $-1.77 Billion over the past twelve months. Generally speaking, earnings are expected to grow in coming quarters. Analysts are forecasting earnings of $-0.06 on a per share basis this quarter. Perhaps, that suggests something about why 0.15% of the outstanding share supply is held by institutional investors.
Weve taken a serious look at this stock from a fundamental perspective, but the tale of the tape may offer more hints about what lies under the surface. Looking at the stocks movement on the chart, CF Industries Holdings, Inc. recorded a 52-week high of $37.17. It is now trading 1.68% off that level. The stock is trading $31.84 its 50-day moving average by -3.65%. The stock carved out a 52-week low down at $20.25.
In recent action, CF Industries Holdings, Inc. (CF) has made a move of +6.04% over the past month, which has come on weak relative transaction volume. Over the trailing year, the stock is underperforming the S&P 500 by 5.53, and its gotten there by action that has been more volatile on a day-to-day basis than most other stocks on the exchange. In terms of the mechanics underlying that movement, traders will want to note that the stock is trading on a float of 13.98% with $232.05 Million sitting short, betting on future declines. That suggests something of the likelihood of a short squeeze in shares of CF.
Read the original post:
How Does CF Industries Holdings, Inc. (CF) Stack Up Right Now? - StockNewsJournal
Posted in Cf
Comments Off on How Does CF Industries Holdings, Inc. (CF) Stack Up Right Now? – StockNewsJournal
Letter: Political correctness is akin to golden rule – The Buffalo News – Buffalo News
Posted: at 10:26 pm
Political correctness is akin to golden rule
Im always perplexed when I hear folks complain that political correctness is out of control. A Google search defines political correctness as the avoidance of forms of expression or actions that are perceived to exclude, marginalize or insult groups of people who are socially disadvantaged or discriminated against. Way back in my early childhood, this was expressed very simply and effectively as do unto others as you would have them do unto you. Failure to follow this golden rule would result is swift punishment from a parent, teacher, grandparent or other authority figure.
If I am to function in the 21st century and shed this oppressive cloak of political correctness, Im going to need the list of groups it is now permissible to exclude, marginalize or insult. Anybody?
Mike Lukasik
Kenmore
Read the original here:
Letter: Political correctness is akin to golden rule - The Buffalo News - Buffalo News
Posted in Political Correctness
Comments Off on Letter: Political correctness is akin to golden rule – The Buffalo News – Buffalo News
Authoritarian political correctness – Dailyuw
Posted: at 10:26 pm
As a community, we choose which values to affirm. Political correctness can promote kindness and sympathy, or intolerance and violence.
Authoritarian political correctness can only create the latter. It is the antithesis of kindness as it polices language, conflates morality with political perspectives, and enables violence. Forty percent of millennials support censorship of speech that offends minorities, yet our right to free speech and assembly necessitates allowing speech some may find hateful.
For example, the phrase undocumented worker obscures reality; they are illegal aliens under the laws of the United States. (Note: Mexico has strict border control.) Describing their circumstances unapologetically neither ascribes policy nor hurts them. Illegal immigrants who have lived here productively can and should be assimilated, but I reject the euphemism undocumented worker because acknowledging reality is important in changing it.
Students must be able to discuss todays issues without being demonized at an institution of higher learning. The term safe space is too vague. I accept the concept of reaffirmation areas, where students can go for emotional support or safety, but not homogenous thought zones, which silence dissent.
How can the validity and constructivity of a position be known without entertaining it?
Jordan Peterson, a personality psychologist at the University of Toronto, has faced intense backlash for standing up to Ontario Human Rights Code Bill C-16. It allows the government to police language with fines of up to $250,000, regarding refusal to use preferred pronouns as a human rights violation, which is alarmingly totalitarian. Identity is an integral part of the human experience, but compelled speech breeds contempt and undermines a free societys ability to resolve conflicts.
Ben Shapiro, a more credible, less inflammatory, and unapologetic conservative journalist, has also faced relentless censorship. Moderate conservatives like Condoleezza Rice, having served as provost at Stanford and Secretary of State, have had their university talks cancelled from authoritarian pushback.
In Red Square on Jan. 20, bricks were thrown at people who went to see Milo Yiannopoulos, and a full-blown riot broke out at UC Berkeley to silence him. Even if Yiannopoulos is fascist, political violence remains wrong and is fascist in itself. Some claim his words threatened and oppressed them. What I saw was the inverse.
Those who wanted to hear Yiannopoulos were ruthlessly persecuted by masked extremists in Red Square. Yiannopoulos speaking revealed a strong authoritarian presence on campus. Even if his speech truly was hateful, did that warrant punishing the thought-crime of wanting to hear Yiannopoulos with bullying and force?
I find much of what Yiannopoulos says disgusting and pointless, but authoritarianism produces violence and therefore I defend his right to speak. I applaud those who peacefully protested him. Had the protest remained peaceful, Yiannopoulos could have taken their questions.
His words sting, but bricks break bones. Authoritarianism is not progressive; it is regressive and oppressive.
In an increasingly polarized nation, it is important to both reaffirm the right to speak and organize freely, as well as to reject political violence and ad hominem attacks. I have yet to find evidence of a single neo-Nazi on campus and am tired of this witch hunt. Ironically, Yiannopoulos himself has denounced white supremacy.
I am open to proof, but have seen no damning evidence of a Mein Kampf reading, neo-Nazi march, or similar event on campus. There will be bigotry in any institution due to our tendency to congregate, but I do not operate on rumor and implore students to demand evidence before repeating lies and deceit.
As an atheist, libertarian, moderate conservative, and constitutional fundamentalist, I believe Adolf Hitler is in hell with Joseph Stalin, Vladimir Lenin, Mao Zedong, and Karl Marx. But I support equal rights and protection under the law for everyone, even for those whose speech disgusts me.
Humankind will never agree on ideal governance. This debate is healthy and necessary for democracy and freedom. Utopian and authoritarian philosophies enforce monocultures where ends justify means. Consequently, coercive utopianism is inherently authoritarian and dystopian.
Jakob Ross, a writer for The Daily, promoted political violence in a call for Maoist revolution: Inherently violent movements, be it the Third Reich or the pasty fascist wannabes who make up the alt-right cannot be reasoned with in a peaceful manner. The inherently violent alt-left cannot be met with concessions. The only violent movement I saw had masked communists and anarchists seeking to impose mob rule censorship by force.
Yiannopoulos did not advocate violence. Your words are truly violent, Jakob. Painting others as problems and suggesting violence as a solution is not only unethical, but is also exactly what Hitler and the Hitler Youth did. Both racial and political violence are unadulterated evil.
The term political correctness was created by Soviets and Soviet sympathizers. Its authoritarian form grants an unearned sense of moral superiority and relentlessly targets those who resist the collective.
Communist Mao Zedong killed tens of millions in China for political dissent. We move toward this extreme with each concession to authoritarianism. Any collective which ostracizes, penalizes, and harms its dissenters, must be resisted.
The peaceful protesters I spoke with denounced the violence. Many Young Democrats expressed interest in collaborating with College Republicans and vice versa. Perhaps cooperation can emerge from this mess. I hope so.
Please join me in resisting political violence.
Reach writer Samuel Bakken at development@dailyuw.com. Twitter: @BakkenSam
Original post:
Posted in Political Correctness
Comments Off on Authoritarian political correctness – Dailyuw
Boffins create quantum cloning machine to intercept ‘secure … – The INQUIRER
Posted: at 10:25 pm
BOFFINS AT THE University of Ottawa claim that quantum computing may not provide the virtually 'unbreakable' security that it has been claimed the technology could offer.
Physicists at the University claim that they were able to build a "quantum cloning machine" that was able to intercept a "secure quantum message".
Their research suggests that initiatives such as China's dedicated quantum encryption network, which will supposedly provide secure communications between Beijing, Shanghai and a number of cities in between when it is finished at the end of the year, might not provide the security that its designers had planned.
"Our team has built the first high-dimensional quantum cloning machine capable of performing quantum hacking to intercept a secure quantum message," said University of Ottawa Department of Physics professor Ebrahim Karimi.
"Once we were able to analyse the results, we discovered some very important clues to help protect quantum computing networks against potential hacking threats."
Quantum systems were believed to provide secure data transmission because, until now, attempts to copy the transmitted information resulted in an altered or deteriorated version of the original information, thereby defeating the purpose of the initial hack.
In conventional computing, anyone can simply copy-and-paste information and replicate it exactly. But this doesn't hold true in the quantum computing world, where attempts to copy quantum information - or qudits* - result in what Karimi refers to as "bad" copies.
Professor Karimi's team was able to clone the photons that transmit information, namely the single carriers of light known as qubits, as well as quantum theory allows, meaning that the clones were almost exact replicas of the original information.
At the same time, though, the researchers' analyses also revealed some clues as to how to protect against such hacking.
"What we found was that when larger amounts of quantum information are encoded on a single photon, the copies will get worse and hacking even simpler to detect," said Frdric Bouchard, a University of Ottawa doctoral student.
"We were also able to show that cloning attacks introduce specific, observable noises in a secure quantum communication channel. Ensuring photons contain the largest amount of information possible and monitoring these noises in a secure channel should help strengthen quantum computing networks against potential hacking threats."
Interest in quantum computing has been escalating for years as advances in conventional computing power slows down. Last week, a University of Surrey scientist published a blueprint for a large-scale quantum computer, while commercial developer D-Wave Systems has started to sell its 2000 qubit device to organisations that need to perform particular calculations at speed.
* The term "qudit" is used to denote a unit of quantum information in a d-level quantum system.
See the rest here:
Boffins create quantum cloning machine to intercept 'secure ... - The INQUIRER
Posted in Cloning
Comments Off on Boffins create quantum cloning machine to intercept ‘secure … – The INQUIRER
Watch out for this crazy Facebook cloning scam! – Komando
Posted: at 10:25 pm
We all know what cloning is. Scientists have been experimenting with physical cloning, and there are even experiments with "mind cloning" that some believe could be the key to immortality.
But, it goes without saying, the concept of cloning can be pretty scary. While science may still be decades away from accomplishing the impossible with physical cloning, scammers are using a form of digital cloning to trick people online.
This particular form of cloning is appearing primarily on Facebook, but can also show up on other social media platforms such as Instagram and Twitter. For the purposes of this article, we'll refer to it as "Facebook cloning," but keep this in mind so you can watch for it on other sites across the internet.
What is Facebook cloning, exactly? It's the act of copying someone's Facebook profileand using it to conduct scams across the web. The scary thing is, anyone could be targeted and have their profile photos and details stolen. In most cases, without even knowing about it.
Note: Facebook cloning isn't the only Facebook scam you need to watch out for. Click here and read this article before you take another Facebook quiz.
By stealing your photos and details from your profile, such as where you work, where you went to school, when you were born and your relationship status, cybercrooks are often able to convince your real contacts to accept your "Friend request." Any that do accept have just given hackers the permission they need to snoop through their photos and clone their profiles too. And the cycle continues from there.
The cloning itself is only part of the scam, which could take months or even years to pull off. Hiding behind their fake profiles, the scammers study and mimic the communication styles of your true contacts, until eventually, they've learned enough to put on an even more convincing act.
Imagine receiving a private message from an old roommate from college. She's in trouble. She's trying to get home, but her purse was just stolen. She couldn't think of anyone else to reach out to but you.
For many, this request would stand out as odd, but under the right circumstances, there are plenty of people who fall for it. This old "friend," of course, isn't truly a friend at all. It's a wolf hiding in sheep's clothing.
The first way to avoid this scam, and the most obvious, is to confirm that all profiles are real before you accept anyone's friend request. Use the search feature on Facebook to pull up their page and see how many friends the person has, and when the account was created. Fake accounts will likely have just been created within a few weeks or months, and chances are, the scammers won't take the time to build up a massive Friends list.
If you see anything that looks suspicious, don't accept the friend request. If you have the contact information (either a phone number or an email address) of the real person, reach out to confirm outside of Facebook.
Next, you need to edit your Facebook profile to ensure that it's private. (Click here for 3 essential Facebook privacy checks you need to do right now.) You also need to remove any unnecessary information about your private life. Delete your phone number, home address, and these three additional details that put your privacy at risk.
Lastly, if you have a Facebook account that you no longer use, you need to delete it. Old, unused accounts leave you at risk of having your private information stolen by hackers, and even through massive data breaches. If you're not sure how to delete your old Facebook account, click here and we'll walk you through the steps.
How to sell your stuff on Facebook Marketplace instead of Craigslist
How to see (and erase) your Facebook search history
5 ways to lock down your Facebook account for maximum security
Please share this information with everyone. Just click on any of these social media buttons.
Google+
Previous Happening Now
Next Happening Now
See the original post:
Posted in Cloning
Comments Off on Watch out for this crazy Facebook cloning scam! – Komando
This Crab Clones Its Allies by Ripping Them in Half – The Atlantic
Posted: at 10:25 pm
The American novelist S. E. Hinton once said, If you have two friends in your lifetime, youre lucky. If you have one good friend, youre more than lucky. By that logic, boxer crabs are the luckiest creatures alive because they can turn one good friend into two by tearing it in half.
These tiny, inch-long crabs carry sea anemones, holding them in place with special hooks on the inner edges of their claws. With their crowns of wavy tentacles, the anemones look like pom-poms, and the crabs like cheerleaders. But those tentacles also pack powerful stings, and a quick jab from them is often enough to ward off an attacking fish. Hence the name: boxer crabs.
Most crabs gather food with their powerful claws, but boxer crabs have adapted so thoroughly to holding anemones that their claws are now feeble, delicate tweezers rather than powerful, crushing pincers. Instead, they rely on their anemones. Some species use the anemones like cutlery, dabbing them onto morsels of food and then bringing them over to their mouths. Others wait for the anemones to passively ensnare food, which they then scrape into their mouths with their front legs. If you remove the anemones, as Yisrael Schnytzer and his colleagues from Bar Ilan University have repeatedly done, the crabs struggle to gather enough to eat.
The anemones, however, flourish apart from the crabs. When Schnytzer freed them from the crabs grasp, their colors got brighter, their tentacles became longer, and they more than doubled in size. Left to their own devices, they can grow far bigger than the crabs that once held them. In the words of Schnytzers colleague Ilan Karplus, the crabs cultivate Bonsai anemones, deliberately stunting their growth to keep them at a manageable size.
But how do the crabs get their anemones in the first place? In 1905, zoologist James Edwin Duerden, in what remains the most thorough account of boxer crab habits, noticed a clue. He wrote that there appeared to be evidence that these crabs will tear a single anemone in two to provide one for each claw. Karplus saw similar signs a few decades ago. He noticed that if he took away one of a crabs two anemones, and came back a few days later, it would once again have two anemonesalbeit smaller ones.
He and Schnytzer have now caught several crabs in the act of dividing their partners. It takes around 20 minutes, and the technique is simple: The crab grabs the anemone in both claws, stretches it outwards, and uses its legs to slice through the middle. And since anemones can regenerate their bodies, each half eventually became a complete animal in its own right. The crab, by bisecting its partner, also clones it.
This explains why wild boxer crabs, even very young ones, almost always have two anemones. As long as a crab can get is claws on one, it can easily make a second. And if it has none at all, as Schnytzer found, it can steal a fragment from another crab. Its remarkable that these anemones are such a crucial commodity that small, juvenile crabs will actually initiate fights with larger crabs to steal their anemonesand will often win, says Kristin Hultgren from Seattle University.
These kinds of fights must happen a lot in the wild. The particular species of boxer crab that Schnytzer studied carries a species of sea anemone that has never been seen on its own in the wild. And yet the crabs always have them, so maybe they all steal them from one another.
Is this how the anemones reproduce? Perhaps partly. But they seem to fall into at least three distinct genetic lineages, and if they only reproduced by crab-cloning, the entire population would be genetically identical. That suggests the anemones do reproduce on their own, Schnytzer says. You can imagine that they could release sperm and eggs into the water, and still breed [while] being held by the crabs.
It seems that the anemonestheir food stolen, their growth stunted, and their bodies regularly torn in twoget very little out of their co-existence with the crabs. Then again, weve never found them free-living, says Schnytzer. If they cant manage on their own, presumably they need the crabs for something.
Randy Brooks from Florida Atlantic University, who has studied the relationships between sea anemones and other animals, says that some species are only found on the shells of hermit crabs. Those anemones, Brooks found, are capable of reproducing by splitting themselves in half, so perhaps the boxers are only accelerating a process that their anemone partners would naturally undergo. I've always wished I could work with the boxer crabs, Brooks says.
See the rest here:
This Crab Clones Its Allies by Ripping Them in Half - The Atlantic
Posted in Cloning
Comments Off on This Crab Clones Its Allies by Ripping Them in Half – The Atlantic
The Evolution and Maturation of HPC in the Enterprise – CIO
Posted: at 10:25 pm
By Adnan Khaleel
The convergence of high performance computing (HPC) and big data has been under way for years. As I noted in an earlier blog, HPC and big data grew up in different worlds and are now coming togetherdue to necessity. People using HPC applications often work with big data, and people working with big data often need the processing power of HPC systems. This convergence is giving rise to the era of high performance data analytics (HPDA) in the enterprise.
Lets take a step back. For enterprises, data is coming at much faster rates than anyone had expected. Whether its from the Internet of Things, webpages, commercial transactions or other sources, the amount of data pouring into enterprise data centers exceeds current storage capacity. This flood of data creates a new class of data consolidation, data handling and data management challenges. Organizations cant just let the data pile up. They now need to make deliberate decisions about what data to store, what data to analyze and what data to discard.
Above all, enterprises need to find ways to turn the flood of data into meaningful insights. This process increasingly requires HPC capabilities that make applications run as fast as possible. In many cases, enterprises need to generate insights in real timewhether they need to optimize the performance of remote equipment, respond faster to a customers needs or put the brakes on a potentially fraudulent transaction.
Lets take the example of the many enterprises that are getting hit with an ever-growing wave of data from our world of connected devices, the Internet of Things (IoT). To capitalize on this data, whether in real time or over a period of time, enterprises need to apply sophisticated machine learning and deep learning techniques, and these techniques require HPC systems paired with big data platforms and data analytics tools.
With HPDA, enterprises use HPC technologies to analyze big data for rapid insights, real-time results and predictive analytics. One study found that 67 percent of HPC users are already doing HPDA, in addition to or instead of traditional HPC.[1]
While HPDA is needed in traditional research-driven applications of HPC, it is becoming a must-have in enterprise environments. Depending on the industry, an enterprise might need to leverage data-centric HPC platforms for more traditional HPC applications like genomics, financial modeling and signal processing, as well as new and emerging HPDA applications like personalized medicine, fraud detection and machine learning.
The rise of new tools and technologies
For organizations that need HPDA, there is good news on the technology front: The tools and technologies for merging HPC with data analytics are maturing rapidly. Better still, HPC and big data platforms are converging in a manner that reduces the need to move data back and forth between HPC and storage environments. This convergence helps organizations avoid a great deal of overhead and latency that comes with disparate systems.
Today, organizations can choose from a rapidly growing range of tools and technologies like streaming analytics, graph analytics, and exploratory data analysis in HPC environments. Lets take a brief look at these tools.
HPDA in action: case studies
Lets consider a couple of real-life examples of HPDA in action. These examples show how companies are capitalizing on the convergence of technologies for HPC and big data.
To help fight cancer and other diseases, TGen needed extremely scalable, reliable and available HPC nodes to develop personalized medical treatments. To meet this need, TGen optimized its infrastructure, scaling its existing Dell EMC HPC cluster with Dell EMC PowerEdge blades. The system incorporates powerful big data and analytics tools, leveraging a Dell EMC Hadoop platform and Statistica software. The increased performance helps TGen accelerate results, enabling researchers to expand treatments to a larger number of patients. Watch the video.
Another Dell EMC customer, Sensus, needed to increase its data set size to be able to more easily visualize meter sensor performance problems. To meet this need, the company implemented a data cluster and a data lakebased on a Hadoop platform and technologies from Dell EMC and Intelthat consolidates manufacturing, testing and other data streams. With this consolidated platform, Sensus can quickly analyze data from 17 million gas, electric and water meter sensors, and proactively identify device problems, helping to predict and prevent future device failures. Read the case study.
Enabling proactive maintenance with HPDA
On the IoT front, HPDA technologies are enabling predictive maintenance of assets to help prevent equipment failures, extend machine life and help organizations gain a better return on their assets. These technologies go beyond condition monitoring to enable condition understanding. On its own, condition monitoring provides time to act, but when data is dynamically provided to a device-specific predictive model you can achieve condition understanding. That means your users will have time to act on maintenance events and have a clear understanding of the actions they need to take.
For organizations new to IoT, the challenges are numerous, spanning both hardware and software. For example, they need to:
And this is where expertise comes in extremely handy. With that thought in mind, Dell EMC has joined forces with Software AG and Kepware to produce an end-to-end solution for proactive maintenance. It offers the complete hardware-software stack that easily allows for the management of IoT sensors, the data produced, and the analysis of that data in real timeultimately easing the deployment of a comprehensive IoT based solution for infrastructure maintenance.
Thats just one of countless advances made possible by the rise of technologies and solutions for high performance data analytics. For a look at more of these technologies and solutions, visit Dell.com/HPC.
Adnan Khaleel is a Global Sales Strategist for Dell EMC.
[1] HPCwire, IDC 2015. The Changing Face of HPC.
Originally posted here:
Posted in Evolution
Comments Off on The Evolution and Maturation of HPC in the Enterprise – CIO
Are Evolution Fresh Drinks ‘Poison’? – snopes.com
Posted: at 10:25 pm
Claim: Evolution Fresh brand cold-pressed juices and smoothies are 'poison.'
Origin:In late February, an apparent hoax began circulating via Facebook claiming that Evolution Fresh brand cold-pressed juices and smoothies, commonly founds at Starbucks outlets, are "poison":
We found no evidence that Evolution Fresh drinks are "poison," nor that they are vended or produced "in Nigeria." According to the brand's official web site, most of the produce used in their manufacture is grown in California (and some of it in Arizona), and the product doesn't appear to be sold beyond the borders of the United States. Evolution Fresh products doe not appear in the FDA's database of food recalls.
It's unclear if the hoax was based on a 2013 news story about a Bay Area woman named Ramineh Behbehanian, who was accused of placing rubbing alcohol into two bottles Evolution Fresh drink, then switching the tainted bottles with others in a refrigerator at a San Jose Starbucks store. Behbehanian, a chemist, was initially charged with attempted murder and poisoning after tests by the San Jose Fire Department indicated the liquid in the bottles contained a lethal dose of rubbing alcohol.
However, subsequent lab tests ordered by the Santa Clara County District Attorneys Office found that the orange juice bottles allegedly dropped off by Behbehanian contained vinegar (a non-harmful substance), so the district attorney's office declined to file charges against her.
We haven't yet heard back from Starbucks, but we could find no reports of recalls or instances of people being poisoned by the brand's drinks.
Originally published: 06 February 2017
Featured Image: FLICKR
Lee, Henry. "Arrest in Attempted Starbucks Poisoning." SFGate. 30 April 2013.
KPIX-TV [San Francisco]. "No Charges for Woman in San Jose Starbucks Alleged Poisoning Case." 24 May 2013.
Bethania Palma Markus is a journalist from the Los Angeles area who started her career as a daily newspaper reporter and has covered everything from crime to government to national politics. She has written for a variety of publications as a staffer and freelancer, including the Los Angeles News Group, the LAist, LA School Report, the OC Weekly and Raw Story. She is a huge fan of the X Files, because while she's not saying it was aliens, it was aliens.
See the original post here:
Posted in Evolution
Comments Off on Are Evolution Fresh Drinks ‘Poison’? – snopes.com
How evolution turned ordinary plants into ravenous meat-eaters – Wired.co.uk
Posted: at 10:25 pm
A species of carnivorous pitcher plant
AYImages / iStock
Meat-eating plants the world over, separated by thousands of miles and millions of year of evolution, share the same sneaky flesh-grabbing tricks down to a molecular level, a study has found.
By comparing the genomes of Australian, American and Asian pitcher plants the carnivorous flowering plants that entice insects into their tube-like leaves and drown them in a sticky liquid biologists could study how this deadly liquid trap evolved. In particular, the research team, headed up by evolutionary biology and plant genomics expert Victor Albert of the University of Buffalo, New York, sequenced the plants DNA to study the genetic differences between the Australian pitcher plants insect-trapping leaves, and its ordinary leaves used solely for photosynthesis. This revealed specific genes were only switched on in the tube-like leaves that generate the deadly serum, and those genes are used in the production of starches and sugars.
The serum was also compared to the insect-trapping juice of the plants distant relatives in Asia and America, and the liquid of a separate carnivorous plant. Despite evolving on different continents, the liquid in each plant had similar characteristics including enzymes used to break down bugs. The enzymes were not always destined to create bug soup, however. In non-carnivorous plants, they are used to break down a polymer called chitin as a defence mechanism against fungi that have chitin in their cell walls. Chitin is also found in the exoskeletons of insects, so it appears the carnivorous plant has a great deal in common with its relations - it has simply repurposed the enzymes to create a homegrown insecticide.
Subscribe to WIRED
Were really looking at a classic case of convergent evolution, said Albert, lead author on a paper describing the find, published in Nature Ecology and Evolution.
The study, though still leaving gaps in our knowledge relating to how certain mutations enable the enzymes to do their work, presents a leap forward in understanding how plants could have evolved from "ordinary", to meat-eating when habitats demand it and nutrients are scarce.
Original post:
How evolution turned ordinary plants into ravenous meat-eaters - Wired.co.uk
Posted in Evolution
Comments Off on How evolution turned ordinary plants into ravenous meat-eaters – Wired.co.uk







