linkedin post 2019-07-02 04:26:23

Uncategorized
SILENT MUTATIONS. "Mutations are errors in codons caused by changes in nucleotide bases. Some mutations may not have much effect. For example, if the codon GAA becomes the codon GAG, because the genetic code is degenerate, the codon will still code for the amino acid glutamate. Such ineffectual mutations are called silent mutations." http://www.sparknotes.com/biology/molecular/geneticcode/section3.rhtml View in LinkedIn
Read More

linkedin post 2019-07-01 04:19:37

Uncategorized
DISTRIBUTED COMPUTING. "Instead of sitting idle, a SETI@home computer executes the SETI program, which crunches data from radio signals coming from the Arecibo telescope in Puerto Rico. Individually, the computers are unimpressive — but collectively, they make up the world's most powerful distributed supercomputer." https://lnkd.in/dh6PrEg View in LinkedIn
Read More

linkedin post 2019-07-01 04:16:25

Uncategorized
NETWORKED POWER. "There's nothing new about networked computers concurrently solving complex tasks. The most famous and largest example of such distributed computing is the SETI@home project, where nearly 3 million owners of Internet-connected computers voluntarily execute the SETI program for the project (https://lnkd.in/dZsGdiR)." http://setiathome.ssl.berkeley.edu/ View in LinkedIn
Read More

linkedin post 2019-07-01 04:12:24

Uncategorized
COMMUNICATION SALTATIONS. "Every major technological success in the public in the last 50 years—cars, phones, beepers, cell phones, Internet—has been about social connection. They all enhance our ability to connect in some way and are successful because they contribute to the symbiotic intelligence process." http://www.computerworld.com/article/2585443/it-management/symbiotic-intelligence.html View in LinkedIn
Read More

linkedin post 2019-07-01 04:08:10

Uncategorized
COMPUTER VIRUS THREAT. "It is now twenty years since Fred Cohen published his seminal research paper suggesting the potential threat of computer viruses. In the years since this publication, the risk that Cohen described has unquestionably been borne out, and alongside hackers, the threat of the computer virus is the security issue that has most clearly permeated the public mind." (2005). http://www.symantec.com/connect/articles/true-computer-parasite View in LinkedIn
Read More

linkedin post 2019-07-03 05:46:18

Uncategorized
LOGIC IS INSUFFICIENT. "1960s and 1970s. Back then, many thought that general-purpose AI could be achieved purely through symbolic manipulation. That is, it was thought that we could build machines that, through purely logical reasoning, would derive a sufficient understanding of the world to reach and even exceed human intelligence." https://pointersgonewild.com/ View in LinkedIn
Read More