Thứ Tư, 5 tháng 4, 2017

Waching daily Apr 6 2017

The security of the internet depends on encryption.

It allows your device and a faraway server to send private messages to each other

like your emails, your passwords, pictures of your cats, without anyone eavesdropping.

Today's encryption works pretty well, but a sophisticated quantum computer can break it,

and a universal quantum computing machine is likely to emerge in the near future.

"But quantum computers are already here…"

Yeah yeah I know, there are quantum computers on the market, but these are not the scary ones.

They use quantum annealing to solve certain optimisation problems.

They are not the full-blown quantum computers that threaten our security.

They are too highly specialized for that.

But when the general-purpose quantum computers come…

Are we DOOMED???

Maybe… but we can fight quantum with quantum.

For the moment, forget about encryption and just think about what it's trying to achieve.

You and a server need to communicate with each other.

(And by "you", I mean "your computer".)

They need to be able to see the information you send them, and you need to be able to

see the information they send you.

No one else should be able to see any of these messages.

But what's stopping an eavesdropper from taking your messages

and making copies for themselves?

Not much.

So what if you scramble your messages?

Write them in a secret code.

Okay, then how are you and the server supposed to unscramble each other's messages?

If you tell each other how to unscramble them, then the eavesdropper knows

how to unscramble them too, and all of this is pointless.

You and the server need to know something that no one else does.

Ok let's give that a go.

Let's say that we scramble our data and incorporate a special number into the exact

way that we scramble it.

We do this in a way that you need that special number in order to unscramble it afterward.

Since this number is used to "lock" and "unlock" the data, let's call it a "key".

This key is a secret so we can't pass it through the internet for eavesdroppers to see.

Otherwise, they would be able to unscramble our messages.

But what about you and the server?

Without access to each other's key, how are you supposed to

unscramble each other's messages?

Here's how we get around this problem today.

Say that you want to send the server some private information.

The server has two special keys.

The public key can only be used to scramble information, no unscrambling.

So it's safe to send you that key, so you can scramble your secrets

before you send them along.

Even if the eavesdropper makes their own copy of the public key,

it's useless against a scrambled message.

So how does the server unscramble it?

It uses the private key.

This key is super-secret and no one but the server should ever have it, not even you.

This private key was custom-made to unscramble messages

which this particular public key scrambled.

These keys always come it pairs.

One of them can only scramble, and the other can only unscramble messages

that were scrambled by the first one.

Now, calling both these numbers "keys" might be a bad analogy, since keys can typically

both lock and unlock.

That's why I'm illustrating them as a padlock and a padlock key, since padlocks

can only lock, and its corresponding key can only unlock

that specific padlock.

And even this might be a bad analogy, since locking and unlocking messages

makes it seem like they're concealed inside a box or something,

when it's really more like blending it into something that looks meaningless,

but in such a way that the original message can be reconstructed if you have the right number.

Anyway, I'm stealing the padlock analogy from this numberphile video,

which goes into a bit more detail on how all of this works.

The short version is: Because math!

So that covers how you can send the server secret information.

How does the server send you secret information?

You don't have the server's private key, so you can't unscramble messages that were

scrambled by its public key.

Instead, you generate your own unique, plain old, regular key on the spot

and send theserver a copy.

But, before you send the key through, you use the server's public key to scramble it.

The server can then get your key by unscrambling it.

Now you each of you can use this new key to both scramble and unscramble messages.

Even better, the eavesdroppers can't get this new key, since it was scrambled when

you sent it to the server.

Hooray it worked!

Now here's the problem.

Everything here rests on the fact that keys that can unlock messages are kept secret.

We only share them secretly in scrambled form if we ever need to.

But we are freely sharing the public key.

It turns out that given enough time, an eavesdropper's computer can analyse it

to create an exact copy of the corresponding private key.

They can essentially pick the lock.

This is done by guessing tons of potential private keys until a match is found.

There are some shortcuts, but the math behind these keys is designed

so that this would take forever anyway.

Luckily, we change our locks faster the than the eavesdropper can pick them.

The fastest algorithms for doing this key reconstruction are just too slow

to be of any practical use.

So the eavesdropper won't find your private key unless you're astronomically unlucky.

There are theoretically faster algorithms that would do the job though.

But luckily they can only run on quantum computers.

Wait a minute, those are probably coming soon aren't they?

So, once again…

Are we DOOMED???

Possibly not.

There is an initiative to create new encryption standards

in a world after quantum computers become a thing: Post-Quantum Cryptography.

Here's the basic idea.

Public-private keys must behave as one-way functions.

Given a private key, it's easy to create its corresponding public key,

but given a public key, it's hard to create its corresponding private key.

It's a real pain to go backwards, hence it is one-way.

By design, at least one of these processes should be easy,

otherwise we wouldn't be able to create these key pairs in the first place.

After all, what's the point of designing the perfect padlock with no way to open it,

or the perfect padlock key with nothing for it to open?

Making this process easy ensures that we can always make a useful pair.

The hard part here is the critical point of this mechanism.

This makes it possible to let everybody encrypt messages but only some people decrypt them.

You can't decrypt messages without the private key, and it's hard to get it,

even when you have the public key.

And that is next to impossible in practice.

You might be wondering why we can't just make it impossible to go backwards.

It's because there will always be at least one way to get the private key from the public key:

going through every single possibility until a match is found.

The best thing that we can do is make the backwards process as hard as we can,

while keeping the forward process easy.

This is how one-way functions work, and they're the best thing we have so far.

Unfortunately, the particular one-way function that most of the internet uses can be broken

by quantum computers.

They make it easy to get the private key, but only because there happens to be algorithm

to do it that performs very well when it's run on a quantum computer.

To solve this problem with existing technology, new mechanisms could be built on different

one-way functions, particularly ones that no one knows how to break

even with quantum computers.

That would keep this process easy, this process hard.

This is good in the shorter term, but we can do better.

Surprisingly, quantum computers themselves come to save the day.

They can let us do things with security that not even public-private keys can do.

Welcome to Quantum Cryptography.

Conventional computers use bits which can each be either 1 or 0.

Quantum computers use qubits, which can be 1 or 0 or some combination of the two.

Let's visually represent qubits with this diagram, which I like to call the Bloch circle.

It's a simplified version of something else called the Bloch sphere,

but we don't need it for this video.

Now, in the Bloch circle, the direction that this arrow is pointing represents the state the qubit is in.

When we try to read a qubit, we need to choose a direction to measure it in.

If we measure it in the vertical orientation, we'll say that it's a zero whenever the

arrow points this way, and a 1 whenever the arrow points this way.

If the qubit was in some non-vertical state, our measurement forces the qubit to choose

one of them, ...because quantum mechanics!

If it was in a horizontal state, there's a 50-50 chance of it being measured as 0 or 1.

But if we wanted, we could have measured it horizontally.

In this case, this would be a 0, this would be a 1, and

these would be 50-50 chances.

But what's the point of leaving it up to chance anyway?

Why not just measure vertically when it's vertical, and horizontally when it's horizontal?

Because we can't know if a given qubit is vertical or horizontal,

unless we made it ourselves. ourselves.

The only way for us to learn anything about it is to measure it, but the harsh reality

is that measurement might have changed it to something else.

Because quantum mechanics!

Now all of this might look really useless at first, but we can actually use these qubits

to generate keys and actually detect if someone is trying to eavesdrop.

Here's how it could work.

The server generates a random string of 1s and 0s.

We're gonna use these ones and zeros to make a key.

The server encodes these bits into qubits

by randomly choosing a vertical or horizontal orientation.

These qubits are then sent down a line that supports transmission of qubits, and you receive them.

Now, you don't know which qubits are vertical and which are horizontal, so you randomly guess,

measuring some of them vertically and others horizontally.

Each time, you have a 50-50 chance of guessing right since there are only two possible orientations

and you have to pick one of them.

If you do guess right, that bit will be the same for you as it is for the server.

If you guess wrong, that bit has at risk of being wrong.

Now, you have your own random string of 1s and 0s, but it's not exactly the same as

the server's string because of your wrong guesses.

To throw out the useless bits, you and the server compare the orientations

you used for each bit, and throw out the mismatches.

Even if an eavesdropper drops in to peek at the orientations used to make the measurements,

they won't know what the measurements were.

Now, you and the server each have copies of the same key

that you can both use to scramble and unscramble messages.

But why did the server make you guess what the orientations were?

Why couldn't the server just give them to you so you wouldn't need to guess?

Because it would have given away too much information for eavesdroppers looking at our qubits.

If you can perfectly guess the server's bits, so can an eavesdropper.

But adding a little uncertainty trips them up.

Let's see how it plays out.

Once again, the server generates a random bit sequence and encodes it in random orientations.

Now the server sends you the qubits, but the eavesdropper catches them along the way.

The eavesdropper must act quickly.

They need to measure the qubits and then send them back down to you

so you don't notice anything wrong.

But the eavesdropper doesn't know whether to measure vertically or horizontally.

If they guess wrong, the qubit changes.

Plus, they wouldn't even know if they guessed right or wrong in the first place, so they

can't fix their mistakes.

Maybe, they could make copies of the qubits, send one copy to you so you don't notice

anything wrong, and then try all sorts of different measurements

on their own copies to figure out what the qubits were.

Too bad they would need to break the laws of physics to do that.

A principle of quantum mechanics known as the no-cloning-theorem tells us that you can't

make copies of qubits if you don't already know what they are.

If the eavesdropper wants to know anything at all,

they need to measure the qubits.

And unfortunately for them, that means they either need to send you

contaminated qubits or dummy qubits of their own.

Even if the eavesdropper eventually sees you and the server

saying which orientations they should have used, it's too late for them.

Unless they happened to guess the orientation correctly every single time you guessed correctly,

or if by pure chance, the qubits collapsed to the right values anyway,

you and the server will end up with different numbers.

And taking a guess on all of your qubits is pretty much the worst strategy ever.

But how do you and the server know if the eavesdropper was messing with the qubits?

How do you know if these bits are safe to use?

You randomly pick half of your bits to compare.

If they're the same, you and the server know that

the other half is the same as well, unless you're astronomically unlucky.

But to better your odds, you use more qubits so small mistakes from

the eavesdropper are more likely to be noticed.

If you ever notice a problem, you toss everything out and try again.

Hopefully the eavesdropper will respect your privacy this time.

And if they don't, try a different communication channel.

This is known as the BB84 protocol.

It's one of the simpler ways of distributing quantum keys.

There's another one called the E91 protocol that takes advantage of quantum entanglement.

This one is a little more complicated.

First of all, instead of the server generating a random bit sequence,

you both receive half of a bunch of entangled qubits from a trusted third party.

You and the server then randomly pick from 3 orientations to measure your own half.

You then compare orientations, and note the ones that were the same.

But instead of throwing the rest of them away,

you can use the mismatches to check for an eavesdropper.

You know there was an eavesdropper if something called Bell's inequality was satisfied.

If Bell's inequality was not satisfied, it means that there was no eavesdropping, and

the key is safe to use.

Of course these protocols aren't perfect.

They rely on accurate transmission of qubits, which doesn't always happen in the real world.

So in reality, you need to sacrifice a bit more information

to do error correction.

And that's assuming you can even send qubits in the first place.

The existing infrastructure of the internet cannot.

But small quantum networks are being built.

They have all even successfully performed the BB84 protocol.

In addition, these protocols also don't fix all the problems the classical ones have.

For instance, man-in-the-middle attacks are still possible, where the eavesdropper impersonates

both you and the server, so neither of you notice anything wrong.

Denial of service attacks still are possible by simply "eavesdropping" on purpose.

The eavesdropper will be detected every time, but you and the server will never be able

to make a key, and thus can't communicate securely.

The solutions to these problems may involve broader fields,

such as authentication and networking.

In the end, quantum computers are a double edged sword, at least in the world of security.

They break our current system, but they open the door for more advanced ones.

But isn't that pointless?

Why develop quantum computers in the first place if they break and then re-solve the same problem?

Why the trouble?

It's because they open up new possibilities.

Breaking security is just one of many things they can do.

They can also improve database performance, and give us more accurate simulations of quantum mechanics,

which could accelerate research in medicine

or other technologies.

Every new discovery comes with opportunity and costs.

We can't complain when the eavesdroppers are just using superior tech to our own.

The threat is real, but people believe in advancing science and technology,

because of its potential to improve our lives. Sometimes...

we just need to keep up with it.

Oh no...

The video intro's out of date!

For more infomation >> Will Quantum Computers break encryption? - Duration: 15:45.

-------------------------------------------

How does Sordid Puppeteer's Veil sound without distortion ? (Metal Without distortion) - Duration: 5:10.

Hello my name is John or if you prefer

Nostra Cantus, so, i made this video with

the purpose of showing how some of my

songs sound without distortion on the guitars...

OK, first things first, I thought would be

interesting for y'all to hear songs

the way the were they were created

because, I first write down all the riffs

without the distortion and then I add it, ok ? the video

will be... first i play the guitar

without distortion and then the guitar with

distortion, ok ? two parts ! and so this way

you can hear the harmony, melody, feel

the atmosphere and all that crap in

different ways, ok ? and like I said, we are

focusing on the guitars, so the bass

is more kind of hidden, and the drums are

in a lower volume, the piano and the

synthesizer are in the way they were

supposed to be, the same volume as the

original mix, ok ? the song is called

Sordid Puppeteer's Veil, it's a song about

butterflies and bees? no! It's a song about

manipulation of the being through his

malevolent actions, on the being and on

the other person... ok ? So enjoy, ok?

For more infomation >> How does Sordid Puppeteer's Veil sound without distortion ? (Metal Without distortion) - Duration: 5:10.

-------------------------------------------

ASTRONOMERS PUZZLED BY MINI BIG BANG OF UNKNOWN ORIGINS - Duration: 5:38.

ASTRONOMERS PUZZLED BY MINI BIG BANG OF UNKNOWN ORIGINS

For a few minutes, the cataclysmic explosion produced a thousand times more energy than

all the stars in the galaxy combined.

The mysterious flash in the X-ray spectrum was spotted by the NASA�s Chandra X-ray

Observatory as it was peeking into the farthest reaches of our universe.

Astronomers suspect the bang can be attributed to some sort of destructive event but they

admit they haven�t seen anything like it before.

The source of the cosmic explosion was found in an area known as the Chandra Deep Field

South (CDF-S) and the region itself is quite strange.

Before October 2014, the CDF-S looked like an unassuming chunk of space, that is until

the event occurred and the area became 1,000 times brighter in the space of just a few

hours.

Following the incident, astronomers pointed both Hubble and the Spitzer space telescopes

towards the source of the massive explosion and after thousands of hours of carefully

gathering data, they were able to pinpoint the exact location to a small galaxy 10.7

billion light-years from Earth.

This meant that the cosmic boom that put out more energy than all the stars in the galaxy

combined took place more than 10 billion years ago, when galaxies were very young.

The early universe seems like it was a wild and dangerous place.

Understandably, this singular event took astronomers by surprise and ever since they witnessed

it unfold, they�ve been struggling to grasp its importance.

�Ever since discovering this source, we�ve been struggling to understand its origin,�

said Franz Bauer of the Pontifical Catholic University of Chile in Santiago, Chile.

�It�s like we have a jigsaw puzzle but we don�t have all of the pieces.�

There are several theories attempting to explain the explosion and all of them involve detonations

powerful enough to rip the space-time continuum a new one.

Scientists suspect the X-ray source could have originated with a gamma-ray burst, GRB

for short.

GRBs are massive surges of energy that happen when enormous stars collapse or when neutron

stars collide with one another.

Another plausible source for a gamma-ray burst could be the merger between a neutron star

and a black hole.

To get a sense of what went on, you first need to know just what kind of heat a neutron

star is packing.

Neutron stars are collapsed cores of massive stars and they are the hottest, densest type

of stars in our known universe.

Although their diameter rarely exceeds 20 miles, they typically weigh twice as much

as our own sun.

This means that a matchbox of neutron star matter would weigh about 3 billion tonnes.

Oh, and they spin like crazy.

The fastest neutron star revolves around its own axis a whopping 716 times per second,

which means that if you could theoretically exist on its surface, you would be traveling

at a quarter of the speed of light.

Now imagine two of these bad boys running into each other.

GRB moment right there.

WE MAY HAVE OBSERVED A COMPLETELY NEW TYPE OF CATACLYSMIC EVENT.�

Another explanation for the oxymoronic mini big bang could be a medium-sized black hole

sitting down to devour a white dwarf, with the X-ray emission as a result of the black

hole being a messy eater.

Unfortunately, �none of these ideas fits the data perfectly,� said study co-author

Ezequiel Treister, �but then again, we�ve rarely if ever seen any of the proposed possibilities

in actual data, so we don�t understand them well at all.�

So what�s all this have to do with us? you might ask.

Well, picture a GRB as a jetted discharge of energy, or better yet, a big-ass cosmic

death ray.

Should one occur closer to home (that is, somewhere in the Milky Way galaxy) and if

the Earth stood in its path, a gamma-ray burst could theoretically wipe us out.

It could deplete the ozone layer by as much as 75%, massively increasing ultraviolet radiation

to a point where no amount of sunscreen would offer protection.

It would cause chemical reactions in our atmosphere that could lead to what scientists call a

�cosmic winter� as well as global acid rains.

The effects would last for years.

Scientists suspect such an event took place in Earth�s distant past and it could be

responsible for the Ordovician-Silurian extinction events some 450 million years ago.

RIP trilobites and nearly 85% of all marine species at that time.

For more infomation >> ASTRONOMERS PUZZLED BY MINI BIG BANG OF UNKNOWN ORIGINS - Duration: 5:38.

-------------------------------------------

Art vs the Consumer | Catering to Censorship - Duration: 2:24.

(start sound, dog barks)

We live in strange days

where consumers feel they have a right to change what an artist initially wanted to reflect.

I'm curious as to how this would have changed what we value as masterpieces today

today if it had received the backlash that some art receives in this day and age.

It boggles my mind and entices my curiosity.

My brother is an artist, so yea, I am biased...

I truly believe that we aren't meant to change the original intent of the artist whether it offends or doesn't offend enough.

The tumultuous relationship consumers have versus artists

has heightened with the rise of social media.

Everyone feels the need to have a say on how something should be created

based on how it made them feel as a person.

. I guess I just grew up with the idea that art is just supposed to make you feel

good or bad, that's the whole point.

. It opens up a dialogue that would have otherwise been harder to begin.

It opens your mind. It ignites creativity.

And at times it opens your heart.

Whether or not it offends you – is besides the point.

Let it inspire you.

But in times like these, be wary that what you believe in,

what inspired you to create something that negates the art that you fully pounced on

might be the stomping ground for someone who felt offended by what you had to say.

And before you could just put it out there without the fear

of hordes of people analyzing who you are as person based on how a piece made them feel instead of who you actually are

It's my belief that the original work isn't supposed to be changed to make it easier to consume.

It's not a cookie.

I understand the need or desire to see things that speak to you in a positive light

or even one that you feel is accurate.

But that's not the role of the artist.

Their meaning, their truth, their inspiration is their own.

. It's not yours to change or to censor.

Obviously, this is just my opinion. Times are changing.

And change often pits us against each other even though at the end of the day,

we all want the same thing - freedom, respect, love, safety and basic human rights.

Take care guys! (chuckles) I hope this video encourages civil discussion.

But I really hope that you guys take the time to tell me about the artists (in all mediums) that have personally inspired you. Bye!

For more infomation >> Art vs the Consumer | Catering to Censorship - Duration: 2:24.

-------------------------------------------

AntSocial - Cataclisma. Part. Gigante No Mic & Bino (prod. Dj Tadela) - Duration: 3:45.

For more infomation >> AntSocial - Cataclisma. Part. Gigante No Mic & Bino (prod. Dj Tadela) - Duration: 3:45.

-------------------------------------------

AnimeMatsuri2017 We will be soon there!! - Duration: 3:07.

For more infomation >> AnimeMatsuri2017 We will be soon there!! - Duration: 3:07.

-------------------------------------------

Creativity 365 Administrator Center Tutorial - Manage Your Team Account - Duration: 2:25.

Welcome to Creativity 365 Administrator Center.

Let's walk you through the administrator panel and so you can quickly get hands on

managing your team account.

First, browse the plans you purchased, and select the one you'd like to assign users

to.

You can check the real-time status and renew date of the current plan in the dashboard,

or find the number of users assigned to this plan.

There are 3 ways to import emails and send invitation to your team members.

You can enter the email, or simply copy and paste the addresses to the box.

If you have a bulky list, we suggest you compile the list in a CSV file and choose

"Import from CSV".

It might take a while for the system to process your CSV files.

You can check the status in the "Processing" tab.

There are 3 kinds of user status.

The user who has received a confirmation mail will be in the 'Waiting for confirmation' tab.

Once the email is confirmed, it will be listed in the 'Assigned' tab.

The email will be listed in the 'Pending' tab if you are out of licenses, or if the

email is duplicated or has been assigned by another administrator.

You can download your invoice in 'Payment info.'

Check what you have done in 'Activity Log'

If there is any question, click the 'info' button to learn more or contact customer service.

For more infomation >> Creativity 365 Administrator Center Tutorial - Manage Your Team Account - Duration: 2:25.

-------------------------------------------

🌿Cannabis Concentrates & Extracts 📺Ep06 ⚛️SciBong.com - Duration: 8:51.

-[Matt] Welcome back to the

Institute of Higher Learning

Amazing news coming out of

Canada this week

the date to legalize recreational use

of cannabis nation wide will be

July 1st - Canada Day - 2018

it'll be up to each of the provinces

to set their own regulations

I personally like this approach

in the long term you don't want

a mandatory blanket of rules for

the whole country

you want each area to have the ability

to tweak and adapt over time

with each province theoretically

being responsible for how they

regulate and distribute

various cannabis products

the newest, most potent

and some of the most popular of those

products are concentrates

Ten years ago, a search online for

concentrates would have pulled up links

to results like orange juice or

study habits whereas today the phrase

is synonymous with cannabis culture

To begin, think about what happens

when you burn any plant…

take a piece of lettuce for instance

this example works great because

I hate salad…

if you burn a piece of lettuce

you'd be left with a smokey

smelly pile of ashes

these are all the things you avoid

when you use a concentrate as opposed

to traditional dry herb

you avoid burning plant material

which also means you avoid

the by-products: smoke, ash and odor

that go along with that

So the theory behind concentrates is

take the good stuff out

and leave the waste behind

in that way concentrates are an

evolution in the search for a

cleaner consumption method

for thousands of years its

been most convenient to ignite

the whole plant and let

biology sort the rest out

these days scientists are racing

to find the best way to get

the active ingredients: the cannabinoids

off the plant and into the waiting hands

of consumers and medical patients alike

now there are a ton of ways to extract

the cannabinoids

we can split these into

two separate groups: Physical Extraction

and Chemical Extraction

Physical Extraction uses factors in the

physical world like

gravity, temperature or pressure

to complete the extraction process

this doesn't include any

additional chemicals

just physical forces

to isolate the pollen from

the flowers of the plant

-Some guy from central called

said my packets on -

-[Matt] Physical extraction methods

produce dry concentrates

such as kief or hash

Chemical extraction uses a

foreign substance to complete

the extraction process

this substance is

known as a solvent

and it's used to bind to

and carry the cannabinoids away

from the plant material

-[Matt] this solvent is later reclaimed

leaving a pure and unbelievably

potent liquid containing the active

ingredients of the original

harvested strain

this is how concentrates such as

Oil, Wax and Shatter are manufactured

One of the main concerns of

any extraction process is safety

fortunately changes in legislation

such as what we're going through

right now in Canada

also means the formation of safety codes

and standards for the cannabis industry

this means less exploding labs

less residual solvents

cleaner concentrates

safer consumption

if you are looking for a guide to a safe

extraction method

that you can do in your own home

Check out ENDOCA - their lab does

a great demo showing safe

clean extraction

I'll leave a link below in the comments

also let's not forget that with

higher concentrations

come higher risks for misuse

for more info on that

we did an entire episode on

cannabis safety called

Avoid the Emergency Room

that's episode 3 in case you missed it

Now let's talk about a few trends

we're seeing emerge in markets where

concentrates are popular

The first is e-juice

this product is actually adapted from

similar trends we've seen over in the

nicotine market

the idea is to dilute your concentrate

into a hygroscopic liquid such as

Propylene Glycol, add flavor

and you have a clean, discreet

and portable way to enjoy

cannabis on the go

also because the terpenes are masked by

the flavor from the vape clouds

it's a great way to fit cannabis into

social gatherings and activities

if you're looking for e-juice in Canada

I can recommend 420VapeJuice.ca

I've seen nothing but quality from

them and they have a ton of flavors

to choose from

The last thing we'll talk about today is

school of thought when it comes to

extraction process

Theres two trends we see emerging

Whole Flower Extraction

and Distillate Extraction...

In the whole flower camp

your final product matches

the cannabinoid profile

of the original strain

this methodology is rooted in the

Entourage Effect...

-[Matt] Now the Entourage Effect

is the idea that the active

ingredients work best

and have the fewest side effects

when used together

Great example:

Turtle, great in a group

but doesn't do well when separated

from the rest of his friends

-How much time?!

-Three seconds!

-She's got the arm bar!

-That's not good...

-[Matt] Sorry we're getting

sidetracked now

the important thing with whole

flower extraction is you maintain

the same ratio

that same botanical fingerprint

as when the plant was harvested

The opposing school of thought is

Distillate Extraction

In this camp, you're trying to

separate, or distill particular

cannabinoids away from everything else

So what you end up with is

pure THC or Pure CBD

What we're seeing as research progresses

is certain compounds are more inherently

susceptible to being distilled away from

the plant, CBD being a great example

of a compound with treatment potential

apart from the rest of the plant

THC on the other hand seems to operate

better with friends

remember things can get out of hand quickly

especially if you have no experience

being in the ring with concentrates

-I just wanted to take you to dinner!

We will have to see what emerges as the

dominant trend, but they both have

their draws in terms of application

down the road...

A pure THC distillate

with it's high psychoactive potential

will be in high demand in a

recreational market

CBD and other non-psychoactive distillates

Have attraction for people looking to

avoid any mind altering effects

and whole flower concentrates boast

that unmistakable flavor and essence

of the original plant, which is a

huge selling point

Speaking of flavor and essence

concentrate companies are now introducing

additional terpenes back into the mix

after the extraction is complete

think of it as icing on the cake

a signatory seal used to distinguish

high end brands in what is sure to

be a popular and saturated market

That's it for this episode

we'll get to dabbing vs vaping

in a future episode

that's super important we'll

cover that next

thanks everyone for watching

for more on the Chemistry, Physics

and Biology behind cannabis use

stay tuned to the

Institute of Higher Learning

online at SciBong.com

For more infomation >> 🌿Cannabis Concentrates & Extracts 📺Ep06 ⚛️SciBong.com - Duration: 8:51.

-------------------------------------------

B Shape Logo Design In Illustrator - Illustrator Tutorial - Illustrator CC - Duration: 6:35.

B Shape Logo Design In Illustrator - Illustrator Tutorial - Illustrator CC

For more infomation >> B Shape Logo Design In Illustrator - Illustrator Tutorial - Illustrator CC - Duration: 6:35.

-------------------------------------------

NEW CAR 2017│MAZDA CX-5 (Inside & Outside) [Full] - Duration: 3:23.

NEW CAR 2017

MAZDA CX-5

LOZEN

For more infomation >> NEW CAR 2017│MAZDA CX-5 (Inside & Outside) [Full] - Duration: 3:23.

-------------------------------------------

Trappist - 1 Update 04/04/17 - Duration: 6:46.

This is an update in my continuing coverage of the Trappist -1 system, a fascinating solar

system that could host up to 7 roughly earth-sized planets where the conditions could be right

for liquid water, and thus hold the potential for life.

See my other videos on this channel for more back story.

When I was a kid sitting in grade school science classes in the 1980's, I remember two scientific

consensuses that stick in my mind to this day.

One was that even though we had never seen one, or indeed any evidence of one, exoplanets

outside our solar system almost certainly existed.

There was no reason why they shouldn't, all you need to form them is a sufficient amount

of solid material around a star to coalesce into planets.

And that clearly happened here, so unless rocks and dust were rare in the universe it

was a good bet that it happened elsewhere.

That consensus turned out to be correct, in 1992 the existence of an exoplanet was confirmed

and since those days we have discovered evidence of well over 3000 planets not located in our

solar system scattered among a wide variety of stars in our galaxy.

The other consensus that I remember was that, at the time, there wasn't any particular reason

to think that Earth was rare.

Indeed, blue jewel worlds like our own could populate the universe to such an extent that

there could be untold thousands of civilizations in our galaxy alone allowing for science fiction

universes like Star Trek where the discovery and contact of such civilizations was a routine,

and often unpleasant and tricky, occurrence.

After all, if exoplanets turned out to be common, then why not?

What would be so special about Earth?

On its face, would seem like only serendipity favored it.

After all, it just happens to be a certain size located at a certain distance from its

star.

And out of the vast multitude of stars in our galaxy alone, surely there would be many

analogues of earth that took advantage of that same kind of luck.

But that consensus has changed.

We know now that many things have come together to make our planet the way it is.

Atmospheric composition, orbital stability, the presence of a moon to help keep earth

rotating on its axis, the stability of the sun, are just a few of the many factors that

make this planet an abode where complex life could evolve.

Earth is probably not common at all, in fact it now seems likely that it is an extremely

rare kind of world that we won't encounter much as we explore our universe.

And that leads us to Trappist - 1.

This is a star system full of could be's.

We see evidence of at least seven worlds that appear to be of a similar size to earth.

More, they cluster in close to their dim, small red dwarf sun in such a way that, at

least a portion of them, might, depending on the specific conditions present on those

worlds, be able to support liquid water.

Where there is liquid water, there is the possibility of life as we know it.

Again, after all, we know that happened here.

A new climate model, which is no doubt one of many to come, may give us a picture of

what these worlds might be like and suggest which planet astronomers should take a look

at first.

Also, models like this, and models of what the spectra of the planets might be like,

are important because as scientists collect the data on these worlds in future years they

can then compare them to the models and see which ones fit best.

According to the new model by Eric Wolf of the University of Colorado, link to his paper

in the description below, the best chance for liquid water on a planet in this system

would be on Trappist -1e. Wolf looked at the three most likely planets for liquid water,

Trappist -1 d, e and f.

In the model, the other four planets of the system didn't even come close.

The farther out planets in the system would be frozen solid and the inner planets would

be too hot.

Wolf modeled a variety of possible atmospheres for these three candidate worlds.

To do this, he assumed that water, in whatever form, was freely available in the system.

This is a reasonable assumption, the planets are modeled to have formed farther out from

the star where ices are likely to have been present and then the planets migrated closer

after formation.

From there, he modified a model originally intended to study Earth's climate to produce

the most complex model of the Trappist - 1 system we so far have.

Now, modeling planetary climates is a tricky business.

Earth especially.

As a result, more models are needed for a consensus to be arrived at as to what's going

on with these planets.

But in Wolf's model out of the three most likely candidates, only Trappist - 1e made

the grade for liquid water.

Planet d is too close to the star, if it had liquid water, it would simply boil off into

a thick water vapor atmosphere.

That should cause a runaway greenhouse effect producing a planet perhaps similar to Venus.

Planet f has the opposite problem.

It's too far from the star and any water on its surface would be frozen solid.

Wolf found no combination of atmospheric gases which could keep it warm enough, even carbon

dioxide would freeze out according to the model.

Not so with Planet e, liquid water was predicted to be possible there.

But would that planet be earth-like?

Not likely.

The planets at Trappist - 1 are probably tidally locked, given their proximity to their star.

This means that Trappist -1e would always present the same face towards its star, much

like the moon is similarly tidally locked with earth and always shows us the same face.

This would create an eyeball-like world where you would have liquid water at the point on

the planet that received the most light from the star.

The rest would be ice.

How much of the planet is conducive to liquid water is unknown, it would depend on if the

sunlight is striking an ocean or a dryer continental landscape, the content of the atmosphere and

so on, but perhaps around 20 percent of the surface could be earthlike in temperature.

But, as we're seeing with our own solar system, earth-like worlds are not the exclusive domain

of liquid water.

There are a variety of conditions, such as those of Enceladus or Europa, that could allow

for subsurface liquid water.

While it will be a long time before we know if such things are possible in the Trappist

- 1 system, we at least know that the possibility for one potentially habitable planet more

in the grain of earth is on the table.

Thanks for listening!

I am futurist and science fiction author John Michael Godier currently with an upcoming

book, it's called Supermind and asks if our universe is really a computer simulation and

be sure to check out my other books at your favorite online book retailer and subscribe

to my channel for regular, in-depth explorations into the interesting, weird and unknown aspects

of this amazing universe in which we live.

For more infomation >> Trappist - 1 Update 04/04/17 - Duration: 6:46.

-------------------------------------------

7 MUST HAVE Marketing Tools To Use On Your WordPress Site - Duration: 7:34.

A WordPress website without marketing tools will always be like a warrior without weapons…

You're ready to rock, but you're missing the essentials.

Hi, I am Robert from Themeisle.com and in this video, I'll show you seven Marketing

tools to use on your WordPress site.

INTRO

1.

GOOGLE ANALYTICS

The one and only!

It brings you lots of insights about the people that come to your site and their specific

behaviors.

Thanks to this tool, you will be able to track your audience's actions on the site and

read their minds.

I mean, somehow anticipate what they're up to.

To be more specific about what you can find with Google Analytics… well, sort of everything.

In a word, stats!

Such as the total number of users in a given period, pageviews, sessions and pages per

session, bounce rates, session durations, most popular posts/pages, conversions, etc.

Knowing your people is a goldmine because it takes you closer to your goals.

Google Analytics is a free tool and can be integrated with your WordPress site through

a simple embed code provided by Google.

2.

SENDINBLUE

For the record, email still rocks when it comes to marketing.

Email is one of the most effective marketing strategies for making people come back to

your site.

And SendinBlue?

It has a friendly and easy-to-use dashboard, where you can carefully keep all your email

drafts and user lists.

You can also use it to send out your marketing email, transactional email, and even mobile

messages.

Once you send an email, you get detailed reports and stats, so you can see what works and what

doesn't right away.

Open rates, click rates, user engagement data … it's all there.

SendinBlue is a paid tool, but it also comes with a free plan.

3.

WORDPRESS SEO BY YOAST

Yoast SEO is the most popular WordPress plugin when it comes to search engine optimization,

and it's completely free.

Actually, it is one of the most downloaded WordPress plugins ever.

It comes with three important settings for each of your posts and pages: title, meta

description, and meta keywords.

And not only can you write your custom text and keywords, but the plugin also lets you

know how weak or strong the optimization is.

Under the hood, it also takes care of a number of optimizations that don't require your

assistance.

4.

REVIVE OLD POST

This free tool will save you a lot of time by automatically posting your articles to

social media.

Don't let your posts only live for a short period of time and then be forgotten.

Revive Old Post can be set to auto-share at constant intervals.

You can set lots of things about the shares: the intervals between shares, how old should

a post be in order to be shared, how many posts to share daily, and how many times each

one should be shared, what kind of format the article should have when posted, and more.

The free version of the plugin can share your content to Twitter and Facebook.

To get additional exposure – LinkedIn, Tumblr, and Xing – you'll need the pro version.

5.

PAGEBUILDER BY SITEORIGIN

Yet another free WordPress plugin.

This one helps you create great landing pages in an easy fashion – through drag-and-drop.

Landing pages can help you make your offer more clear, and thus make it easier for the

visitor to decide whether they want any part of it or not.

Landing pages usually target a specific audience and focus on a very specific goal.

Most commonly, those goals can be selling a product, a giveaway, email subscription,

etc.

Now, PageBuilder by SiteOrigin is a free tool for WordPress that helps you create a landing

page.

It's very simple, and you don't need any technical knowledge in order to use it.

You can either create an original landing page from scratch or use a pre-built layout

provided by the plugin, which you can then customize.

6.

AB PRESS OPTIMIZER

A/B testing is a great method to improve the performance of a landing page with.

Whether it's visitors we're talking about, clicks, conversions … A/B testing can help

you with whatever goal.

And AB Press Optimizer is a great plugin that does all that.

Basically, it lets you take two pages and put them against each other.

The pro version starts at $49, but there's also a free version in the WordPress directory.

How does it work?

Well, you add experiments easily by going through a simple settings panel.

Name your experiment, add a description, the time period for the test, and set a goal and

the URL of the page that you want to test.

After a while, the plugin will start informing you of the results.

7.

CANVA

The last one in our video is Canva.

This is a D-I-Y graphic design platform developed with non-designers in mind.

Embedded with an intuitive drag-in-drop user interface along with a massive library of

pre-designed templates and free stock photos, Canva makes it really easy for anyone to create

professional-quality image graphics effectively enhancing their visual content.

It caters to a wide range of design types such as blog post graphics, presentations,

digital flyers, letterheads, advertising graphics, and so much more.

You can basically create almost any visual element you need for personal or professional

purposes.

The usage of the platform is free and you will only need to pay when you utilize premium

elements.

Take note that Canva has thousands of free design elements and images.

The tool is available in the following formats: for the web, for iPad, and for iPhone.

If you have further questions about any of the marketing tools in this video I will happy

to answer them in the comments section below.

Không có nhận xét nào:

Đăng nhận xét