Posts Tagged ‘from’

Transfer Dropbox to Google Drive

August 13, 2019

Quantifying the impact of public omics data.

August 11, 2019

similar idea to quantifying the value of the data

NYTimes: Walmart Shooting in El Paso Renews Attention on Crime Frequency at Its Stores

August 11, 2019

Photopea and Polarr- browser based editors

August 6, 2019

The browser-based photoshop editor…is

(It’s more like a lite version of photoshop with all the functionality an amateur might ever use. Accepts photoshop, GIMP, etc. file formats in addition to other standard file formats.)

For a web-based Lightroom alternative –

Low-level password protection

August 4, 2019

You set up two pages (e.g., page.html and protectpage.html). page.html has the javascript code snippet within the tags. protectpage.html has the protected information. If someone enters the correct password — ‘letmein’ in the example — the protected page opens in a new browser window.

Of course, the password is identifiable by viewing page source. Also, a webcrawling bot will probably index or scrape protectpage.html at some point.

Anything more sophisticated is challenging.

Single Cell Resource for Mouse

August 2, 2019


Tabula Muris is a compendium of single cell transcriptome data from the model organism Mus musculus, containing nearly 100,000 cells from 20 organs and tissues. The data allow for direct and controlled comparison of gene expression in cell types shared between tissues, such as immune cells from distinct anatomical locations. They also allow for a comparison of two distinct technical approaches: “}}

Bluetooth was named after a Danish King (but just bad tooth?)

August 2, 2019

“The first documented appearance of Harald’s nickname “Bluetooth” (as blatan; Old Norse *blátǫnn) is in the Chronicon Roskildense (written ca. 1140), alongside the alternative nickname Clac Harald.[5] Clac Harald appears to be a confusion of Harald Bluetooth with the legendary or semi-legendary Harald Klak, son of Halfdan. The byname is given as Blachtent and explicitly glossed as “bluish or black tooth” (dens lividus vel niger) in a chronicle of the late 12th century, Wilhelmi abbatis regum Danorum genealogia.[6] The traditional explanation is that Harald must have had a conspicuous bad tooth that appeared “blue” (i.e. “black”, as blár “blue” meant “blue-black”, or “dark-coloured”). Another explanation, proposed by Scocozza (1997) is that he was called “blue thane” (or “dark thane”) in England (with Anglo-Saxon thegn corrupted to tan when the name came back into Old Norse).[7]”

SKS Keyserver Network Under Attack

July 5, 2019

a good example of a hypothetical attack that now becomes real QT:{{”
“The number one use of OpenPGP today is to verify downloaded packages for Linux-based operating systems, usually using a software tool called GnuPG. If someone were to poison a vendor’s public certificate and upload it to the keyserver network, the next time a system administrator refreshed their keyring from the keyserver network the vendor’s now-poisoned certificate would be downloaded. At that point upgrades become impossible because the authenticity of downloaded packages cannot be verified. Even downloading the vendor’s certificate and re-importing it would be of no use, because GnuPG would choke trying to import the new certificate. It is not hard to imagine how motivated adversaries could employ this against a Linux-based computer network.”

Meta-omics analysis of elite athletes identifies a performance-enhancing microbe that functions via lactate metabolism

June 29, 2019

Beacons How it Works– Rocketbook

June 24, 2019

Rocketbooks for whiteboards…