Thứ Tư, 1 tháng 2, 2017

Waching daily Feb 1 2017

(MLG)

THIS IS BROKEN AF

For more infomation >> The Grateful Crane is OP - Duration: 3:49.

-------------------------------------------

Scientists Have Found That Memories May Be Passed Down Through Generations In Our DNA - Duration: 3:32.

Scientists Have Found That Memories May Be Passed Down Through Generations In Our DNA

By Dylan Harper

New research from Emory University School of Medicine, in Atlanta, has shown that it

is possible for some information to be inherited biologically through chemical changes that

occur in DNA.

During the tests they learned that that mice can pass on learned information about traumatic

or stressful experiences � in this case a fear of the smell of cherry blossom � to

subsequent generations.

According to the Telegraph, Dr Brian Dias, from the department of psychiatry at Emory

University, said: �From a translational perspective, our results allow us to appreciate

how the experiences of a parent, before even conceiving offspring, markedly influence both

structure and function in the nervous system of subsequent generations.

�Such a phenomenon may contribute to the etiology and potential intergenerational transmission

of risk for neuropsychiatric disorders such as phobias, anxiety and post-traumatic stress

disorder.�

This suggests that experiences are somehow transferred from the brain into the genome,

allowing them to be passed on to later generations.

The researchers now hope to carry out further work to understand how the information comes

to be stored on the DNA in the first place.

They also want to explore whether similar effects can be seen in the genes of humans.

Professor Marcus Pembrey, a paediatric geneticist at University College London, said the work

provided �compelling evidence� for the biological transmission of memory.

He added: �It addresses constitutional fearfulness that is highly relevant to phobias, anxiety

and post-traumatic stress disorders, plus the controversial subject of transmission

of the �memory� of ancestral experience down the generations.

�It is high time public health researchers took human transgenerational responses seriously.

�I suspect we will not understand the rise in neuropsychiatric disorders or obesity,

diabetes and metabolic disruptions generally without taking a multigenerational approach.�

Professor Wolf Reik, head of epigenetics at the Babraham Institute in Cambridge, said,

however, further work was needed before such results could be applied to humans.

He said: �These types of results are encouraging as they suggest that transgenerational inheritance

exists and is mediated by epigenetics, but more careful mechanistic study of animal models

is needed before extrapolating such findings

to humans.�

For more infomation >> Scientists Have Found That Memories May Be Passed Down Through Generations In Our DNA - Duration: 3:32.

-------------------------------------------

The Bold and The Beautiful - My Time is Now - Duration: 2:43.

>> Ridge: Let's not overreact, okay?

>> Thomas: I'm being iced out again.

How am I supposed to react?

>> Ridge: Who knows how long this arrangement's gonna last.

We'll revisit it.

>> Thomas: And in the meantime, you and Steffy are gonna be

running the company and -- and running my life.

>> Ridge: You know that's not true.

>> Thomas: How about this?

Do you believe in me?

Do you believe in my talent as a designer?

>> Ridge: You know I do.

>> Thomas: So you studied under Granddad, and I studied under

you.

Granddad passed the torch to you.

Shouldn't you passing that torch to me someday?

>> Ridge: Maybe I will.

>> Thomas: And maybe not.

Even if Steffy does step down as C.E.O., which I doubt, what

about Rick?

You're getting married to Brooke, and she wants him in

this office just as bad as he wants it.

Another person ahead of your own son.

I just -- I don't see how I fit in here anymore.

>> Ridge: You fit in here as a talented, young designer, as a

Forrester, and as my son.

>> Thomas: I wish that meant something.

>> Ridge: What?

How the hell can you say that?

When you and Caroline had your thing, I stepped away, and that

wasn't easy for me.

But it was best for you, it was best for your son, it was best

for her.

And this is best for you.

>> Thomas: Dad, I know that was hard.

This was hard for everyone.

But this is not the best.

I don't see how I benefit at all.

I wasn't consulted on any of this.

>> Ridge: You were in New York!

>> Thomas: Has anybody ever heard of a phone call, a text,

an e-mail?

Come on!

It's like I don't even exist.

[ Sighs ] My family, my company that I

have shares in, they are making major decisions without me, and

I am just supposed to sit back and be okay with all of this.

>> Ridge: I thought you were dealing with things.

>> Thomas: I still am.

Caroline and the baby are in New York.

My son is being raised without me -- my son.

So yeah, I'm dealing with things.

But I come back here and I have to answer to Steffy as C.E.O.?

And -- And -- And now this.

>> Ridge: "This" is us taking control of this company again.

That's what "this" is.

>> Thomas: Correction, Dad.

You and Steffy are taking over as C.E.O. under the guise of

Quinn.

There's no family decision made here.

I had no input in this.

I'm happy for you.

You deserve it.

But it is time for me to look out for my future.

For more infomation >> The Bold and The Beautiful - My Time is Now - Duration: 2:43.

-------------------------------------------

Piccolo Attempts a Let's Play - Dragon Ball Super Let's Play Parody - Duration: 1:33.

waves and rooooooocks

hey what is up my friends this is your pal Piccolo here to play a scary game!

Just be warned I might scream!

It's gonna be Resident Evil!

I've got my hydration ready in case I need to get my energy on as you know we sometimes

need to do in this business, and in general I am just hella stoked to play and get scared

and SCREAM.

So let's get started!

We're in a very scary forest.

Something terrifying could happen at any moment, ooo what's over here?

Hmm.

Nothing.

That's terrifying!

There's nothing it's like a ghost!

You know, because you don't see ghosts?

Ha?

Ha?

Ha?

Let's find something else.

Tra la la.

La.

AAAAAAAAAAA saws!

That's the name of a horror movie, Saw!

I, I'm probably supposed to crouch down and walk through there but you know what?

I'm just too scared!

I can't do it man, I can't do it bros!

This is, this is too much for me.

Peace out!

I'm out of here!

For more infomation >> Piccolo Attempts a Let's Play - Dragon Ball Super Let's Play Parody - Duration: 1:33.

-------------------------------------------

DARPA Vader and the Evil Intel Empire Inside - Duration: 33:05.

DARPA

Vader and the Evil Intel Empire Inside.

By the Anonymous Patriots.

One of the best ways to describe the U.S. Department of Defense and DARPA (Defense Advanced

Research Projects Agency) is to use the Star Wars moniker �Evil Empire� to describe

its international, secretive agenda to take over the world and turn all of us into neo-feudal

slaves who have no choice but to give allegiance to the controllers of the universe�Darth

Vader and the Sith Lords.

DARPA �Vader� has controlled technological innovation since 1958 when it was created

by the military-driven Evil Empire, a/k/a Department of Defense. Every emerging technology

from the Evil Empire leads humanity into the science fiction fate of machines controlling

humans, much like Darth Vader became a weapon that was half man and half machine. There

is much wisdom and truth that lies behind the first Star Wars movie, and its story was

given to humanity as a warning of how the Evil Empire and its Death Star planned to

destroy the entire planet.

Folks, this is no longer science fiction. This battle for Earth is going on now and

we, like the Rebel Alliance, must join forces to destroy the imperial forces of Darth Vader.

Aside: Do you know the real back story of Star Wars? If not, see Star Wars: The Secret

Weapon and Why George Lucas has Kept It Hidden.

Folks at the DoD should read science fiction so that they can see how their actions�individually

and collectively�are leading humanity into the evil destiny commonly found in sci-fi:

robot wars, cyborgs turning against humans, computer take-over of the world, endless weapons,

and, you guessed it � the Death Star. DARPA is the father of war-fighting, both conventional

and digital. And as we all know, Darth Vader took his orders from the Evil Emperor. DARPA

Vader is controlled by a man they called �Yoda,� but is in reality the Evil Emperor who leads

a group called the Highlands Forum (Evil Empire Imperial Command) that directs all military

research and development.

Who is this Evil Emperor who looks as innocent as Yoda? His name is Andrew Marshall and for

decades this single man has driven the Highland Forum (Evil Empire) into creating weapons

of every sort that have been released into the corporate world and now control your laptop,

phone, computer, and every other device with a microprocessor inside � especially the

�Evil Intel Empire Inside.�

Intel Inside is found in our private digital devices and is, in fact, collecting �Intelligence�

for the Department of Defense, CIA, and NSA who are all members of the Evil Empire. Yes,

the one they call �Yoda� is actually the Evil Emperor in disguise who controls DARPA

Vader and the evil Sith lords of war. He does not have lightning bolts shooting out of his

fingers � unless of course he uses one of his many DARPA inventions to do so.

Andrew Marshall: Former Head of the Highlands Forum

The Evil Emperor, as we call Andrew Marshall, was the director of the United States Department

of Defense�s Office of Net Assessment from 1973 to 2015. He was appointed by Richard

Nixon and remained in office during all successive administrations that followed until his retirement

on January 2, 2015. Marshall created the Highlands Forum as a secret think tank for warfare innovation.

All meetings are invitation only and not open to the public and no written records are kept.

Marshall created this type of secret platform so that no one could prove the Highland Forum

exists or has the greatest power over tech warfare on the planet.

DARPA and the Highlands Forum have essentially taken over the world and few people have noticed.

From creating the devices that control all nuclear weapons to incubating the technologies

that created the Internet (originally ARPANET), Intel microprocessors, Cisco routers, Google

search engines, Facebook, the Internet of Things, I-phones, Microsoft software, MacAfee

security software, and all conventional and digital warfare devices, among many others.

The Highlands Forum has been the headquarters of the Evil Imperial Empire for five decades.

The Evil Emperor Andrew Marshall has the blood of millions on his hands and yet he is considered

an America hero instead of a warlord criminal.

There�s an Intel Inside

To be truthful, this ad should read:

Intel �LOOKS� Inside

Ever wonder why Intel used to run those warm fuzzy ads letting us know that there was an

�Intel Inside,� as if we had a choice of what microprocessor was inside our computer?

They had a monopoly on microprocessors for decades and certainly end-use consumers didn�t

have a choice of what components were inside their computers. Why would Intel spend money

on ads to make us feel good about Intel? For goodness sake, it is just a microchip in your

computer.

Key Point: What if we were to tell you that inside every Intel microprocessors is a smaller

processor that lets the Sith Lords at Intel � who work for the Department of Defense

�control every aspect of your computer remotely no matter what encryption codes you use.

Yes, the Evil Emperor (Andrew Marshall) was able to retire two years ago at age 94 knowing

that the Empire�s control has reached into every digital device in the world through

the good work of his best student, DARPA Vader. The only thing left for the Evil Emperor to

do is activate the Death Star, which as you will see in the DARPA �future plans� below,

has already been built. The question is: �Will Luke Skywalker show up and defeat the Evil

Empire?�

Intel-Based PC�s Permanently Hackable

To be truthful, this ad should read:

Intel �Controllers� of Tomorrow

All Intel microprocessor chips have a built-in backdoor that allows complete remote access

to a PC, your PC, through a second physical processor embedded within the main processor

which has its own operating system embedded on the chip. It is being advertised as something

that will allow IT professionals the ability to remotely troubleshoot a PC. Intel�s latest

x86 chips contain a secret backdoor with an embedded subsystem called the Management Engine

(ME) that functions as a separate CPU and cannot be disabled, and the code is proprietary.

The Management Engine is a dedicated micro-controller on all recent Intel platforms. The first versions

were included in the network card and later moved into the chipset where it shares flash

with the BIOS but is completely independent of the CPU. It allows IT professionals to

view the contents of hard drives, check the memory, hunt for problems on a machine remotely,

or take over the system entirely.

Even an encrypted hard drive can be monitored and controlled by the �processor within

the processor� that already has your encryption key. There is more than just the NSA monitoring

your calls, emails, and transmissions � there is Intel (DARPA) �Inside� your computer.

Intel collects �intelligence� but it also provides a backdoor to control, or turn off

your computer at will just like it has been demonstrated that Cisco routers have a backdoor

open to the NSA. A backdoor is a method of bypassing normal authentication in a cryptosystem

used for securing unauthorized remote access to a computer.

Key Point: The word Intel was used for this DARPA product because it is collecting personal

INTELLIGENCE from YOU that can be used against YOU anytime the Evil Empire decides it is

to be done.

Why does DARPA, through Intel, have open access to all of your files and your computer? DARPA

funded all of the original development of microprocessors. Intel is a front for DARPA

and the military efforts to create, control, and weaponize all digital platforms through

cyber-warfare. DARPA, ARPARNET, DARPANET, the Internet, and microprocessors are military

creations that were allowed to come into the public market place only after the Department

of Defense, and the CIA through In-Q-Tel, installed backdoors to control these powerful

digital platforms of war fighting.

Some European-made chips used in defense contracts have a built-in �kill switch� that can

be accessed remotely to disable a microprocessor remotely on weapons that use the chip. The

Pentagon has realized that it no longer controls who manufactures the chips that go into its

increasingly complex systems. Nearly every military system today contains some commercial

hardware. No entity, no matter how well funded, can afford to manufacture its own safe version

of every chip in every piece of equipment.

Vetting a chip is nearly impossible and requires a scanning electron microscope to examine

the many layers of a chip and the millions or billions of transistors. Semiconductor

chips are made in Singapore, Taiwan, China, Europe, but Intel designs and manufactures

all their own chips in their own fabrication plants in America.

Defense Science Board, which advises the DoD on science and technology developments, warned

in a report that the continuing shift to overseas chip fabrication would expose the Pentagon�s

most mission-critical integrated circuits to sabotage. The board was especially alarmed

that no existing tests could detect such compromised chips, which led to the formation of the DARPA

Trust in IC program. Each year, secure government computer networks weather thousands of attacks

over the Internet from places where most of our electronics are being manufactured. Any

malefactor who can penetrate government security can find out what chips are being ordered

by the DoD and then target them for sabotage.

In other words, DARPA Vader and the Evil Emperor are in open warfare with the rebellion that

has hi-jacked the microprocessing industry in the infiltrated the Imperial Command.

Calling on Rebels of the Alliance to Take Out the Real Death Star

Fellow Patriots and Rebels of the Alliance, we have taken the plans of the Galactic Empire�s

Death Star and trust that you will know what to do with this Intel. Rebels have been preparing

themselves since 1977, when the first Star Wars was released, to face the real Evil Empire,

Darth Vadar, the Sith Lords, and the Imperial Command. This is no longer a science fiction

fantasy or sequel to the next Star Wars. This is the real war and all Rebels of the Alliance

are called to save the galaxy, or at least western civilization.

A Citizens Intelligence Report was previously given in a recent article. If you have not

armed yourself with this intelligence, please do so now. The CIA and Deep State Exposed.

We need all Alliance Rebels to analyze the Death Star�s plans and identify vulnerable

exhaust ports that connect to the main reactor.

In this additional intelligence report to fellow Alliance Rebels, we will show you the

following to assist in your planning efforts in analyzing the Death Star:

Microprocessors, the Internet, Cisco Systems, Google, and Intel were all DARPA projects

that were allowed to flourish with new technologies created and funded by the military for cyberwarfare.

Most high-tech moguls are simply �front men� selling DARPA and In-Q-Tel (the CIA�s

DARPA) products that control our lives and spy on us continually.

Intel processors have a backdoor built into the microprocessor that allows complete monitoring

and control over your personal computer.

Cisco Systems is a front for DARPA routers that were created with a backdoor for the

NSA to spy on �virtually every exchange on the Internet.�

Cisco System�s �Internet of Things� plants net-bots in all devices under its control

that can be activated remotely and used for cyber-attacks.

The Internet was first a DARPA project called the ARPANET which was created as an information

technology weapon for cyberwarfare.

DARPA, the Inventors of Warfare Technology

In 1999, the CIA created its own venture capital investment firm, In-Q-Tel, to fund promising

start-ups that might create technologies useful for intelligence agencies just as the Department

of Defense had years earlier created DARPA. Both groups are controlled by the Highlands

Forum (Group). The Highlands Forum provides the ideas and funding for the scientific weaponization

of new inventions through cooperation between the military and corporate contractors. Its

biggest successes recently have been led by the CIA�s In-Q-Tel in the development of

high-tech network-based cyber-warfare.

In-Q-Tel contracts almost all of its work through SAIC (Science Applications International

Corporation) which changed its name to Leidos in 2013. Leidos is among the top 10 largest

defense contractors in the U. S. and has a symbiotic relationship with the NSA and U.

S. intelligence agencies.

The Highland Forum, DARPA, and In-Q-Tel are secret multi-national high-tech think tanks

for inventing and controlling innovations that can be turned into weapons. Military

and information technology experts gather at the Forum meetings to consider the impacts

of the globalization of IT on U. S. interests and warfare. The Forum developed the idea

of �network-centric warfare� which is now a top concern of the military and the

corporations that serve it.

DARPANET = Internet

In 1973, DARPA initiated a research program to investigate techniques and technologies

for interlinking packet networks of various kinds. The objective was to develop communication

protocols which would allow networked computers to communicate transparently across multiple,

linked packet networks for the use of defense contractors. This was called the �Internetting

Project� and the system of networks which emerged from the research was known as ARPANET,

later to be called Internet.

In 1986, the U.S. National Science Foundation (NSF) initiated the development of the NSFNET

which, today, provides a major backbone communication service for the Internet. The National Aeronautics

and Space Administration (NASA) and the U.S. Department of Energy contributed additional

backbone facilities in the form of the NSINET and ESNET respectively. Thus, the electronic

connectivity of the Internet was advanced with government funding.

A great deal of support for the Internet community has come from the U.S. Federal Government,

since the Internet was originally part of a federally-funded research program and, subsequently,

has become a major part of the U.S. research infrastructure.

Cisco Systems � DARPA Routers

Once the ARPANET proved to be effective, routers were created that could handle exchanges between

systems and computers. In 1998, virtually every Internet exchange went through a Cisco

router. In 2010, a researcher at IBM publicly revealed a flaw in a Cisco operating system

that allows a hacker to use a backdoor that was supposed to be available only to law enforcement

agencies. The intruder could hi-jack the Cisco device and use it to spy on all communications

passing through it, including the content of e-mails, leaving products vulnerable to

attack, particularly ubiquitous software programs like those produced by Microsoft. These backdoors

put millions of customers and their private information at risk and jeopardizes the security

of electrical power facilities, public utilities, and transportation systems.

Cisco has been accused of remotely monitoring users� connections through Cisco�s Linksys

E2700, E3500, E4500 devices. They have been reported to be remotely updated to a firmware

version that forces users to register for a cloud service which allows Cisco to monitor

their network use and ultimately shut down the cloud service account and render the affected

router unusable.

Cisco has also been accused of building into their routers a firewall backdoor developed

by NSA. The Tailored Access Operations (TAO) unit and other NSA employees intercept servers,

routers and other network gear being shipped to organizations targeted for surveillance

and install covert firmware onto them before they�re delivered. These Trojan horse systems

were described by an NSA manager as being �some of the most productive operations

in TAO because they pre-position access points into hard target networks around the world.�

The Creation of DARPA�s Google

The United States intelligence community funded, nurtured and incubated Google as a military

weapon to control information. Seed-funded by the NSA (DARPA) and CIA (In-Q-Tel & SAIC),

Google was one among a group of private sector start-ups co-opted by U.S. intelligence to

control information warfare.

In 1994 (the same year the Highlands Forum �DARPA�s boss � was founded under the

stewardship of the Office of the Secretary of Defense, the ONA, and DARPA) ?two PhD students

at Stanford University, Sergey Brin and Larry Page, made their breakthrough on the first

automated web crawling and page ranking application. That application remains the core component

of what eventually became Google�s search service. Brin and Page had performed their

work with funding from the Digital Library Initiative (DLI), a multi-agency program of

the National Science Foundation (NSF), NASA and DARPA.

The NSA needed to control and monitor digital information, particularly the data flowing

over the Internet. With its millions of customers around the world, Google is effectively a

directory of people using the Internet. It stores users e-mail addresses and knows where

they�re physically located, when they log in, and what they search for on the web. Google

has a profile on every user. The government can �command� that any company must turn

over that information, and it does so as part of the NSA�s Prism program, which Google

had been participating in for years by the time it signed the cooperative agreement with

the NSA.

Under Google�s terms of service, the company advises its users that it may share their

personal information with outside organizations, including government agencies, in order to

�detect, prevent, or otherwise address fraud, security or technical issues� and to �protect

against harm to the rights, property or safety of Google.�

Intelligence Agencies Control Industry

No intelligence organization can survive if it doesn�t know its enemy. As expansive

as the NSA�s network of sensors is, it�s sometimes easier to get precise intelligence

about hacking campaigns from the targets themselves. That�s why the NSA partnered with Google.

Google�s Sergey Brin is just one of hundreds of CEOs who have been brought into the NSA�s

circle of secrecy. Starting in 2008, the agency began offering executives temporary security

clearances, some good for only one day, so they could sit in on classified threat briefings.

Private high-level meetings are just one way the NSA has forged alliances with corporations.

Several classified programs allow companies to share the designs of their products with

the agency so it can inspect them for flaws and, in some instances, install backdoors

or other forms of privileged access. The types of companies that have shown the NSA their

products include computer, server, and router manufacturers; makers of popular software

products, including Microsoft; Internet and e-mail service providers; telecommunications

companies; satellite manufacturers; antivirus and Internet security companies; and makers

of encryption algorithms.

The NSA helps the companies find weaknesses in their products. But it also pays the companies

not to fix some of them. Those weak spots give the agency an entry point for spying

or attacking foreign governments that install the products in their intelligence agencies,

their militaries, and their critical infrastructure. Microsoft, for instance, shares zero day vulnerabilities

in its products with the NSA before releasing a public alert or a software patch. McAfee,

the Internet security company owned by Intel, provides the NSA, the CIA, and the FBI with

network traffic flows, analysis of malware, and information about hacking trends.

Companies that promise to disclose holes in their products only to the spy agencies are

paid for their silence. To an extent, these openings for government surveillance are required

by law. Telecommunications companies in particular must build their equipment in such a way that

it can be tapped by a law enforcement agency presenting a court order. But when the NSA

is gathering intelligence abroad, it is not bound by the same laws. The surveillance it

conducts via backdoors and secret flaws in hardware and software would be illegal in

most of the countries where it occurs.

AT&T is Controlled by Homeland Security

The Homeland Security Department conducts meetings with companies through its �cross

sector working groups� initiative. These sessions are a chance for representatives

from the large group of companies with which the government shares intelligence to meet

with one another and hear from U.S. officials. The attendees at these meetings often have

security clearances and have undergone background checks and interviews. Between January 2010

and October 2013, the period for which public records are available, the government held

at least 168 meetings with companies just in the cross sector working group. There have

been hundreds more meetings broken out by specific industry categories, such as energy,

telecommunications, and transportation.

Through this exchange of intelligence, the government has created a cyber security business.

AT&T and CenturyLink are in effect its private sentries, selling protection to select corporations

and industries. AT&T has one of the longest histories of any company participating in

government surveillance. Most phone calls in the United States pass through AT&T equipment

at some point, regardless of which carrier initiates them. The company�s infrastructure

is one of the most important and frequently tapped repositories of electronic intelligence

for the NSA and U.S. law enforcement agencies.

CenturyLink, which has its headquarters in Monroe, Louisiana, has been a less familiar

name in intelligence circles over the years. In 2011, the company acquired Qwest Communications,

which is now a part of the NSA�s extended security apparatus.

DARPA�s History

DARPA�s history is littered with death and destruction. DARPA and In-Q-Tel, through the

Highlands Forum (Group), have driven research and development for the military that has

cost American taxpayers trillions. This same technology is also shared with countries throughout

the world through open source sharing. The U. S. military wants our enemies to have the

technology so that they can be spied upon with ever more sophisticated technology and

attacked with ever-better weapons.

Key Point: If both sides have the same technology and weapons, then the Military-Industrial

Complex always needs more money to spend on bigger and better weapons, continually.

Areas of focus and discovery for DARPA over its history include: NASA space projects,

information processing, ARPANET (Internet), ballistic missile defense, nuclear test detection,

counterinsurgency, computer processing, behavioral sciences, materials sciences, sensors, surveillance,

radar, infrared sensing, x-ray/gamma ray detection, global positioning satellites, information

processing, tactical technologies, time-sharing systems, wide-area packet switching networks,

packet radio networks, packet satellite networks, artificial intelligence, speech recognition,

signal processing, robotics, hypermedia systems, virtual reality, personal computing, space

technology, tactical armor, anti-armor programs, infrared sensing for space-based surveillance,

high-energy laser technology, antisubmarine warfare, advanced cruise missiles, advanced

aircraft, defense applications of advanced computing, integrated circuit research, submicrometer

electronic technology and electron devices, very large-scale integration, charged particle

beams, automatic target recognition, space based sensing, propulsion, aerospace planes,

hypersonic research, strategic computing, advanced processing, networking technologies,

lightweight satellites, interstellar travel, X-planes, computer security, and cyberwarfare,

to name a few that have come into the public domain.

The list above is only the tip of the iceberg for DARPA projects. We do not know of the

projects that are still classified, which could potentially be a much greater list.

Every project of DARPA and In-Q-Tel have been weaponized before they are shared with the

companies who then are the �front� for a DARPA sponsored company. DARPA and In-Q-Tel

keep the encryption codes and build in backdoors so that they can always attempt to control

the military weapons that have been released into the corporate world for public use.

Below is a list of DARPA projects on the drawing board, or at least the ones that we know about.

You might notice that the ideas are completely insane and only perpetuate continuous warfare.

Aircraft Carriers in the Sky: Using large manned aircraft to launch and recover small

UAVs

ACTUV: A project to build an unmanned anti-submarine warfare vessel

Adaptive Execution Office: Robust connections to the war-fighter community

Air Dominance Initiative: Sixth-generation jet fighters

Atlas: A humanoid robot

Battlefield Illusion

Captive Air Amphibious Transporter

Clean-Slate Design of Resilient, Adaptive, Secure Hosts (CRASH)

Cognitive Technology Threat Warning System

Collaborative Operations in Denied Environment: Modular software architecture for UAVs

Combat Zones That See: �Track everything that moves�

Computational Weapon Optic: Computer rifle scope

DARPA XG: Technology for Dynamic Spectrum Access for assured military communications

Experimental Spaceplane 1: First stage of a reusable space transport

Gremlins: Air-launched and recoverable UAVs

Ground X-Vehicle Technology

Fast Lightweight Autonomy: Software algorithms that enable UAVs to fly anywhere

High Energy Liquid Laser Area Defense System

High Productivity Computing Systems

Human Universal Load Carrier: Battery-powered human exoskeleton

Hydra: Undersea network of mobile unmanned sensors

Long Range Anti-Ship Missile

MAHEM: Molten penetrating munition

MEMS Exchange: Microelectromechanical Systems Implementation Environment

MeshWorm: An earthworm-like robot

Mind�s Eye: A visual intelligence system for detecting and analyzing activity from

video feeds

Near Zero Power RF and Sensor Operations

Next Generation Tactical Wearable Night Vision

One Shot: Sniper scope that automatically measures crosswind and range

Persistent Close Air Support

Phoenix: A satellite project with the aim to recycle retired satellite parts

Remote-controlled Insects

Satellite Remote Listening System: A satellite mounted system that can eavesdrop on a targeted

area

DARPA Silent Talk: Identify EEG patterns for words and transmit these for covert communications

System of Systems Integration Technology and Experimentation: Distribute air warfare capabilities

Squad X Core Technologies: Digitized, integrated technologies that improve infantry awareness

SyNAPSE: Systems of Neuromorphic Adaptive Plastic Scalable Electronics

XOS: Powered military exoskeleton

SIGMA Devices: A network of mobile devices the size of smart phones

Tactical Boost Glide: Air-launched hypersonic boost glide missile

Tactically Exploited Reconnaissance Node: Ship-based long-range ISR UAV

(Urban Leader Tactical Response, Awareness and Visualization): Heads-up display

VTOL X-Plane

Warrior Web: Soft exosuit

WolfPack

XDATA: Processing and analyzing vast amounts of information

We think it fair to say that any reasonable person would agree that DARPA Vader is simply

evil and focused on killing, warfare, and manipulation science.

Just the list above shows the insanity driving this agency that is not being controlled by

any governmental agency outside of the military. There is no limit to research and development

for warfare and any idea that advances warfare is funded and put into production before anyone

can object. According to DARPA and In-Q-Tel, innovation and technological advances must

first be a weapon that can be controlled by its makers � the military.

What the Rebel Alliance Can Do to Stop the Evil Empire

Investigate, audit and then defund DARPA, In-Q-Tel and the Highlands Forum.

End the Highlands Forum and investigate all participants for industrial and military espionage.

Stop using integrated circuits, chips, and microprocessors from foreign countries.

Investigate Cisco, Google, Intel, Facebook, Microsoft, Apple, and other DARPA sponsored

and funded technology companies and seize ownership of the companies for the U. S. taxpayers

whose tax dollars created these fronts.

Seize the assets of all companies found to use backdoors in their products for any reason.

Stop the NSA from using backdoors on routers, microchips, and processors and close those

avenues of manipulation and surveillance.

There may be other strategies and tactics that we haven�t listed, and we welcome your

ideas and call to action to your community of Rebels and Patriots. We ask that citizens

around the world call on their inner Hans, Luke and Leia. The story of Star Wars is more

than a science fiction movie. The characters and plot are deeply embedded memes that actually

point to the truth about forces in the world that wish to destroy humanity.

Guided by the spirit of Obi-Wan, we can each find the FORCE within us to destroy the Death

Star created by DARPA and the DoD�and, yes, save

the world.

Rebel Alliance Unite!

For more infomation >> DARPA Vader and the Evil Intel Empire Inside - Duration: 33:05.

-------------------------------------------

Elton John's husband David Furnish is granted British citizenship - Duration: 1:32.

For more infomation >> Elton John's husband David Furnish is granted British citizenship - Duration: 1:32.

-------------------------------------------

MİKRODALGA FIRIN NASIL VE KİM TARAFINDAN BULUNDU ?- HOW MICROWAVE OVEN IS FINDED BY AND BY WHO? - Duration: 1:57.

For more infomation >> MİKRODALGA FIRIN NASIL VE KİM TARAFINDAN BULUNDU ?- HOW MICROWAVE OVEN IS FINDED BY AND BY WHO? - Duration: 1:57.

-------------------------------------------

Smash Bros Meme Factory - Duration: 5:38.

For more infomation >> Smash Bros Meme Factory - Duration: 5:38.

-------------------------------------------

Deep Learning with Tensorflow - Introduction to Unsupervised Learning - Duration: 2:16.

Hello, and welcome!

In this video, we will provide an overview of the basic concepts of unsupervised learning.

Depending on the goals of the application, there are many different techniques for training

a neural network.

A few general categories are supervised learning, reinforcement learning and unsupervised learning,

which is the topic of this video.

But before explaining what unsupervised learning is, it might be helpful to recall how supervised

learning works.

In a supervised learning algorithm, the machine receives a dataset containing inputs and the

targets associated with each input sample.

After processing the data, the resulting output is compared with the target from the dataset.

If the results differ, the net is fine-tuned until it can more accurately model the training

data.

But it might be the case that we don't have any output targets at all.

This is when we would apply unsupervised learning techniques.

With unsupervised learning, the network only receives the input data.

There are no output targets, or rewards, or punishments for its results.

The goal of unsupervised learning is to find patterns in the data, and to build new and

useful representations of it.

Unsupervised learning is a powerful technique for tasks like pattern recognition, data clustering,

object recognition, feature extraction and data dimensionality reduction, just to name

a few examples.

Depending on the nature of the data and the goals of the application, there are several

different techniques to choose from.

Some of these are Restricted Boltzmann Machines, autoencoders, Self-Organizing Maps, Principal

Component Analysis and k-means.

By now, you should understand the main ideas behind unsupervised learning, and how it differs

from supervised learning.

Thank you for watching this video.

For more infomation >> Deep Learning with Tensorflow - Introduction to Unsupervised Learning - Duration: 2:16.

-------------------------------------------

Eyüp - Pierre Loti Aerial Tramway | My Istanbul Diary [English Sub] - Duration: 4:38.

Assalamu'alaikum! Hi, everyone! Leysan here, and welcome to My Istanbul Diary!

If you have been to Istanbul then you know that this city is huge.

And the public transportation network of the city is huge and diverse as well.

Here you can see almost all kinds of public transport possible:

buses, taxis, dolmuş (share taxis), trains, ferries, tramway,

metro, BRT (bus rapid transit), funicular and, finally, aerial cable car.

I hope I didn't miss anything?!

And in this video we will have a ride on the last one in the list,

i.e. Eyüp–Piyerloti Aerial Cable Car.

And also, I will tell you a little bit about Eyüp district

where this aerial tram line is situated.

So, Eyüp–Piyerloti Aerial Cable Car brings local and foreign tourists

from the shore of the Golden Horn up to the Piyerloti Hill.

This cable car line was built to provide easy access to the hill

by avoiding a walk through the big Eyüp Cemetery on a hillside.

The Piyerloti Hill is named after the French naval officer,

novelist and Orientalist Pierre Loti (1850–1923),

who used to visit the site very often during his stay in Istanbul.

The historical café on the top of the hill, at which he used to drink Turkish coffee,

was later renamed also after him.

And one of the goals of the tourists visiting this hill, apart from the observing

the beautiful panoramic view of the Golden Horn bay and Eyüp district of the city from the observation point,

is the opportunity of spending time at the famous outdoor café and

diving into thoughts and dreams while having a cup of traditional Turkish coffee.

From the height of the hill, all the landmarks of Eyüp district are spread before your eyes.

There is the huge Eyüp cemetery on the hillside,

which once was one of the most well-groomed cemeteries in Istanbul,

because many Ottoman officials were buried here.

A little further you can see outlines of the famous Eyüp Sultan Mosque,

which has the tomb of Abu Ayyub al-Ansari, a companion of Muhammad (peace be upon him)

who fell in the First Arab Siege of Constantinople in the 7th century, next to it.

Basically, the mosque and the district itself are named after this person.

And of course, you can admire the beautiful views

of the Golden Horn bay with green parks and walking paths on its shore

from the observation deck on the top of the hill.

These parks, actually, are the ones where Turkish families

like to gather together and break their fast during Ramadan.

All Ramadan, every day in the evening, just before the sunset,

the shore of the bay turns into a lively family recreation and picnic area.

If you want to learn more about Eyüp district, I have a blog post

about it which is supplemented with different photos.

The link is in the description box below.

And here is the end of this video. Thank you everyone for watching!

Press "like" button if you loved the video, and subscribe to this channel!

See you soon! Bye bye!

Không có nhận xét nào:

Đăng nhận xét