Monthly Archives: April 2016

Mergel Transhuman – Free Download at Ektoplazm – Free …

Posted: April 16, 2016 at 3:41 am

Free Music|Psycore|June 16, 2012|Released by Akashik Record|Posted byBasilisk

01 - System Crash (vs Antagon) (155 BPM) 02 - Alkoholisches Travel (160 BPM) 03 - Morning Delirium (164 BPM) 04 - Maroderi Voodoo (Gamaliel Remix) (170 BPM) 05 - Blood Emo (175 BPM) 06 - The Indigenous Child From Hell (with Jesus Raves) (180 BPM) 07 - Drop Me Speed Dude! (184 BPM) 08 - Delete Live (190 BPM) 09 - I Do Not Like Speed (210 BPM) 10 - Journey In The Dark (vs OmniPresence) (200 BPM)

Mergel (Andrei Krasnoperov) makes a strong debut with Transhuman on Akashik Record, originally released in 2011. Mergels style is psycore, high-tech, and darkpsy with experimental mechanical sounds and crazy emotional melodies designed for peak experiences at extreme tempos. The label calls this quantum higher octave form of ascending vibration towards the omega point which just about sums it up. Artwork by Egnogra.

MP3 Download|FLAC Download|WAV DownloadDownload count: 7,966.

Released under a Creative Commons licence for noncommercial usage. Donations to keep underground music alive are welcome on Bandcamp.

Audio clip: Adobe Flash Player (version 9 or above) is required to play this audio clip. Download the latest version here. You also need to have JavaScript enabled in your browser.

Mergel Invisible Landscapes

Engrams: The Trilogy Vol. 2

Mergel Night On A CornfieLD

Go here to read the rest:
Mergel Transhuman - Free Download at Ektoplazm - Free ...

Posted in Transhuman | Comments Off on Mergel Transhuman – Free Download at Ektoplazm – Free …

Bitcoin download | SourceForge.net

Posted: April 15, 2016 at 11:46 pm

4.5 Stars (115) 168 Downloads (This Week) Last Update: 2015-06-05 Browse Code SVN Repository Screenshots Description

Bitcoin is a decentralized P2P electronic cash system without a central server or trusted parties. Users hold the crypto keys to their own money and transact directly with each other, with the help of the network to check for double-spending.

Bitcoin Web Site

97

4

1

1

12

ease 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 4 / 5

features 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 4 / 5

design 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 4 / 5

support 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 4 / 5

1 of 5 2 of 5 3 of 5 4 of 5 5 of 5

NOTE: Bitcoin development has moved to GitHub: github.com/bitcoin Documentation and downloads can be found at: bitcoin.org

Posted 03/20/2016

1 of 5 2 of 5 3 of 5 4 of 5 5 of 5

WARNING, this is not the official Bitcoin project! You're likely to download malware here.

Posted 06/04/2015

1 of 5 2 of 5 3 of 5 4 of 5 5 of 5

thks for btc! keylogger thingy in the review... hmm... anyone tried and dl-ed it? any problem? @applebypd ur graphic-card must be good... else u will see weird lines when u surf other webbies.

Posted 03/17/2015

1 of 5 2 of 5 3 of 5 4 of 5 5 of 5

never accomplished to get a full sync with the blockchain so far. DB regularry gets currupted and the max. blockchain that was downloaded was two months old and then didn't proceed with the download

Posted 10/25/2014

1 of 5 2 of 5 3 of 5 4 of 5 5 of 5

good

Posted 09/24/2014

First Energy-Efficient Cryptocurrency

First Cryptocurrency with Scientific Computing Proof-of-Work (Prime)

Bitcoin miner for nVidia GPUs

Read the original post:
Bitcoin download | SourceForge.net

Posted in Bitcoin | Comments Off on Bitcoin download | SourceForge.net

James Bond 007 – Casino Royale (2006) – Movie-Censorship.com

Posted: at 11:43 pm

Comparison between the cut British DVD rated BBFC 12 and the uncut Australian DVD.

In November 2006 a new Bond movie was released. In spite of initial skepticism by the popular press and some fans, too, Daniel Craig could convince both critics and the audience in the graver and more serious Casino Royale, after the incredible stunts of his predecessor. Daniel Craigs introduction became the most successful Bond in history and topped Die Another Day easily.

The new toughness, rediscovered after Licence To Kill by the film makers, caused some problems for the movie, eventually leading to the release of 3 different versions of the movie in different parts of the world. While the previous movie only had a ridiculous and harmless sex scene being an overkill only for the USA, Casino Royale had a difficult time once again at its British home.

On the informative homepage of the British Censorship Board BBFC BBFC, whose censors were able to watch the movie prior to its premiere so that the movie makers could know how close they were to the desired "12 A" rating, one could learn about a torture scene which had to be cut for the English version.

It didnt take long to make clear that the cuts would be permanent for the English version of the movie, causing justified concerns that other countries would receive the same censored version. Fortunately that didnt happen. The censored version was only shown in English cinemas and was only released there on DVD. In Australia the scene remained intact.

The USA received a cut version of their own. There the torture scene turned out to be without difficulty for the important PG-13 rating but what usually is too much for Americans of this age bracket is realistic violence.

Exaggerated and cartoon-like violence hardly disturbs the MPAA or the American public than a realistic and matter-of-factly presented battle for life or death.

Of all things Casino Royale wanted to distinguish itself from the previous movies in that category in order to win back the adult audience which often doesnt like too much fantasy and extravagance in action movies anymore. Two scenes - the stylish black-and-white fight in the bathroom and the confrontation in the staircase - had to be mitigated considerably.

Interesting in this connection is that, besides the deletion of several scenes, there are some individual shots which are missing both in the English and in the Australian version. Whether these shots were deleted because of censorship reasons in the different countries or that they were added into the US version to compensate the deleted scenes (to get the desired PG-13 rating) and to keep the editing rhythm is unknown.

2 deleted und 1 alternative scenes in the English version with a total difference of 13 seconds.

Follow this link:
James Bond 007 - Casino Royale (2006) - Movie-Censorship.com

Posted in Censorship | Comments Off on James Bond 007 – Casino Royale (2006) – Movie-Censorship.com

What is NATO?

Posted: April 14, 2016 at 5:47 pm

NATO is a political and military alliance of 28 North American and European countries, bound by shared democratic values, that have joined together to best pursue security and defense. In addition to the United States, the other NATO Allies are Albania, Belgium, Bulgaria, Canada, Croatia, the Czech Republic, Denmark, Estonia, France, Germany, Greece, Hungary, Iceland, Italy, Latvia, Lithuania, Luxembourg, the Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Turkey, and the United Kingdom. The principle of collective defense is at the heart of NATO and is enshrined in Article 5 of the Alliances founding Washington Treaty, which asserts that an attack on one Ally is to be considered an attack on all. NATO invoked Article 5 of the Washington Treaty for the first time in its history following the 9/11 terrorist attacks against the United States.

Founded in 1949, NATO played a unique role in maintaining stability and security in the trans-Atlantic area during the Cold War. Since the end of the Cold War the Alliance has transformed itself to meet the security challenges of the new century, continuing with adoption of a new NATO Strategic Concept at the Lisbon NATO Summit in 2010. Today, NATOs operations include leading the International Security Assistance Force (ISAF) mission in Afghanistan, ensuring a safe and secure environment in Kosovo through the KFOR mission, and contributing to international counter-piracy efforts off the Horn of Africa through Operation Ocean Shield. In 2011, NATO successfully carried out the UN-mandated mission in Libya to protect civilians, enforce a no-fly zone, and enforce a maritime arms embargo. NATO has also provided airlift and sealift support to the African Union (AU) missions in Somalia and Sudan, has engaged in a number of humanitarian relief operations in recent years, including delivery of over 100 tons of supplies from Europe to the United States following Hurricane Katrina, and leads the counterterrorism Operation Active Endeavor in the Mediterranean Sea.

Recognizing that the security challenges Allies face often emerge beyond Europe, NATO has become the hub of a global security network, establishing partnerships with over thirty countries. These ties provide opportunities for practical military cooperation and political dialogue. Partners have contributed significantly to NATO operations in Afghanistan, Kosovo, Iraq, and Libya.

Here is the original post:
What is NATO?

Posted in NATO | Comments Off on What is NATO?

4th Amendment – Revolutionary War and Beyond

Posted: at 3:44 pm

We are considering offers for the sale of this website. Use the contact form in the left column to contact us for more information.

The 4th Amendment to the United States Constitution was added as part of the Bill of Rights on December 15, 1791. It deals with protecting people from the searching of their homes and private property without properly executed search warrants. The 4th Amendment reads like this:

"The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized."

The 4th Amendment requires that in order for a government official, such as a police officer, to search a person's home, business, papers, bank accounts, computer or other personal items, in most cases, he must obtain a search warrant signed by the proper authority, which usually means by a judge.

In order for a warrant to be issued, someone must affirm to the judge that he has a reasonable belief that a crime has been committed and that by searching the premises of a particular location, he believes he will find evidence that will verify the crime. The person submitting this information to the judge is usually a police officer. The police officer does not have to be correct in his assumption, he just has to have a reasonable belief that searching someone's private property will yield evidence of the crime.

The judge then reviews the information and if he also believes the information the officer has submitted shows probable cause, he will issue the warrant. In order for the warrant to be good, it must identify the place and the particular items or persons that are to be seized if they are found. A warrant is not a general order that can be used to search for anything, anywhere the officer wants. In order for the warrant to be in compliance with the 4th Amendment, the warrant must be very specific about what is being looked for and where the officer can look for it.

The 4th Amendment idea that citizens should be protected from unreasonable searches and seizures goes back far into English history. In 1604, in the famous Semayne's Case, the Judge, Sir Edward Coke, first identified this right. He ruled that, "The house of every one is to him as his castle and fortress, as well for his defence against injury and violence as for his repose."

In this case, it was determined that subjects of the kingdom had the right to be protected from searches and seizures that were unlawfully conducted, even if they were conducted by the king's representatives. The case also recognized that lawfully conducted searches and seizures were acceptable. This case established a precedent that has remained a part of English law ever since.

The most famous English case dealing with the right to freedom from illegal search and seizure is called Entick vs. Carrington, 1765. In this case, royal representatives had broken into the private home of John Entick in search of material that was critical of the king and his policies. In the process, they broke into locked boxes and desks and confiscated many papers, charts, pamphlets, etc. The officers were acting on the orders of Lord Halifax.

During the trial, Entick charged that the entire search and seizure had been unlawfully conducted, and the Court agreed. The Court said that Lord Halifax had no standing to issue the order to search the premises, that probable cause that a crime had been committed had not been demonstrated and that the warrant allowed a general confiscation of anything the officers found, not specifying exactly what they were to look for or could seize. In addition, there were no records kept of what the officers seized.

Click to enlarge

Charles Pratt, Lord Camden

This ruling essentially declared that the government was not allowed to do anything that was not specified by law. It required the search and seizure be carried out according to the law. It also established that the right to be able to protect one's private property was an important right to be safeguarded by the government. In his ruling, Lord Camden, the Chief Justice made this famous statement:

"The great end, for which men entered into society, was to secure their property. That right is preserved sacred and incommunicable in all instances, where it has not been taken away or abridged by some public law for the good of the whole. The cases where this right of property is set aside by private law, are various. Distresses, executions, forfeitures, taxes etc are all of this description; wherein every man by common consent gives up that right, for the sake of justice and the general good. By the laws of England, every invasion of private property, be it ever so minute, is a trespass. No man can set his foot upon my ground without my license, but he is liable to an action, though the damage be nothing; which is proved by every declaration in trespass, where the defendant is called upon to answer for bruising the grass and even treading upon the soil. If he admits the fact, he is bound to show by way of justification, that some positive law has empowered or excused him. The justification is submitted to the judges, who are to look into the books; and if such a justification can be maintained by the text of the statute law, or by the principles of common law. If no excuse can be found or produced, the silence of the books is an authority against the defendant, and the plaintiff must have judgment."

In 1886, in a case called Boyd vs. United States, the Supreme Court of the United States referred to Entick vs. Carrington as a "great judgment," "one of the landmarks of English liberty" and "one of the permanent monuments of the British Constitution." This established the Entick decision as a guide to understanding what the Founding Fathers meant concerning search and seizure laws when they wrote the 4th Amendment.

The British government generally looked at the American colonies as a money making enterprise. Consequently, they passed many revenue collection bills aimed at generating as much money from the colonists as possible. The colonists naturally resented this and engaged in substantial smuggling operations in order to get around the customs taxes imposed by the British government. You can learn more about these and other causes of the American Revolution here.

Click to enlarge

King George III

In response to the widespread smuggling, Parliament and the King began to use "writs of assistance," legal search warrants that were very broad and general in their scope. Customs agents could obtain a writ of assistance to search any property they believed might contain contraband goods. They could enter someone's property with no notice and without any reason given. Tax collectors could interrogate anyone about their use of customed goods and require the cooperation of any citizen. Searches and seizures of private property based on very general warrants became an epidemic in colonial America.

In response to this, the Massachusetts legislature passed search and seizure laws in 1756 outlawing the use of general warrants. This created a great deal of friction between the Royal Governor and the people of Massachusetts until the death of King George II in 1760. Writs of assistance by law were good until 6 months after the death of the king who issued them. This meant that the Royal Governor had to have new writs of assistance issued by the new king.

Click to enlarge

James Otis

by Joseph Blackburn

James Otis, a Boston lawyer, had recently been appointed Advocate General of the Admiralty Court, which meant he was essentially the top lawyer for the Crown in the colony. In this position, Otis was required to defend the use of writs of assistance by the government. He strongly objected to these arbitrary searches and seizures of private property and consequently resigned his position. Instead, he became the lawyer for a group of over 50 merchants who sued the government claiming that the writs of assistance were unjust.

James Otis represented these merchants for free. His speech condemning British policies, including writs of assistance and general search warrants, was so powerful and eloquent, that it was heard of throughout the colonies and catapulted him to a place of leadership in the swelling tide of disillusionment toward Great Britain.

Future President, John Adams, who was 25 at the time, was sitting in the courtroom and heard Otis' famous speech that day. Later he said:

"The child independence was then and there born, every man of an immense crowded audience appeared to me to go away as I did, ready to take arms against writs of assistance."

He viewed Otis' speech "as the spark in which originated the American Revolution."

Later, in 1776, George Mason's Virginia Declaration of Rights, which was a document on which Thomas Jefferson relied heavily when he wrote the Declaration of Independence, included prohibitions against general warrants that did not specify probable cause or exactly what was to be searched for. The passage of the Virginia Declaration of Rights dealing with general warrants reads like this:

"That general warrants, whereby any officer or messenger may be commanded to search suspected places without evidence of a fact committed, or to seize any person or persons not named, or whose offense is not particularly described and supported by evidence, are grievous and oppressive and ought not to be granted."

You can read the Virginia Declaration of Rights here and you can read the Declaration of Independence here. You can also read more about how Thomas Jefferson wrote the Declaration of Independence here.

Once the Constitution was written, each state held a convention to debate its worth. Many people opposed the Constitution because they thought it gave the federal government too much power at the expense of the states and of individual rights. Those opposing the Constitution were known as anti-Federalists. They were led by such men as Patrick Henry, George Mason and Elbridge Gerry.

The anti-Federalists were concerned that the federal government would trample on the rights of individual citizens. They believed the Constitution did not specify clearly enough which rights of individuals were protected from government interference. Some of them called for the addition of a bill of rights to the Constitution, which would specify exactly which rights of the citizens were protected.

Those who were in support of the Constitution were known as Federalists because they did support a strong federal government. The Federalists were led by such men as James Madison, Alexander Hamilton, John Adams and George Washington.

In order to convince enough anti-Federalists to support the Constitution to pass it and have it go into effect, the Federalists made a promise that if the anti-Federalists would vote to accept the Constitution, the First Congress would address their concerns by adding a bill of rights to it. This promise succeeded in persuading enough anti-Federalists to support the Constitution that it passed and became law. It also ensured that the Founders concerns about illegal searches and seizures would eventually become law embodied in the 4th Amendment.

On June 8, 1789, James Madison kept the promise of the Federalists by proposing to the First Congress twenty amendments to be added to the Constitution. You can read James Madison's June 8, 1789 speech here.

One of these amendments, that dealt with search and seizure laws, eventually became what we know as the 4th Amendment. Congress approved twelve of the amendments suggested by Madison on September 25, 1789 and ten of those were eventually ratified by the states. The First Ten Amendments, also known as the Bill of Rights, became law on December 15, 1791. You can read more about the History of the Bill of Rights here.

The 4th Amendment only applied originally to the federal government, but through the Due Process Clause of the 14th Amendment, the Supreme Court has now applied most parts of the Bill of Rights to state and local governments as well.

The 4th Amendment only provides protection from illegal search and seizure by government officials, not by private citizens. So, if an employer unreasonably searched your possessions at work, the 4th Amendment would not have been violated.

There are certain exceptions to the 4th Amendment right to have a properly executed search warrant issued before a search or seizure of private property can be conducted. The Supreme Court has ruled that, for example, a police officer may conduct a pat down search of someone he has observed engaging in suspicious behavior, if he has reasonable suspicion that some crime is being committed. Also, if a police officer observes someone committing a crime, or believes that he has probable cause to suspect someone has committed a crime, he may arrest the person without a warrant.

There are a number of other exceptions to the 4th Amendment warrant rule:

Supreme Court of the United States

In general, any evidence that is obtained in an illegal search and seizure is not admissible in court by the prosecution in a criminal defendant's trial. This is known as the 4th Amendment Exclusionary Rule because evidence obtained in this manner is excluded from the trial. The Supreme Court established this rule in a case called Weeks vs. United States, 1914. Before that time, any evidence, even if it was gathered in an illegal search and seizure, was admissible in court.

There are some exceptions to the 4th Amendment Exclusionary Rule. For example, Grand Juries may use illegally obtained evidence to question witnesses. The method of gathering the evidence can be challenged later if the defendant is charged. Evidence gathered in good faith by an officer can be used in court. This means that if an officer is following the directions of a warrant that is faulty, not realizing that it is faulty, the evidence may be used.

Evidence obtained through illegal search and seizure can also be used in the following circumstances:

Read about some of the most interesting and significant Fourth Amendment Court cases here.

Preamble to the Bill of Rights Learn about the 1st Amendment here. Learn about the 2nd Amendment here. Learn about the 3rd Amendment here. Learn about the 4th Amendment here. Learn about the 5th Amendment here. Learn about the 6th Amendment here. Learn about the 7th Amendment here. Learn about the 8th Amendment here. Learn about the 9th Amendment here. Learn about the 10th Amendment here.

Read the Bill of Rights here.

Learn more about theBill of Rightswith the following articles:

Return to top of 4th Amendment

Revolutionary War and Beyond Home

See the rest here:
4th Amendment - Revolutionary War and Beyond

Posted in Fourth Amendment | Comments Off on 4th Amendment – Revolutionary War and Beyond

Liberty Public Schools

Posted: April 13, 2016 at 10:42 pm

Look Who Made The Accelerated Reading Party! 9:30 a.m./Brown - PreK

Tobie Barzellone, William Benson, Ava Gray, Emma Thrasher and Marki Wakefield

Chrissy Conley, Connelly Mitchell, Fisher Head, Kylan Mathis, Madison Brown, Natalee Henson, Presley Howe, and Shawna Crowell

Alivia Barzellone, Mallory Bryant, Emmett Coffeltt, Braxton Floyd, Shelby Geen, Bryce Guthrie, Lane Lewis, Jayda Malone, caleb Taylor, Fallon Testa, Graham Vivion, and Broc Wilson

Jordan Barzellone, Mayce Bell, Alexander Corn, Leo Endicott, Yatzil Flores, Bryce Floyd, Amare Hamilton, Cash Perner, Rynnick Rider, and Tanner Thompson

Gracie Barzellone, Zanna Gordon, Chloe Harris, Trey Lee, Larry Morris, Trinity Matney, Brayden Rogers, Tripp Sanders, Emma Sligar, and Haly Todd

Braylen Bear, Taya Jo Beesley, Grant Clay, Gabby Dare, Joshua Pierce, and Maci Skelton

The whole class!!

Katelyn Benson, Jaxon Brown, McKenzie Hoskin, Gabby Miller, Katie Outhier, and Ireland Thomas

Lilly Beams, Camron Bear, Carmela Paz, Amelia Testa, Wyatt Toney, and Jayce Wheeler

Elizabeth Clifford, Dallyn Dooley, Charlie Hill, Tori Summers and Alicia Paz

Original post:
Liberty Public Schools

Posted in Liberty | Comments Off on Liberty Public Schools

New York Genome Center NYGC Careers

Posted: at 9:44 am

CAREERS @ THE NEW YORK GENOME CENTER

The New York Genome Center (NYGC) is an independent, non-profit organization that leverages the collaborative resources of leading academic medical centers, research universities and commercial organizations. Our vision is to transform medical research and clinical care through the creation of one of the largest genomics facilities in North America; integrating sequencing, bioinformatics and data management, as well as performing cutting-edge genomics research.

Each faculty member of the NYGC leads a laboratory of post doctoral researchers, lab associates and scientific staff. They integrate their genomic expertise with the work that we are doing NYGC, working in collaborative research relationships both inside NYGC and with academic institutions. Our Faculty members hold joint appointments at our Institutional Founding Members while also managing their independent laboratories housed at the NYGC and conducting ground-breaking and collaborative genomic research.

We believe that every team member is crucial as NYGC works towards our mission, be it in a scientific, technical, or administrative position. Our administration team plays a huge role in driving transformative change in biomedical and clinical care. This group includes external affairs, finance, legal, business development, project management, sponsored research and facilities.

We are proud to boast a world-class bioinformatics and computational biology organization to support the cutting edge genomics research and integrated genomics services that we offer at NYGC. Our collaborative bioinformatics team is passionate about understanding and modeling human genetic variation and researching how it can be used to generate clinically actionable results.

This group develops and maintains the tools and infrastructure necessary to support our scientists as they tackle ground-breaking and large-scale data and genomic analysis. They are responsible for initiating and fostering external collaborations with technology partners, as well as ensuring that NYGC is a leader in the effective use of technology.

NYGC is committed to providing the most advanced sequencing an analysis possible. Our facility was designed to accommodate ever-improving technology, and we have more sequencing capacity than any other single institution in the Tri-State area. The Sequencing Operations group is responsible for understanding and interpreting sequencing and primary bioinformatics data, and is central to the transformative work of NYGC.

Our Software Engineers develop cutting edge tools to drive the services at NYGC. This team works closely with bioinformatics, sequencing lab, scientists, program management, and more to develop scientific applications for high-volume data processing, analysis and management.

Learn, grow and become part of the New York Genome Center team for a summer by participating in our 10-week paid internship program. Interns will have the opportunity to contribute towards the cutting-edge science being performed within our facilities. All interns will contribute towards a specific and meaningful project within their group which will culminate in an end-of-summer company presentation, ensuring our interns' professional and personal development. NYGC believes that our interns' summers should be both social and educational, and will offer a variety of lunch & learns, training seminars offered by team members across multiple functions of the organization, and organized social events.

Our Innovation Lab is currently testing several novel technologies with the potential to complement and enhance current technologies. Working with this group provides the opportunity to be on the cutting-edge of new technology and to perform innovative research that will shape the future of our industry.

The New York Genome Center provides equal employment opportunities to all employees and applicants without regard to race, color, religious creed, sex, national origin, ancestry, citizenship status, pregnancy, childbirth, physical disability, mental disability, age, military status or status as a Vietnam-era or special disabled veteran, marital status, registered domestic partner or civil union status, gender (including sex stereotyping and gender identity or expression), medical condition (including, but not limited to, cancer related or HIV/AIDS related), genetic information or sexual orientation in accordance with applicable federal and state laws. In addition, the New York Genome Center complies with applicable state and local laws governing nondiscrimination in employment in every location in which the Company has facilities. This policy applies to all terms and conditions of employment, including, but not limited to, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation and training.

2016 New York Genome Center. All rights reserved.

Read more here:
New York Genome Center NYGC Careers

Posted in Genome | Comments Off on New York Genome Center NYGC Careers

DNA – The New York Times

Posted: April 12, 2016 at 3:42 pm

Latest Articles

Most of the diversity outlined on the new tree has been hiding in plain sight.

By CARL ZIMMER

In frank statements, the Most Rev. Justin Welby, the spiritual leader of 86 million Anglicans, and his mother talked of the shock of discovering the truth in the past month.

By YONETTE JOSEPH

A number of recent genetic studies challenge the notion that mistaken paternity is commonplace, finding a rate of less than 1 percent.

By CARL ZIMMER

A quest to create a state-of-the-art map of the Aedes aegypti mosquitos genome involves scientists from assorted disciplines who rarely collaborate.

By AMY HARMON

A study of global genomes has found that our ancestors are even more varied than we thought.

Scientists hope to use a cellphone app to recruit 100,000 women to submit DNA samples to try to identify genes that may be markers for postpartum depression.

By PAM BELLUCK

The interbreeding may have given modern humans better immunity to pathogens, according to the authors of the analysis of global genomes.

By CARL ZIMMER

A diverse biotechnology company hopes its genetically engineered mosquitoes can help stop the spread of a devastating virus. But thats just a start.

By ANDREW POLLACK

A report in the journal Science reveals how evolution harnessed viral DNA to rewire humans own genetic circuitry and strengthen the immune system.

By CARL ZIMMER

Cutting-edge technology has enabled analysis of ever-tinier genetic samples. But as the science pushes boundaries, some experts are raising reliability questions.

By CARL ZIMMER

President Obama said the success of his initiative to collect genetic data so scientists can develop drugs and personalized treatments hinged partly on understanding who owns the data.

By JULIE HIRSCHFELD DAVIS

The suit, filed in State Supreme Court, seeks monetary damages from the hospital and Dr. David H. Newman, whom she says sexual attacked her last month.

By SHARON OTTERMAN

Marina Stajic, the former director of the Forensic Toxicology Laboratory, sued the city Thursday, saying she was made to resign after she questioned the use of a novel form of DNA testing.

By BENJAMIN WEISER and JOSEPH GOLDSTEIN

On top of abundant evidence that humans carry Neanderthal DNA, a new study shows that the interbreeding went both ways.

By CARL ZIMMER

The recommendation by the influential Texas Forensic Science Commission is not legally binding, but is likely to carry great weight.

Jeremy Wilson, who is charged with forgery, says he is the son of a famed Irish Republican Army leader. His lawyer, a supporter of the group, said he could not take the chance he was being tricked.

By JAMES C. McKINLEY Jr.

When other researchers studied the 4,500-year-old-genome, they discovered that the conclusion that much of Africa has Eurasian ancestry was incorrect.

By CARL ZIMMER

At a legendary dinner in 1951, the Explorers Club was said to have served its members mammoth, but DNA tests have revealed what the meat really was.

By JAMES GORMAN

A surprising genetic diversity has been discovered among the citys bedbugs, which the scientists tracked through DNA samples that were taken from the subway system.

By THE ASSOCIATED PRESS

For years, the remains have been out of reach, the subject of a legal struggle that pitted 3 scientists against their own administration and the Kumeyaay.

By CARL ZIMMER

Most of the diversity outlined on the new tree has been hiding in plain sight.

By CARL ZIMMER

In frank statements, the Most Rev. Justin Welby, the spiritual leader of 86 million Anglicans, and his mother talked of the shock of discovering the truth in the past month.

By YONETTE JOSEPH

A number of recent genetic studies challenge the notion that mistaken paternity is commonplace, finding a rate of less than 1 percent.

By CARL ZIMMER

A quest to create a state-of-the-art map of the Aedes aegypti mosquitos genome involves scientists from assorted disciplines who rarely collaborate.

By AMY HARMON

A study of global genomes has found that our ancestors are even more varied than we thought.

Scientists hope to use a cellphone app to recruit 100,000 women to submit DNA samples to try to identify genes that may be markers for postpartum depression.

By PAM BELLUCK

The interbreeding may have given modern humans better immunity to pathogens, according to the authors of the analysis of global genomes.

By CARL ZIMMER

A diverse biotechnology company hopes its genetically engineered mosquitoes can help stop the spread of a devastating virus. But thats just a start.

By ANDREW POLLACK

A report in the journal Science reveals how evolution harnessed viral DNA to rewire humans own genetic circuitry and strengthen the immune system.

By CARL ZIMMER

Cutting-edge technology has enabled analysis of ever-tinier genetic samples. But as the science pushes boundaries, some experts are raising reliability questions.

By CARL ZIMMER

President Obama said the success of his initiative to collect genetic data so scientists can develop drugs and personalized treatments hinged partly on understanding who owns the data.

By JULIE HIRSCHFELD DAVIS

The suit, filed in State Supreme Court, seeks monetary damages from the hospital and Dr. David H. Newman, whom she says sexual attacked her last month.

By SHARON OTTERMAN

Marina Stajic, the former director of the Forensic Toxicology Laboratory, sued the city Thursday, saying she was made to resign after she questioned the use of a novel form of DNA testing.

By BENJAMIN WEISER and JOSEPH GOLDSTEIN

On top of abundant evidence that humans carry Neanderthal DNA, a new study shows that the interbreeding went both ways.

By CARL ZIMMER

The recommendation by the influential Texas Forensic Science Commission is not legally binding, but is likely to carry great weight.

Jeremy Wilson, who is charged with forgery, says he is the son of a famed Irish Republican Army leader. His lawyer, a supporter of the group, said he could not take the chance he was being tricked.

By JAMES C. McKINLEY Jr.

When other researchers studied the 4,500-year-old-genome, they discovered that the conclusion that much of Africa has Eurasian ancestry was incorrect.

By CARL ZIMMER

At a legendary dinner in 1951, the Explorers Club was said to have served its members mammoth, but DNA tests have revealed what the meat really was.

By JAMES GORMAN

A surprising genetic diversity has been discovered among the citys bedbugs, which the scientists tracked through DNA samples that were taken from the subway system.

By THE ASSOCIATED PRESS

For years, the remains have been out of reach, the subject of a legal struggle that pitted 3 scientists against their own administration and the Kumeyaay.

By CARL ZIMMER

Read this article:
DNA - The New York Times

Posted in DNA | Comments Off on DNA – The New York Times

DNA | Buzzle.com

Posted: at 3:42 pm

DNA (Deoxyribonucleic acid), of the shape of a double helix, found in the nucleus of a cell, is where genetic information is encoded and transferred. It has all the instructions needed for the development and functioning of an organism. DNA segments are known as genes. DNA research is a very complex scientific study which aids in finding complicated evolutionary information in humans and animals. It is a vast topic that has aided theories and discoveries in many diverse areas. The articles given below present DNA research in clearer light. They also tell you about the structure and composition of DNA, and also about DNA sequencing and replication.

What Does a Mutagen Mean in Biology?

Mutagens can cause disastrous effects on organisms.This Buzzle article explains what does the term mutagen mean. We have also explained different types of mutagens along with some examples of each type.

How to Make a 3D DNA Model Project

DNA - the blueprint of our life! Making a three-dimensional model, either for a school project or just because you want to understand DNA better, is very simple. This Buzzle write-up shows you how to make a 3D DNA model project...

Nucleoside vs. Nucleotide

Nucleoside and nucleotide are commonly used terms with regards to the molecular and structural components of the nucleic acids, DNA and RNA. They are often used interchangeably, however, they are quite distinct entities. This...

Plasmids: Functions, Types, and Uses

Plasmids are naturally occurring genetic elements found in microbial organisms. They can be found in all three domains of microbes - archaea, bacteria, and eukarya/eukaryota. This Buzzle article elaborates on the concept of a...

Difference Between Adenine and Adenosine

The terms 'adenine' and 'adenosine' are often used interchangeably, to refer to each other, however they differ with respect to their chemical structure and the other biomolecules that they interact with. This article compares...

55 Interesting Facts About The DNA

DNA or deoxyribonucleic acid, is the fundamental molecular unit that is responsible for the existence of living things on our planet. DNA is a vital part of each and every organism; be it a plant, an animal, a human, or even a...

DNA Bases and Their Pairing Rules

The DNA of all the living beings is composed of just four bases i.e. Adenine (A), Thymine (T), Guanine (G), and Cytosine (C). The various juxtapositions of these 4 bases give rise to the genetic codes of all the biota on the...

Best Microarray Data Analysis Software

High quality image processing and appropriate data analysis are important steps of a microarray experiment. This Buzzle article outlines some of the best microarray data analysis software available to extract statistically and...

Prokaryotic Vs. Eukaryotic DNA Replication

DNA replication is a complex process comprising several co-ordinated activities of specific molecules. This Buzzle write-up provides a brief difference between prokaryotic and eukaryotic DNA replication processes.

Difference Between DNA and RNA

Technically, ribonucleic acid and deoxyribonucleic acid sure sound alike. But let's face it, in the human body, redundancy does not exist. Check out this article to understand the difference between DNA and RNA.

DNA Replication Steps

The process of DNA replication comprises a set of carefully orchestrated sequence of events to duplicate the entire genetic content of a cell. The current article provides a short insight into the complex DNA replication steps.

Purines and Pyrimidines

The chemical properties of purines and pyrimidines, their structure & functions and other interesting facts are presented in the article.

Chromatin Function

If you are looking for information about chromatin function and structure, you've landed on the right page. This article explains the important role it plays in cell division and inheritance.

DNA Translation

In a nutshell, DNA translation can be defined as the process that "translates" information contained in the nucleic acids (DNA and RNA) to facilitate polypeptide or protein synthesis.

What Makes up DNA?

DNA or deoxyribonucleic acid is known as the building block of life. Mainly composed of protein, the DNA has a key role in life and is considered to be the storehouse for genetic traits.

Nucleotides in DNA

DNA is a polynucleotide. The genetic information, consisting of thousands of codes is carried by the nucleotides in DNA. This genetic information helps a person to know about his ancestors. Let's discuss more about this most...

What is a Nucleotide

We may never have been able to find out about our ancestors if what is a nucleotide remained a question. It is known as the box of information which is carried through generations. So, let's go through some of its essential...

Why is DNA Important

The following article presents some points that are related to the subject of DNA studies, and which specifically describe the importance of DNA.

DNA Replication Enzymes

DNA replication, the basis of biological inheritance, is made possible by certain enzymes present in cells. In this article, I talk about these prime replication enzymes and their functions.

Mitochondrial DNA and Human Evolution

The evolution of man has always been a matter of great interest and a widely debated topic in recent times. DNA is present in each cell of the human body. The DNA of mitochondria in the cell, can be used to reconstruct the...

DNA Sequencing

DNA sequencing is a revolutionary concept in biological research that attempts to decode the human body and its working. The accurate mapping of genes and genomes is achieved through this technology.

Mitochondrial DNA Testing

Mitochondrial DNA testing is a process that helps us to trace and unravel our maternal ancestry. To know more about it, read on...

Structure of Mitochondrial DNA

Mitochondrial DNA is the genetic material that is found in mitochondria, the organelles which provide energy to cells and are hence called their powerhouses.

Functions of Mitochondrial DNA

Mitochondrial DNA or mtDNA is the deoxyribonucleic acid present in the mitochondria organelles. This DNA was discovered by Margit and Sylvan Nass via electron microscopy. The discovery enabled an understanding about the role it...

How is Mitochondrial DNA Used in Forensics

Mitochondrial DNA analysis is a boon in forensic studies, as it is used to solve difficult cases, especially in case of degraded samples that lack nuclear DNA. Here is some information on how mitochondrial DNA is used in forensics.

Who Discovered DNA

DNAs are a unique bond of molecules that determine our very beings. Read the following article to gain more information this subject.

Biochips Part 2

Breaker's invention opens the way for future RNA chips capable of revealing the molecular composition of complex mixtures like blood serum and industrial wastefar more comprehensively than current biochips.

Biochips Part 1

This article deals with biochips used in the latest technology sector. Though implanted biochips could easily become a tool of Big Brother, they are more likely to become the treatment of choice for the physician of the 21st century.

Originally posted here:
DNA | Buzzle.com

Posted in DNA | Comments Off on DNA | Buzzle.com

Jitsi – WOW.com

Posted: April 11, 2016 at 5:45 am

Jitsi Original author(s) Emil Ivov Developer(s) Jitsi Team and Contributors Initial release 2003(2003) Stable release 2.8 (build.5426) (March19, 2015; 11 months ago(2015-03-19)) [] Preview release 2.9 (nightly) [] Development status Active Written in Java Operating system Linux, Mac OS X, Windows (all Java supported) Size 52.4 MB Windows (bundles its own private JRE)[1] 78.8MB Mac OS X (includes private JRE)[2] 22MB Linux 65MB source code[3] Available in Asturian, English, French, German, Bulgarian, Japanese, Spanish, Italian, Romanian, Greek and 25 more Type Voice over Internet Protocol / instant messaging / videoconferencing License Apache Website jitsi.org

Jitsi (formerly SIP Communicator) is a free and open source multiplatform[4]voice (VoIP), videoconferencing and instant messaging application for Windows, Linux, Mac OS X and Android. It supports several popular instant-messaging and telephony protocols, including open recognised encryption protocols for chat (OTR) and voice/video/streaming and voice/video conferencing (SIP/RTP/SRTP/ZRTP), as well as built-in IPv6, NAT traversal and DNSSEC. Jitsi and its source code are released under the terms of the Apache Software Licence.[5]

Work on Jitsi (then SIP Communicator) started in 2003 in the context of a student project by Emil Ivov at the University of Strasbourg.[6] It was originally released as an example video phone in the JAIN-SIP stack and later spun off as a standalone project.[7]

Originally the project was mostly used as an experimentation tool because of its support for IPv6.[8][9] Through the years, as the project gathered members, it also added support for protocols other than SIP.

Jitsi has received support from various institutions such as the NLnet Foundation,[10][11] the University of Strasbourg and the Region of Alsace[12] and it has also had multiple participations in the Google Summer of Code program.[13][14]

In 2009, Emil Ivov founded the BlueJimp company which has employed some of Jitsi's main contributors[15][16] in order to offer professional support and development services[17] related to the project.

In 2011, after successfully adding support for audio/video communication over XMPPs Jingle extensions, the project was renamed to Jitsi since it was no longer "a SIP only Communicator".[18][19] This name originates from the Bulgarian "" (wires).[20]

On November 4, 2014, "Jitsi + Ostel" scored 6 out of 7 points on the Electronic Frontier Foundation's secure messaging scorecard. They lost a point because there has not been a recent independent code audit.[21]

On February 1, 2015, Hristo Terezov, Ingo Bauersachs and the rest of the team released [22] version 2.6 from their stand at the Free and Open Source Software Developers' European Meeting 2015 event in Brussels. This release includes security fixes, removes support of the deprecated MSN protocol, along with SSLv3 in XMPP. Among other notable improvements, the OS X version bundles a Java 8 runtime, enables echo cancelling by default, and uses the CoreAudio subsystem. The Linux build addresses font issues with the GTK+ native LookAndFeel, and fixes some long standing issues about microphone level on call setup when using the PulseAudio sound system. This release also adds the embedded Java database Hyper SQL Database to improve performance for users with huge configuration files, a feature which is disabled by default. A full list of changes is [23] available on the project web site.

Jitsi supports multiple operating systems, including Windows as well as Unix-like systems such as Linux, Mac OS X and BSD. "Beta" packages built for Android are available[24] but the project's roadmap describes the porting to Android as "on hold".[25] It also includes:[26]

The following protocols are currently supported by Jitsi:[4]

Jitsi is mostly written in Java[31] which helps reuse most of the same code over the various operating systems it works on. Its GUI is based upon Swing. The project also uses native code for the implementation of platform specific tasks such as audio/video capture and rendering, IP address selection, and access to native popup notification systems such as Growl.

The project uses the Apache Felix OSGi implementation[32] for modularity.

Among others Jitsi uses the JAIN-SIP protocol stack for SIP support and the Jive Software Smack library [33] for XMPP.[34]

As Jitsi can handle IPv6 it is especially interesting for direct PC-to-PC (peer-to-peer) communication, for instance, if both sides were 'trapped' behind NAT routers, but could obtain a reachable IPv6 address via a tunnel-broker.[citation needed]

The Jitsi community has also completed an ICE implementation called ice4j.org, which it uses to provide NAT traversal capabilities, and assist IPv4 to IPv6 transition.[35]

Audio systems supported are PortAudio, PulseAudio and WASAPI (Windows Audio Session API).

Go here to see the original:
Jitsi - WOW.com

Posted in Jitsi | Comments Off on Jitsi – WOW.com