linkedin post 2019-02-26 10:43:01

Uncategorized
ONCE AN URBAN MYTH. "In the late 1980s and early ‘90s, computer viruses were considered an urban myth. A small number of computer viruses had been written and infection was fairly uncommon. Today, the situation is much different: over 56,000 distinct virus, worm and Trojan horse strains are known!" https://lnkd.in/eV_mmFn View in LinkedIn
Read More

linkedin post 2019-02-26 10:39:38

Uncategorized
COMPUTER VIRUSES, or bugs, represent a very interesting topic. In genetics, errors or mutations, are the sources of genetic innovation, the drivers of evolution, and through selective pressures acting on the diverse bell-curve of possibilities, drives adaptation to new niches and fitter organisms. How do code errors function in the computing ecosystem? View in LinkedIn
Read More

linkedin post 2019-02-26 10:37:01

Uncategorized
INSPIRATION FOR VENUS. "Dewdney proposed a game called "Core Wars", in which hackers create computer programs that battle for control of a computer's "core" memory. Since computer programs are just patterns of information, a successful program in core wars is one that replicates its pattern within the memory, so that eventually most of the memory contains its pattern rather than that of the competing program." https://lnkd.in/esA_k7j View in LinkedIn
Read More

linkedin post 2019-02-26 10:34:01

Uncategorized
RASMUSSEN'S VENUS. "In VENUS, genetically-programmed digital organisms occupy memory, and each block of memory has a specific "resource value" to it--it can vary from a desert (very few resources) to a jungle (many resources); this resource value is added at a steady state, analogous to an external energy source such as sunlight. These digital organisms compete for this memory space and use it for energy, and to go on "living" they must have enough resources to sustain themselves and their growth." https://lnkd.in/etiQ6T7 View in LinkedIn
Read More

linkedin post 2019-02-28 06:18:53

Uncategorized
COMPUTER HOST-VIRUS ARMS RACE, identical to biological viruses and their hosts. "In order to stay far from the anti-virus scanners, computer viruses gradually improve their codes to make them invisible. On the other hand, anti-virus technologies continually follow the virus tricks and methodologies to overcome their threats." https://lnkd.in/e2ErnC6 View in LinkedIn
Read More

linkedin post 2019-02-28 06:15:52

Uncategorized
"THE ENCRYPTED VIRUS conceals its presence by encrypting the bulk of its viral logic. When an infected program is launched, the virus usurps control of the system and then uses a simple decryption subroutine to decrypt the rest of the encrypted viral logic, thus the virus’ logic is only visible when it is actively running, but never when it is stored on the disk in an infected file." Just like biology. https://lnkd.in/eV_mmFn View in LinkedIn
Read More

linkedin post 2019-03-02 05:05:08

Uncategorized
DOWNSTREAM EFFECTS. "The multiple effects of light on the timing mechanism are important determinants of photoperiodic responses as they serve to set the phase of the photoperiodic-response rhythm. Yet they must be distinguished from separate effects of light mediating the floral response downstream of the clock." https://lnkd.in/d_f7kfY View in LinkedIn
Read More

linkedin post 2019-02-27 06:03:33

Uncategorized
LIMITED OS CHOICES. "You can only get a limited amount of diversity by using two operating systems, or routers from three vendors. South American potato diversity comes from hundreds of different varieties. Genetic diversity comes from millions of different genomes." https://lnkd.in/dvZvf8T View in LinkedIn
Read More