Dear All,
Please find attached a video recording of Ron's talk from earlier
today on: Bio-Data,
Bioinformatics and the Gears that Make Biological Machines Tick
http://www.youtube.com/watch?v=3RnpkmgH40o
Sorry for the light quality, we'll try to correct that for the next class
The intersection of biology and computer science is showing tremendous
potential. Literally thousands of data sources great and small are publicly
available now. Come and enjoy a low key introduction to all the 'omes' -
genomes, transcriptomes, proteomes, methylomes, metabolomes, etc. We'll
play with some of the more useful data sources, tools and biological
pathways.
No biology training is necessary - the talk will be accessible to anyone.
Programming skills are useful, but not necessary.
If you have a laptop, please bring it. We will try to look at data in the
class and preview a couple of tools.
Cygwin on windows machines, OsX or linux are useful here, but we can go
over these at the time if needed.
We will be designing a project for anyone who wants to go deeper and get
more experience with Bioinformatics.
Ron Shigeta PhD has been doing bioinformatics for 12 years in biotech in
the east bay, before that he made biological information as a protein
crystallographer.!
--
Ryan Bethencourt
Tel: (415) 825 2705
ryan.bethencourt(a)gmail.com
www.bamh1.comwww.linkedin.com/in/bethencourtwww.logos-press.com/books/biotechnology_business_development.php
The answer is http://preyproject.com
you can install this free software on your laptop and it hides, amd just
waits. You create a login on preyproject.com (also free) and if your
laptop goes missing, you log in and tell it to start tracking it!
that means that you can find out what your computer is doing, what network
it's on, and even take pictures through the camera. If you get really
close, and need to actually locate it, you can make it make a loud noise!
this requires you making your computer usable without a password, which i
recommend to everyone anyway. If your computer gets stolen and it's
locked with a password, they will simply turn it off and sell it to a pro
who will format the hard drive and sell it.
If your computer is welcoming and without a password, the thief might keep
it around and watch your movies, and connect to the internet at their
house and things like that. Then you can track it down and get it back,
along with all your precious data.
Now you know.
-jake
Raymond Lai wrote:
So sorry to hear, DJ Neon Leon. I don't know how to track a laptop, but
keep me in the loop.
Ray
On Sat, Jul 27, 2013 at 9:22 AM, johanna faust <female.faust at
gmail.com>wrote:
> and although this did not occur at SR, sure could use help if anyone
knows
> how to track via mac address.
>
> needless to say, he is bumming. hard.
>
> details returned per private request.
>
> --
> *Be seeing you.*
I came into Noisebridge today, and it's buzzing here. People are moving
around, teaching and working. There is a very positive vibe. There were
people at the library on the chairs who weren't sleeping there, they were
talking about ideas with JC. It was cool.
The bathrooms were sparkling clean.
High feeling of excellence and cool things soon to happen. Telling people
at SudoRoom and other organizations about the upcoming Noisebridge party.
Turing is pleasant, quiet and nice to work in since I'm learning Python
right now for fun. I'm able to concentrate, and then when I'm done I can go
out and enjoy the vibe.
This sure beats the past few Sundays I've had!
and although this did not occur at SR, sure could use help if anyone knows
how to track via mac address.
needless to say, he is bumming. hard.
details returned per private request.
--
*Be seeing you.*
hi all,
thought you might enjoy these excellent comics with stories from
"cybernavigators," librarians at chicago public libraries whose job
entirely consists of helping people learn how to use computers. lots of
lessons here for us as we teach and learn!
http://echicago.illinois.edu/stories.html
- marina
now that we've installed a big on/off switch for the elevator upstairs,
which locks out calling it from downstairs, there is no more need to use
the Emergency Stop to lock the elevator.
In order to help with safety and comply with elevator laws, we should
install a loud alarm bell that rings continuously if the emergency stop is
activated. Since the only time the emergency stop will be used will be
emergencies, this will help save lives by alerting people to the fact that
there is an emergency.
we should also post a sign in the elevator, warning that use of the
emergency stop button for non-emergencies is against elevator law and can
be punished as a misdemeanor with up to one year in Real jail.
the first time someone decides to do it anyway, they will wake up all the
sleeping tenants and get a stern talking-to
its not george anymore is it?
the alterative is, we add a relay to bypass the stop switch long enough to
get the elevator down and open.. problem solved.
come on people, we are hackers! lets hack our problems!
There is now a large paper chart in Sudoroom, on the door between the
sudo sink and the buzzer phone. It breaks up the next month or so into
3-hour blocks, and you can pen yourself in for any blocks you like.
The idea is for people to commit to being at Sudoroom at certain
hours, and to identify empty slots, in an effort to help keep Sudoroom
open as often as possible!
Already I am signed up for tomorrow 9-3pm, and another sudoer has
signed up for 9-2 on Friday.
More hi-tech solutions are welcome, but we are starting simple in the
interest of it actually happening. :)
Due to incredible enthusiasm and demand, Sudo Room will now be hosting
monthly Cryptoparties! Join us from 2-5pm every Third Sunday to learn about
digital security and get up and running with basic tools for privacy and
anonymity.
*
*
*What's a Cryptoparty?*
A Cryptoparty is a safe space for learning about digital security, privacy
and anonymity. In the wake of Snowden's leak of the NSA's PRISM project,
digital security has become a widespread concern. What most people don't
know enough about is the advantages and disadvantages of various tools such
as TOR, GPG, and OTR.
*That's a lot of acronyms!
*
No worries! Friendly geeks will be giving presentations, answering any
questions, and leading hands-on workshops to get you comfortable using the
right tools for you. By the end of the day, you'll have learned security
techniques & software, understand why responsible security is important,
and have made friends with other proactive residents! Bring your phone and
your laptop. *All* skill levels are welcome!
Spread to your networks. Fliers to come!
Calendar Event:
https://sudoroom.org/ai1ec_event/cryptoparty-a-digital-security-privacy-wor…
--------
Jenny
http://jennyryan.nethttp://thepyre.orghttp://thevirtualcampfire.orghttp://technomadic.tumblr.com
`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`
"Technology is the campfire around which we tell our stories."
-Laurie Anderson
"Storytelling reveals meaning without committing the error of defining it."
-Hannah Arendt
"To define is to kill. To suggest is to create."
-Stéphane Mallarmé
~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`~`