Archive for March, 2015
Nuns and Nuclear Security – The New Yorker
Saturday, March 21st, 2015A Reporter at Large MARCH 9, 2015 ISSUE
Break-In at Y-12
How a handful of pacifists and nuns exposed the vulnerability of America’s nuclear-weapons sites.
BY ERIC SCHLOSSER
http://www.newyorker.com/magazine/2015/03/09/break-in-at-y-12
Genome sequence-independent identification of RNA editing sites : Nature Methods : Nature Publishing Group
Saturday, March 21st, 2015Genome sequence-independent identification of #RNA editing
siteshttp://www.nature.com/nmeth/journal/vaop/ncurrent/full/nmeth.3314.html GIREMI uses LD to separate edit sites from #SNPs
Qing Zhang
& Xinshu Xiao
Nature Methods (2015) doi:10.1038/nmeth.3314Received
Linking signaling pathways to transcriptional programs in breast cancer
Friday, March 20th, 2015Linking #signaling pathways [phospho-proteins in samples] to transcriptional programs [TFs & targets], via matrices
http://genome.cshlp.org/content/24/11/1869.long
More verbosely:
using matrices to linking TF & targets and phosphorsylated proteins in particular samples to gene expression in specific samples
Linking signaling pathways to transcriptional programs in breast cancer
Hatice U. Osmanbeyoglu1,
Raphael Pelossof1,
Jacqueline F. Bromberg2 and
Christina S. Leslie1
Genome Research
Article: In ‘Data-ism’ Steve Lohr gives his take on how Big Data will shape our future.
Friday, March 20th, 2015Adam Gopnik article
Friday, March 20th, 2015Should You Choose The iPhone 5s Over The iPhone 6?
Thursday, March 19th, 2015Set up mail delegation – Gmail Help
Wednesday, March 18th, 2015Convergent transcriptional specializations in the brains of humans and song-learning birds
Sunday, March 15th, 2015Convergent…specializations in brains of humans & songbirds http://www.sciencemag.org/content/346/6215/1256846.long Both have matching expression patterns across regions
Quantum internet could keep us safe from spying eyes – tech – 18 September 2014 – New Scientist
Sunday, March 15th, 2015#Quantum internet could keep us safe from spying eyes http://www.newscientist.com/article/mg22329873.000-quantum-internet-could-keep-us-safe-from-spying-eyes.html#.VQOzLBDF87M Uses photon states for intercept-proof key distribution (#QKD)
QT:{{"
That something is called quantum key distribution (QKD). The technique
transmits photons in particular quantum states to generate a secure
cryptographic key, with which you can encrypt data sent over an
ordinary, non-quantum connection. QKD is far more secure than standard
cryptography, which relies on hard mathematical problems that can
theoretically be cracked, given enough computing power. Any attempt to
intercept a quantum key, however, will disturb the photon’s quantum
states, alerting users not to use the key (see "Unbeatable security")."}}