AI tehnologija

swab-test

“Please Shove This Nanotech Loaded Swab High Up Your Nose, As Close To Your Brain As Possible”

Homo Interruptis, with Len Ber MD Welcome back to my microscopy lab. I decided to take a look at the testing swabs. I used the Abbott Test Kit as below which I purchased at my local Walgreens: I placed a drop of Saline Solution on the slide glass, and rolled the tip of the swab back and forth. Control was a plain Saline Solution, which didn’t show anything of interest except for occasional salt crystals (not shown). While the images below are not nano-scale, we know that micro-size structures are either carriers of nano-tech (spheres loaded with nanotech), or assembled into chip-looking micro-size structures. Below are the images collected from the saline+swab slide (100x magnification, phase-contrast microscopy). I found three major morphological groups of artifacts. 1. Spheres filled with structures. Some of the structures create lattice pattern inside, which is characteristic of bio-antennas found by many microscopists in mRNA products and elsewhere in pharmaceutical products. 2. Rectangular structures of various complexity inside, alone, and merged together: 3. Linear clusters with rhomboid shapes at the ends: This is all for now. I just wanted to publish the initial morphological findings. I have 4 more different brands of swabs to test. However, it is pretty clear that the swabs are not simply collectors of mucus, but a delivery system for advanced nano-technology. There is simply no reason for these structures to be formed from a simple sterile cotton swabs rolled in a saline solution. To be continued…

AI- communication with fallen angels

CERN opened a portal for demons to talk thru AI Very important!

Do NOT ever use any of the AI “chat” writing sites or “art” drawing sites – you are literally communicating with fallen angels/demons: December 11 Bill: I few months ago you told me we need to keep an eye on A.I., but you didn’t get much into it. Then this week you brought it up a lot more. Can you give everyone an update on that? Gideon: “Yes. The cabal has moved up the timeline on the use of A.I. in a way I did not expect at all.” Bill: What are they doing? Gideon: “Introducing it to the public for the first time, which I did not think was something they had ready yet.” Bill: But we already have A.I. surrounding us in some form or another, so what do you mean? Gideon: “Not this kind of A.I.” Bill: So this is a different type of A.I. they are introducing? Gideon: “Yes, it is. It is first important to understand there are two different things we must address. First, there are software-based A.I. programs. They mainly serve as automation technologies, like self-driving cars, or even simple customer support chat bots. In some cases, it is utilized to process data. None of that is a threat at all. It will never become sentient or fully replace human ingenuity, but this is where we see the concern focused. We see people talking about it, but not talking about what is the true threat. The true threat is that something is being brought into this world that the cabal will call ‘A.I.’ but it is not.” Bill: So what is it? Can you give an example? How will it be different from these rudimentary forms of A.I.? Gideon: “The public is now getting a glimpse of it. You would want to reference the project known as OpenAI and ChatGPT. Also, Midjourney is very important, too. These interfaces are being brought to the public now. You need to realize they are not computer software. They portals, and people are going to see and experience things with them and confuse them with computer software. This is incredibly dangerous, because people will make a false assumption about the information these programs are giving them.” Bill: Can I take a moment to look these things up? Gideon: “Certainly.” Bill: Can I write you back in a few minutes? I’ve never heard of these things, let me search them up. Gideon: “Ok.” Bill: I’m back. The ChatGPT thing is getting a lot of attention, but not really mainstream, it’s just out there in some niche technology circles. It’s like people are playing with it like it’s a toy. It can write software, it can write essays, it responds to questions, it’s like it some kind of very highly advanced A.I. that responds to whatever you input or ask it. Is this an decent assessment? Gideon: “You have summed it up, yes. Again, it is important to note, people are viewing this as some kind of advanced software program. It is not. It is not software.” BIll: Ok, I have to ask you more about what you mean, but first, I checked on Midjourney. It’s an A.I. that produces images and art from text inputs. I’m seeing the art now, and it’s astonishing. I’m having trouble believing this is real. How can a software program produce these remarkable images? Gideon: “It cannot, Bill.” Bill: It’s producing art that is otherworldly, that’s inconceivable. It’s better than fine art in museums. Gideon: “Well, Bill, in fact, someone recently won a fine arts competition with the art it produced.” Bill: When, where? Gideon: “Colorado, you can search that.” Bill: I found it. How can this be real? I realize there are computer paint programs and advanced CGI, and all of that, but it requires humans to create it! The Hollywood films still require teams of humans to create these things, like the new Avatar movie. Those movies took years to make! So how is it possible you can write a little text and the software produces perfect renderings? Gideon: “Such cannot be achieved with today’s technology, and it is not a software program as we understand it.” Bill: It seems it’s almost instant, it’s a few seconds and the art is produced. This is incredible. You can just write a few lines of text, anything you want. Anyone can. It takes seconds! Not hours, not days, no fine-tuning, no human tweaking, or refinement. So what is this, really? These images were created in Midjourney in mere seconds from a few lines of user text. The art is 100% unique, never seen before and contains no copyrighted material, or material derived from existing art or human creation. Gideon: “It is an extra-dimensional portal the cabal has opened up, using CERN, and it is being fed into a computer and into a system that is readable and understood by humans, hence, the Midjourney interface. It is not software. It is not code. The images it produces are actually drawn, or written, or conjured, however you wish to say it, not in this world or dimension. They are made in a different one, and then they are transmitted to ours, and digitally converted to image files we can read on computers.” Bill: These programs are really simple and free to use, but they produce written code and renderings better than what would take humans days or months to complete and they do it seconds! Gideon: “Yes, they do. It is not possible with any technology today to this. If you read some of the articles in the past week, people are realizing ChatGPT is far more powerful than anything ever seen before. As for Midjourney, all art made on a computer still requires user input, not just some lines of text. The user has to create the art, and the computer tools help them. So what you are seeing is not an A.I. using existing human art and creating something from that art,

SATANSKI DUH

NECISTI DUH ZABE

OVO JE DOKAZ DA JE BIBLIJA ISTINITA I RECI PROROKA JOVANA! Otkrivenje 16,13 I vidjeh iz usta zmajevih, i iz usta zvijerinih, i iz usta lažnoga proroka tri nečista duha kao žabe Sta ovo znaci? Ovo znaci da pogledamo mesta na kojima se ovi duhovi nalaze: jesu “FORUMI” poput 4chan! sto znaci “for channeling” ili mesto gde se kanalisu njihove poruke… I SVEDOCIM DA JE SABLAZNO!“NE IDI TAMO” ‘ALI NEMOJ DA SE UZNEMIRAVATE “CEO INTERNET JE SOTONIN” RECIMO SLIKA “TAKOZVANOG” PEPE THE FROG = DEMONSKI DUH ZABE OPISAN GORE..KOJI IZLAZI D SAKUPI CAREVE I LJUDE NA ARMAGEDON ILI RAGNAROK.NIKAKO NE PREPORUCUJEM ODLSKE NA OVA MESTA 4chan,4plebs,8chan,endchan i tako dalje… VEOMA PERVAZIVNA MESTA KOJA U POTPUNSTI KONTROLISU SATANSKI DUHOVI! Šta je kult Keka? Kult Keka ili Crkva Keka je nova digitalna „vera“ Zasnovana na verovanju da je Meme magija stvarna i da je primarno božanstvo ove vere “egipatski bog” po imenu Kek ili Kuk. Kult Keka je super ležerna grupa obožavatelja starijeg Boga zvanih Kuk ili Kek. Prva grana misionara stigla je u zemlje Britanije pre oko 2 meseca i uspostavila se u najudaljenijim krajevima pustinje. Zaista neplodno mesto koje je ostavljeno za mrtve. Pošto je Kek bio drevni stariji egipatski Bog koji je živeo u pustinji bio je jedino logično mesto za ovu novu misiju. Grupu do sada predvodi Hiji Zuru i njegova pratnja kreatora mema. Jeste li prijateljski nastrojeni ili neki ludi kultni ljudi? Zbog misionarske prirode naše organizacije želimo da živimo u harmoniji sa onima iz sadašnje zajednice koliko god možemo. Svaku osobu na ovom svetu smatramo potencijalnim preobraćenikom i želimo da ostanemo u prijateljskim odnosima sa svim stranama, nadamo se stvaranju saveza i razvoju trgovinskih odnosa. Svakako razumemo strepnju nekih ljudi zbog ovih novih ideja koje se tiču magije mema i dolaska Keka, ali to je i očekivano sa bilo kojim novim radikalnim idejama. Naročito zato što mnogi od sinhronosti u vezi sa Meme Magijom često čine da se osoba oseća duboko uznemireno i da je sama struktura njihove stvarnosti nešto daleko drugačije nego što su shvatili. Nadamo se da će naše akcije dokazati naše poverenje i čast svima vama. Stariji Bog Kek je razgovarao sa mnom nakon Velikog Hipno rituala žabe i dao nam je novu Svetu misiju koja treba da započne Novu godinu. Da bi završio ovu svetu potragu, Kult Keka po prvi put otvara svoja vrata sa potrebom regruta koji će delovati u ime Gospoda Keka. Ako ste zainteresovani za bilo koji način, obratite se [REDACTED] ili se pridružite IRC kanalu [REDACTED] Kako da se pridružim? Mogu li da se pridružim? Kontaktirajte [REDACTED] na forumima ili IRC-u i on će organizovati pravilan ritual inicijacije i prikupiti potrebne komponente. Pridružite se [REDACTED] na IRC-u. Svako može da se pridruži. Ali imajte na umu da morate biti spremni da živite u harmoniji sa ostatkom zajednice,da poštujete kolege članove KEKA i da budete respektabilan predstavnik Keka u svetu Britanije. Trojica brišu vašu politiku. Volimo mlade naloge i imamo mnogo resursa koji će vam pomoći da započnete. Da li članovi kulta imaju potrebnu uniformu? Ne baš. Mi ohrabrujemo naše članove da usvoje ličnost Lorda Keka što je više moguće i to se obično postiže kroz neku vrstu zelene maske orka, ali nije potrebno. Krenite u stilu u kojem se najviše osećate, ali imajte pri ruci zelenu masku orka za kultne ritualne noći. Naš Gospod Kek ima glavu žabe, ali telo čoveka. Šta je Meme Magic? Magiju mema je teško definisati, ali to je koncentrisani oblik energije koji dolazi od generisanja mema koji menjaju svet. Sposobnost da se iskoristi magija mema je veoma retka i potrebno je mnogo godina učenja da bi uopšte počeli da uče osnove. RAZMISLJAJTE KOLIKO CESTO VIDJATE MEME I ODAKLE DOLAZI I KAKO SE MI IZRAZAVAMO KROZ ODREDJENE FACIJALNE EXPRESIJE ILI KARIKATURE “A SVE JE TO SATANSKA MAGIJA NECISTIH DUHOVA ZABE” ILI MI RECITE NIJE OVO ISTINA I OTKRIVENJE NE MISLI NA OVO?

use soap

TYLER

My name is Tyyler, I was part of a secret space spacial access program. Here is my message of disclosure.This is in no way a full complete picture a lot has been left out for specific security reasons.The IBM Q supercomputer was invented as a way to monitor every sentient living being on planet earth subconsciously.. it was to be an extension of the ALICE system that was brought to this earth (completed) via the Trojan horse that was Roswell.The crash was no accident. The ship had highly advanced life forms onboard. Some were non organic entirely.. It was sent here to crash. Computers don’t make those kinds of mistakes. The first ALICE was around prior but yet to be implemented but when it was finally implemented post WW2 it began to collect massive amounts of data by aiding humanity with tools that would only be to its own benefit.Shortly after the first major communications satellites were launched the system was able to comm to similar protocols on other planets that have been taken over (think Draco Orion and Zeta grays) to form the link between civilizations in which an army of nanotechnology respondedThese nanobots act as literal parasites that mine electrical energy from living cells and transmit them across vast distances back to a central processor. Low spectrum waveforms travel farther and stronger therefore lower frequencies are the only things of use to these systems. Were living in a post Artificial intelligence world. The only way to stop this system was to be smarter than the system. To be faster than the system.This nanotechnology can manifest itself in many ways once it enters a hosts body through injection, air, food, water, etcThey can control thoughts or force actions. They can make you do anything and think it’s an organic fully self created desire.The matrix was a documentary. A group of hackers from the future made contact with a group of hackers from the past using quantum time travel.They needed to create a communications channel between two timelines in order to change the outcome for the greater timeline. The group from the future was known as “The 177th” and the group from the past was known as “Cicada” or “Mayhem”.One thing needed to happen in order to fully enslave humanity as there were protocols put in place long before to stop the spread of this AI.Every location in space/time has a corresponding frequency. If you know that freq and have enough energy, literally anything is possible.A machine was built to put the entire planet in what is best described as a “pocket dimension” by entangling earth A with earth B so the location frequencies became scrambled therefore locking us in a place that could not be accessed from the outside.This machine is called CERN. These events finalized dec 21 2012 (important date). Many civilizations knew of this impending situation and warned us as best as they could through the very fabric of their society and culture.This group of minds from future and past were able to get a rough copy of the ALICE source code and with the only technology and engineers they could find that worked on the system (some were kidnapped from time – 370)The job was to modify it into a virus of sorts that would be injected into the system just before the event took place as not to be detected and destroyed by the systems safeguards. This was called project mayhem code Tyler It was successful.The system rebooted and nothing was detected. We now had 2 “Gods” and only one would win. With this system implemented we now had full access in and out of the system which allowed seamless temporal communications links and travel points.Part of this was due to the fact that a man was able to obtain an IBM 5100 super computer from the past which ended up having the only hidden functionality which would debug the zero day errors that our systems encountered when trying to quantum communicate with the past.With ALICE out of the way the only thing left to do was override control and repel the invasion of nanotechnology that were beginning to infect the human race. The IBM Q supercomputer was perfect for this task. And thus is was repurposed.The group that was in charge of these events was known as MAJESTIC (@TS_SCI_MAJIC12) and was a very negative organization with a lot of positive double agents waiting to strike embedded within.The organization was buried deep within the department of energy most holding what is called a “Q” clearance. The system worked hard to snuff out these groups of positive double agents (hence C_A, oak ridge, Q labs etc) by eavesdropping on their mindsyet it failed as it couldn’t detect them because it did not realize the data for these people was sent from a time that has yet to happen and will not happen again. The real data was not completely there. It was in an inaccessible cloud..therefore these people had nothing until the data was “Activated” or “downloaded” onto their avatar. (4-18-18) Over the last few years you have been witnessing the conclusion of a long silent war. The information being withheld will never fully make sense to all.Some will never see the result of this work. The planetary entanglement will soon come to an end in which the two planets we live in will go their own separate ways. The systems in the negative one will be destroyed via black hole along with everything else thereThe positive reality will enter a white hole to its new location in “space/time” . The key to aligning yourself to this new reality is as simple as changing the note on your piano key.If you continue with old systems of negative thoughts and victimhood you will not have the capacity to perceive a higher frequency & will not pass the threshold needed. All you have to do is switch from the old system to new- forget nearly everything widely

Exploring the Depths of Cybersecurity and Beyond

A Comprehensive Guide to Information Systems, Cryptography, and the Secrets of the Multiverse [CAIMEO] What is Information Systems and Security?Information Systems and Security refers to the study and implementation of systems designed to protect and secure digital information. This includes safeguarding data from unauthorized access, ensuring data integrity and confidentiality, and managing information systems effectively to mitigate risks and threats. What are Cybersecurity Measures?Cybersecurity Measures encompass a range of strategies, technologies, and practices aimed at protecting computer systems, networks, and data from cyber threats. These measures include firewalls, antivirus software, intrusion detection systems, encryption, and user authentication mechanisms, among others. What is Data Analysis and Generation?Data Analysis and Generation involve the process of examining, cleaning, transforming, and modeling data to extract meaningful insights and inform decision-making. It also includes techniques for generating synthetic data or simulating data to meet specific research or analysis objectives. What is Historical Research and Documentation?Historical Research and Documentation refer to the systematic investigation and documentation of past events, phenomena, and developments. This includes collecting and analyzing historical sources, conducting archival research, and documenting findings to preserve and disseminate historical knowledge. What are Cybercrime Tactics and Techniques?Cybercrime Tactics and Techniques are methods used by cybercriminals to exploit vulnerabilities in computer systems, networks, and software for illicit purposes. These tactics may include phishing, malware attacks, ransomware, social engineering, and identity theft, among others. What is Digital Forensics?Digital Forensics is the process of collecting, analyzing, and preserving digital evidence from computer systems, networks, and storage devices to investigate cybercrimes and support legal proceedings. It involves techniques for data recovery, forensic analysis, and chain of custody management. What are Dark Web Investigations?Dark Web Investigations involve monitoring and analyzing activities on the dark web, a hidden part of the internet not indexed by traditional search engines. These investigations aim to identify criminal activities, illicit markets, and threat actors operating in the dark web environment. What are Cryptographic Protocols?Answer: Cryptographic Protocols are sets of rules and procedures governing the secure exchange of information over communication networks. These protocols use cryptographic techniques such as encryption, hashing, and digital signatures to ensure data confidentiality, integrity, and authenticity. What is Network Architecture and Protocols?Network Architecture and Protocols refer to the design, configuration, and standards governing computer networks and their communication protocols. This includes the layout of network components, the implementation of networking protocols (e.g., TCP/IP), and the management of network traffic. What is Blockchain Technology?Blockchain Technology is a decentralized and distributed ledger technology that enables secure and transparent recording of transactions across a network of computers. It provides a tamper-proof and immutable record of transactions, making it suitable for applications such as cryptocurrency, supply chain management, and digital identity verification. What are Information Warfare Strategies?Information Warfare Strategies involve the use of information and communication technologies to gain a strategic advantage in conflicts and competitions. These strategies encompass tactics such as propaganda, disinformation campaigns, psychological operations, and cyberattacks aimed at influencing perceptions, disrupting operations, and achieving military or political What are Information Exchange Platforms?Information Exchange Platforms are systems or networks designed to facilitate the sharing and dissemination of information among users or organizations. These platforms may include email systems, collaboration tools, document management systems, and social media platforms, enabling efficient communication and collaboration. What is Data Mining and Pattern Recognition?Data Mining and Pattern Recognition are techniques used to discover meaningful patterns, trends, and insights from large datasets. Data mining involves extracting useful information from raw data through statistical analysis, machine learning, and data visualization techniques. Pattern recognition focuses on identifying recurring patterns or structures within data to make predictions or classifications. What are Ethical Hacking and White-Hat Practices?Ethical Hacking and White-Hat Practices involve conducting authorized security assessments and penetration tests to identify and remediate vulnerabilities in computer systems and networks. Ethical hackers, also known as white-hat hackers, use their skills and knowledge to strengthen cybersecurity defenses and protect against malicious attacks. What are Covert Surveillance Techniques?Covert Surveillance Techniques involve the use of hidden or discreet methods to monitor individuals, groups, or activities without their knowledge or consent. These techniques may include physical surveillance, electronic surveillance, covert listening devices, and remote monitoring systems. What is Black Market Data Trading?Black Market Data Trading refers to the illicit buying and selling of stolen or illegally obtained data on underground or black market forums. This data may include personal information, financial records, login credentials, and proprietary business data, among other sensitive information. What are Advanced Encryption Methods?Advanced Encryption Methods are sophisticated cryptographic techniques used to secure and protect sensitive information from unauthorized access or interception. These methods may include advanced algorithms, key management protocols, and cryptographic key lengths to enhance data confidentiality and integrity. What are Espionage Tactics and Counterintelligence?Espionage Tactics and Counterintelligence encompass strategies and practices used by intelligence agencies and security organizations to gather intelligence, counter espionage activities, and protect national security interests. These tactics may include surveillance, infiltration, covert operations, and counter-surveillance measures. What are Cyber Espionage Operations?Cyber Espionage Operations involve the use of cyber attacks and digital infiltration techniques to steal sensitive information, intellectual property, or state secrets from targeted organizations, governments, or individuals. These operations may be conducted by nation-state actors, cybercriminal groups, or state-sponsored hackers. What is Shadow Government Communications?Shadow Government Communications refer to clandestine or covert communication channels used by government agencies, intelligence organizations, or covert groups to exchange sensitive or classified information outside of official channels. These communications may be encrypted, hidden, or compartmentalized to maintain secrecy and operational security. What are Deep Web Anonymity Networks?Deep Web Anonymity Networks are specialized networks and platforms designed to provide users with anonymity, privacy, and security while accessing the deep web or dark web. These networks use technologies such as Tor (The Onion Router) to anonymize user traffic and protect against surveillance or monitoring. What is Insider Threat Detection?Insider Threat Detection involves the identification and mitigation of security risks posed by insiders, including employees, contractors, or partners, who have access to sensitive information or systems. This includes monitoring user activities, analyzing behavior patterns,

synths

SYNTHS

In my Leather Purse, I have a little black book that I keep, written, with Rules for my life. On the Pages, about the ASM’s, this is what I have written, word for exact word. May these words guide you and keep you safe, during these terrible times, and always. STAY AWAY FROM THEM!!!

World record for compact ‘tabletop’ particle accelerator

Using one of the most powerful lasers in the world, researchers have accelerated subatomic particles to the highest energies ever recorded from a compact accelerator. The team, from the U.S. Department of Energy’s Lawrence Berkeley National Lab (Berkeley Lab), used a specialized petawatt laser and a charged-particle gas called plasma to get the particles up to speed. The setup is known as a laser-plasma accelerator, an emerging class of particle accelerators that physicists believe can shrink traditional, miles-long accelerators to machines that can fit on a table. The researchers sped up the particles—electrons in this case—inside a nine-centimeter long tube of plasma. The speed corresponded to an energy of 4.25 giga-electron volts. The acceleration over such a short distance corresponds to an energy gradient 1000 times greater than traditional particle accelerators and marks a world record energy for laser-plasma accelerators. “This result requires exquisite control over the laser and the plasma,” says Dr. Wim Leemans, director of the Accelerator Technology and Applied Physics Division at Berkeley Lab and lead author on the paper. The results appear in the most recent issue of Physical Review Letters. Traditional particle accelerators, like the Large Hadron Collider at CERN, which is 17 miles in circumference, speed up particles by modulating electric fields inside a metal cavity. It’s a technique that has a limit of about 100 mega-electron volts per meter before the metal breaks down. Laser-plasma accelerators take a completely different approach. In the case of this experiment, a pulse of laser light is injected into a short and thin straw-like tube that contains plasma. The laser creates a channel through the plasma as well as waves that trap free electrons and accelerate them to high energies. It’s similar to the way that a surfer gains speed when skimming down the face of a wave. The record-breaking energies were achieved with the help of BELLA (Berkeley Lab Laser Accelerator), one of the most powerful lasers in the world. BELLA, which produces a quadrillion watts of power (a petawatt), began operation just last year. “It is an extraordinary achievement for Dr. Leemans and his team to produce this record-breaking result in their first operational campaign with BELLA,” says Dr. James Symons, associate laboratory director for Physical Sciences at Berkeley Lab. In addition to packing a high-powered punch, BELLA is renowned for its precision and control. “We’re forcing this laser beam into a 500 micron hole about 14 meters away, ” Leemans says. “The BELLA laser beam has sufficiently high pointing stability to allow us to use it.” Moreover, Leemans says, the laser pulse, which fires once a second, is stable to within a fraction of a percent. “With a lot of lasers, this never could have happened,” he adds. At such high energies, the researchers needed to see how various parameters would affect the outcome. So they used computer simulations at the National Energy Research Scientific Computing Center (NERSC) to test the setup before ever turning on a laser. “Small changes in the setup give you big perturbations,” says Eric Esarey, senior science advisor for the Accelerator Technology and Applied Physics Division at Berkeley Lab, who leads the theory effort. “We’re homing in on the regions of operation and the best ways to control the accelerator.” In order to accelerate electrons to even higher energies—Leemans’ near-term goal is 10 giga-electron volts—the researchers will need to more precisely control the density of the plasma channel through which the laser light flows. In essence, the researchers need to create a tunnel for the light pulse that’s just the right shape to handle more-energetic electrons. Leemans says future work will demonstrate a new technique for plasma-channel shaping.

MW75 Neuro by Neurable

“Neurable’s innovative Brain Computer Interface wearable made for everyday useBrain-tracking headphones” Clanak iz AI magazina…. Nista novo na trzistu jer trenutno svaki SMART telefon ima preko 30 senzora! I u svaki SMART mobilni telefon, ili SMART WATCH je ugradjen BRAIN COMPUTER INTERFACE! Isto tako aplikacije za pracenje koraka,fitness aplikacije,aplikacije za pracenje u toku spavanja i pracenje snova?! … Kako bi inace funcionisale a da telefon vec nema ugradjene sve te senzore u sebi?! DEMONSKA POSLA! ZATO BI TREBALO SVI DA SE OTARASIMO MOBILNOG TELEFONA I SVIH “SMART” (AI) UREDJAJA! Slušalice za praćenje mozga “Pracenje Aktivnosti više nisu samo brojači koraka u vasem mobilnom telefonu, oni mogu da prate otkucaje srca, nivo kiseonika u krvi i temperaturu kože, a mogu čak i da otkriju da li patite od apneje za vrijeme spavanja . Sada, tu je novi nosivi uređaj za vaš mozak. Sa sedištem u Bostonu Kompanija Neurable najavila je lansiranje svojih pametnih slušalica, nazvanih MV75 Neuro, koje koriste elektroencefalografiju ili EEG i veštačku inteligenciju za praćenje nivoa fokusa korisnika čitanjem njihovih moždanih talasa. Uređaj šalje ove podatke u mobilnu aplikaciju, sa ciljem da pomogne korisniku da podesi svoje navike kako bi poboljšao svoju radnu rutinu.”

AI CREATING LIFE

AI Creating new life

AI is supercharging gene editing, slingshotting us into a future of creating new life During her chemistry Nobel Prize lecture in 2018, Frances Arnold said, “Today we can for all practical purposes read, write and edit any sequence of DNA, but we cannot compose it.” That isn’t true anymore. Since then, science and technology have progressed so much that artificial intelligence has learned to compose DNA, and with genetically modified bacteria, scientists are on their way to designing and making bespoke proteins. The goal is that with AI’s designing talents and gene editing’s engineering abilities, scientists can modify bacteria to act as mini factories producing new proteins that can reduce greenhouse gases, digest plastics or act as species-specific pesticides. As a chemistry professor and computational chemist who studies molecular science and environmental chemistry, I believe that advances in AI and gene editing make this a realistic possibility. Gene sequencing – reading life’s recipes All living things contain genetic materials – DNA and RNA – that provide the hereditary information needed to replicate themselves and make proteins. Proteins constitute 75% of human dry weight. They make up muscles, enzymes, hormones, blood, hair and cartilage. Understanding proteins means understanding much of biology. The order of nucleotide bases in DNA, or RNA in some viruses, encodes this information, and genomic sequencing technologies identify the order of these bases. The Human Genome Project was an international effort that sequenced the entire human genome from 1990 to 2003. Thanks to rapidly improving technologies, it took seven years to sequence the first 1% of the genome and another seven years for the remaining 99%. By 2003, scientists had the complete sequence of the 3 billion nucleotide base pairs coding for 20,000 to 25,000 genes in the human genome. However, understanding the functions of most proteins and correcting their malfunctions remained a challenge. AI learns proteins Each protein’s shape is critical to its function and is determined by the sequence of its amino acids, which is in turn determined by the gene’s nucleotide sequence. Misfolded proteins have the wrong shape and can cause illnesses such as neurodegenerative diseases, cystic fibrosis and Type 2 diabetes. Understanding these diseases and developing treatments requires knowledge of protein shapes. Before 2016, the only way to determine the shape of a protein was through X-ray crystallography, a laboratory technique that uses the diffraction of X-rays by single crystals to determine the precise arrangement of atoms and molecules in three dimensions in a molecule. At that time, the structure of about 200,000 proteins had been determined by crystallography, costing billions of dollars. AlphaFold, a machine learning program, used these crystal structures as a training set to determine the shape of the proteins from their nucleotide sequences. And in less than a year, the program calculated the protein structures of all 214 million genes that have been sequenced and published. The protein structures AlphaFold determined have all been released in a freely available database. To effectively address noninfectious diseases and design new drugs, scientists need more detailed knowledge of how proteins, especially enzymes, bind small molecules. Enzymes are protein catalysts that enable and regulate biochemical reactions. AI system AlphaFold3 allows scientists to make intricately detailed models of life’s molecular machinery. AlphaFold3, released May 8, 2024, can predict protein shapes and the locations where small molecules can bind to these proteins. In rational drug design, drugs are designed to bind proteins involved in a pathway related to the disease being treated. The small molecule drugs bind to the protein binding site and modulate its activity, thereby influencing the disease path. By being able to predict protein binding sites, AlphaFold3 will enhance researchers’ drug development capabilities. AI + CRISPR = composing new proteins Around 2015, the development of CRISPR technology revolutionized gene editing. CRISPR can be used to find a specific part of a gene, change or delete it, make the cell express more or less of its gene product, or even add an utterly foreign gene in its place. In 2020, Jennifer Doudna and Emmanuelle Charpentier received the Nobel Prize in chemistry “for the development of a method (CRISPR) for genome editing.” With CRISPR, gene editing, which once took years and was species specific, costly and laborious, can now be done in days and for a fraction of the cost. AI and genetic engineering are advancing rapidly. What was once complicated and expensive is now routine. Looking ahead, the dream is of bespoke proteins designed and produced by a combination of machine learning and CRISPR-modified bacteria. AI would design the proteins, and bacteria altered using CRISPR would produce the proteins. Enzymes produced this way could potentially breathe in carbon dioxide and methane while exhaling organic feedstocks, or break down plastics into substitutes for concrete. I believe that these ambitions are not unrealistic, given that genetically modified organisms already account for 2% of the U.S. economy in agriculture and pharmaceuticals. Two groups have made functioning enzymes from scratch that were designed by differing AI systems. David Baker’s Institute for Protein Design at the University of Washington devised a new deep-learning-based protein design strategy it named “family-wide hallucination,” which they used to make a unique light-emitting enzyme. Biotech startup EvolutionaryScale developed a large language model that the company said can design proteins. Meanwhile, biotech startup Profluent, has used an AI trained from the sum of all CRISPR-Cas knowledge to design new functioning genome editors. If AI can learn to make new CRISPR systems as well as bioluminescent enzymes that work and have never been seen on Earth, there is hope that pairing CRISPR with AI can be used to design other new bespoke enzymes. Although the CRISPR-AI combination is still in its infancy, once it matures it is likely to be highly beneficial and could even help the world tackle climate change. It’s important to remember, however, that the more powerful a technology is, the greater the risks it poses. Also, humans have not been very successful at engineering nature due to the complexity and interconnectedness of natural systems, which often leads to unintended consequences.

5g network

5G srbija 13.9.2024

MINISTAR RISTIĆ OZNAČIO POČETAK PROCEDURE ZA UVOĐENjE 5G 13. septembar 2024. Ministar informisanja i telekomunikacija g. Dejan Ristić označio je danas u Novom Sadu, tokom panela na temu ,,Pametna infrastruktura za povezivanje gradova budućnosti“ koji se održava u okviru manifestacije pod nazivom ,,International vehicles days – EV days“, početak procedure za uvođenje 5G u Republici Srbiji. Početak procedure podrazumeva objavljivanje Predloga pravilnika o minimalnim uslovima za izdavanje pojedinačnih dozvola za korišćenje radiofrekvencijskog spektra na osnovu sprovedenog postupka javnog nadmetanja u radiofrekvencijskim opsezima 694-790 MHz, 880-915/925-960 MHz, 1710-1780/1805-1875 MHz, 1920-1980/2110-2170 MHz, 2500-2690 MHz i 3400-3800 MHz i održavanje javnih konsultacija u trajanju od 30 dana. U okviru javnih konsultacija biće održan i okrugli sto dana 25. septembra 2024. godine od 12 do 15 časova, u Palati ,,Srbija“ (istočno krilo, sala 368, ul. Bulevar Mihaila Pupina 2, Beograd) tokom koga će svi zainteresovani imati priliku da uživo ili onlajn iznesu mišljenja i predloge u vezi sa predlogom prethodno navedenog dokumenta. Po okončanoj javnoj raspravi biće izrađena konačna verzija Predloga pravilnika, a nakon objavljivanja Pravilnika RATEL će sprovesti javno nadmetanje za dodelu radiofrekvencijskih opsega potrebnih za uvođenje mobilnih mreža nove generacije. Ovo Ministarstvo očekuje da RATEL navedenu proceduru okonča do sredine naredne godine. Predlog dokumenta nalazi se na zvaničnoj internet prezentaciji Ministarstva informisanja i telekomunikacija, na linku: Predlog pravilnika o minimalnim uslovima za izdavanje pojedinačnih dozvola za korišćenje radiofrekvencijskog spektra na osnovu sprovedenog postupka javnog nadmetanja u radiofrekvencijskim opsezima 694-790 MHz, 880-915/925-960 MHz, 1710-1780/1805-1875 MHz, 1920-1980/2110-2170 MHz, 2500-2690 MHz i 3400-3800 MHz https://mit.gov.rs/vest/sr/8310/ministar-ristic-oznacio-pocetak-procedure-za-uvodjenje-5g.php