linkedin post 2019-05-05 04:39:54

Uncategorized
FINITE SIZE RANGE. "Proteins exist in a finite range of sizes with a limited amino acid alphabet. We find that these restrictions set an intrinsic limit to designing protein interfaces that can bind selectively to target proteins, while remaining relatively repulsive to all other protein interfaces." https://lnkd.in/eTyvTV7 View in LinkedIn
Read More

linkedin post 2019-05-06 05:01:42

Uncategorized
MONKEYS, TYPEWRITERS AND SHAKESPEARE. "How many random variants of these 66 characters will compile? How many will link and execute at all, or execute without fatal errors? Assuming that our program has already been written, what is the chance of evolving it into another, more complex program that will compile, link, execute and produce meaningful output?" https://lnkd.in/dZqxxrU View in LinkedIn
Read More

linkedin post 2019-05-06 04:59:27

Uncategorized
C LANGUAGE COMBINATIONS. "To get a feel for this number, it is estimated that there are about 10^80 subatomic particles in the known universe, so there are as many 66-character combinations in our example as there are subatomic particles in 10 trillion universes. There are about 4 x 10^17 seconds in the history of the universe, assuming that the universe is 13 billion years old." https://lnkd.in/dZqxxrU View in LinkedIn
Read More

linkedin post 2019-05-06 04:57:18

Uncategorized
COMPUTER LANGUAGE. "The C language uses almost every character on the keyboard, but to be generous in my calculations I’ll only assume that we need the 26 lower-case alpha characters. How many 66-character combinations are there? The answer is 26 raised to the 66th power, or 26^66. That’s roughly 2.4 x 10^93 (10^93 is 1 followed by 93 zeros)." https://lnkd.in/dZqxxrU View in LinkedIn
Read More

linkedin post 2019-05-08 04:02:36

Uncategorized
NULL EFFECT. "True viruses have two major components: one that handles the spread of the virus, and a “payload” or “manipulation” task. The payload task may not be present (has null effect), or it may await a set of predetermined circumstances before triggering. For a computer virus to work, it somehow must add itself to other executable code." https://lnkd.in/eCG7b3z View in LinkedIn
Read More

linkedin post 2019-05-08 03:56:54

Uncategorized
STEALTH JUMPING GENES. "Most TEs appear to be silent—in other words, these elements do not produce a phenotypic effect, nor do they actively move around the genome. At least that has been the general scientific consensus. Some silenced TEs are inactive because they have mutations that affect their ability to move from one chromosomal location to another; others are perfectly intact and capable of moving but are kept inactive by epigenetic defense mechanisms such as DNA methylation, chromatin remodeling, and miRNAs." (MiRNAs = MicroRNAs; TE = Transposable element, transposons). https://lnkd.in/GEpmJN View in LinkedIn
Read More

linkedin post 2019-05-08 03:53:10

Uncategorized
CODE CORRUPTION. "What do all these jumping genes do, besides jump? Much of what a transposon does depends on where it lands. Landing inside a gene can result in a mutation, as was discovered when insertions of L1 into the factor VIII gene caused hemophilia. Similarly, a few years later, researchers found L1 in the APC genes in colon cancer cells but not in the APC genes in healthy cells in the same individuals." https://lnkd.in/GEpmJN View in LinkedIn
Read More

linkedin post 2019-05-08 03:50:05

Uncategorized
COMPUTER VIRUS is "a virus as a piece of code with two characteristics: 1. At least a partially automated capability to reproduce. 2. A method of transfer which is dependent on its ability to attach itself to other computer entities (programs, disk sectors, data files, etc.) that move between these systems.” https://lnkd.in/eCG7b3z View in LinkedIn
Read More