Skip to main content

Home/ LumpysCorner/ Group items tagged hand

Rss Feed Group items tagged

John Lemke

Calif. woman to show off newly transplanted hand - 0 views

  •  
    This March 5, 2011 image provided by UCLA Health System shows Dr. Kodi Azari, left, and members of his surgical team performing a hand transplant at Ronald Reagan UCLA Medical Center in Los Angeles. The transplant was performed on a 26-year-old mother from Northern California who lost her right hand in a traffic accident nearly five years ago. UCLA is only the fourth center in the nation to offer this procedure and the 13th hand transplant surgery performed in the United States
John Lemke

Sperm can pass trauma symptoms through generations, study finds | The Verge - 0 views

  • People who experience early childhood trauma, like abuse or war, often exhibit a number of hormonal imbalances. The mechanisms involved are poorly understood, but most scientists agree that traumatic events alter gene expression, which then causes misregulations in a number of biological processes. But whether these changes can actually be passed down to offspring is a controversial question, because it would imply that acquired traits — traits that aren't actually encoded in DNA, but rather arise following certain experiences — are somehow being passed down through generations.
  • After the pups of the traumatized male mice were born, scientists monitored their behavior. As expected, these pups showed the same symptoms of trauma that their fathers did, despite having never undergone traumatic events themselves. And these symptoms were even apparent in a third generation of mice.
  • When researchers looked at the sperm of the traumatized mice, they discovered that the microRNAs in these sperm cells were also present in abnormally high numbers. "This means that germ cells — sperm in males and oocytes in females — are very sensitive to environmental conditions in early life," Mansuy says, "and early childhood trauma has consequences not only for the brain but also for the germ cell line
  •  
    An interesting article on how trauma may be handed down but not by psychological transference nor DNA but by some other means of physiology. In other words, it is neither handed down from environment nor DNA. 
John Lemke

Compound Plurals - 0 views

  • In regard to American usage, the Chicago Manual of Style recommends that writers consult Merriam-Webster’s Collegiate Dictionary for “tricky” compounds like fathers-in-law, courts-marital, and chefs d’oeuvre, adding, “For those not listed, common sense can usually provide the answer.”
  • Compound nouns are of three kinds: open, closed, and hyphenated.
  • Some speakers have trouble with nouns that end in -ful, puzzling, for example, between cupfuls and cupsful. This is a case in which common sense should probably advise against consulting M-W. Although the M-W entries for cupful, handful, and armful list the plurals cupfuls, handfuls, and armfuls first, they give cupsful, handsful, and armsful as alternative spellings. In addition, the spelling handfull is in there as an “also.” My American spellchecker does not countenance any of these alternatives. Cupsful doesn’t cut it because compound nouns are made up of two or more words that can be used on their own. For example, the words in the compound policeman can be used separately: “The man called for the police.” The element ful in cupful is not a word; it’s a suffix. Common sense tells me that cupsful is incorrect.
John Lemke

What happens with digital rights management in the real world? | Technology | theguardi... - 0 views

  • In 1997's Bernstein v United States, another US appeals court found that code was protected expression. Bernstein was a turning point in the history of computers and the law: it concerned itself with a UC Berkeley mathematician named Daniel Bernstein who challenged the American prohibition on producing cryptographic tools that could scramble messages with such efficiency that the police could not unscramble them. The US National Security Agency (NSA) called such programs "munitions" and severely restricted their use and publication. Bernstein published his encryption programs on the internet, and successfully defended his right to do so by citing the First Amendment. When the appellate court agreed, the NSA's ability to control civilian use of strong cryptography was destroyed. Ever since, our computers have had the power to keep secrets that none may extract except with our permission – that's why the NSA and GCHQ's secret anti-security initiatives, Bullrun and Edgehill, targetted vulnerabilities in operating systems, programs, and hardware. They couldn't defeat the maths (they also tried to subvert the maths, getting the US National Institute for Standards in Technology to adopt a weak algorithm for producing random numbers).
    • John Lemke
       
      This is also why they have a hard on for developing a quantum computer.
  • An increase in the security of the companies you buy your media from means a decrease in your own security. When your computer is designed to treat you as an untrusted party, you are at serious risk: anyone who can put malicious software on your computer has only to take advantage of your computer's intentional capacity to disguise its operation from you in order to make it much harder for you to know when and how you've been compromised.
  • The DMCA's injunction against publishing weaknesses in DRM means that its vulnerabilities remain unpatched for longer than in comparable systems that are not covered by the DMCA. That means that any system with DRM will on average be more dangerous for its users than one without DRM.
  • ...4 more annotations...
  • For example, in 2005, Sony-BMG music shipped a DRM called the "Sony Rootkit" on 51m audio CDs. When one of these CDs was inserted into a PC, it automatically and undetectably changed the operating system so that it could no longer see files or programs that started with "$SYS$." The rootkit infected millions of computers, including over 200,000 US military and government networks, before its existence became public. However, various large and respected security organisations say they knew about the Sony Rootkit months before the disclosure, but did not publish because they feared punishment under the DMCA. Meanwhile, virus-writers immediately began renaming their programs to begin with $SYS$, because these files would be invisible to virus-checkers if they landed on a computer that had been compromised by Sony.
    • John Lemke
       
      How the Sony DRM created serious security issues.  It should also be considered a violation of our civil rights.  Who the hell gave Sony permission to modify my OS!  Furthermore why didn't the OS companies sue Sony?  Likely because they are in bed together.
  • If I was a canny entrepreneur with a high appetite for risk -- and a reasonable war-chest for litigation – I would be thinking very seriously about how to build a technology that adds legal features to a DRM-enfeebled system (say, Itunes/Netflix/Amazon video), features that all my competitors are too cowardly to contemplate. The potential market for devices that do legal things that people want to do is titanic, and a judgment that went the right way on this would eliminate a serious existential threat to computer security, which, these days, is a synonym for security itself.And once anti-circumvention is a dead letter in America, it can't survive long in the rest of the world. For one thing, a product like a notional Itunes/Amazon/Netflix video unlocker would leak across national borders very easily, making non-US bans demonstrably pointless. For another, most countries that have anti-circumvention on the books got there due to pressure from the US Trade Representative; if the US drops anti-circumvention, the trading partners it armed-twisted into the same position won't be far behind.I've talked to some lawyers who are intimate with all the relevant cases and none of them told me it was a lost cause (on the other hand, none of them said it was a sure thing, either). It's a risky proposition, but something must be done. You see, contrary to what the judge in Reimerdes said in 2000, this has nothing to do with whether information is free or not – it's all about whether people are free.
  • The DMCA is a long and complex instrument, but what I'm talking about here is section 1201: the notorious "anti-circumvention" provisions. They make it illegal to circumvent an "effective means of access control" that restricts a copyrighted work. The companies that make DRM and the courts have interpreted this very broadly, enjoining people from publishing information about vulnerabilities in DRM, from publishing the secret keys hidden in the DRM, from publishing instructions for getting around the DRM – basically, anything that could conceivably give aid and comfort to someone who wanted to do something that the manufacturer or the copyright holder forbade.
  • Significantly, in 2000, a US appeals court found (in Universal City Studios, Inc v Reimerdes) that breaking DRM was illegal, even if you were trying to do something that would otherwise be legal. In other words, if your ebook has a restriction that stops you reading it on Wednesdays, you can't break that restriction, even if it would be otherwise legal to read the book on Wednesdays.
John Lemke

How I Make a Living as a Writer (and You Can, Too) - 0 views

  • If you sit down at a blank screen every day and simply do nothing then you are a writer. If you write one word, even better. Some people will disagree. Maybe you will disagree. That's fine. We also can all disagree. Meanwhile, our DNA is telling us we are pretty much exactly the same.
  • I try to read pieces or chapters in 3-4 books a day or more. I read at least from one non-fiction, one or two quality fiction, and one inspirational. I try to read at the level I want to write. I do this in the morning before I start writing.
  • Destroy every gatekeeper.
  • ...7 more annotations...
  • Do what you want. Self-publishing simply means you write a book and you figure out how to get it into the hands of other people. It might just be you sell it on your email list. Congrats! You're then a published author. In my post "How to Self Publish a Bestseller" I write about the details and the numbers.
  • This seems opposite of what I said above. But blogging is not such a bad idea. How come? Because it makes you write every day. And it also is fun to build friends and community around your blog. But if you want to blog, don't just register a domain name and start blogging. You won't get any traffic.
  • There's a thousand ways to build community and practice writing on the Internet. Blog is one of them but there are many others. My #1 suggestion: first practice on Quora (cc Marc Bodnick) If you go there, follow me and say "Hi!".
  • If you don't write every day, you won't know what your potential skill level is. You will be producing sub-par work. And in a world where 15 million books will be published this year, your book will have little chance to shine.
  • Do the math: if you just write 1,000 words a day that are publishable then you have a book every two months. 1,000 words a day is not easy. But it's not hard either.
  • No. You used to be able to make a living writing articles. Just a few years ago. In 2005 I made a good living writing about 3-4 articles a day for different publications while I was running my fund and before I started and sold Stockpickr. But those days are over. People just don't pay for content. And there are too many writers. It's a supply and demand thing.
  • ou have to write more than one book. And for most people, you have to write dozens of books.
  •  
    A great article of advice from a published author.
John Lemke

Top 10 Incredibly Useful Windows Programs to Have On Hand - 0 views

  •  
    While I am a Linux user, I often get asked for recommendations by Windows users. This is a great list of utilities. Especially the malware software.
John Lemke

Theme Week: How to Socialize Your Posts for Maximum Effect : @ProBlogger - 0 views

  • If you have more time on your hands, you can of course choose to engage in more social networks. Just don’t overcommit and end up spreading yourself too thin!
  • Get 10 successful bloggers from different niches in a room and ask them which social networks are best for driving traffic to their blogs, and you’ll get a different answer from each one as to where their readers hang out in greatest numbers.
  • One of the things that I’d highly recommend you ponder when it comes to this is to think about developing a rhythm to your sharing.
  • ...1 more annotation...
  • Of course the other thing to do when you’re resharing the same piece of content is to mix up the timings of your updates. If you first tweet a piece of content at 9am – at least wait a few hours to reshare it so that others in different parts of the world are likely to be online. The same thing applies to other networks (although I’d wait longer than a few hours to reshare on networks like Facebook or Google+). Also consider avoiding sharing during those times of the day that are particularly ‘noisy’. Sometimes sharing during times that you’d think your audience isn’t online is actually best. Dan Zarrella calls this ‘contra-competitive timing’ and has some great data on the topic here.
1 - 7 of 7
Showing 20 items per page