The Prometheus League
Breaking News and Updates
- Abolition Of Work
- Ai
- Alt-right
- Alternative Medicine
- Antifa
- Artificial General Intelligence
- Artificial Intelligence
- Artificial Super Intelligence
- Ascension
- Astronomy
- Atheism
- Atheist
- Atlas Shrugged
- Automation
- Ayn Rand
- Bahamas
- Bankruptcy
- Basic Income Guarantee
- Big Tech
- Bitcoin
- Black Lives Matter
- Blackjack
- Boca Chica Texas
- Brexit
- Caribbean
- Casino
- Casino Affiliate
- Cbd Oil
- Censorship
- Cf
- Chess Engines
- Childfree
- Cloning
- Cloud Computing
- Conscious Evolution
- Corona Virus
- Cosmic Heaven
- Covid-19
- Cryonics
- Cryptocurrency
- Cyberpunk
- Darwinism
- Democrat
- Designer Babies
- DNA
- Donald Trump
- Eczema
- Elon Musk
- Entheogens
- Ethical Egoism
- Eugenic Concepts
- Eugenics
- Euthanasia
- Evolution
- Extropian
- Extropianism
- Extropy
- Fake News
- Federalism
- Federalist
- Fifth Amendment
- Fifth Amendment
- Financial Independence
- First Amendment
- Fiscal Freedom
- Food Supplements
- Fourth Amendment
- Fourth Amendment
- Free Speech
- Freedom
- Freedom of Speech
- Futurism
- Futurist
- Gambling
- Gene Medicine
- Genetic Engineering
- Genome
- Germ Warfare
- Golden Rule
- Government Oppression
- Hedonism
- High Seas
- History
- Hubble Telescope
- Human Genetic Engineering
- Human Genetics
- Human Immortality
- Human Longevity
- Illuminati
- Immortality
- Immortality Medicine
- Intentional Communities
- Jacinda Ardern
- Jitsi
- Jordan Peterson
- Las Vegas
- Liberal
- Libertarian
- Libertarianism
- Liberty
- Life Extension
- Macau
- Marie Byrd Land
- Mars
- Mars Colonization
- Mars Colony
- Memetics
- Micronations
- Mind Uploading
- Minerva Reefs
- Modern Satanism
- Moon Colonization
- Nanotech
- National Vanguard
- NATO
- Neo-eugenics
- Neurohacking
- Neurotechnology
- New Utopia
- New Zealand
- Nihilism
- Nootropics
- NSA
- Oceania
- Offshore
- Olympics
- Online Casino
- Online Gambling
- Pantheism
- Personal Empowerment
- Poker
- Political Correctness
- Politically Incorrect
- Polygamy
- Populism
- Post Human
- Post Humanism
- Posthuman
- Posthumanism
- Private Islands
- Progress
- Proud Boys
- Psoriasis
- Psychedelics
- Putin
- Quantum Computing
- Quantum Physics
- Rationalism
- Republican
- Resource Based Economy
- Robotics
- Rockall
- Ron Paul
- Roulette
- Russia
- Sealand
- Seasteading
- Second Amendment
- Second Amendment
- Seychelles
- Singularitarianism
- Singularity
- Socio-economic Collapse
- Space Exploration
- Space Station
- Space Travel
- Spacex
- Sports Betting
- Sportsbook
- Superintelligence
- Survivalism
- Talmud
- Technology
- Teilhard De Charden
- Terraforming Mars
- The Singularity
- Tms
- Tor Browser
- Trance
- Transhuman
- Transhuman News
- Transhumanism
- Transhumanist
- Transtopian
- Transtopianism
- Ukraine
- Uncategorized
- Vaping
- Victimless Crimes
- Virtual Reality
- Wage Slavery
- War On Drugs
- Waveland
- Ww3
- Yahoo
- Zeitgeist Movement
-
Prometheism
-
Forbidden Fruit
-
The Evolutionary Perspective
Monthly Archives: June 2022
Scientists at Vanderbilt University Medical Center and 23andMe Find Genetic Link to Peoples Ability to Move to a Musical Beat – Newswise
Posted: June 20, 2022 at 2:10 pm
Newswise Moving in time to musical rhythm is so automatic that people are often not conscious of the exquisite coordination that it demands of our brains, minds and bodies.
Tapping, clapping and dancing in synchrony with the beat the pulse of music is at the core of our human musicality, said Reyna Gordon, PhD, associate professor in the Department of Otolaryngology - Head and Neck Surgery and co-director of the Vanderbilt Music Cognition Lab.
Through a new study led by Vanderbilt Genetics Institute researchers in collaboration with 23andMe, a personal genomics and biotechnology company, Gordon and her colleagues have made a significant discovery about the biological underpinnings of musical rhythm.
The study, published in the journal Nature Human Behaviour, is the first large-scale genome-wide association study of a musical trait. Gordon and Lea Davis, PhD, associate professor of Medicine, both co-senior authors on the findings, along with Maria Niarchou, PhD, research instructor in the Department of Medicine and first author of the paper, co-led a team of international collaborators in novel groundwork toward understanding the biology underlying how musicality relates to other health traits.
This study identified 69 genetic variants associated with beat synchronization the ability to move in synchrony with the beat of music. Many of the variants are in or near genes involved in neural function and early brain development. Rhythm is not just influenced by a single gene it is influenced by many hundreds of genes, Gordon said.
In addition, the study found that beat synchronization shares some of the same genetic architecture involved in biological rhythms such as walking, breathing and circadian patterns.
These new results shed light on how biology contributes to something as culturally unique and intricate as musicality and highlights connections between rhythm and health. Importantly, the researchers noted that genetics only explain some of the variability in rhythm skills and that environment certainly also plays a large role. Studying the complexity of those possible genetic influences on musical traits is only now possible with very large numbers of people participating in this research.
In this case, the study used data from more than 600,000 research participants. From that data, the researchers were able to identify genetic alleles that vary in association with participants beat synchronization ability. 23andMes large research dataset with millions of individuals who consented to participate offered a unique opportunity for researchers to capture even small genetic signals, said David Hinds, PhD, a research fellow and statistical geneticist at 23andMe.
These new findings represent a leap forward for scientific understanding of the links between genomics and musicality.
Musical beat processing has intriguing links to other aspects of cognition including speech processing and plays a key role in the positive effect of music on certain neurological disorders, including on gait in Parkinson's disease, said Aniruddh D. Patel, professor of Psychology at Tufts University, an expert not involved in the study.
Using such a large dataset allows researchers to find new insights into the biology and evolutionary foundations of musicality. While recent years have seen a growth in neuroscientific and developmental work on beat processing, the current study takes the biological study of beat processing to a new level, Patel added.
This work was supported in part by an NIH Directors New Innovator award #DP2HD098859. Visit the FAQ of the study to learn more.
Posted in Human Genetics
Comments Off on Scientists at Vanderbilt University Medical Center and 23andMe Find Genetic Link to Peoples Ability to Move to a Musical Beat – Newswise
Entering The DeSci era: Human Verification In The Metaverse Wi… – PressReleaseNetwork.com
Posted: at 2:10 pm
Javier M. Floren, CEO & Co-founder ofDNAverse
As the metaverse concept continues to develop at pace, it is absolutely vital that human characteristics are embedded within. Our physical world has already evolved into a digital hybrid, with smartphones becoming digital extensions of ones self. We need the same process of hybridisation to take place within the metaverse. It is high time that scientific innovations are leveraged to enhance social interactions in the metaverse.
At this juncture, we are still in the early adopter/innovation phase. It has beenreportedthat throughout 2021, approximately28.6million wallets actively exchanged NFTs, representing a volume close to $25 billion. Platforms like Sandbox raising $93 million and Yuga Labs raising $450 million demonstrate the scale of interest in this burgeoning space, and point to long-term viability of Web3.0 and the metaverse.
The ongoing proliferation of Artificial Intelligence (AI) makes it increasingly difficult to identify who is on the other side of our interactions. The chatbots commonly deployed across a wide range of websites aim to make us believe that were talking to a real person. Weve all seen movies like The Matrix, I Robot or TV series like Black Mirror. They generally paint a negative picture of how humans and machines can co-exist. While bucketed under the catalogue of Science Fiction, if history tells us anything, Science Fiction can rapidly become Science Fact. If these visions come to fruition, how will we distinguish humans from machines when using avatars in a virtual world?
Science Fiction or Decentralized Science (DeSci)?
DNAVERSE is releasing a 3,200 NFT collection, the first one to be fully customized with real DNA. After a centralized drop, the process becomes decentralizedto initiate the BIOmetaverse as the goal is to let life replicate itself in all metaverses. Currently whitelisting for the Genesis drop, the process isopen and democratic and can be accessed by simply signing up with a form avalanche at DNAVERSE.io.
We are at a time in history where we can access technology that allows us to leave an indelible mark as human beings in digital ecosystems. We are already seeing NFT collections focused exclusively on the scientific field, DNA-based customization in the metaverse like DNAVERSE, genetic sequencing, decentralized health services and even the tokenization of blood samples.
When a real person cannot be distinguished from AI, being able to verify that you are a human using science and genetics will be paramount to future social interactions in the metaverse. Taking a small section of DNA and having scientists create a unique artistic representation of an individual as NFTs will be one of the ways to ensure human verification in this new paradimg. This practical application represents just one of the many possibilities that Web3 technology offers us. The benefits of introducing an individuals genetics into an NFT art piece also extend to personalizing digital assets with an individuals true essence, or transferring consciousness into web3.
Lets not confuse genetic verification with a form of KYC. The goal is not to create a biological database or fill out forms to show who we are or where we live, but to distinguish who is a real person and who has been programmed to interact with us.
The sustainability of the metaverse and future NFT projects hinges on demonstrable utility for individuals, who will constitute the community of participants. Sharing the benefits of each project in a sustainable way is essential so, for example, genetized NFTs can be used in human verification.
The key will be creating an ecosystem based on collaboration, ensuring the metaverse is open to all and offers us the opportunity to interact safely. Every technological advancement has the opportunity to be used by good and nefarious actors. Just consider how the emergence of social media keeps the world connected seamlessly, but can also be used to facilitate the rapid spread of fake news. Its impossible to make any new technology perfect, but by putting certain safeguards in place, and ensuring we have ways to identify ourselves and keep ourselves safe, humanity can be preserved in this new digital universe.
More:
Entering The DeSci era: Human Verification In The Metaverse Wi... - PressReleaseNetwork.com
Posted in Human Genetics
Comments Off on Entering The DeSci era: Human Verification In The Metaverse Wi… – PressReleaseNetwork.com
The robots and AI technologies advancing South African health care – MyBroadband
Posted: at 2:10 pm
South African researchers and surgeons are using artificial intelligence and robotics to enhance healthcare in the country, BBC News reports.
The improvements include a video-call robot that patients can use to speak to their families without needing to be present in the room and an app currently in development that can detect tuberculosis by listening to people cough.
The technologies are also improving surgical procedures at Tygerberg hospital in Cape Town by allowing surgeons to perform precise operations via the DaVinci robot.
The surgeon controls the robot from a console in the corner, surgeon and University of Stellenbosch lecturer Dr Tim Forgan told the BBC.
One can do really fine dissection and fine work under vision, so it really is a bit of a game-changer as far as the precision of surgery goes.
Forgan added that procedures conducted with the robot result in less blood loss and makes it possible for patients to get out of hospital sooner.
The DaVinci robot used at Tygerberg Hospital is one of two in the country.
Researchers from the University of Stellenbosch are also working on an app that can determine whether someone has tuberculosis by analysing their cough.
It uses an artificial intelligence-based, machine learning approach, where we have identified parts of the audio spectrum that are linked very strongly with the presence of tuberculosis, said Grant Theron, Stellenbosch Universitys principal investigator for the molecular biology and human genetics division.
We almost want to apply [artificial intelligence] to computing devices that are available everywhere. Most commonly, this is a cellphone.
The Tygerberg hospital also implemented the use of video-call robots in light of the Covid-19 pandemic.
The robots are controlled by hospital staff and patients can use them to communicate with loved ones without them needing to be in the room, or even at the hospital.
Read the original here:
The robots and AI technologies advancing South African health care - MyBroadband
Posted in Human Genetics
Comments Off on The robots and AI technologies advancing South African health care – MyBroadband
What has John MacArthur actually said about race, slavery and the Curse of Ham? – Baptist News Global
Posted: at 2:10 pm
This whole genealogical effort could lead to a new genre of bumper stickers, I think, like My forefathers were Philistines or like Goliath was in my family or I come from a long line of Hittite kings or heres a good one, My ancestors killed your ancestors.
In 2001, John MacArthur delivered that line to roaring laughter from his congregation. In a sermon dealing with slavery.
This and other cringe-worthy things MacArthur has preached about race and slavery came to the attention of social media users last week when Illinois pastor Sharon Autenriethtweeted, I have just read a long sermon in which John MacArthur promoted the Curse of Ham racial theory in 2001. He was in his early 60s at the time. Can we PLEASE stop talking about this guy like hes the assistant manager to the Trinity?
In the world of conservative evangelicalism, MacArthur is held in that kind of high esteem.
After he spent three years at the notoriously segregationistBob Jones Universityfrom 1957 to 1959, he returned to Los Angeles to follow in the footsteps of his father as a pastor. He completed an undergraduate degree at Los Angeles Pacific College and a master of divinity degree at what then was the brand-new Talbot Theological Seminary.
In 1969, at age 29, he became pastor ofGrace Community Church in Los Angeles, a post he has held ever since. He also leads The Masters UniversityandThe Masters Seminary,which boasts of having graduatedmore than 1,800 men.Hes the voice of the international radio ministryGrace to You, a bestselling author and editor of more than 150 books and was named byChristianity Today as one of the 25most influential pastorsof the past 50 years.
It is impossible to overstate the power MacArthur wields and the influence he has had on shaping the world of conservative evangelicalism today.
It is impossible to overstate the power MacArthur wields and the influence he has had on shaping the world of conservative evangelicalism today.
But while many conservative evangelicals look up to MacArthur for what they consider to be his boldness in preaching the Bible through the lens of conservative evangelical Reformed Baptist theology, Autenrieths tweet opened a larger conversation about this influential pastors views on race and slavery and the Bible.
Scott Coley, who serves on the philosophy faculty at Mount St. Marys University, retweetedAutenrieth andwent on to add: John MacArthur has been at the forefront of the anti-justice movement within white evangelicalism (which has spilled over into right wing politics at large). And here he is, using the Bible to craft a myth that legitimizes racial hierarchy. He and his colleagues deny that systemic racism is to blame for racial disparities in wealth, income and opportunity. So what explains such disparities? According to John MacArthur, its the curse of Canaan. Not incidentally, 10 out of 10 white supremacist theologians used *precisely* this logic to justify race-based, chattel slavery in the 19th century, as did segregationists in the 20th century. Whatever you do, stop listening to John MacArthur. He regularly manipulates Scripture to legitimize his own extra-biblical social agenda.
Sociologist Samuel Perry of the University of Oklahomatweeted, Wow. Just one of the most famous contemporary evangelical radio preachers and authors promoting the Curse of Ham like it was 1850.
In a series of sermons from Genesis preached during the summer of 2001, MacArthur laid out the case that many white supremacists have used throughout history to promote racism and defend slavery.
He began by sharing the story ofNoah getting nakedin his tent after the flood, discovering that his son Ham had seen him, and cursing Hams son Canaan to be a servant of servants to his brothers. MacArthur pointed out that Canaan would serve Shem, while Japheth would be enlarged.
MacArthur laid out the case that many white supremacists have used throughout history to promote racism and defend slavery.
He then moved into a discussion of Israels destruction of the Canaanites. And while many conservative evangelicals try to findother waysto describe the Canaanite conquest than to call it genocide, MacArthur is totally fine setting aside his own humanity and embracing it as genocide.
To any normal person, the thought of genocide, going in and massacring an entire population of people, was a frightening thing, he said. Natural human affections would cause some revulsion against such a command. It must have been a very, very severe challenge to their righteousness thinking to see themselves going into a land and committing genocide. Its massacring the Canaanites. Taking their land, taking their homes, and taking their lives.
The reason MacArthur gave to justify this genocide was that Canaan and his progeny was cursed. And so when Israel heard this read, they knew they had a cursed ancestry, and that they were acting on the basis of divine judgment which had already been determined, giving them historical justification for being the instrument of judgment on Canaan.
As Brock Bahler, a philosophy of religion professor at the University of Pittsburgh,points out, in the Middle Ages, a dominant map of the world in Europe was the T-O map that associated three known continents Africa, Europe & Asia w/ Noahs three sons. This doesnt become racialized until after [the] colonial era.
He claimed Shems descendants are Semites who became the Jews.
He claimed Shems descendants are Semites who became the Jews.
And what of the cursed descendants of Ham?MacArthur confidently proclaimed: If you study the territory of Ham, the territory of Canaan coming from Ham, it included Sodom and Gomorrah afterward, the families of the Canaanites were spread abroad. Wicked, wicked people. Corrupt and corrupting. Then the following week,MacArthur added, Ham settles the south: Africa and to Asia.
During a Q&A session from 2010, somebody asked MacArthur how we have so many races. And according to the text from the Grace to You website, MacArthur responded, It seems that Ham became a more servile people and may have moved south and wound up in Africa.
However, the audio version of MacArthurs response does not include that section. Either somebody from Grace to You added that section to the text of the page when MacArthur never said those words, or MacArthur did indeed say them and somebody edited those words out of the audio version. So it would seem that Grace to You either has something to add or hide regarding MacArthurs views about race.
Bahler goes on to describehow biblical literalists came up with all kinds of wild theories to get white supremacy to work w/ the Bible, with some claiming that Blackness was the curse of Cain, others calling it the curse of Ham, and others claiming skin color was determined by a divine act created at the Tower of Babel.
MacArthur decided to go with all of the above, while mixing in his own shot ofpseudoscience.
All human beings came from Adam through Noah, which means that all there is in the genetic code for all human races was in Adam and Eve, and all that there is of genetic coding that is in all the races that exist today was in the family of Noah, MacArthur assumed. That has all kinds of interesting implications because in the world you have so much diversity: you have very dark-skinned people, very light-skinned people. You have various features of certain kinds of people that are identifiable: Caucasoid, Negroid, Austrailoid, etcetera Mongoloid particular descriptions of physical features. And you have all these differences in skin color, and all these differences in facial look and body design. And the question is often asked, Where did this diversity come from? And the answer is the genetic code for all of that was in Adam and Eve. And the genetic code for all of the humanity in all of its diversity today was in the family of Noah. Everyone from pygmies and dwarves and aborigines to seven-foot-two Zulus and basketball players came from Noah and his wife. All physical features, all skin colors, all physical characteristics, all eye shapes, noses, eye colors, hair colors, etcetera all the necessary genetic coding was in Adam and Eve, and all of it was in those eight people.
And whatever the features were that God designed, in his sovereignty, in those genetic groups then became normalized in those groups. And so, various characteristics began to appear.
Unfortunately, MacArthur suggested, because humanity supposedly lived as one big family with no barriers to marriage, there was very little diversity in skin color. In order to get diversity in skin color, Youd have to pull people off and isolate them, and then they would begin to be dominated by the genetic features that are within that people group. The Tower of Babel did that. God separated the languages, scattered the people all over the planet, and they were isolated. And whatever the features were that God designed, in his sovereignty, in those genetic groups then became normalized in those groups. And so, various characteristics began to appear.
He added inanother Q&A session, Now, though, I believe the direct act of God, God distinguished between those people. At the Tower of Babel, God scattered all those nations, scattered all those people. And I believe in scattering them, he developed, by his own supernatural, providential will, distinctive characteristics of those people to identify them uniquely to their own areas and their own culture. In other words, God was trying to eliminate amalgamation and make them distinct. And I think there is some adaptation isnt there? Darker-skinned people living in areas where the sun was more severe. I dont think thats a process of evolution; I think that was a supernatural act on Gods part. So, the answer to your question is God made the races the way they are, and God put them in certain places of the world and adapted them to that in a distinction.
In an odd statementthat seemed to reflect Bob Jones Universitys historical ban on interracial marriage, MacArthur said the Assyrians became racially mixed, even though elsewhere he denied opposing interracial marriage.
MacArthur tried to say that because we all descended from Noah, we really are one family. There shouldnt be any racism. But the way he separated African descendants as cursed by God to serve European descendants might suggest otherwise.
In addition to his dehumanizing pseudoscience, MacArthur has also given rather offensive descriptions of people. Hespoke ofpygmies in Africa and primitive people that have painted their faces with some kind of plant these people that run around stabbing pigs in the jungle naked.
And lest were unclear about what MacArthur thinks about nakedness, he proclaims, Nakedness leads to wickedness. Nakedness leads to vice, every imaginable and unimaginable kind. Nudists, primitive people, exhibitionists, pornographers they all advocate nakedness as if it was a virtue.
It would be one thing if MacArthur simply interpreted the Bible as a slavery promoting document from two to three millennia ago. But he wants to use that interpretation to defend slavery today.
In 2001, MacArthur declared: The curse falls on Canaan. And the curse is that he would be a servant of servants, and he would wind up enslaved under the dominant rulership of others. And here we find that in Gods purposes, children of Ham through Canaan would be servants to the descendants of Japheth and Shem. He added that their descendants are doomed to perpetual slavery because they followed the moral turpitude of their ancestors, Ham and Canaan.
Here we find that in Gods purposes, children of Ham through Canaan would be servants to the descendants of Japheth and Shem.
In a 2012 YouTube video, MacArthur showed his true colors, stating: It is a little strange that we have such an aversion to slavery because historically there have been abuses. There have been abuses in marriage. We dont have an aversion to marriage particularly because there have been abuses. There are parents who abuse their children. We dont have an aversion to having children because some parents have been abusive. To throw out slavery as a concept simply because there have been abuses, I think, is to miss the point . There can also be benefits. For many people, poor people, perhaps people who werent educated, perhaps people who had no other opportunity, working for a gentle, caring, loving master was the best of all possible worlds. So we have to go back and take a more honest look at slavery and understand that God has, in a sense, legitimized it when its handled correctly. Slavery is not objectionable if you have the right master. Its the perfect scenario.
In one sermon, MacArthur described the descendants of Japheth whom he identified as Europeans as being in a peaceful partnership with Shem. Is it any wonder then why MacArthur would happen to promote dispensational theologies of the end times as well as popular Republican policies regarding Israel?
When President Donald Trump moved the U.S. embassy from Tel Aviv to Jerusalem in 2017,he declared at a rally, And we moved the capital of Israel to Jerusalem. Thats for the evangelicals. You know, its amazing with that the evangelicals are more excited by that than Jewish people.
In a Q&A about dispensationalism, MacArthur joked, People used to say of me that his hope is built on nothing less than Scofields notes and Moody Press. He went onto explain, Theres a difference between the church and Israel. Period. That demands a kingdom. And that makes you pre-millennial. The promises of a kingdom to Israel have to come to pass. And thats why you have to have a kingdom.
In other words, MacArthurs theology that white people are descendants of Japheth who are in a peaceful partnership with Israel as the descendants of Shem, combined with his theology that Israel must have a literal kingdom has led him to use the full force of his own media kingdom to promote political policies among evangelicals that would affect the decisions of President Trump.
Japheth is enlarged, as a peaceful partnership with Shem, and is served by Canaan whos a descendant of Ham.
And where are the descendants of Ham whom MacArthur identifies as Africans in all of this? According to MacArthur, Japheth is enlarged, as a peaceful partnership with Shem, and is served by Canaan whos a descendant of Ham.
For MacArthur, slavery appears to be more than simply a secondary issue Christians can disagree about. He believes slavery is central. In fact, he believes slavery is the gospel. So for MacArthur to reject slavery would be to reject the gospel.
InThe Gospel According to Jesus, MacArthur said, The gospel is an invitation to slavery.
He added inanother article, The Bible is abundantly clear slavery is the heart of what it means to be a true Christian. Slavery to Christ is not a minor or secondary feature of true discipleship. It is exactly how Jesus himself defined the personal relationship he must have with every true follower. In fact, the fundamental aspects of slavery are the very features of redemption. We are chosen, bought, owned, subject to his will and control, called to account, evaluated, and either chastened or rewarded by him. Those are all essential components of slavery.
Since Jesus said he came to set the oppressed free, one might assume MacArthur would desire to see slaves set free.
But instead,MacArthur says: Christianity does not free slaves. Christianity does not give equal social rights. Jesus did not propound equal rights and he did not upset the social order. Neither did Peter, neither did Paul, neither did John, neither did any New Testament writer.Rather, they all affirmed that with great fear of God and great respect you are to be submissive to your masters, whether theyre good and gentle or whether they are unreasonable. You are to submit.
Jesus did not propound equal rights and he did not upset the social order. Neither did Peter, neither did Paul, neither did John, neither did any New Testament writer.
InThe MacArthur New Testament Commentary, he continued: Although slavery was carefully regulated under Mosaic law, neither the Old nor New Testaments condemns slavery as such. Social strata are recognized and even designed by God for mans good. Some people will be served, and some will serve others. New Testament teaching does not focus on reforming and restructuring human systems.
And for those who might wish to reform such systems, MacArthur objects: Nowhere in Scripture is rebellion or revolution justified in order to gain freedom, opportunity or economic, social or political rights. The emphasis is rather on the responsibility of slaves to serve their human masters faithfully and fully.
Human rights seem to mean nothing to MacArthur.He says there is no place for asserting our rights. Its not our concern to have rights in this world. It is our concern to be obedient and submissive in this world. If youre a slave when youre saved, stay a slave. The system stands.
Of course, MacArthur admits slave masters can be abusive. But to those who suffer under physical abuse and starvation,he advises: Now heres a guy in the workplace and hes a slave.And in the Roman world he might be getting whipped unjustly.He might be getting deprived of his food unjustly.He might be working long hours beyond what is reasonable unjustly. He might be punished in a number of ways unjustly.But if for the sake of his consciousness of God he endures all of those sorrows, God is thankful.Did you get that?What pleases God?When you protest?When you strike?When you picket?When you walk out?No, what pleases God, what finds favor with him is when you bear up under the sorrows that come when you suffer unjustly.That pleases God.
What pleases God, what finds favor with him is when you bear up under the sorrows that come when you suffer unjustly.
Given the amount of sheer absurdities that pour from MacArthurs mouth, one might wonder if hes simply ignorant of history, genetics and edifying language. But MacArthur isnt ignorant. He knows full well what hes doing. He brags about studying anthropologists, linguists and scientists.
John MacArthur is pastorally careless. He is a pastor with decades of experience. He should have the pastoral wisdom to know you dont say the things hes said about race and slavery in a country thats given itself over so much to racism and slavery.
John MacArthur is a racist. His entire framing of world history and the gospel itself as Gods slavery design where Africans are to serve Europeans in perpetuity, while the Europeans are enlarged and in partnership with Israel, is a sacralization of racism and white supremacy.
John MacArthur is a dangerous man. Heclaims, The facts that are here are potent and greatly informative to those of us who want to understand the world the way God views it. To MacArthur, the curse of Ham wasnt merely part of a dispensation in the past or the way God used to work, but a revelation into how God presently views the world.
Notice his use of the word potent.
Thats what all of this is about. Its not about unleashing Gods truth one verse at a time. Its aboutMacArthurs power.
When MacArthur told Beth Moore to go home, he said of women who want to be pastors, They want power, not equality. This is the highest location they can ascend to that power in the evangelical church.
In that quote, MacArthur revealed his own cards. He identified how he sees his role as a pastor. To him, the office of being an evangelical pastor is an ascension to power. In MacArthurs world, he is the master to whom others must submit.
The reason MacArthur so easily sets aside the humanity of others is that he is disconnected from his own humanity. And his disconnection from self poses a very real threat to all of us through every power wielder his empire sends out.
John MacArthur has built an entire theology that glorifies slavery and defends genocide against a people group he claims must serve Europeans and Israel in perpetuity. His dispensationalist theology brings his views of slavery in the Bible through today all the way to the end of the world. And he has showed during the COVID crisis that he believes he is above the law. Its time his charade of a ministry be exposed and shut down. Its time for MacArthur to go home.
Rick Pidcockis a 2004 graduate of Bob Jones University, with a bachelor of arts degree in Bible. Hes a freelance writer based in South Carolina and a former Clemons Fellow with BNG. He recently completed a master of arts degree in worship from Northern Seminary. He is a stay-at-home father of five children and produces music under the artist name Provoke Wonder. Follow his blog atwww.rickpidcock.com.
Related articles:
The curse of Ham: Black Baptists question their place in the SBC | Opinion by Alan Bean
Are Black people cursed? | Opinion by Charles Holley
How John MacArthur loves the Bible but not his neighbor | Analysis by Rick Pidcock
Neither democracy nor religious freedom are biblical concepts, John MacArthur declares
John MacArthur rallies pastors to preach against government bans on conversion therapy Jan. 16
Continue reading here:
What has John MacArthur actually said about race, slavery and the Curse of Ham? - Baptist News Global
Posted in Human Genetics
Comments Off on What has John MacArthur actually said about race, slavery and the Curse of Ham? – Baptist News Global
Gen Z version of Lawrence Wong spotted, netizens joke he’s a long-lost son – The Independent
Posted: at 2:10 pm
- Advertisement -
First, it was a doppelgnger of the late Lee Kuan Yew; now, a Gen Z lookalike of Deputy Prime Minister and Finance Minister Lawrence Wong has gone viral on social media.
A Singaporean TikTok user named Cyrus easily morphs into a photo of Mr Wong because of their striking resemblance.
It has been about two months since the teenager has been morphing (a TikTok shapeshift effect that transforms a persons face into their alleged celebrity or prominent person lookalike) into Mr Wong, in hopes of the minister finally noticing him.
Photo: TikTok screengrab/teocyrus
Needless to say, the bespectacled teen does look like Mr Wong; hence he has been dubbed the Lawrence Wong Gen Z version.
In one of Cyrus latest videos, netizens began poking fun that he was the long-lost son of Mr Wong.
@lawrencewongst brois this your son? asked TikTok user @junee.
Many also took the time to make requests, such as can reduce GST (Goods and Services Tax) and petrol price or sir, can increase budget for 2022?
So how much does Cyrus look like Mr Wong? Here are a few comparisons.
Photo: TikTok screengrab/teocyrus
Photo: TikTok screengrab/teocyrus
It appears that Mr Wong might have caught wind of Cyrus efforts because he uploaded a video on TikTok revealing how he looked like while he was in Secondary 4.
I understand some on TikTok have done #morphing videos of me. So heres one from my social media team, said Mr Wong.
Photo: TikTok screengrab/lawrencewongst
According to an article by Sunway, the chances of someone looking exactly like someone theyre not related to is about one in one trillion.
Theres definitely a mathematical chance for two doppelgngers to exist, but its highly unlikely, said University of Adelaide biologist Teghan Lucas who conducted a study on the doppelgnger occurrence.
The human face is extraordinarily unique. I mean think about it. The chance has to be quite low otherwise, you would be bumping into people who looked like you all the time, and you dont, added Sir Walter Bodmer, a professor of human genetics from the University of Oxford./TISG
Reply to @theresalwaysabeeliverinu Started as a joke but I dont think its a joke anymore #fy #fyp #shapeshift
dis it is
Lee Kuan Yew lookalike seen at coffeeshop, netizens say, Hes back!
Follow us on Social Media
Send in your scoops to news@theindependent.sg
- Advertisement -
Read the original:
Gen Z version of Lawrence Wong spotted, netizens joke he's a long-lost son - The Independent
Posted in Human Genetics
Comments Off on Gen Z version of Lawrence Wong spotted, netizens joke he’s a long-lost son – The Independent
Why havent we cured cancer? – Cancer Research UK News
Posted: at 2:10 pm
Despite big improvements in survival, cancer is still one of the worlds biggest killers. Leading Cancer Research UK-funded scientists explain why it presents such a challenge and look at how far weve come
Written by Natalie Grover for Guardian Labs
Part of a pancreatic tumour seen down a microscope, with tumour cells labelled in green, and different types of immune cell in pink, yellow, red, and turquoise. Image credit: Silvia Cusumano, Assya Legrini, Leah Officer-Jones, Dr Nigel Jamison and Prof John La Quesne
Recent decades have yielded extraordinary progress in cancer survival, but many cancers remain deadly, with half of people diagnosed dying within 10 years. So why hasnt science found a way to cure more people yet?
A major challenge is that scientists arent in fact targeting a single disease but a constellation of hundreds of diseases that are lumped together under the umbrella classification of cancer. This came about because all cancers start in the same way, with mutations in genes that control cell function.
Such mutations can fuel the unfettered replication of a single cell. If conditions are right, the cell grows and divides, escalating to millions of cells that may clump together to form a tumour in which no two tumour cells are identical in a single tumour.
I might have been pessimistic that we would ever be able to control these rapidly multiplying clumps of cells, says Prof Sir Mike Stratton, director of the Wellcome Sanger Institute and a genetics expert.
But time and again, the achievements of cancer research have mitigated that pessimism and converted it to optimism. It isnt that one drug will wipe the whole lot [of cancers] off the map, but bit by bit we are eroding the mortality rates of many cancers.
Stratton, leader of the Cancer Grand Challenges Mutographs team, which is working on a 20m project to look for unknown causes of cancer, adds: Were learning that research finding out what is actually going on in cancer cells is the route to new strategies for undermining the ability of cancer cells to behave in the way that they do.
While cancers may start in the same way, decades of research have shown that they evolve into very different diseases requiring a panoply of treatments. So far, scientists have classified more than 200 types of cancer, and found a myriad of genetic mutations underlying them.
Out of around 20,000 genes in the human genome, between 500 and 1,000 have been identified as contributing, when mutated, to a cell becoming cancerous. There is, however, a set of cancers for which the genes are still unclear, says Stratton, who is credited with identifying the breast cancer susceptibility gene BRCA2 among others.
Its tempting to think that the way forward is to target all the genes known to be implicated in cancer by launching 500-plus drug development programmes.
But not only is this a huge task, its by no means certain that the drugs developed would be the answer to curing the different cancers. This is because tumours develop considerable genetic diversity as they evolve, and often become resistant to treatments as more mutations occur in cells.
Targeted therapies have been approved for a range of cancers including breast, liver and lung cancers, and are helping more people to live longer. For now, though, the search for more precision treatments goes on. There is a set of cancer genes that are switched off by their own mutations, Stratton says. So how do we use those genes in order to develop new therapies?
Cancer cells growing in 2D, labelled with fluorescent markers showing the cells nuclei in blue, their cytoplasm in red, and areas of DNA damage in green. Image credit: Getty Image
Drug resistance is one of the biggest challenges in cancer thats why its so important to diagnose cancers early when treatment is more likely to be successful, says our chief clinician Prof Charles Swanton, group leader at the Francis Crick Institute, co-director of the charitys Lung Cancer Centre of Excellence and a consultant at University College London Hospitals (UCLH).
Early diagnosis isnt always possible, for a range of reasons. For example, there are very few techniques that can detect small, early tumours, and some cancers simply dont trigger symptoms early enough until they have already spread (or metastasised) and it is at this stage that the oncologists toolkit of drugs often falls short.
Each cancer has a different suite of signals which its responding to
Robert Insall, professor of mathematical and computational biology
To help uncover the tricks that tumours deploy to evolve, spread and develop drug resistance, we are supporting the TRACERx clinical study for which Swanton is chief investigator. By following the progress of hundreds of patients with the most common form of lung cancer from the point of diagnosis onwards, the study views cancer through an evolutionary lens, and uses a vast array of cutting-edge techniques to monitor participants disease.
According to Swanton, the lessons already learned from tracking these patients are applicable to many types of cancer. For instance, the study has shown that tumours with a high level of genetic diversity have the worst clinical outcomes, and that tumours use an assortment of ploys to elude the immune system, including losing the flags on their cell surface that enable them to be recognised as problematic.
Overall, says Swanton, the major barriers to successfully treating metastatic cancer are the genetic diversity within tumours, the evolutionary fitness of cancer cells that allows them to adapt, and of increasing focus the ways tumours modify their local microenvironment to support their survival.
The tumour microenvironment is composed of non-malignant cells that have been hijacked by cancer cells to support and nourish the tumour. This allows the cancer to smother the bodys immune defence.
Prof Fran Balkwill
Typically, half of the cells that make up a tumour are non-cancerous, and include fibroblasts (for structural support), fat cells and endothelial cells (which can form blood vessels that deliver oxygen and nutrients, and eliminate waste), says Prof Fran Balkwill, whose work at the Barts Cancer Institute in London centres on the links between cancer and inflammation.
Better understanding of this microenvironment and potentially reprogramming it could restrict nourishment of this cancerous rogue organ and reawaken the bodys immune cells to recognise and destroy it.
Already this ecosystem of hijacked normal cells within tumours is being targeted by cancer treatments, whether immunotherapy or chemotherapy, says Balkwill, noting that it is likely that treatments in the future will be combinations of drugs that target malignant cells and this microenvironment.
What makes cancer ultimately so dangerous, however, is the suite of signals that induce it to move beyond its primary site into the blood, lymphatic system or other tissues.
Robert Insall, professor of mathematical and computational biology.
Typically, chemical signals steer a cancer cell to move in a particular direction, but in many cases we dont know what they are, says Robert Insall, professor of mathematical and computational cell biology at the our Beatson Institute in Glasgow. So, if youre looking at this theme of why isnt cancer cured yet, its because each cancer has a different suite of signals which its responding to.
In the case of melanoma, a serious form of skin cancer, Insalls research suggests that the cancer cells themselves make their own spreading signals, creating the local instructions that direct them to spread.
Other kinds of skin cancer are not nearly as scary because they either dont, or rarely, spread. And one of the reasons is that they are not primed to drive themselves outwards in the same way, he says. My suspicion is that the most metastatic, the most deadly, cancers have this same property [as melanoma].
Reprogramming a tumours microenvironment could reawaken the bodys immune cells to destroy it
Professor Fran Balkwill
Insights such as Insalls continue to inform research into the biology of cancer, building on the decades of endeavour that have gone before. This burgeoning knowledge has transformed the way doctors diagnose and treat cancers in the UK, for instance, survival rates have doubled in the past 40 years for all cancers combined. On this journey to cure patients with cancer, says Swanton, I think were about half way there.
Part of an ovarian tumour viewed down a microscope, with cancer cells in blue and immune cells in brown Barts Cancer Institute
The second half of this odyssey demands further research. Research that will not just benefit the cancer patients of tomorrow, but is keeping hope alive for people affected by cancer now who may have limited or no treatment options if their cancer progresses.
Eileen Rapley, a participant in the TRACERx study who is being treated at UCLH, and who has also been receiving an immunotherapy drug that has so far kept her cancer at bay, says: When youre diagnosed with cancer and youre suddenly very dependent on other people, being able to contribute something makes it a little more palatable. You feel that at least this cancer is having a positive effect rather than a negative one.
But funding for this type of lifesaving research has come under considerable strain, in large part due to the pandemic, with CRUK needing to reduce its planned spending for 2022-23 from 400m to 300m.
Maintaining investment in cancer research and getting back to where we were in 2017, 2018 and 2019 is going to be absolutely crucial, says Swanton.
We are now getting to the point of being able to personalise medicines given to patients upon the genetic basis of their disease, he says. But we need new medicines to circumvent and overcome drug resistance in cancers that have spread, and new approaches to detect small, early stage tumours, and treat them before they become malignant thats where some of the major advances are going to come from over the next five decades.
This article was originally published on theguardian.com as part of the Cancer Research UK and Guardian Labs Cancer revolutionaries campaign.
To dig deeper into why we havent cured cancer, we heard from Dr Alanna Skuse, Dr Mariam Jamal-Hanjani and Sir Leszek Borysiewicz in the latest episode of our podcast That Cancer Conversation.
From Egyptian mummies and medieval wolves, to precision medicine and microscopic evolution, we take a look at the past to find out why curing cancer is more complex than we think, and what is needed next to get us closer to a future without cancer.
Read the original post:
Why havent we cured cancer? - Cancer Research UK News
Posted in Human Genetics
Comments Off on Why havent we cured cancer? – Cancer Research UK News
National Security Memorandum on Promoting United States Leadership in …
Posted: at 2:09 pm
NATIONAL SECURITY MEMORANDUM/NSM-10
MEMORANDUM FOR THE VICE PRESIDENT
THE SECRETARY OF STATE
THE SECRETARY OF THE TREASURY
THE SECRETARY OF DEFENSE
THE ATTORNEY GENERAL
THE SECRETARY OF COMMERCE
THE SECRETARY OF ENERGY
THE SECRETARY OF HOMELAND SECURITY
THE ASSISTANT TO THE PRESIDENT AND CHIEF OF STAFF
THE DIRECTOR OF THE OFFICE OF MANAGEMENT BUDGET
THE DIRECTOR OF NATIONAL INTELLIGENCE
THE DIRECTOR OF THE CENTRAL INTELLIGENCE AGENCY
THE ASSISTANT TO THE PRESIDENT FOR NATIONAL
SECURITY AFFAIRS
THE COUNSEL TO THE PRESIDENT
THE ASSISTANT TO THE PRESIDENT FOR ECONOMIC
POLICY AND DIRECTOR OF THE NATIONAL ECONOMIC
COUNCIL
THE DIRECTOR OF THE OFFICE OF SCIENCE AND
TECHNOLOGY POLICY
THE NATIONAL CYBER DIRECTOR
THE CHAIRMAN OF THE JOINT CHIEFS OF STAFF
THE DIRECTOR OF THE FEDERAL BUREAU OF
INVESTIGATION
THE DIRECTOR OF THE NATIONAL SECURITY AGENCY
THE DIRECTOR OF THE NATIONAL INSTITUTE OF
STANDARDS AND TECHNOLOGY
THE DIRECTOR OF THE CYBERSECURITY AND
INFRASTRUCTURE SECURITY AGENCY
SUBJECT: Promoting United States Leadership in Quantum
Computing While Mitigating Risks to Vulnerable
Cryptographic Systems
This memorandum outlines my Administrations policies and initiatives related to quantum computing. It identifies key steps needed to maintain the Nations competitive advantage in quantum information science (QIS), while mitigating the risks of quantum computers to the Nations cyber, economic, and national security. It directs specific actions for agencies to take as the United States begins the multi-year process of migrating vulnerable computer systems to quantum-resistant cryptography. A classified annex to this memorandum addresses sensitive national security issues.
Section 1. Policy. (a) Quantum computers hold the potential to drive innovations across the American economy, from fields as diverse as materials science and pharmaceuticals to finance and energy. While the full range of applications of quantum computers is still unknown, it is nevertheless clear that Americas continued technological and scientific leadership will depend, at least in part, on the Nations ability to maintain a competitive advantage in quantum computing and QIS.
(b) Yet alongside its potential benefits, quantum computing also poses significant risks to the economic and national security of the United States. Most notably, a quantum computer of sufficient size and sophistication also known as a cryptanalytically relevant quantum computer (CRQC) will be capable of breaking much of the public-key cryptography used on digital systems across the United States and around the world. When it becomes available, a CRQC could jeopardize civilian and military communications, undermine supervisory and control systems for critical infrastructure, and defeat security protocols for most Internet-based financial transactions.
(c) In order to balance the competing opportunities and risks of quantum computers, it is the policy of my Administration: (1) to maintain United States leadership in QIS, through continued investment, partnerships, and a balanced approach to technology promotion and protection; and (2) to mitigate the threat of CRQCs through a timely and equitable transition of the Nations cryptographic systems to interoperable quantumresistant cryptography.
(d) Additional guidance and directives may be required in the future as quantum computing technologies and their associated risks mature.
Sec. 2. Promoting United States Leadership. (a) The United States must pursue a whole-of-government and wholeofsociety strategy to harness the economic and scientific benefits of QIS, and the security enhancements provided by quantum-resistant cryptography. This strategy will require a coordinated, proactive approach to QIS research and development (R&D), an expansion of education and workforce programs, and a focus on developing and strengthening partnerships with industry, academic institutions, allies, and like-minded nations.
(b) The United States must seek to encourage transformative and fundamental scientific discoveries through investments in core QIS research programs. Investments should target the discovery of new quantum applications, new approaches to quantum-component manufacturing, and advances in quantumenabling technologies, such as photonics, nanofabrication, and cryogenic and semiconductor systems.
(c) The United States must seek to foster the next generation of scientists and engineers with quantum-relevant skill sets, including those relevant to quantum-resistant cryptography. Education in QIS and related cybersecurity principles should be incorporated into academic curricula at all levels of schooling to support the growth of a diverse domestic workforce. Furthermore, it is vital that we attract and retain talent and encourage career opportunities that keep quantum experts employed domestically.
(d) To promote the development of quantum technology and the effective deployment of quantum-resistant cryptography, theUnited States must establish partnerships with industry; academia; and State, local, Tribal, and territorial (SLTT) governments. These partnerships should advance joint R&D initiatives and streamline mechanisms for technology transfer between industry and government.
(e) The United States must promote professional and academic collaborations with overseas allies and partners. This international engagement is essential for identifying and following global QIS trends and for harmonizing quantum security and protection programs.
(f) In support of these goals, within 90 days of the date of this memorandum, agencies that fund research in, develop, or acquire quantum computers shall coordinate with the Director of the Office of Science and Technology Policy to ensure a coherent national strategy for QIS promotion and technology protection, including for workforce issues. To facilitate this coordination, all such agencies shall identify a liaison to the National Quantum Coordination Office to share information and best practices, consistent with section 102(b)(3) of the National Quantum Initiative Act (Public Law 115-368) and section 6606 of the National Defense Authorization Act for Fiscal Year 2022 (Public Law 117-81). All coordination efforts shall be undertaken with appropriate protections for sensitive and classified information and intelligence sources and methods.
Sec. 3. Mitigating the Risks to Encryption. (a) Any digital system that uses existing public standards for publickey cryptography, or that is planning to transition to such cryptography, could be vulnerable to an attack by a CRQC. To mitigate this risk, the United States must prioritize the timely and equitable transition of cryptographic systems to quantum-resistant cryptography, with the goal of mitigating as much of the quantum risk as is feasible by 2035. Currently, the Director of the National Institute of Standards and Technology (NIST) and the Director of the National Security Agency (NSA), in their capacity as the National Manager for National Security Systems (National Manager), are each developing technical standards for quantumresistant cryptography for their respective jurisdictions. The first sets of these standards are expected to be released publicly by 2024.
(b) Central to this migration effort will be an emphasis on cryptographic agility, both to reduce the time required to transition and to allow for seamless updates for future cryptographic standards. This effort is an imperative across all sectors of the United States economy, from government to critical infrastructure, commercial services to cloud providers, and everywhere else that vulnerable public-key cryptography is used.
(c) Consistent with these goals:
(i) Within 90 days of the date of this memorandum, the Secretary of Commerce, through the Director of NIST, shall initiate an open working group with industry, including critical infrastructure owners and operators, and other stakeholders, as determined by the Director of NIST, to further advance adoption of quantum-resistant cryptography. This working group shall identify needed tools and data sets, and other considerations to inform the development by NIST of guidance and best practices to assist with quantumresistant cryptography planning and prioritization. Findings of this working group shall be provided, on an ongoing basis, to the Director of the Office of Management and Budget (OMB), the Assistant to the President for National Security Affairs (APNSA), and the National Cyber Director to incorporate into planning efforts.
(ii) Within 90 days of the date of this memorandum, the Secretary of Commerce, through the Director of NIST, shall establish a Migration to Post-Quantum Cryptography Project at the National Cybersecurity Center of Excellence to work with the private sector to address cybersecurity challenges posed by the transition to quantum-resistant cryptography. This project shall develop programs for discovery and remediation of any system that does not use quantum-resistant cryptography or that remains dependent on vulnerable systems.
(iii) Within 180 days of the date of this memorandum, and annually thereafter, the Secretary of Homeland Security, through the Director of the Cybersecurity and Infrastructure Security Agency (CISA), and in coordination with Sector Risk Management Agencies, shall engage with critical infrastructure and SLTT partners regarding the risks posed by quantum computers, and shall provide an annual report to the Director of OMB, the APNSA, and the National Cyber Director that includes recommendations for accelerating those entities migration to quantum-resistant cryptography.
(iv) Within 180 days of the date of this memorandum, and on an ongoing basis, the Director of OMB, in consultation with the Director of CISA, the Director of NIST, the National Cyber Director, and the Director of NSA, shall establish requirements for inventorying all currently deployed cryptographic systems, excluding National Security Systems (NSS). These requirements shall include a list of key information technology (IT) assets to prioritize, interim benchmarks, and a common (and preferably automated) assessment process for evaluating progress on quantum-resistant cryptographic migration in IT systems.
(v) Within 1 year of the date of this memorandum, and on an annual basis thereafter, the heads of all Federal Civilian Executive Branch (FCEB) Agencies shall deliver to the Director of CISA and the National Cyber Director an inventory of their IT systems that remain vulnerable to CRQCs, with a particular focus on High Value Assets and High Impact Systems. Inventories should include current cryptographic methods used on IT systems, including system administrator protocols, non-security software and firmware that require upgraded digital signatures, and information on other key assets.
(vi) By October 18, 2023, and on an annual basis thereafter, the National Cyber Director shall, based on the inventories described in subsection 3(c)(v) of this memorandum and in coordination with the Director of CISA and the Director of NIST, deliver a status report to the APNSA and the Director of OMB on progress made by FCEB Agencies on their migration of non-NSS IT systems to quantum-resistant cryptography. This status report shall include an assessment of the funding necessary to secure vulnerable IT systems from the threat posed by adversarial access to quantum computers, a description and analysis of ongoing coordination efforts, and a strategy and timeline for meeting proposed milestones.
(vii) Within 90 days of the release of the first set of NIST standards for quantum-resistant cryptography referenced in subsection 3(a) of this memorandum, andon an annual basis thereafter, as needed, the Secretary of Commerce, through the Director of NIST, shall release a proposed timeline for the deprecation of quantum-vulnerable cryptography in standards, with the goal of moving the maximum number of systems off quantum-vulnerable cryptography within a decade of the publication of the initial set of standards. The Director of NIST shall work with the appropriate technical standards bodies to encourage interoperability of commercial cryptographic approaches.
(viii) Within 1 year of the release of the first set of NIST standards for quantum-resistant cryptography referenced in subsection 3(a) of this memorandum, the Director of OMB, in coordination with the Director of CISA and the Director of NIST, shall issue a policy memorandum requiring FCEB Agencies to develop a plan to upgrade their non-NSS IT systems to quantum-resistant cryptography. These plans shall be expeditiously developed and be designed to address the most significant risks first. The Director of OMB shall work with the head of each FCEB Agency to estimate the costs to upgrade vulnerable systems beyond already planned expenditures, ensure that each plan is coordinated and shared among relevant agencies to assess interoperability between solutions, and coordinate with the National Cyber Director to ensure plans are updated accordingly.
(ix) Until the release of the first set of NIST standards for quantum-resistant cryptography referenced in subsection 3(a) of this memorandum, the heads of FCEB Agencies shall not procure any commercial quantum-resistant cryptographic solutions for use in IT systems supporting enterprise and mission operations. However, to assist with anticipating potential compatibility issues, the heads of such FCEB Agencies should conduct tests of commercial solutions that have implemented pre-standardized quantum-resistant cryptographic algorithms. These tests will help identify interoperability or performance issues that may occur in Federal environments at an early stage and will contribute to the mitigation of those issues. The heads of such FCEB Agencies should continue to implement and, where needed, upgrade existing cryptographic implementations, but should transition to quantum-resistant cryptography only once the first set of NIST standards for quantum-resistant cryptography is complete and implemented in commercial products. Conformance with international standards should be encouraged, and may be required for interoperability.
(x) Within 1 year of the date of this memorandum, and annually thereafter, the Director of NSA, serving in its capacity as the National Manager, in consultation with the Secretary of Defense and the Director of National Intelligence, shall provide guidance on quantum-resistant cryptography migration, implementation, and oversight for NSS. This guidance shall be consistent with National Security Memorandum/NSM-8 (Improving the Cybersecurity of National Security, Department of Defense, and Intelligence Community Systems). The National Manager shall share best practices and lessons learned with the Director of OMB and the National Cyber Director, as appropriate.
(xi) Within 1 year of the date of this memorandum, and on an ongoing basis, and consistent with section 1 of NSM-8, the heads of agencies operating NSS shall identify and document all instances where quantum-vulnerable cryptography is used by NSS and shall provide this information to the National Manager.
(xii) Within 180 days of issuance by the National Manager of its standards on quantum-resistant cryptography referenced in section 3(a) of this memorandum, and annually thereafter, the National Manager shall release an official timeline for the deprecation of vulnerable cryptography in NSS, until the migration to quantum-resistant cryptography is completed.
(xiii) Within 1 year of issuance by the National Manager of its standards on quantum-resistant cryptography for referenced in subsection 3(a) of this memorandum, and annually thereafter, the heads of agencies operating or maintaining NSS shall submit to the National Manager, and, as appropriate, the Department of Defense Chief Information Officer or the Intelligence Community Chief Information Officer, depending on their respective jurisdictions, an initial plan to transition to quantumresistant cryptography in all NSS. These plans shall be updated annually and shall include relevant milestones, schedules, authorities, impediments, funding requirements, and exceptions authorized by the head of the agency in accordance with section 3 of NSM-8 and guidance from the National Manager.
(xiv) By December 31, 2023, agencies maintaining NSS shall implement symmetric-key protections (e.g., High Assurance Internet Protocol Encryptor (HAIPE) exclusion keys or VPN symmetric key solutions) to provide additional protection for quantum-vulnerable key exchanges, where appropriate and in consultation with the National Manager. Implementation should seek to avoid interference with interoperability or other cryptographic modernization efforts.
(xv) By December 31, 2023, the Secretary of Defense shall deliver to the APNSA and the Director of OMB an assessment of the risks of quantum computing to the defense industrial base and to defense supply chains, along with a plan to engage with key commercial entities to upgrade their IT systems to achieve quantum resistance.
Sec. 4. Protecting United States Technology. (a) In addition to promoting quantum leadership and mitigating the risks of CRQCs, the United States Government must work to safeguard relevant quantum R&D and intellectual property (IP) and to protect relevant enabling technologies and materials. Protection mechanisms will vary, but may include counterintelligence measures, well-targeted export controls, and campaigns to educate industry and academia on the threat of cybercrime and IP theft.
(b) All agencies responsible for either promoting or protecting QIS and related technologies should understand the security implications of adversarial use and consider those security implications when implementing new policies, programs, and projects.
(c) The United States should ensure the protection of U.S.developed quantum technologies from theft by our adversaries. This will require campaigns to educate industry, academia, and SLTT partners on the threat of IP theft and on the importance of strong compliance, insider threat detection, and cybersecurity programs for quantum technologies. As appropriate, Federal law enforcement agencies and other relevant agencies should investigate and prosecute actors who engage in the theft of quantum trade secrets or who violate United States export control laws. To support efforts to safeguard sensitive information, Federal law enforcement agencies should exchange relevant threat information with agencies responsible for developing and promoting quantum technologies.
(d) Consistent with these goals, by December 31, 2022, the heads of agencies that fund research in, develop, or acquire quantum computers or related QIS technologies shall develop comprehensive technology protection plans to safeguard QIS R&D, acquisition, and user access. Plans shall be coordinated across agencies, including with Federal law enforcement, to safeguard quantum computing R&D and IP, acquisition, and user access. These plans shall be updated annually and provided to the APNSA, the Director of OMB, and the Co-Chairs of the National Science and Technology Council Subcommittee on Economic and Security Implications of Quantum Science.
Sec. 5. Definitions. For purposes of this memorandum:
(a) the term agency has the meaning ascribed to it under 44 U.S.C. 3502;
(b) the term critical infrastructure means systems and assets, whether physical or virtual, so vital to the UnitedStates that their incapacitation or destruction would have a debilitating effect on the Nations security, economy, public health and safety, or any combination thereof;
(c) the term cryptographic agility means a design feature that enables future updates to cryptographic algorithms and standards without the need to modify or replace the surrounding infrastructure;
(d) the term cryptanalytically relevant quantum computer or CRQC means a quantum computer capable of undermining current public-key cryptographic algorithms;
(e) the term Federal Civilian Executive Branch Agency or FCEB Agency means any agency except the Department of Defense or agencies in the Intelligence Community;
(f) the term high value asset means information or an information system that is so critical to an organization that the loss or corruption of this information, or loss of access to the system, would have serious impacts on the organizations ability to perform its mission or conduct business;
(g) the term high impact system means an information system in which at least one security objective (i.e., confidentiality, integrity, or availability) is assigned a Federal Information Processing Standards (FIPS) 199 potential impact value of high;
(h) the term information technology or IT has the meaning ascribed to it under 44 U.S.C. 3502;
(i) the term National Security Systems or NSS has the meaning ascribed to it in 44 U.S.C 3552(b)(6) and shall also include other Department of Defense and Intelligence Community systems, as described in 44 U.S.C. 3553(e)(2) and 44 U.S.C.3553(e)(3);
(j) the term quantum computer means a computer utilizing the collective properties of quantum states, such as superposition, interference and entanglement, to perform calculations. The foundations in quantum physics give a quantum computer the ability to solve a subset of hard mathematical problems at a much faster rate than a classical (i.e., nonquantum) computer;
(k) the term quantum information sciences or QIS has the meaning ascribed to it under 15 U.S.C. 8801(6) and means the study and application of the laws of quantum physics for the storage, transmission, manipulation, computing, or measurement of information; and
(l) the term quantum-resistant cryptography means those cryptographic algorithms or methods that are assessed not to be specifically vulnerable to attack by either a CRQC or classical computer. This is also referred to as post-quantum cryptography.
Sec. 6. General Provisions. (a) Nothing in this memorandum shall be construed to impair or otherwise affect:
(i) the authority granted by law to an executive department or agency, or the head thereof, to include the protection of intelligence sources and methods; or
(ii) the functions of the Director of OMB relating to budgetary, administrative, or legislative proposals.
(b) This memorandum shall be implemented consistent with applicable law and subject to the availability of appropriations.
(c) This memorandum shall also be implemented without impeding the conduct or support of intelligence activities, and all implementation measures shall be designed to be consistent with appropriate protections for sensitive information and intelligence sources and methods.
(d) This memorandum is not intended to, and does not, create any right or benefit, substantive or procedural, enforceable at law or in equity by any party against the UnitedStates, its departments, agencies, or entities, its officers, employees, or agents, or any other person.
JOSEPH R. BIDEN JR.
Read more from the original source:
National Security Memorandum on Promoting United States Leadership in ...
Posted in Quantum Computing
Comments Off on National Security Memorandum on Promoting United States Leadership in …
Quantum computing: D-Wave shows off prototype of its next quantum annealing computer – ZDNet
Posted: at 2:09 pm
Image: Wacomka/Shutterstock
Quantum-computing outfit D-Wave has announced commercial access to an "experimental prototype" of its Advantage2 quantum annealing computer.
D-Wave is beating its own path to qubit processors with its quantum annealing approach. According to D-Wave, the Advantage2 prototype available today features over 500 qubits. It's a preview of a much larger Advantage2 it hopes to be available by 2024 with 7,000 qubits.
Access to the Advantage2 prototype is restricted to customers who have a D-Wave's Leap cloud service subscription, but developers interested in trying D-Wave's quantum cloud can sign up to get "one minute of free use of the actual quantum processing units (QPUs) and quantum hybrid solvers" that run on its earlier Advantage QPU.
The Advantage2 prototype is built with D-Wave's Zephyr connection technology that it claims offers higher connectivity between qubits than its predecessor topology called Pegasus, which is used in its Advantage QPU.
D-Wave says the Zephyr design enables shorter chains in its Advantage2 quantum chips, which can make them friendlier for calculations that require extra precision.
SEE:What is quantum computing? Everything you need to know about the strange world of quantum computers
"The Advantage2 prototype is designed to share what we're learning and gain feedback from the community as we continue to build towards the full Advantage2 system," says Emile Hoskinson, director of quantum annealing products at D-Wave.
"With Advantage2, we're pushing that envelope again demonstrating that connectivity and reduction in noise can be a delivery vehicle for even greater performance once the full system is available. The Advantage2 prototype is an opportunity for us to share our excitement and give a sneak peek into the future for customers bringing quantum into their applications."
While quantum computing is still experimental, senior execs are priming up for it as a business disruptor by 2030, according to a survey by consultancy EY. The firm found found that 81% of senior UK executives expect quantum computing to play a significant role in their industry by 2030.
Fellow consultancy McKinsey this month noted funding for quantum technology startups doubled in the past two years, from $700 million in 2020 to $1.4 billion in 2021. McKinsey sees quantum computing shaking up pharmaceuticals, chemicals, automotive, and finance industries, enabling players to "capture nearly $700 billion in value as early as 2035" through improved simulation and better machine learning. It expects revenues from quantum computing to exceed $90 billion by 2040.
D-Wave's investors include PSP Investments, Goldman Sachs, BDC Capital, NEC Corp, Aegis Group Partners, and the CIA's VC firm, In-Q-Tel.
Original post:
Quantum computing: D-Wave shows off prototype of its next quantum annealing computer - ZDNet
Posted in Quantum Computing
Comments Off on Quantum computing: D-Wave shows off prototype of its next quantum annealing computer – ZDNet
Chicago Quantum Exchange takes first steps toward a future that could revolutionize computing, medicine and cybersecurity – Chicago Tribune
Posted: at 2:09 pm
Flashes of what may become a transformative new technology are coursing through a network of optic fibers under Chicago.
Researchers have created one of the worlds largest networks for sharing quantum information a field of science that depends on paradoxes so strange that Albert Einstein didnt believe them.
The network, which connects the University of Chicago with Argonne National Laboratory in Lemont, is a rudimentary version of what scientists hope someday to become the internet of the future. For now, its opened up to businesses and researchers to test fundamentals of quantum information sharing.
The network was announced this week by the Chicago Quantum Exchange which also involves Fermi National Accelerator Laboratory, Northwestern University, the University of Illinois and the University of Wisconsin.
People work in the Pritzker Nanofabrication Facility, June 15, 2022, inside the William Eckhardt Research Center at the University of Chicago. The Chicago Quantum Exchange is expanding its quantum network to make it available to more researchers and companies. Quantum computing is a pioneering, secure format said to be hacker-proof and of possible use by banks, the health care industry, and others for secure communications. (Erin Hooley / Chicago Tribune)
With a $500 million federal investment in recent years and $200 million from the state, Chicago, Urbana-Champaign, and Madison form a leading region for quantum information research.
Why does this matter to the average person? Because quantum information has the potential to help crack currently unsolvable problems, both threaten and protect private information, and lead to breakthroughs in agriculture, medicine and climate change.
While classical computing uses bits of information containing either a 1 or zero, quantum bits, or qubits, are like a coin flipped in the air they contain both a 1 and zero, to be determined once its observed.
That quality of being in two or more states at once, called superposition, is one of the many paradoxes of quantum mechanics how particles behave at the atomic and subatomic level. Its also a potentially crucial advantage, because it can handle exponentially more complex problems.
Another key aspect is the property of entanglement, in which qubits separated by great distances can still be correlated, so a measurement in one place reveals a measurement far away.
The newly expanded Chicago network, created in collaboration with Toshiba, distributes particles of light, called photons. Trying to intercept the photons destroys them and the information they contain making it far more difficult to hack.
The new network allows researchers to push the boundaries of what is currently possible, said University of Chicago professor David Awschalom, director of the Chicago Quantum Exchange.
Fourth-year graduate student Cyrus Zeledon, left, and postdoctoral student Leah Weiss, right, show senior undergraduate Tiarna Wise around one of the quantum science laboratories, June 15, 2022, inside the William Eckhardt Research Center at the University of Chicago. (Erin Hooley / Chicago Tribune)
However, researchers must solve many practical problems before large-scale quantum computing and networking are possible.
For instance, researchers at Argonne are working on creating a foundry where dependable qubits could be forged. One example is a diamond membrane with tiny pockets to hold and process qubits of information. Researchers at Argonne also have created a qubit by freezing neon to hold a single electron.
Because quantum phenomena are extremely sensitive to any disturbance, they might also be used as tiny sensors for medical or other applications but theyd also have to be made more durable.
The quantum network was launched at Argonne in 2020, but has now expanded to Hyde Park and opened for use by businesses and researchers to test new communication devices, security protocols and algorithms. Any venture that depends on secure information, such as banks financial records of hospital medical records, would potentially use such a system.
Quantum computers, while in development now, may someday be able to perform far more complex calculations than current computers, such as folding proteins, which could be useful in developing drugs to treat diseases such as Alzheimers.
In addition to driving research, the quantum field is stimulating economic development in the region. A hardware company, EeroQ, announced in January that its moving its headquarters to Chicago. Another local software company, Super.tech, was recently acquired, and several others are starting up in the region.
Because quantum computing could be used to hack into traditional encryption, it has also attracted the bipartisan attention of federal lawmakers. The National Quantum Initiative Act was signed into law by President Donald Trump in 2018 to accelerate quantum development for national security purposes.
In May, President Joe Biden directed federal agency to migrate to quantum-resistant cryptography on its most critical defense and intelligence systems.
Ironically, basic mathematical problems, such as 5+5=10, are somewhat difficult through quantum computing. Quantum information is likely to be used for high-end applications, while classical computing will likely continue to be practical for many daily uses.
Renowned physicist Einstein famously scoffed at the paradoxes and uncertainties of quantum mechanics, saying that God does not play dice with the universe. But quantum theories have been proven correct in applications from nuclear energy to MRIs.
Stephen Gray, senior scientist at Argonne, who works on algorithms to run on quantum computers, said quantum work is very difficult, and that no one understands it fully.
But there have been significant developments in the field over the past 30 years, leading to what some scientists jokingly called Quantum 2.0, with practical advances expected over the next decade.
Were betting in the next five to 10 years therell be a true quantum advantage (over classical computing), Gray said. Were not there yet. Some naysayers shake their canes and say its never going to happen. But were positive.
Just as early work on conventional computers eventually led to cellphones, its hard to predict where quantum research will lead, said Brian DeMarco, professor of physics at the University of Illinois at Urbana-Champaign, who works with the Chicago Quantum Exchange.
Thats why its an exciting time, he said. The most important applications are yet to be discovered.
The rest is here:
Posted in Quantum Computing
Comments Off on Chicago Quantum Exchange takes first steps toward a future that could revolutionize computing, medicine and cybersecurity – Chicago Tribune
The role of quantum computing and AI in reversing climate change – Digital Nation
Posted: at 2:09 pm
As the world grapples with the existential crisis that is climate change, technologies including quantum computing and AI can play a crucial role in reversing the damage.
According to a recent McKinsey and Company report, as businesses prepare for quantum advantage, they must consider the value in quantum computing as a significant tool for decarbonisation and limiting global warming to 1.5 degrees.
Meeting the goal of net-zero emissions that countries and some industries have committed to wont be possible without huge advances in climate technology that arent achievable today. Even the most powerful supercomputers available now are not able to solve some of these problems. Quantum computing could be a game-changer in those areas, the report said.
The authors have attested that quantum computing could be leveraged to develop climate technologies that would contribute to an additional seven gigatons of carbon dioxide abatement by 2035.
According to the authors, Quantum computing could bring about step changes throughout the economy that would have a huge impact on carbon abatement and carbon removal, including by helping to solve persistent sustainability problems such as curbing methane produced by agriculture.
"Making the production of cement emissions-free, improving electric batteries for vehicles, developing significantly better renewable solar technology, finding a faster way to bring down the cost of hydrogen to make it a viable alternative to fossil fuels, and using green ammonia as a fuel and a fertiliser.
In a separate McKinsey report, Jeremy OBrien, one of the worlds leading quantum computing experts, and co-founder and CEO of PsiQuantum explained the significance of quantum computing in providing better solutions for carbon reduction technologies such as carbon capture and for electric batteries.
Many low-carbon technologies involve complex systems, particularly around chemistry and materials science, which nobody fully understands, said OBrien.
Right now, we have to test thousands of molecular combinations, which means lengthy and hugely expensive trial-and-error lab experiments, with often disappointing, marginal improvements.
That is exactly where quantum computing will play such a critical role: in breaking through these scientific and technical barriers.
The most recent Intergovernmental Panel on Climate Change (IPCC) report reveals that with proper governance, digital technologies can contribute to climate change mitigation and assist in meeting the United Nations 17 Sustainable Development Goals.
Sensors, Internet of Things, robotics, and artificial intelligence can improve energy management in all sectors, increase energy efficiency, and promote the adoption of many low-emission technologies, including decentralised renewable energy while creating economic opportunities, the IPCC report says.
However, the authors caution that mitigation gains can be counterbalanced by trade-offs including increasing electronic waste, negative impacts on the labour market and the growing digital divide.
Here is the original post:
The role of quantum computing and AI in reversing climate change - Digital Nation
Posted in Quantum Computing
Comments Off on The role of quantum computing and AI in reversing climate change – Digital Nation







