analog C–H activation-enabled synthesis of a piperazine-embedded azadibenzo[a,g]corannulene analogue By pubs.rsc.org Published On :: Org. Chem. Front., 2024, Advance ArticleDOI: 10.1039/D4QO00415A, Research ArticleLin Huang, Mengyu Qiu, Zhihao Chang, Duncan L. Browne, Jianhui HuangThe first example of an azadibenzo[a,g]corannulene analogue with an embedded piperazine ring on the flank of its polycyclic skeleton is reported.To cite this article before page numbers are assigned, use the DOI form of citation above.The content of this RSS Feed (c) The Royal Society of Chemistry Full Article
analog Sulfur- and iron-rich mineralogical features preserved in permafrost in the Canadian High Arctic: analogs for the astrobiological exploration of Mars By geoscan.nrcan.gc.ca Published On :: Thu, 07 Apr 2022 00:00:00 EDT Lau, G E; Trivedi, C B; Grasby, S E; Spear, J R; Cosmidis, J; Templeton, A S. Frontiers in Astronomy and Space Sciences 2022 p. 1-21, https://doi.org/10.3389/fspas.2022.825019<a href="https://geoscan.nrcan.gc.ca/images/geoscan/20220029.jpg"><img src="https://geoscan.nrcan.gc.ca/images/geoscan/20220029.jpg" title="Frontiers in Astronomy and Space Sciences 2022 p. 1-21, https://doi.org/10.3389/fspas.2022.825019" height="150" border="1" /></a> Full Article
analog GLP-1 Analogues Market worth $471.1 billion by 2032 By www.emailwire.com Published On :: Tue, 29 Oct 2024 00:00:00 -0700 (EMAILWIRE.COM, October 29, 2024 ) The global GLP-1 analogues market is poised for substantial growth, projected to expand from USD 47.4 billion in 2024 to USD 471.1 billion by 2032, at a robust CAGR of 33.2%. Key drivers include the drugs' efficacy in managing diabetes and obesity, driving high... Full Article
analog 5 Differences Between IP Video Intercom and Analog By www.bravesnewsworld.com Published On :: Wed, 29 Jun 2022 06:49:07 +0000 Which video intercom to choose? Before choosing an intercom, let’s understand where and why we will put it. In a private house or apartment? Let’s say an apartment. In modern multi-tenant buildings, in most cases, apartment intercom systems are already installed. It can be an access intercom, a video surveillance system, automatic gates, security, and [...] The post 5 Differences Between IP Video Intercom and Analog appeared first on Braves News World. Full Article Technology apartment intercom Featured outdoor panels
analog Improving Progression and Satisfaction Rates of Novice Computer Programming Students through ACME – Analogy, Collaboration, Mentoring, and Electronic Support By Published On :: Full Article
analog Analogical Thinking for Generation of Innovative Ideas: An Exploratory Study of Influential Factors By Published On :: 2016-07-25 Analogical thinking is one of the most effective tools to generate innovative ideas. It enables us to develop new ideas by transferring information from well-known domains and utilizing them in a novel domain. However, using analogical thinking does not always yield appropriate ideas, and there is a lack of consensus among researchers regarding the evaluation methods for assessing new ideas. Here, we define the appropriateness of generated ideas as having high structural and low superficial similarities with their source ideas. This study investigates the relationship between thinking process and the appropriateness of ideas generated through analogical thinking. We conducted four workshops with 22 students in order to collect the data. All generated ideas were assessed based on the definition of appropriateness in this study. The results show that participants who deliberate more before reaching the creative leap stage and those who are engaged in more trial and error for deciding the final domain of a new idea have a greater possibility of generating appropriate ideas. The findings suggest new strategies of designing workshops to enhance the appropriateness of new ideas. Full Article
analog Cheating and Feeling Honest: Committing and Punishing Analog versus Digital Academic Dishonesty Behaviors in Higher Education By Published On :: 2016-12-26 This study examined the phenomenon of academic dishonesty among university students. It was based on Pavela’s (1997) framework of types of academic dishonesty (cheating, plagiarism, fabrication, and facilitation) and distinguished between digital and “traditional”- analog dishonesty. The study analyzed cases of academic dishonesty offenses committed by students, as well as the reasons for academic dishonesty behaviors, and the severity of penalties for violations of academic integrity. The motivational framework for committing an act of academic dishonesty (Murdock & Anderman, 2006) and the Self-Concept Maintenance model (Mazar, Amir, & Ariely, 2008) were employed to analyze the reasons for students’ dishonest behaviors. We analyzed 315 protocols of the Disciplinary Committee, at The Open University of Israel, from 2012-2013 that represent all of the offenses examined by the Committee during one and a half years. The findings showed that analog dishonesty was more prevalent than digital dishonesty. According to the students, the most prevalent reason for their academic dishonesty was the need to maintain a positive view of self as an honest person despite violating ethical codes. Interestingly, penalties for analog dishonesty were found to be more severe than those imposed for digital dishonesty. Surprisingly, women were penalized more severely than men, despite no significant gender differences in dishonesty types or in any other parameter explored in the study. Findings of this study shed light on the scope and roots of academic dishonesty and may assist institutions in coping effectively with this phenomenon. Full Article
analog Analog Equivalent Rights (2/21): The analog, anonymous letter and The Pirate Bay By falkvinge.net Published On :: Mon, 18 Dec 2017 18:00:38 +0000 Privacy: Our parents were taking liberties for granted in their analog world, liberties that are not passed down to our children in the transition to digital — such as the simple right to send an anonymous letter. Sometimes when speaking, I ask the audience how many would be okay with sites like The Pirate Bay, even if it means that artists are losing money from their operation. (Do note that this assertion is disputed: I’m asking the question on the basis of what-if the assertion is true.) Some people raise their hands, the proportion varying with audience and venue. The copyright industry asserts that the offline laws don’t apply on the Internet when they want to sue and prosecute people sharing knowledge and culture. They’re right, but not in the way they think. They’re right that copyright law does apply online as well. But privacy laws don’t, and they should. In the offline world, an analog letter was given a certain level of protection. This was not intended to cover just the physical letter as such, but correspondence in general; it was just that the letter was the only form of such correspondence when these liberties were drafted. First, the letter was anonymous. It was your prerogative entirely whether you identified yourself as sender of the letter on the outside of the envelope, on the inside of the letter (so not even the postal service knew who sent it, only the recipient), or not at all. Further, the letter was untracked in transit. The only governments tracking people’s correspondence were those we looked down on with enormous contempt. Third, the letter was secret. The envelope would never we broken in transit. Fourth, the carrier was never responsible for the contents, of nothing else for the simple reason they were not allowed to examine the content in the first place. But even if they could, like with a envelopeless postcard, they were never liable for executing their courier duties — this principle, the courier immunity or messenger immunity, is a principle that dates as far back as the Roman Empire. These principles, the liberties of correspondence, should apply to offline correspondence (the letter) just as it should to online correspondence. But it doesn’t. You don’t have the right to send anything you like to anybody you like online, because it might be a copyright infringement — even though our parents had exactly this right in their offline world. So the copyright industry is right – sending a copied drawing in a letter is a copyright infringement, and sending a copied piece of music over the net is the same kind of copyright infringement. But offline, there are checks and balances to these laws – even though it’s a copyright infringement, nobody is allowed to open the letter in transit just to see if it violates the law, because the secrecy of private correspondence is considered more important than discovering copyright infringements. This is key. This set of checks and balances has not been carried over into the digital environment. The only time a letter is opened and prevented is when somebody is under individual and prior suspicion of a serious crime. The words “individual” and “prior” are important here — opening letters just to see if they contain a non-serious crime in progress, like copyright infringement, is simply not permitted in the slightest. There is no reason for the offline liberties of our parents to not be carried over into the same online liberties for our children, regardless of whether that means somebody doesn’t know how to run a business anymore. After highlighting these points, I repeat the question whether the audience would be okay with sites like The Pirate Bay, even if it means an artist is losing income. And after making these points, basically everybody raises their hand to say they would be fine with it; they would be fine with our children having the same liberty as our parents, and the checks and balances of the offline world to also apply online. Next in the series, we’re going to look at a related topic – public anonymous announcements and the important role the city square soapbox filled in shaping liberty. Privacy remains your own responsibility. Full Article Privacy
analog Analog Equivalent Rights (3/21): Posting an Anonymous Public Message By falkvinge.net Published On :: Wed, 20 Dec 2017 19:00:00 +0000 Privacy: The liberties of our parents are not being inherited by our children – they are being lost wholesale in the transition to digital. Today, we’ll look at the importance of posting anonymous public messages. When I was in my teens, before the Internet (yes, really), there was something called BBSes – Bulletin Board Systems. They were digital equivalents of an analog Bulletin Board, which in turn was a glorified sheet of wood intended for posting messages to the public. In a sense, they were an anonymous equivalent of today’s webforum software, but you connected from your home computer directly to the BBS over a phone line, without connecting to the Internet first. The analog Bulletin Boards are still in existence, of course, but mostly used for concert promotions and the occasional fringe political or religious announcement. In the early 1990s, weird laws were coming into effect worldwide as a result of lobbying from the copyright industry: the owners of bulletin board systems could be held liable for what other people posted on them. The only way to avoid liability was to take down the post within seven days. Such liability had no analog equivalent at all; it was an outright ridiculous idea that the owner of a piece of land should be held responsible for a poster put up on a tree on that land, or even that the owner of a public piece of cardboard could be sued for the posters other people had glued up on that board. Let’s take that again: it is extremely weird from a legal standpoint that an electronic hosting provider is in any way, shape, or form liable for the contents hosted on their platform. It has no analog equivalent whatsoever. Sure, people could put up illegal analog posters on an analog bulletin board. That would be an illegal act. When that happened, it was the problem of law enforcement, and never of the bulletin board owner. The thought is ridiculous and has no place in the digital landscape either. The proper digital equivalent isn’t to require logging to hand over upload IPs to law enforcement, either. An analog bulletin board owner is under no obligation whatsoever to somehow identify the people using the bulletin board, or even monitor whether it’s being used at all. The Analog Equivalent Privacy Right for an electronic post hosting provider is for an uploader to be responsible for everything they upload for the public to see, with no liability at all for the hosting provider under any circumstance, including no requirement to log upload data to help law enforcement find an uploader. Such monitoring is not a requirement in the analog world of our parents, nor is there an analog liability for anything posted, and there is no reason to have it otherwise in the digital world of our children just because somebody doesn’t know how to run a business otherwise. As a side note, the United States would not exist had today’s hosting liability laws in place when it formed. A lot of writing was being circulated at the time arguing for breaking with the British Crown and forming an Independent Republic; from a criminal standpoint, this was inciting and abetting high treason. This writing was commonly nailed to trees and public posts, for the public to read and make up their own minds. Imagine for a moment if the landowners where such trees happened to stand had been charged with high treason for “hosting content” — the thought is as ridiculous in the analog would, as it really is in the digital too. We just need to pull the illusion aside, that the current laws on digital hosting make any kind of sense. These laws really are as ridiculous in the digital world of our children, as they would have been in the analog world of our parents. Privacy remains your own responsibility. Full Article Privacy
analog Analog Equivalent Rights (4/21): Our children have lost the Privacy of Location By falkvinge.net Published On :: Fri, 22 Dec 2017 18:00:37 +0000 Privacy: In the analog world of our parents, as an ordinary citizen and not under surveillance because of being a suspect of a crime, it was taken for granted that you could walk around a city without authorities tracking you at the footstep level. Our children don’t have this right anymore in their digital world. Not even the dystopias of the 1950s — Nineteen Eighty-Four, Brave New World, Colossus, and so on, managed to dream up the horrors of this element: the fact that every citizen is now carrying a governmental tracking device. They’re not just carrying one, they even bought it themselves. Not even Brave New World could have imagined this horror. It started out innocently, of course. It always does. With the new “portable phones” — which, at this point, meant something like “not chained to the floor” — authorities discovered that people would still call the Emergency Services number (112, 911, et cetera) from their mobile phones, but not always be capable of giving their location themselves, something that the phone network was now capable of doing. So authorities mandated that the phone networks be technically capable of always giving a subscriber’s location, just in case they would call Emergency Services. In the United States, this was known as the E911 regulation (“Enhanced 9-1-1”). This was in 2005. Things went bad very quickly from there. Imagine that just 12 years ago, we still had the right to roam around freely without authorities being capable of tracking our every footstep – this was no more than just over a decade ago! Before this point, governments supplied you with services so that you would be able to know your location, as had been the tradition since the naval lighthouse, but not so that they would be able to know your location. There’s a crucial difference here. And as always, the first breach was one of providing citizen services — in this case, emergency medical services — that only the most prescient dystopians would oppose. What’s happened since? Entire cities are using wi-fi passive tracking to track people at the individual, realtime, and sub-footstep level in the entire city center. Train stations and airports, which used to be safe havens of anonymity in the analog world of our parents, have signs saying they employ realtime passive wi-fi and bluetooth tracking of everybody even coming close, and are connecting their tracking to personal identifying data. Correction: they have signs about it in the best case but do it regardless. People’s location are tracked in at least three different… not ways, but categories of ways: Active: You carry a sensor of your location (GPS sensor, Glonass receiver, cell tower triangulator, or even visual identifier through the camera). You use the sensors to find your location, at one point in time or continuously. The government takes itself the right to read the contents of your active sensors. Passive: You take no action, but are still transmitting your location to the government continuously through a third party. In this category, we find cell tower triangulation as well as passive wi-fi and bluetooth tracking that require no action on behalf of a user’s phone other than being on. Hybrid: The government finds your location in occasional pings through active dragnets and ongoing technical fishing expeditions. This would not only include cellphone-related techniques, but also face recognition connected to urban CCTV networks. Privacy of location is one of the Seven Privacies, and we can calmly say that without active countermeasures, it’s been completely lost in the transition from analog to digital. Our parents had privacy of location, especially in busy places like airports and train stations. Our children don’t have privacy of location, not in general, and particularly not in places like airports and train stations that were the safest havens of our analog parents. How do we reinstate Privacy of Location today? It was taken for granted just 12 years ago. Full Article Privacy
analog Analog Equivalent Rights (5/21): Where did Freedom of Assembly go? By falkvinge.net Published On :: Mon, 25 Dec 2017 18:00:49 +0000 Privacy: Our analog parents had the right to meet whomever they liked, wherever they liked, and discuss whatever they liked, without the government knowing. Our digital children have lost this, just because they use more modern items. For a lot of our digital children’s activities, there’s no such thing as privacy anymore, as they naturally take place on the net. For people born 1980 and later, it doesn’t make sense to talk of “offline” or “online” activities. What older people see as “people spending time with their phone or computer”, younger see as socializing using their phone or computer. This is an important distinction that the older generation tends to not understand. Perhaps this is best illustrated with an anecdote from the previous generation again: The parents of our parents complained that our parents were talking with the phone, and not to another person using the phone. What our parents saw as socializing (using an old analog landline phone), their parents in turn saw as obsession with a device. There’s nothing new under the sun. (Note: when I say “digital children” here, I am not referring to children as in young people below majority age; I am referring to the next generation of fully capable adult professionals.) This digital socializing, however, can be limited, it can be… permissioned. As in, requiring somebody’s permission to socialize in the way you and your friends want, or even to socialize at all. The network effects are strong and create centralizing pressure toward a few platforms where everybody hang out, and as these are private services, they get to set any terms and conditions they like for people assembling and socializing – for the billions of people assembling and socializing there. Just as one example to illustrate this: Facebook is using American values for socializing, not universal values. Being super-against anything even slightly naked while being comparatively accepting of hate speech is not something inherently global; it is strictly American. If Facebook had been developed in France or Germany instead of the US, any and all nudity would be welcomed as art and free-body culture (Freikörperkultur) and a completely legitimate way of socializing, but the slightest genocide questioning would lead to an insta-kickban and reporting to authorities for criminal prosecution. Therefore, just using the dominant Facebook as an example, any non-American way of socializing is effectively banned worldwide, and it’s likely that people developing and working with Facebook aren’t even aware of this. But the Freedom of Assembly hasn’t just been limited in the online sphere, but also in the classic analog offline world where our analog parents used to hang out (and still do). Since people’s locations are tracked, as we saw in the previous post, it is possible to match locations between individuals and figure out who was talking to whom, as well as when and where this happened, even if they were only talking face to face. As I’m looking out my window from the office writing this piece, it just so happens that I’m looking at the old Stasi headquarters across from Alexanderplatz in former East Berlin. It was a little bit like Hotel California; people who checked in there tended to never leave. Stasi also tracked who was talking to whom, but required a ton of people to perform this task manually, just in order to walk behind other people and photograph whom they were talking to — and therefore, there was an economic limit to how many people could be tracked like this at any one time before the national economy couldn’t sustain more surveillance. Today, that limit is completely gone, and everybody is tracked all the time. Do you really have Freedom of Assembly, when the fact that you’ve associated with a person — indeed, maybe just spent time in their physical proximity — can be held against you? I’m going to illustrate this with an example. In a major leak recently, it doesn’t matter which one, a distant colleague of mine happened to celebrate a big event with a huge party in near physical proximity to where the documents were being copied at the same time, completely unaware and by sheer coincidence. Months later, this colleague was part of journalistically vetting those leaked documents and verifying their veracity, while at this time still unaware of the source and that they had held a big party very close to the origin of the documents. The government was very aware of the physical proximity of the leak combined with this person’s journalistic access to the documents, though, and issued not one but two arrest-on-sight warrants for this distant colleague based on that coincidence. They are now living in exile outside of Sweden, and don’t expect to be able to return home anytime soon. Privacy, including Privacy of Location, remains your own responsibility. Full Article Privacy
analog Analog Equivalent Rights (6/21): Everything you do, say, or think today will be used against you in the future By falkvinge.net Published On :: Wed, 27 Dec 2017 18:00:33 +0000 Privacy: “Everything you say or do can and will be used against you, at any point in the far future when the context and agreeableness of what you said or did has changed dramatically.” With the analog surveillance of our parents, everything was caught in the context of its time. The digital surveillance of our children saves everything for later use against them. It’s a reality for our digital children so horrible, that not even Nineteen Eighty-Four managed to think of it. In the analog surveillance world, where people are put under surveillance only after they’ve been identified as suspects of a crime, everything we said and did was transient. If Winston’s telescreen missed him doing something bad, then it had missed the moment and Winston was safe. The analog surveillance was transient for two reasons: one, it was assumed that all surveillance was people watching other people, and two, that nobody would have the capacity of instantly finding keywords in the past twenty years of somebody’s conversations. In the analog world of our parents, that would mean somebody would need to actually listen to twenty years’ worth of tape recordings, which would in turn take sixty years (as we only work 8 out of 24 hours). In the digital world of our children, surveillance agencies type a few words to get automatic transcripts of the saved-forever surveillance-of-everybody up on screen in realtime as they type the keywords – not just from one person’s conversation, but from everybody’s. (This isn’t even exaggerating; this was reality in or about 2010 with the GCHQ-NSA XKEYSCORE program.) In the world of our analog parents, surveillance was only a thing at the specific time it was active, which was when you were under individual and concrete suspicion of a specific, already-committed, and serious crime. In the world of our digital children, surveillance can be retroactively activated for any reason or no reason, with the net effect that everybody is under surveillance for everything they have ever done or said. We should tell people as it has become instead; “anything you say or do can be used against you, for any reason or no reason, at any point in the future”. The current generation has utterly failed to preserve the presumption of innocence, as it applies to surveillance, in the shift from our analog parents to our digital children. This subtle addition – that everything is recorded for later use against you – amplifies the horrors of the previous aspects of surveillance by orders of magnitude. Consider somebody asking you where you were on the evening of March 13, 1992. You would, at best, have a vague idea of what you did that year. (“Let’s see… I remember my military service started on March 3 of that year… and the first week was a tough boot camp in freezing winter forest… so I was probably… back at barracks after the first week, having the first military theory class of something? Or maybe that date was a Saturday or Sunday, in which case I’d be on weekend leave?” That’s about the maximum precision your memory can produce for twenty-five years past.) However, when confronted with hard data on what you did, the people confronting you will have an utter and complete upper hand, because you simply can’t refute it. “You were in this room and said these words, according to our data transcript. These other people were also in the same room. We have to assume what you said was communicated with the intention for them to hear. What do you have to say for yourself?” It doesn’t have to be 25 years ago. A few months back would be sufficient for most memories to be not very detailed anymore. To illustrate further: consider that the NSA is known to store copies even of all encrypted correspondence today, on the assumption that even if it’s not breakable today, it will probably be so in the future. Consider what you’re communicating encrypted today — in text, voice, or video — can be used against you in twenty years. You probably don’t even know half of it, because the window of acceptable behavior will have shifted in ways we cannot predict, as it always does. In the 1950s, it was completely socially acceptable to drop disparaging remarks about some minorities in society, which would socially ostracize you today. Other minorities are still okay to disparage, but might not be in the future. When you’re listening to somebody talking from fifty years ago, they were talking in the context of their time, maybe even with the best of intentions by today’s standards. Yet, we could judge them harshly for their words interpreted by today’s context — today’s completely different context. Our digital children will face exactly this scenario, because everything they do and say can and will be used against them, at any point in the future. It should not be this way. They should have every right to enjoy Analog Equivalent Privacy Rights. Full Article Privacy
analog Analog Equivalent Rights (7/21): Analog Libraries Were Private Searches for Information By falkvinge.net Published On :: Mon, 01 Jan 2018 18:00:14 +0000 When our analog parents searched for information, that activity took place in libraries, and that was one of the most safeguarded privacies of all. When our digital children search for information, their innermost thoughts are instead harvested wholesale for marketing. How did this happen? If you’re looking at one particular profession of the analog world that was absolutely obsessed with the privacy of its patrons, it was the librarians. Libraries were where people could search for their darkest secrets, were it literature, science, shopping, or something else. The secrecy of libraries were downright legendary. As bomb recipes started appearing on the proto-Internet in the 1980s — on so-called BBSes — and some politicians tried to play on moral panics, many of common sense were quick to point out, that these “text files with bomb recipes” were no different than what you would find in the chemistry section of a mediocre-or-better library — and libraries were sacred. There was no moral panic to play on as soon as you pointed out that this was already available in every public library, for the public to access anonymously So private were libraries, in fact, that librarians were in collective outrage when the FBI started asking libraries for records of who had borrowed what book – and that’s how the infamous warrant canaries were invented. Yup, by a librarian, protecting the patrons of the library. Librarians have always been the profession defending privacy rights the hardest – in the analog as well as the digital. In the analog world of our parents, their Freedom of Information was sacramount: their innermost thirst for learning, knowledge, and understanding. In the digital world of our children, their corresponding innermost thoughts are instead harvested wholesale and sold off to market trinkets into their faces. It’s not just what our digital children successfully studied that’s up for grabs. In the terms of our analog parents, it’s what they ever went to the library for. It’s what they ever considered going to the library for. In the world of our digital children, everything they searched for is recorded — and everything they thought of searching for but didn’t. Think about that for a moment: something that was so sacred for our analog parents that entire classes of professions would go on strike to preserve it, is now casually used for wholesale marketing in the world of our digital children. Combine this with the previous article about everything you do, say, and think being recorded for later use against you, and we’re going to need a major change in thinking on this very soon. There is no reason our children should have less Freedom of Information just because they happen to live in a digital environment, as compared to the analog environment of our parents. There is no reason our digital children shouldn’t enjoy Analog Equivalent Privacy Rights. Of course, it can be argued that the Internet search engines are private services who are free to offer whatever services they like on whatever terms they like. But there were private libraries in the analog world of our parents, too. We’ll be returning to this “it’s private so you don’t have a say” concept a little later in this series. Privacy remains your own responsibility. Full Article Privacy
analog Analog Equivalent Rights (8/21): Using Third-Party Services Should Not Void Expectation of Privacy By falkvinge.net Published On :: Fri, 05 Jan 2018 18:00:49 +0000 Privacy: Ross Ulbricht handed in his appeal to the U.S. Supreme Court last week, highlighting an important Analog Equivalent Privacy Right in the process: Just because you’re using equipment that makes a third party aware of your circumstances, does that really nullify any expectation of privacy? In most constitutions, there’s a protection of privacy of some kind. In the European Charter of Human Rights, this is specified as having the right to private and family life, home, and correspondence. In the U.S. Constitution, it’s framed slightly differently, but with the same outcome: it’s a ban for the government to invade privacy without good cause (“unreasonable search and seizure”). U.S. Courts have long held, that if you have voluntarily given up some part of your digitally-stored privacy to a third party, then you can no longer expect to have privacy in that area. When looking at analog equivalence for privacy rights, this doctrine is atrocious, and in order to understand just how atrocious, we need to go back to the dawn of the manual telephone switchboards. At the beginning of the telephone age, switchboards were fully manual. When you requested a telephone call, a manual switchboard operator would manually connect the wire from your telephone to the wire of the receiver’s telephone, and crank a mechanism that would make that telephone ring. The operators could hear every call if they wanted and knew who had been talking to whom and when. Did you give up your privacy to a third party when using this manual telephone service? Yes, arguably, you did. Under the digital doctrine applied now, phonecalls would have no privacy at all, under any circumstance. But as we know, phonecalls are private. In fact, the phonecall operators were oathsworn to never utter the smallest part of what they learned on the job about people’s private dealings — so seriously was privacy considered, even by the companies running the switchboards. Interestingly enough, this “third-party surrender of privacy” doctrine seems to have appeared the moment the last switchboard operator left their job for today’s automated phone-circuit switches. This was as late as 1983, just at the dawn of digital consumer-level technology such as the Commodore 64. This false equivalence alone should be sufficient to scuttle the doctrine of “voluntarily” surrendering privacy to a third party in the digital world, and therefore giving up expectation of privacy: the equivalence in the analog world was the direct opposite. But there’s more to the analog equivalent of third-party-service privacy. Somewhere in this concept is the notion that you’re voluntarily choosing to give up your privacy, as an active informed act — in particular, an act that stands out of the ordinary, since the Constitutions of the world are very clear that the ordinary default case is that you have an expectation of privacy. In other words, since people’s everyday lives are covered by expectations of privacy, there must be something outside of the ordinary that a government can claim gives it the right to take away somebody’s privacy. And this “outside the ordinary” has been that the people in question were carrying a cellphone, and so “voluntarily” gave up their right to privacy, as the cellphone gives away their location to the network operator by contacting cellphone towers. But carrying a cellphone is expected behavior today. It is completely within the boundaries of “ordinary”. In terms of expectations, this doesn’t differ much from wearing jeans or a jacket. This leads us to the question; in the thought experiment that yesterday’s jeans manufacturers had been able to pinpoint your location, had it been reasonable for the government to argue that you give up any expectation of privacy when you’re wearing jeans? No. No, of course it hadn’t. It’s not like you’re carrying a wilderness tracking device for the express purpose of rescue services to find you during a dangerous hike. In such a circumstance, it could be argued that you’re voluntarily carrying a locator device. But not when carrying something that everybody is expected to carry — indeed, something that everybody must carry in order to even function in today’s society. When the only alternative to having your Constitutionally-guaranteed privacy is exile from modern society, a government should have a really thin case. Especially when the analog equivalent — analog phone switchboards — was never fair game in any case. People deserve Analog Equivalent Privacy Rights. Until a government recognizes this and voluntarily surrenders a power it has taken itself, which isn’t something people should hold their breath over, privacy remains your own responsibility. Full Article Privacy
analog Analog Equivalent Rights (9/21): When the government knows what news you read, in what order, and for how long By falkvinge.net Published On :: Mon, 15 Jan 2018 18:00:03 +0000 Privacy: Our analog parents had the ability to read news anonymously, however they wanted, wherever they wanted, and whenever they wanted. For our digital children, a government agent might as well be looking over their shoulder: the government knows what news sources they read, what articles, for how long, and in what order. For our analog parents, reading the news was an affair the government had no part of, or indeed had any business being part of. Our analog parents bought a morning newspaper with a few coins on the street corner, brought it somewhere quiet where they had a few minutes to spare, and started reading without anybody interfering. When our digital children read the news, the government doesn’t just know what news source they choose to read, but also what specific articles they read from that news source, in what order, and for how long. So do several commercial actors. There are at least three grave issues with this. The first is that since the government has this data, it will attempt to use this data. More specifically, it will attempt to use the data against the individual concerned, possibly in some sort of pre-crime scheme. We know this that since all data collected by a government will eventually be used against the people concerned, with mathematical certainty. In an attention economy, data about what we pay attention to, how much, and for how long, are absolutely crucial predictive behaviors. And in the hands of a government which makes the crucial mistake of using it to predict pre-crime, the results can be disastrous for the individual and plain wrong for the government. Of course, the instant the government uses this data in any way imaginable, positive or negative, it will become Heisenberg Metrics — the act of using the data will shape the data itself. For example, if somebody in government decides that reading about frugality probably is an indicator of poverty, and so makes people more eligible for government handouts, then such a policy will immediately shape people’s behavior to read more about frugality. Heisenberg Metrics is when a metric can’t be measured without making it invalid in the process. (The phenomenon is named after the Heisenberg Uncertainty Principle, which is traditionally confused with the Observer Effect, which states you can’t measure some things without changing them in the process. The Heisenberg Uncertainty Principle is actually something else entirely; it states that you can’t measure precise momentum and position of a subatomic particle at the same time, and does not apply at all to Heisenberg Metrics.) The second issue is that not only government, but also other commercial actors, will seek to act on these metrics, Heisenberg Metrics as they may be. Maybe somebody thinks that reading fanzines about motorcycle acrobatics should have an effect on your health and traffic insurance premiums? The third issue is subtle and devious, but far more grave: the government doesn’t just know what articles you read and in what order, but as a corollary to that, knows what the last article you read was, and what you did right after reading it. In other words, it knows very precisely what piece of information leads you to stop reading and instead take a specific action. This is far more dangerous information than being aware of your general information feed patterns and preferences. Being able to predict somebody’s actions with a high degree of certainty is a far more dangerous ability than being vaguely aware of somebody’s entertainment preferences. Our analog parents had the privacy right of choosing their information source anonymously with nobody permitted (or able) to say what articles they read, in what order, or for what reason. It’s not unreasonable that our digital children should have the same privacy right, the analog equivalent privacy right. Privacy remains your own responsibility. Full Article Privacy
analog Analog Equivalent Rights (10/21): Analog journalism was protected; digital journalism isn’t By falkvinge.net Published On :: Wed, 17 Jan 2018 18:00:13 +0000 Privacy: In the analog world of our parents, leaks to the press were heavily protected in both ends – both for the leaker and for the reporter receiving the leak. In the digital world of our children, this has been unceremoniously thrown out the window while discussing something unrelated entirely. Why aren’t our digital children afforded the same checks and balances? Another area where privacy rights have not been carried over from the analog to the digital concerns journalism, an umbrella of different activities we consider to be an important set of checks-and-balances on power in society. When somebody handed over physical documents to a reporter, that was an analog action that was protected by federal and state laws, and sometimes even by constitutions. When somebody is handing over digital access to the same information to the same type of reporter, reflecting the way we work today and the way our children will work in the future, that is instead prosecutable at both ends. Let us illustrate this with an example from the real world. In the 2006 election in Sweden, there was an outcry of disastrous information hygiene on behalf of the ruling party at the time (yes, the same ruling party that later administered the worst governmental leak ever). A username and password circulated that gave full access to the innermost file servers of the Social Democratic party administration from anywhere. The username belonged to a Stig-Olof Friberg, who was using his nickname “sigge” as username, and the same “sigge” as password, and who accessed the innermost files over the Social Democratic office’s unencrypted, open, wireless network. Calling this “bad opsec” doesn’t begin to describe it. Make a careful note to remember that these were, and still are, the institutions and people we rely on to make policy for good safeguarding of sensitive citizen data. However, in the shadow of this, there was also the more important detail that some political reporters were well aware of the login credentials, such as one of Sweden’s most (in)famous political reporters Niklas Svensson, who had been using the credentials as a journalistic tool to gain insight into the ruling party’s workings. This is where it gets interesting, because in the analog world, that reporter would have received leaks in the form of copied documents, physically handed over to him, and leaking to the press in this analog manner was (and still is) an extremely protected activity under law and indeed some constitutions — in Sweden, as this concerns, you can even go to prison for casually speculating over coffee at work who might have been behind a leak to the press. It is taken extremely seriously. However, in this case, the reporter wasn’t leaked the documents, but was leaked a key for access to the digital documents — the ridiculously insecure credentials “sigge/sigge” — and was convicted in criminal court for electronic trespassing as a result, despite doing journalistic work with a clear analog protected equivalent. It’s interesting to look at history to see how much critically important events would never have been uncovered, if this prosecution of digital journalism had been applied to analog journalism. For one example, let’s take the COINTELPRO leak, when activists copied files from an FBI office to uncover a covert and highly illegal operation by law enforcement to discredit political organizations based solely on their political opinion. (This is not what law enforcement should be doing, speaking in general terms.) This leak happened when activists put up a note on the FBI office door on March 8, 1971 saying “Please do not lock this door tonight”, came back in the middle of the night when nobody was there, found the door unlocked as requested, and took (stole) about 1,000 classified files that revealed the illegal practices. These were then mailed to various press outlets. The theft resulted in the exposure of some of the FBI’s most self-incriminating documents, including several documents detailing the FBI’s use of postal workers, switchboard operators, etc., in order to spy on black college students and various non-violent black activist groups, according to Wikipedia. And here’s the kicker in the context: while the people stealing the documents could and would have been indicted for doing so, it was unthinkable to charge the reporters receiving them with anything. This is no longer the case. Our digital children have lost the right to leak information to reporters in the way the world works today, an activity that was taken for granted — indeed, seen as crucially important to the balance of power — in the world of our digital parents. Our digital children who work as reporters can no longer safely receive leaks showing abuse of power. It is entirely reasonable that our digital children should have at least the same set of civil liberties in their digital world, as our parents had in their analog world. Privacy remains your own responsibility. Full Article Privacy
analog Analog Equivalent Rights (11/21): Our parents used anonymous cash By falkvinge.net Published On :: Mon, 22 Jan 2018 18:00:57 +0000 Privacy: The anonymous cash of our analog parents is fast disappearing, and in its wake comes trackable and permissioned debit cards to our children. While convenient, it’s a wolf in sheep’s clothing. In the last article, we looked at how our analog parents could anonymously buy a newspaper on the street corner with some coins, and read their news of choice without anybody knowing about it. This observation extends to far more than just newspapers, of course. This ability of our parents – the ability to conduct decentralized, secure transactions anonymously – has been all but lost in a landscape that keeps pushing card payments for convenience. The convenience of not paying upfront, with credit cards; the convenience of always paying an exact amount, with debit cards; the convenience of not needing to carry and find exact amounts with every purchase. Some could even argue that having every transaction listed on a bank statement is a convenience of accounting. But with accounting comes tracking. With tracking comes predictability and unwanted accountability. It’s been said that a VISA executive can predict a divorce one year ahead of the parties involved, based on changes in purchase patterns. Infamously, a Target store was targeting a high school-aged woman with maternity advertising, which at first made her father furious: but as things turned out, the young woman was indeed pregnant. Target knew, and her own father didn’t. This is because when we’re no longer using anonymous cash, every single purchase is tracked and recorded with the express intent on using it against us — whether for influencing us to make a choice to deplete our resources (“buy more”) or for punishing us for buying something we shouldn’t have, in a wide variety of conceivable ways. China is taking the concept one step further, as has been written here before, and in what must have been the inspiration for a Black Mirror episode, is weighting its citizens’ Obedience Scores based on whether they buy useful or lavish items — useful in the views of the regime, of course. It’s not just the fact that transactions of our digital children are logged for later use against them, in ways our analog parents could never conceive of. It’s also that the transactions of our digital children are permissioned. When our digital children buy a bottle of water with a debit card, a transaction clears somewhere in the background. But that also means that somebody can decide to have the transaction not clear; somebody has the right to arbitrarily decide what people get to buy and not buy, if this trend continues for our digital children. That is a horrifying thought. Our parents were using decentralized, censorship resistant, anonymous transactions in using plain cash. There is no reason our digital children should have anything less. It’s a matter of liberty and self-determination. Privacy remains your own responsibility. Full Article Privacy
analog Analog Equivalent Rights (12/21): Our parents bought things untracked, their footsteps in store weren’t recorded By falkvinge.net Published On :: Fri, 26 Jan 2018 18:00:45 +0000 Privacy: In the last article, we focused on how people are tracked today when using credit cards instead of cash. But few pay attention to the fact that we’re tracked when using cash today, too. Few people pay attention to the little sign on the revolving door on Schiphol Airport in Amsterdam, Netherlands. It says that wi-fi and bluetooth tracking of every single individual is taking place in the airport. What sets Schiphol Airport apart isn’t that they track individual people’s movements to the sub-footstep level in a commercial area. (It’s for commercial purposes, not security purposes.) No, what sets Schiphol apart is that they bother to tell people about it. (The Netherlands tend to take privacy seriously, as does Germany, and for the same reason.) Locator beacons are practically a standard in bigger commercial areas now. They ping your phone using wi-fi and bluetooth, and using signal strength triangulation, a grid of locator beacons is able to show how every single individual is moving in realtime at the sub-footstep level. This is used to “optimize marketing” — in other words, find ways to trick people’s brains to spend resources they otherwise wouldn’t have. Our own loss of privacy is being turned against us, as it always is. Where do people stop for a while, what catches their attention, what doesn’t catch their attention, what’s a roadblock for more sales? These are legitimate questions. However, taking away people’s privacy in order to answer those questions is not a legitimate method to answer them. This kind of mass individual tracking has even been deployed at city levels, which happened in complete silence until the Privacy Oversight Board of a remote government sounded the alarms. The city of Västerås got the green light to continue tracking once some formal criteria were met. Yes, this kind of people tracking is documented to have been already rolled out citywide in at least one small city in a remote part of the world (Västerås, Sweden). With the government’s Privacy Oversight Board having shrugged and said “fine, whatever”, don’t expect this to stay in the small town of Västerås. Correction, wrong tense: don’t expect it to have stayed in just Västerås, where it was greenlit three years ago. Our analog parents had the ability to walk around untracked in the city and street of their choice, without it being used or held against them. It’s not unreasonable that our digital children should have the same ability. There’s one other way to buy things with cash which avoids this kind of tracking, and that’s paying cash-on-delivery when ordering something online or over the phone to your door — in which case your purchase is also logged and recorded, just in another type of system. This isn’t only used against the ordinary citizen for marketing purposes, of course. It’s used against the ordinary citizen for every conceivable purpose. But we’ll be returning to that in a later article in the series. Privacy remains your own responsibility. Full Article Privacy
analog Analog Equivalent Rights (13/21): Our digital children are tracked not just in everything they buy, but in what they DON’T buy By falkvinge.net Published On :: Wed, 31 Jan 2018 18:00:45 +0000 Privacy: We’ve seen how our digital children’s privacy is violated in everything they buy with cash or credit, in a way our analog parents would have balked at. But even worse: our digital children’s privacy is also violated by tracking what they don’t buy — either actively decline or just plain walk away from. Amazon just opened its first “Amazon Go” store, where you just pick things into a bag and leave, without ever going through a checkout process. As part of the introduction of this concept, Amazon points out that you can pick something off the shelves, at which point it’ll register in your purchase — and change your mind and put it back, at which point you’ll be registered and logged as having not purchased the item. Sure, you’re not paying for something you changed your mind about, which is the point of the video presentation. But it’s not just about the deduction from your total amount to pay: Amazon also knows you considered buying it and eventually didn’t, and will be using that data. Our digital children are tracked this way on a daily basis, if not an hourly basis. Our analog parents never were. When we’re shopping for anything online, there are even simple plugins for the most common merchant solutions with the business terms “funnel analysis” — where in the so-called “purchase funnel” our digital children choose to leave the process of purchasing something — or “cart abandonment analysis”. We can’t even simply walk away from something anymore without it being recorded, logged, and cataloged for later use against us. But so-called “cart abandonment” is only one part of the bigger issue of tracking what we’re interested in in the age of our digital children, but didn’t buy. There is no shortage of people today who would swear they were just discussing a very specific type of product with their phone present (say, “black leather skirts”) and all of a sudden, advertising for that very specific type of product would pop up all over Facebook and/or Amazon ads. Is this really due to some company listening for keywords through the phone? Maybe, maybe not. All we know since Snowden is that if it’s technically possible to invade privacy, it is already happening. (We have to assume here these people still need to learn how to install a simple adblocker. But still.) At the worst ad-dense places, like (but not limited to) airports, there are eyeball trackers to find out which ads you look at. They don’t yet change to match your interests, as per Minority Report, but that’s already present on your phone and on your desktop, and so wouldn’t be foreign to see in public soon, either. In the world of our analog parents, we weren’t registered and tracked when we bought something. In the world of our digital children, we’re registered and tracked even when we don’t buy something. Full Article Privacy
analog Analog Equivalent Rights (14/21): Our analog parents’ dating preferences weren’t tracked, recorded, and cataloged By falkvinge.net Published On :: Sat, 31 Mar 2018 13:42:57 +0000 Privacy: Our analog parents’ dating preferences were considered a most private of matters. For our digital children, their dating preferences is a wholesale harvesting opportunity for marketing purposes. How did this terrifying shift come to be? I believe the first big harvester of dating preferences was the innocent-looking site hotornot.com 18 years ago, a site that more seemed like the after-hours side work of a frustrated highschooler than a clever marketing ploy. It simply allowed people to rate their subjective perceived attractiveness of a photograph, and to upload photographs for such rating. (The two founders of this alleged highschool side project netted $10 million each for it when the site was sold.) Then the scene exploded, with both user-funded and advertising-funded dating sites, all of which cataloged people’s dating preferences to the smallest detail. Large-scale pornography sites, like PornHub, also started cataloging people’s porn preferences, and contiously make interesting infographics about geographical differences in preferences. (The link is safe for work, it’s data and maps in the form of a news story on Inverse, not on Pornhub directly.) It’s particularly interesting, as Pornhub is able to break down preferences quite specifically by age, location, gender, income brackets, and so on. Do you know anyone who told Pornhub any of that data? No, I don’t either. And still, they are able to pinpoint who likes what with quite some precision, precision that comes from somewhere. And then, of course, we have the social networks (which may or may not be responsible for that tracking, by the way). It’s been reported that Facebook can tell if you’re gay or not with as little as three likes. Three. And they don’t have to be related to dating preferences or lifestyle preferences — they can be any random selections that just map up well with bigger patterns. This is bad enough in itself, on the basis that it’s private data. At a very minimum, our digital childrens’ preferences should be their own, just like their favorite ice cream. But a dating preferences are not just a preference like choosing your flavor of ice cream, is it? It should be, but it isn’t at this moment in time. It could also be something you’re born with. Something that people even get killed for if they’re born with the wrong preference. It is still illegal to be born homosexual in 73 out of 192 countries, and out of these 73, eleven prescribe the death penalty for being born this way. A mere 23 out of 192 countries have full marriage equality. Further, although the policy direction is quite one-way toward more tolerance, acceptance, and inclusion at this point in time, that doesn’t mean the policy trend can’t reverse for a number of reasons, most of them very bad. People who felt comfortable in expressing themselves can again become persecuted. Genocide is almost always based on public data collected with benevolent intent. This is why privacy is the last line of defense, not the first. And this last line of defense, which held fast for our analog parents, has been breached for our digital children. That matter isn’t taken nearly seriously enough. Privacy remains your own responsibility. Full Article Privacy
analog Analog Equivalent Rights (15/21): Our digital children’s conversations are muted on a per-topic basis By falkvinge.net Published On :: Fri, 06 Apr 2018 18:00:45 +0000 Privacy: At worst, our analog parents could be prevented from meeting each other. Our digital children are prevented from talking about particular subjects, once the conversation is already happening. This is a horrifying development. When our digital children are posting a link to The Pirate Bay somewhere on Facebook, a small window sometimes pops up saying “you have posted a link with potentially harmful content. Please refrain from posting such links.” Yes, even in private conversations. Especially in private conversations. This may seem like a small thing, but it is downright egregious. Our digital children are not prevented from having a conversation, per se, but are monitored for bad topics that the regime doesn’t like being discussed, and are prevented from discussing those topics. This is far worse than preventing certain people from just meeting. The analog equivalent would be if our parents were holding an analog phone conversation, and a menacing third voice popped into the conversation with a slow voice speaking just softly enough to be perceived as threatening: “You have mentioned a prohibited subject. Please refrain from discussing prohibited subjects in the future.” Our parents would have been horrified if this happened — and rightly so! But in the digital world of our children, the same phenomenon is instead cheered on by the same people who would abhor it if it happened in their world, to themselves. In this case, of course, it is any and all links to The Pirate Bay that are considered forbidden topics, under the assumption — assumption! — that they lead to manufacturing of copies that would be found in breach of the copyright monopoly in a court of law. When I first saw the Facebook window above telling me to not discuss forbidden subjects, I was trying to distribute political material I had created myself, and used The Pirate Bay to distribute. It happens to be a very efficient way to distribute large files, which is exactly why it is being used by a lot of people for that purpose (gee, who would have thought?), including people like myself who wanted to distribute large collections of political material. There are private communications channels, but far too few use them, and the politicians at large (yes, this includes our analog parents) are still cheering on this development, because “terrorism” and other bogeymen. Privacy remains your own responsibility. Full Article Privacy
analog Analog Equivalent Rights (16/21): Retroactive surveillance of all our children By falkvinge.net Published On :: Fri, 13 Apr 2018 18:00:59 +0000 Privacy: In the analog world of our parents, it was absolutely unthinkable that the government would demand to know every footstep you took, every phonecall you made, and every message you wrote, just as a routine matter. For our digital children, government officials keep insisting on this as though it were perfectly reasonable, because terrorism, and also, our digital children may be listening to music together or watching TV together, which is illegal in the way they like to do it, because of mail-order legislation from Hollywood. To make things even worse, the surveillance is retroactive — it is logged, recorded, and kept until somebody wants all of it. About ten years ago, a colleague of mine moved from Europe to China. He noted that among many differences, the postal service was much more tightly controlled — as in, every letter sent was written by hand onto a line in a log book, kept by the postmaster at each post office. Letter from, to whom, and the date. At the time, three things struck me: one, how natural this was to the Chinese population, not really knowing anything else; two, how horrified and denouncing our analog parents would have been at this concept; three, and despite that, that this is exactly what our lawmaker analog parents are doing to all our digital children right now. Or trying to do, anyway; the courts are fighting back hard. Yes, I’m talking about Telecommunications Data Retention. There is a saying, which mirrors the Chinese feeling of normality about this quite well: “The bullshit this generation puts up with as a temporary nuisance from deranged politicians will seem perfectly ordinary to the next generation.” Every piece of surveillance so far in this series is amplified by several orders of magnitude by the notion that it you’re not only being watched, but that everything you do is recorded for later use against you. This is a concept so bad, not even Nineteen-Eighty Four got it: If Winston’s telescreen missed him doing something that the regime didn’t want him to do, Winston would have been safe, because there was no recording happening; only surveillance in the moment. If Winston Smith had had today’s surveillance regime, with recording and data retention, the regime could and would have gone back and re-examined every earlier piece of action for what they might have missed. This horror is reality now, and it applies to every piece in this series. Our digital children aren’t just without privacy in the moment, they’re retroactively without privacy in the past, too. (Well, this horror is a reality that comes and goes, as legislators and courts are in a tug of war. In the European Union, Data Retention was mandated in 2005 by the European Parliament, was un-mandated in 2014 by the European Court of Justice, and prohibited in 2016 by the same Court. Other jurisdictions are playing out similar games; a UK court just dealt a blow to the Data Retention there, for example.) Privacy remains your own responsibility. Full Article Privacy
analog Analog Equivalent Rights (17/21): The Previous Inviolability of Diaries By falkvinge.net Published On :: Sun, 29 Apr 2018 19:23:00 +0000 Privacy: For our analog parents, a diary or a personal letter could rarely be touched by authorities, not even by law enforcement searching for evidence of a crime. Objects such as these had protection over and above the constitutional privacy safeguards. For our digital children, however, the equivalent diaries and letters aren’t even considered worthy of basic constitutional privacy. In most jurisdictions, there is a constitutional right to privacy. Law enforcement in such countries can’t just walk in and read somebody’s mail, wiretap their phonecalls, or track their IP addresses. They need a prior court order to do so, which in turn is based on a concrete suspicion of a serious crime: the general case is that you have a right to privacy, and violations of this rule are the exception, not the norm. However, there’s usually a layer of protection over and above this: even if and when law enforcement gets permission from a judge to violate somebody’s privacy in the form of a search warrant of their home, there are certain things that may not be touched unless specific and additional permissions are granted by the same type of judge. This class of items includes the most private of the personal: private letters, diaries, and so on. Of course, this is only true in the analog world of our parents. Even though the letter of the law is the same, this protection doesn’t apply at all to the digital world of our children, to their diaries and letters. Because the modern diary is kept on a computer. If not on a desktop computer, then certainly on a mobile handheld one — what we’d call a “phone” for historical reasons, but what’s really a handheld computer. And a computer is a work tool in the analog world of our parents. There are loads of precedent cases that establish any form of electronic device as a work tool, dating back well into the analog world, and law enforcement is falling back on all of them with vigor, even now that our digital devices are holding our diaries, personal letters, and other items far more private than an analog diary was ever capable of. That’s right: whereas your parents’ diaries were extremely protected under the law of the land, your children’s diaries — no less private to them, than those of your parents were to your parents — are as protected from search and seizure as an ordinary steel wrench in a random workshop. So the question is how we got from point A to point B here? Why are the Police, who know that they can’t touch an analog diary during a house search, instantly grabbing mobile phones which serve the same purpose for our children? “Because they can”, is the short answer. “Also because nobody put their foot down” for advanced points on the civics course. It’s because some people saw short term political points in being “tough on crime” and completely erasing hard-won rights in the process. Encrypt everything. Full Article Privacy
analog Analog Equivalent Rights (18/21): Our analog parents had private conversations, both in public and at home By falkvinge.net Published On :: Tue, 01 May 2018 18:00:12 +0000 Privacy: Our parents, at least in the Western world, had a right to hold private conversations face-to-face, whether out in public or in the sanctity of their home. This is all but gone for our digital children. Not long ago, it was the thing of horror books and movies that there would actually be widespread surveillance of what you said inside your own home. Our analog parents literally had this as scary stories worthy of Halloween, mixing the horror with the utter disbelief. “There was of course no way of knowing whether you were being surveilled at any given moment. How often, or on what system, the Thought Police plugged in on any individual device was guesswork. It was even conceivable that they listened to everybody all the time. But at any rate they could listen to you whenever they wanted to. You had to live — did live, from habit that became instinct — in the assumption that every sound you made was overheard.” — from Nineteen Eighty-Four In the West, we prided ourselves on not being the East — the Communist East, specifically — who regarded their own citizens as suspects: suspects who needed to be cleansed of bad thoughts and bad conversations, to the degree that ordinary homes were wiretapped for ordinary conversations. There were microphones under every café table and in every residence. And even if there weren’t in the literal sense, just there and then, they could still be anywhere, so you had to live — did live, from habit that became instinct — in the assumption that every sound you made was overheard. “Please speak loudly and clearly into the flower pot.” — a common not-joke about the Communist societies during the Cold War Disregard phonecalls and other remote conversations for now, since we already know them to be wiretapped across most common platforms. Let’s look at conversations in a private home. We now have Google Echo and Amazon Alexa. And while they might have intended to keep your conversations to themselves, out of the reach of authorities, Amazon has already handed over living room recordings to authorities. In this case, permission became a moot point because the suspect gave permission. In the next case, permission might not be there, and it might happen anyway. Mobile phones are already listening, all the time. We know because when we say “Ok Google” to an Android phone, it wakes up and listens more intensely. This, at a very minimum, means it’s always listening for the words “Ok Google”. IPhones have a similar mechanism listening for “Hey Siri”. While nominally possible to turn off, it’s one of those things you can never be sure of. And we carry these governmental surveillance microphones with us everywhere we go. If the Snowden documents showed us anything in the general sense, it was that if a certain form of surveillance is technically possible, it is already happening. And even if Google and Apple aren’t already listening, the German police got the green light to break into phones and plant Bundestrojaner, the flower-pot equivalent of hidden microphones, anyway. You would think that Germany of all countries has in recent memory what a bad idea this is. It could — maybe even should — be assumed that the police forces of other countries have and are already using similar tools. For our analog parents, the concept of a private conversations was as self-evident as oxygen in the air. Our digital children may never know what one feels like. And so we live today — from what started as a habit that has already become instinct — in the assumption that every sound we make is overheard by authorities. Full Article Privacy
analog Analog Equivalent Rights (19/21): Telescreens in our Living Rooms By falkvinge.net Published On :: Fri, 04 May 2018 18:00:30 +0000 Privacy: The dystopic stories of the 1950s said the government would install cameras in our homes, with the government listening in and watching us at all times. Those stories were all wrong, for we installed the cameras ourselves. In the analog world of our parents, it was taken for completely granted that the government would not be watching us in our own homes. It’s so important an idea, it’s written into the very constitutions of states pretty much all around the world. And yet, for our digital children, this rule, this bedrock, this principle is simply… ignored. Just because they their technology is digital, and not the analog technology of our parents. There are many examples of how this has taken place, despite being utterly verboten. Perhaps the most high-profile one is the OPTIC NERVE program of the British surveillance agency GCHQ, which wiretapped video chats without the people concerned knowing about it. Yes, this means the government was indeed looking into people’s living rooms remotely. Yes, this means they sometimes saw people in the nude. Quite a lot of “sometimes”, even. According to summaries in The Guardian, over ten percent of the viewed conversations may have been sexually explicit, and 7.1% contained undesirable nudity. Taste that term. Speak it out loud, to hear for yourself just how oppressive it really is. “Undesirable nudity”. The way you are described by the government, in a file about you, when looking into your private home without your permission. When the government writes you down as having “undesirable nudity” in your own home. There are many other examples, such as the state schools that activate school-issued webcams, or even the US government outright admitting it’ll all your home devices against you. It’s too hard not to think of the 1984 quote here: The telescreen received and transmitted simultaneously. Any sound that Winston made, above the level of a very low whisper, would be picked up by it, moreover, so long as he remained within the field of vision which the metal plaque commanded, he could be seen as well as heard. There was of course no way of knowing whether you were being watched at any given moment. How often, or on what system, the Thought Police plugged in on any individual wire was guesswork. It was even conceivable that they watched everybody all the time. But at any rate they could plug in your wire whenever they wanted to. You had to live — did live, from habit that became instinct — in the assumption that every sound you made was overheard, and, except in darkness, every movement scrutinized. — From Nineteen Eighty-Four And of course, this has already happened. The so-called “Smart TVs” from LG, Vizio, Samsung, Sony, and surely others have been found to do just this — spy on its owners. It’s arguable that the data collected only was collected by the TV manufacturer. It’s equally arguable by the police officers knocking on that manufacturer’s door that they don’t have the right to keep such data to themselves, but that the government wants in on the action, too. There’s absolutely no reason our digital children shouldn’t enjoy the Analog Equivalent Rights of having their own home to their very selves, a right our analog parents took for granted. Full Article Privacy
analog Analog Equivalent Rights (20/21): Your analog boss couldn’t read your mail, ever By falkvinge.net Published On :: Fri, 11 May 2018 18:00:22 +0000 Europe: Slack has updated its Terms of Service to let your manager read your private conversations in private channels. Our analog parents would have been shocked and horrified at the very idea that their bosses would open packages and read personal messages that were addressed to them. For our digital children, it’s another shrugworthy part of everyday life. The analog plain old telephone system, sometimes abbreviated POTS, is a good template for how things should be even in the digital world. This is something that lawmakers got mostly right in the old analog world. When somebody is on a phonecall — an old-fashioned, analog phonecall — we know that the conversation is private by default. It doesn’t matter who owns the phone. It is the person using the phone, right this very minute, that has all the rights to its communication capabilities, right this very minute. The user has all the usage rights. The owner has no right to intercept or interfere with the communications usage, just based on the property right alone. Put another way: just because you own a piece of communications equipment, that doesn’t give you any kind of automatic right to listen to private conversations that happen to come across this equipment. Regrettably, this only applies to the telephone network. Moreover, only the analog part of the telephone network. If anything is even remotely digital, the owner can basically intercept anything they like, for any reason they like. This particularly extends to the workplace. It can be argued that you have no expectation of privacy for what you do on your employer’s equipment; this is precisely forgetting that such privacy was paramount for the POTS, less than two decades ago, regardless of who owned the equipment. Some employers even install wildcard digital certificates on their workplace computers with the specific purpose of negating any end-to-end security between the employee’s computer and the outside world, effectively performing a so-called “man-in-the-middle attack”. In a whitewashed term, this practice is called HTTPS Interception instead of “man-in-the-middle attack” when it’s performed by your employer instead of another adversary. Since we’re looking at difference between analog and digital, and how privacy rights have vanished in the transition to digital, it’s worth looking at the code of law for the oldest of analog correspondences: the analog letter, and whether your boss could open and read it just because it was addressed to you at your workplace. Analog law differs somewhat between different countries on this issue, but in general, even if your manager or workplace were allowed to open your mail (which is the case in the United States but not in Britain), they are typically never allowed to read it (even in the United States). In contrast, with electronic mail, your managers don’t just read your entire e-mail, but typically has hired an entire department to read it for them. In Europe, this went as far as the European Court of Human Rights, which ruled that it’s totally fine for an employer to read the most private of correspondence, as long as the employer informs of this fact (thereby negating the default expectation of privacy). Of course, this principle about somewhat-old-fashioned e-mail applies to any and all electronic communications now, such as Slack. So for our digital children, the concept of “mail is private and yours, no matter if you receive it at the workplace” appears to have been irrevocably lost. This was a concept our analog parents took so for granted, they didn’t see any need to fight for it. Today, privacy remains your own responsibility. Full Article Europe Global Privacy United Kingdom United States
analog Analog Equivalent Rights (21/21): Conclusion, privacy has been all but eliminated from the digital environment By falkvinge.net Published On :: Fri, 18 May 2018 18:00:41 +0000 Privacy: In a series of posts on this blog, we have shown how practically everything our parents took for granted with regards to privacy has been completely eliminated for our children, just because they use digital tools instead of analog, and the people interpreting the laws are saying that privacy only applies to the old, analog environment of our parents. Once you agree with the observation that privacy seems to simply not apply for our children, merely for living in a digitally-powered environment instead of our parents’ analog-powered one, surprise turns to shock turns to anger, and it’s easy to want to assign blame to someone for essentially erasing five generations’ fight for civil liberties while people were looking the other way. So whose fault is it, then? It’s more than one actor at work here, but part of the blame must be assigned to the illusion that that nothing has changed, just because our digital children can use old-fashioned and obsolete technology to obtain the rights they should always have by law and constitution, regardless of which method they use to talk to friends and exercise their privacy rights. We’ve all heard these excuses. “You still have privacy of correspondence, just use the old analog letter”. As if the Internet generation would. You might as well tell our analog parents that they would need to send a wired telegram to enjoy some basic rights. “You can still use a library freely.” Well, only an analog one, not a digital one like The Pirate Bay, which differs from an analog library only in efficiency, and not in anything else. “You can still discuss anything you like.” Yes, but only in the analog streets and squares, not in the digital streets and squares. “You can still date someone without the government knowing your dating preferences.” Only if I prefer to date like our parents did, in the unsafe analog world, as opposed to the safe digital environment where predators vanish at the click of a “block” button, an option our analog parents didn’t have in shady bars. The laws aren’t different for the analog and the digital. The law doesn’t make a difference between analog and digital. But no law is above the people who interpret it in the courts, and the way people interpret those laws means the privacy rights always apply to the analog world, but never to the digital world. It’s not rocket science to demand the same laws to apply offline and online. This includes copyright law, as well as the fact that privacy of correspondence takes precedence over copyright law (in other words, you’re not allowed to open and examine private correspondence for infringements in the analog world, not without prior and individual warrants — our law books are full of these checks and balances; they should apply in the digital too, but don’t today). Going back to blame, that’s one actor right there: the copyright industry. They have successfully argued that their monopoly laws should apply online just as it does offline, and in doing so, has completely ignored all the checks and balances that apply to the copyright monopoly laws in the analog world. And since copying movies and music has now moved into the same communications channels as we use for private correspondence, the copyright monopoly as such has become fundamentally incompatible with private correspondence at the conceptual level. The copyright industry has been aware of this conflict and has been continuously pushing for eroded and eliminated privacy to prop up their crumbling and obsolete monopolies, such as pushing for the hated (and now court-axed) Data Retention Directive in Europe. They would use this federal law (or European equivalent thereof) to literally get more powers than the Police themselves in pursuing individual people who were simply sharing music and movies, sharing in the way everybody does. There are two other major factors at work. The second factor is marketing. The reason we’re tracked at the sub-footstep level in airports and other busy commercial centers is simply to sell us more crap we don’t need. This comes at the expense of privacy that our analog parents took for granted. Don’t even get started on Facebook and Google. Last but not least are the surveillance hawks — the politicians who want to look “Tough on Crime”, or “Tough on Terrorism”, or whatever the word of choice is this week. These were the ones who pushed the Data Retention Directive into law. The copyright industry were the ones who basically wrote it for them. These three factors have working together, and they’ve been very busy. It’s going to be a long uphill battle to win back the liberties that were slowly won by our ancestors over about six generations, and which have been all but abolished in a decade. It’s not rocket science that our children should have at least the same set of civil liberties in their digital environment, as our parents had in their analog environment. And yet, this is not happening. Our children are right to demand Analog Equivalent Privacy Rights — the civil liberties our parents not just enjoyed, but took for granted. I fear the failure to pass on the civil liberties from our parents to our children is going to be seen as the greatest failure of this particular current generation, regardless of all the good we also accomplish. Surveillance societies can be erected in just ten years, but can take centuries to roll back. Privacy remains your own responsibility today. We all need to take it back merely by exercising our privacy rights, with whatever tools are at our disposal. Image from the movie “Nineteen-Eighty Four”; used under fair use for political commentary. Full Article Privacy
analog Vegetables as Meat Replacers— Not Analogs— Find Their Way Back to Center Plate By www.preparedfoods.com Published On :: Thu, 22 Feb 2024 00:00:00 -0500 Prepared Foods speaks with Susan Guerin, CEO of World Finer Foods, Inc. and Cutting Vedge, Inc., makers of burgers, meatballs, crumbles, and sausage replacers from artichokes. Full Article
analog Analogue Plus to Launch CRNK Helmets on Kickstarter in October! By www.24-7pressrelease.com Published On :: Thu, 14 Oct 2021 08:00:00 GMT The company is also continuously launching products for motorcycles and snow sports. In Kickstarter, the company will be launching three of its next-generation helmet CRNK. Here are the three types that will be introduced at Kickstarter. Full Article
analog [Pangyo Startup] Analogue Plus Introduces "CRNK," a Smart Helmet Brand Which Added Features of IoT Communications and Removed Risk Factors By www.24-7pressrelease.com Published On :: Thu, 01 Jul 2021 08:00:00 GMT In Pangyo Techno Valley Start-up campus, I sat down with CMO Brina from Analogue Plus to listen to an explanation of "CRNK," which combined IoT with a safety helmet. Full Article
analog Bad science as genre fiction: I think there’s a lot to be said for this analogy! By statmodeling.stat.columbia.edu Published On :: Fri, 08 Nov 2024 14:19:54 +0000 I came across this blog comment from a couple years ago saying that, whatever was going on in the head of Brian “Pizzagate” Wansink when he wrote up those papers with the fake data, in any case his papers papers … Continue reading → Full Article Literature Miscellaneous Science Zombies
analog [ V.151 (05/06) ] - Procedures for the end-to-end connection of analogue PSTN text telephones over an IP network utilizing text relay By www.itu.int Published On :: Fri, 01 Feb 2008 11:10:00 GMT Procedures for the end-to-end connection of analogue PSTN text telephones over an IP network utilizing text relay Full Article
analog Associate Analog Mixed Signal Integrated Circuit Design Engineer By www.avjobs.com Published On :: Tukwila, WA United States - Job Description At Boeing, we innovate and collaborate to make the world a better place. From the seabed to outer space, you can contribute to work that matters with a company where diversity, equity and inclusion are shared values. Were committed to fostering an en... View Full Article
analog analogous By separatedbyacommonlanguage.blogspot.com Published On :: Mon, 26 Aug 2024 20:34:00 +0000 I listen to a lot of podcasts, and I notice things. One thing I’ve noticed is that no one seems to be able to agree with anyone else without saying 100%. That cliché seems to have caught on in both UK and US, so that’s not the topic of this blog post. This blog post is about another thing I’ve noticed: an apparent change in the British pronunciation of analogous. Dictionaries give the pronunciation as /əˈnaləɡəs/ (or similar; all dictionary pronunciations here from the OED). That is to say, the stress is on the second syllable and the ‘g’ is pronounced ‘hard’ as in analog(ue). What I’ve been noticing in BrE speakers is a non-dictionary pronunciation, /əˈnaləʤəs/, which is to say with a ‘soft g’ as in analogy. To see how common this pronunciation is, I looked to YouGlish, which finds a word in YouTube videos (using the automatic transcription), classifies them by country, and presents them so that you can listen to that word pronounced by lots of people in lots of contexts. The automati{s/z}ation means that it makes mistakes. I wanted to listen to the first ten pronunciations in US and UK, but had to listen to 12 in the ‘UK’ category to get ten that were both British and the right word.screenshot from examplesof.net The first British one had a pronunciation that I hadn’t heard before: /əˈnaləɡjuəs/, as if the spelling were analoguous. Half (five) of the British ten had the hard ‘g’ pronunciation, four had the soft-g pronunciation I’d been hearing, as if the spelling is analogious (or analogeous). All of the first 10 US ones said /əˈnaləɡəs/. The word analogous seems to be more common in AmE. There are 2433 examples of it on US YouGlish, versus 147 examples tagged-as-UK. (The US population is about five times larger than UK’s, and Americans might post videos to YouTube at a higher rate than Britons. So while that’s a very big numerical difference, it doesn’t mean Americans say it16 times more than the British.) That’s in speech. In writing, there’s about twice as much American analogous in the News on the Web corpus: So, Americans have presumably heard the word more than Britons have, leading to a more uniform pronunciation. Now, when people know a word more from reading it than from hearing it, we might expect that they will rely on the spelling to know how it sounds. What’s a bit odd here is that the non-dictionary pronunciations contradict the spelling. Perhaps some people who know the word from print have not fully noticed that the spelling is -gous and think it’s -gious. Or perhaps they’re deriving the word anew from their knowledge of other members of that word-family. Analog(ue) = /ˈanəl*ɡ/ + -ous = analogous /əˈnaləɡəs/ [dictionary] (* different vowels: AmE [ɔ] or [ɑ] & BrE [ɒ]) Analogy = /əˈn*lədʒi/ + -ous = analogious > /əˈnaləʤəs/ [non-dictionary] (* different vowels: AmE [æ] & BrE [a]) Analogu(e) + /ˈanəl*ɡ/ + ous = analoguous > /əˈnaləɡjuəs/ [non-dictionary] In the last case, the ‘u’ that is silent in analogue is treated as if it’s ‘really there’ and pronounced in the extended form. This sometimes happens with ‘silent’ final consonants and suffixes. Think of how the ‘silent n’ in damn and autumn are pronounced in damnation and autumnal. This is a bit different, since it’s a vowel, and I can’t think of another example where a silent final ue does the same thing. We don’t go from critique to critiqual (it’s critical) and tonguelet is not pronounced tun-gu-let or tung-u-let: the u remains silent. When I tweeted (or skeeted or something) about the soft-g analogous pronunciation, some respondents supposed that the -gous ending is not found in other words, and therefore unfamiliar. (One said they could only think of humongous, which seems like a jokey word). It is true that analogous is the most common -gous word, but the OED lists 153 others, most of them fairly technical terms like homologous, tautologous, homozygous, and polyphagous. There are fewer -gious words (83), but they’re much more common words: religious, prestigious, contagious, etc. The relative frequency of -gious endings versus -gous endings may have contagiously spread to analogous. But there’s something to notice about contagious and its -gious kin and analogous and its -gous mates. The main stress in a word like contagious is in the syllable just before the -gious, i.e. the penultimate syllable (/kənˈteɪdʒəs/, religious = /rᵻˈlɪdʒəs/, prestigious = BrE /prɛˈstɪdʒəs/ and AmE /prɛˈstidʒəs/ ). (English stress patterns are often best described by counting syllables from the back of the word.) The main stress in analogous is not on the penultimate syllable, but on the one before (the antepenult). That is, we say aNAlogous not anaLOgous, no matter how we pronounce the ‘g’. If soft-g analogous was surmised from (mis)reading rather than hearing the word, and if it was following the model of words like contagious, we’d expect it to be pronounced anaLOdʒous, with some sort of O sound as a stressed vowel. That's not what's happening.(One way to think of this is that there’s a general pattern that long -ous words are stressed on the antepenultimate syllable, but only if we think of the ‘i’ in -gious words as a syllable of its own, which gets elided after the stress pattern has been set. There’s way more to explain about that than I can do in a blog post…and I am relying on decades-old phonology education here.) Now, I am not a phonologist or a morphologist, so I asked my former colleague and friend Max Wheeler to check my reasoning here. He's OK'd it and adds:To make your argument another way, while -gous is unusual, '-jous' after an unstressed vowel is unparalleled.[...] analogy is quite a common word, while analogous is much rarer (and people may not readily connect semantically to analog(ue)). Even people with a literary education are unfamiliar with the /g/ - /j/ alternation, so 'mispronounce' fungi, pedagogy, as well as analogous, taking no guidance from the spelling. The phoneme from the more frequent word-form wins.The moral of the story: soft-g analogous is a bit weird—which is to say, a bit interesting. If you liked this post, you might like:-og and -ogue-ousnessconflab Full Article adjectives morphology pronunciation
analog The Gonchar–Chudnovskies conjecture and a functional analogue of the Thue–Siegel–Roth theorem By www.ams.org Published On :: Tue, 01 Oct 2024 14:21 EDT A. I. Aptekarev and M. L. Yattselev Trans. Moscow Math. Soc. 83 (), 251-268. Abstract, references and article information Full Article
analog In crystallo screening for proline analog inhibitors of the proline cycle enzyme PYCR1 [Metabolism] By www.jbc.org Published On :: 2020-12-25T00:06:31-08:00 Pyrroline-5-carboxylate reductase 1 (PYCR1) catalyzes the biosynthetic half-reaction of the proline cycle by reducing Δ1-pyrroline-5-carboxylate (P5C) to proline through the oxidation of NAD(P)H. Many cancers alter their proline metabolism by up-regulating the proline cycle and proline biosynthesis, and knockdowns of PYCR1 lead to decreased cell proliferation. Thus, evidence is growing for PYCR1 as a potential cancer therapy target. Inhibitors of cancer targets are useful as chemical probes for studying cancer mechanisms and starting compounds for drug discovery; however, there is a notable lack of validated inhibitors for PYCR1. To fill this gap, we performed a small-scale focused screen of proline analogs using X-ray crystallography. Five inhibitors of human PYCR1 were discovered: l-tetrahydro-2-furoic acid, cyclopentanecarboxylate, l-thiazolidine-4-carboxylate, l-thiazolidine-2-carboxylate, and N-formyl l-proline (NFLP). The most potent inhibitor was NFLP, which had a competitive (with P5C) inhibition constant of 100 μm. The structure of PYCR1 complexed with NFLP shows that inhibitor binding is accompanied by conformational changes in the active site, including the translation of an α-helix by 1 Å. These changes are unique to NFLP and enable additional hydrogen bonds with the enzyme. NFLP was also shown to phenocopy the PYCR1 knockdown in MCF10A H-RASV12 breast cancer cells by inhibiting de novo proline biosynthesis and impairing spheroidal growth. In summary, we generated the first validated chemical probe of PYCR1 and demonstrated proof-of-concept for screening proline analogs to discover inhibitors of the proline cycle. Full Article
analog Evaluating Drug-Drug Interaction Risk Associated with Peptide Analogs Using advanced In Vitro Systems [Special Section on New and Emerging Areas and Technologies in Drug Metabolism and Disposition, Part II] By dmd.aspetjournals.org Published On :: 2024-10-16T09:02:03-07:00 Drug–drug interaction (DDI) assessment of therapeutic peptides is an evolving area. The industry generally follows DDI guidelines for small molecules, but the translation of data generated with commonly used in vitro systems to in vivo is sparse. In the current study, we investigated the ability of advanced human hepatocyte in vitro systems, namely HepatoPac, spheroids, and Liver-on-a-chip, to assess potential changes in regulation of CYP1A2, CYP2B6, CYP3A4, SLCO1B1, and ABCC2 in the presence of selected therapeutic peptides, proteins, and small molecules. The peptide NN1177, a glucagon and GLP-1 receptor co-agonist, did not suppress mRNA expression or activity of CYP1A2, CYP2B6, and CYP3A4 in HepatoPac, spheroids, or Liver-on-a-chip; these findings were in contrast to the data obtained in sandwich cultured hepatocytes. No effect of NN1177 on SLCO1B1 and ABCC2 mRNA was observed in any of the complex systems. The induction magnitude differed across the systems (e.g., rifampicin induction of CYP3A4 mRNA ranged from 2.8-fold in spheroids to 81.2-fold in Liver-on-a-chip). Small molecules, obeticholic acid and abemaciclib, showed varying responses in HepatoPac, spheroids, and Liver-on-a-chip, indicating a need for EC50 determinations to fully assess translatability data. HepatoPac, the most extensively investigated in this study (3 donors), showed high potential to investigate DDIs associated with CYP regulation by therapeutic peptides. Spheroids and Liver-on-a-chip were only assessed in one hepatocyte donor and further evaluations are required to confirm their potential. This study establishes an excellent foundation toward the establishment of more clinically-relevant in vitro tools for evaluation of potential DDIs with therapeutic peptides. SIGNIFICANT STATEMENT At present, there are no guidelines for drug–drug interaction (DDI) assessment of therapeutic peptides. Existing in vitro methods recommended for assessing small molecule DDIs do not appear to translate well for peptide drugs, complicating drug development for these moieties. Here, we establish evidence that complex cellular systems have potential to be used as more clinically-relevant tools for the in vitro DDI evaluation of therapeutic peptides. Full Article
analog KLS-13019, a Novel Structural Analogue of Cannabidiol and GPR55 Receptor Antagonist, Prevents and Reverses Chemotherapy-Induced Peripheral Neuropathy in Rats [Special Section: Cannabinoid Signaling in Human Health and Disease] By jpet.aspetjournals.org Published On :: 2024-10-18T07:04:15-07:00 Neuropathic pain is a form of chronic pain that develops because of damage to the nervous system. Treatment of neuropathic pain is often incompletely effective, and most available therapeutics have only moderate efficacy and present side effects that limit their use. Opioids are commonly prescribed for the management of neuropathic pain despite equivocal results in clinical studies and significant abuse potential. Thus, neuropathic pain represents an area of critical unmet medical need, and novel classes of therapeutics with improved efficacy and safety profiles are urgently needed. The cannabidiol structural analog and novel antagonist of GPR55, KLS-13019, was screened in rat models of neuropathic pain. Tactile sensitivity associated with chemotherapy exposure was induced in rats with once-daily 1-mg/kg paclitaxel injections for 4 days or 5 mg/kg oxaliplatin every third day for 1 week. Rats were then administered KLS-13019 or comparator drugs on day 7 in an acute dosing paradigm or days 7–10 in a chronic dosing paradigm, and mechanical or cold allodynia was assessed. Allodynia was reversed in a dose-dependent manner in the rats treated with KLS-13019, with the highest dose reverting the response to prepaclitaxel injection baseline levels with both intraperitoneal and oral administration after acute dosing. In the chronic dosing paradigm, four consecutive doses of KLS-13019 completely reversed allodynia for the duration of the phenotype in control animals. Additionally, coadministration of KLS-13019 with paclitaxel prevented the allodynic phenotype from developing. Together, these data suggest that KLS-13019 represents a potential new drug for the treatment of neuropathic pain. SIGNIFICANCE STATEMENT Chemotherapy-induced peripheral neuropathy (CIPN) is a common, debilitating side effect of cancer treatment with no known cure. The GPR55 antagonist KLS-13019 represents a novel class of drug for this condition that is a potent, durable inhibitor of allodynia associated with CIPN in rats in both prevention and reversal-dosing paradigms. This novel therapeutic approach addresses a critical area of unmet medical need. Full Article
analog $250 Analogue 3D will play all your N64 cartridges in 4K early next year By arstechnica.com Published On :: Wed, 16 Oct 2024 15:00:54 +0000 FPGA-powered hardware will capture CRT glow with "bespoke, purpose-built upscaler" Full Article Gaming
analog Der Zauberstab der Analogie : Untersuchungen zu den Erscheinungsweisen und Funktionen von Analogien in sprachlichen Sinnbildungsprozessen [Electronic book] / Wilhelm Köller. By encore.st-andrews.ac.uk Published On :: Berlin ; Boston : De Gruyter, [2023] Full Article
analog Synthesis and study of antibiofilm and antivirulence properties of flavonol analogues generated by palladium catalyzed ligand free Suzuki–Miyaura coupling against Pseudomonas aeruginosa PAO1 By pubs.rsc.org Published On :: RSC Adv., 2024, 14,12278-12293DOI: 10.1039/D3RA08617H, Paper Open Access   This article is licensed under a Creative Commons Attribution-NonCommercial 3.0 Unported Licence.Anjitha Theres Benny, Masthan Thamim, Prakhar Srivastava, Sindoora Suresh, Krishnan Thirumoorthy, Loganathan Rangasamy, Karthikeyan S., Nalini Easwaran, Ethiraj Kannatt RadhakrishnanAn overview on the mechanism of Pseudomonas aeruginosa PAO1 biofilm inhibition by Suzuki–Miyaura coupled flavonols.The content of this RSS Feed (c) The Royal Society of Chemistry Full Article
analog Selenosalicylate; a little-studied heavy-element analogue of the versatile thiosalicylate ligand By pubs.rsc.org Published On :: RSC Adv., 2024, 14,12323-12336DOI: 10.1039/D4RA00926F, Paper Open Access   This article is licensed under a Creative Commons Attribution-NonCommercial 3.0 Unported Licence.Simeon Atiga, Graham C. Saunders, William HendersonSelenosalicylic acid was synthesised by reacting 2-carboxybenzenediazonium chloride with Na2Se2 followed by reduction of the resulting diselenide with zinc and acetic acid. The deprotonated acid reacted with metal precursors to form selenosalicylate complexes.The content of this RSS Feed (c) The Royal Society of Chemistry Full Article
analog Effect of computationally designed fragment-based analogs on the RBD–ACE2 complex of the SARS-CoV-2 P.1 variant By pubs.rsc.org Published On :: Mol. Syst. Des. Eng., 2024, Advance ArticleDOI: 10.1039/D3ME00193H, PaperSurabhi Lata, Mohd. AkifModulation of the RBD–ACE2 complex formation and perturbation in their interface by the designed analogs.To cite this article before page numbers are assigned, use the DOI form of citation above.The content of this RSS Feed (c) The Royal Society of Chemistry Full Article
analog Recent advances in the chemistry of isolable carbene analogues with group 13–15 elements By pubs.rsc.org Published On :: Chem. Soc. Rev., 2024, 53,3896-3951DOI: 10.1039/D3CS00784G, Review ArticleMian He, Chaopeng Hu, Rui Wei, Xin-Feng Wang, Liu Leo LiuThis review provides an overview of main group carbene analogues, covering recent advancements, synthesis strategies, and the diverse reactivity of elements in groups 13–15 based on their structural characteristics.The content of this RSS Feed (c) The Royal Society of Chemistry Full Article
analog Analogy of two birds By www.thehindu.com Published On :: Mon, 12 Sep 2016 04:10:16 +0530 Full Article Faith
analog Exogenous analogues of substance P trigger pseudo-allergic reactions through activation of MRGPRX2 By pubs.rsc.org Published On :: New J. Chem., 2024, Advance ArticleDOI: 10.1039/D3NJ04581A, PaperYi Shan, Jiayu Lu, Na Li, Xiaoxue Mo, Cheng Wang, Huaizhen HeThis article reports that exogenous analogues of the neuropeptide substance P can activate MRGPRX2 to trigger pseudo-allergic reactions.To cite this article before page numbers are assigned, use the DOI form of citation above.The content of this RSS Feed (c) The Royal Society of Chemistry Full Article
analog Structural flexibility of favipiravir and its structural analogues in solutions: experimental and computational insight By pubs.rsc.org Published On :: Org. Biomol. Chem., 2024, Advance ArticleDOI: 10.1039/D4OB00404C, PaperTatiana P. Gerasimova, Almaz A. Zagidullin, Anastasiia N. Nikolaeva, Robert R. Fayzullin, Aliya M. Saitova, Vasili A. Miluykov, Stefan Grimme, Sergey A. KatsyubaKeto-enol transformations of 6-R-3-hydroxy-2-pyrazinecarboxamides in solutions are accompanied by deprotonation of enol tautomers and the formation of corresponding anionic species. The key factors determining these processes have been identified.To cite this article before page numbers are assigned, use the DOI form of citation above.The content of this RSS Feed (c) The Royal Society of Chemistry Full Article
analog A phosphamide nucleotide analog: a substrate for polymerase synthesis of DNA By pubs.rsc.org Published On :: Org. Biomol. Chem., 2024, 22,2963-2967DOI: 10.1039/D4OB00089G, CommunicationJiong Meng, Qiaqia Guo, Xiaona Zhai, Song Yang, Shuai Wang, Pengcheng Wang, Debin JiA phosphamide nucleotide analog (dNTPγNH2) exhibited higher stability than dNTPs and can be recognized by DNA polymerases in PCR.The content of this RSS Feed (c) The Royal Society of Chemistry Full Article
analog Photoproperties of Favipiravir and their 6-Substituted Analogues: Fluorescence Controlled through Halogen Substitution and Tautomerism By pubs.rsc.org Published On :: Org. Biomol. Chem., 2024, Accepted ManuscriptDOI: 10.1039/D4OB00397G, PaperAngel H Romero, Marcos Couto, Ivan E Romero, German Fuentes, Matías N. MöllerHerein, we showed the photophysical properties of the favipiravir and their 6-substituted analogues. Also, we interpreted the origin of the fluorescence of the favipiravir and their 6-substituted analogues as function...The content of this RSS Feed (c) The Royal Society of Chemistry Full Article
analog How Gen Z is driving the return to film and analogue in photography By www.thehindu.com Published On :: Fri, 25 Aug 2023 15:01:25 +0530 A generation that has grown up on a digital diet is propelling this art form’s revival Full Article Arts