From this we see that there is a convention of naming promoters as protein name + p, e.g. the first gene in E. Coli K-12 MG1655 promoter thrLp encodes protein thrL.
It is also possible to add numbers after the p, e.g. at biocyc.org/ECOLI/NEW-IMAGE?type=OPERON&object=PM0-45989 we see that the protein zur has two promoters:
  • zurp6
  • zurp7
TODO why 6 and 7? There don't appear to be 1, 2, etc.
This is the first of many love declarations and mentions EMBII makes of his partner Chiharu! This came just one day afte the very first uploads of the system.
Figure 1.
ILoveYouMore.jpg
. Source.
Message:
My Dearest Chiharu....I Love you more. <3 Eric
Note that she's Japanese and not really bond, it's hair dye.
Figure 2.
OurWedding.jpg
. Source.
Message:
My Dearest Chiharu, I will love you forever. Taken Aug 6th 2014 in Ipswich, SD.
Figure 3.
MadyBobbyOffToCollege.jpg
. Source.
Associated messages:
A #father could not ask for more perfect daughters. I #Love you both so much!! <3 Pa
My oldest daugher moves into the dorms tomorrow morning. Dear Mady, You are forever my baby. <3 Pa
EMBII's daughter, Maddy Bobby, (presumably not with Chiharu) is going off to college! Sadface.
Figure 4.
Chiharu EMBII and The Atom Sea say Happy Halloween.jpg
. Source.
Message:
#Chiharu #embii & the #AtomSea #Fargo #ND
so their location was: en.wikipedia.org/wiki/Fargo,_North_Dakota
Figure 5.
Chiharu.jpg
. Source.
Messages:
mini camera test #Wilson #Chiharu #embii #Broadway #Fargo #ND
and:
"Trip to Italy" Mini Digital Camera N. Broadway, Fargo, ND 49°F
TODO actual Italy? Or some place named Italy in the US? One of the photos is from the First Lutheran church in Fargo, Nort Dacota.
Figure 6.
Loraine.jpg
. Source.
Photographer unknown, but presumably EMBII's father or another close family member.
Message:
In loving memory of Loraine Elizabeth White
EMBII's mum died :-(
Cost: ~0.001 BTC ~ $0.80 at the time.
x.com/EMBII4U/status/1940802996851634198 comments on the effect his mother's death had on him:
I was dealing with severe depression brought about by life and the loss of my mom
was too many things left unsaid
Figure 7.
SatoFamily.jpg
. Source.
This one gives Chiharu's full identity with picture basically. Message:
The Sato Family Arrives from Japan! Taken Aug 2. 2014 in Minneapolis MN. (Keiko, Chiharu, Hideaki, Katsuhiko) Now preparing for the Sato / Bobby Great American Vacation!!
so presumably Chiharu's full name is Chiharu Sato.
More EMBII social media:
OpenWorm by Ciro Santilli 37 Updated 2025-07-16
High level simulation only, no way to get from DNA to worm! :-) Includes:
3D body viewer at: browser.openworm.org/ TODO can you click on a cell to get its name?
Video 1.
OpenWorm Sibernetic demo by Mike Vella (2013)
Source. Sibernetic adds a fluid dynamics solver for brain-in-the-loop simulation of C. elegans.
When TLB is filled up, older addresses are overwritten. Just like CPU cache, the replacement policy is a potentially complex operation, but a simple and reasonable heuristic is to remove the least recently used entry (LRU).
With LRU, starting from state:
  valid  linear  physical
  -----  ------  --------
> 1      00003   00005
  1      00007   00009
  1      00009   00001
  1      0000B   00003
adding 0000D -> 0000A would give:
  valid  linear  physical
  -----  ------  --------
  1      0000D   0000A
> 1      00007   00009
  1      00009   00001
  1      0000B   00003
The Linux Kernel reserves two zones of virtual memory:
  • one for kernel memory
  • one for programs
The exact split is configured by CONFIG_VMSPLIT_.... By default:
  • on 32-bit:
    • the bottom 3/4 is program space: 00000000 to BFFFFFFF
    • the top 1/4 is kernel memory: C0000000 to FFFFFFFF, like this:
      ------------------ FFFFFFFF
      Kernel
      ------------------ C0000000
      ------------------ BFFFFFFF
      
      
      Process
      
      
      ------------------ 00000000
  • on 64-bit: currently only 48-bits are actually used, split into two equally sized disjoint spaces. The Linux kernel just assigns:
    • the bottom part to processes 00000000 00000000 to 008FFFFF FFFFFFFF
    • the top part to the kernel: FFFF8000 00000000 to FFFFFFFF FFFFFFFF, like this:
      ------------------ FFFFFFFF
      Kernel
      ------------------ C0000000
      
      
      (not addressable)
      
      
      ------------------ BFFFFFFF
      Process
      ------------------ 00000000
Kernel memory is also paged.
FFFFF 000 points to its own physical address FFFFF 000. This kind of translation is called an "identity mapping", and can be very convenient for OS-level debugging.
Learned readers will ask themselves: so why use an unbalanced tree instead of balanced one, which offers better asymptotic times en.wikipedia.org/wiki/Self-balancing_binary_search_tree?
Likely:
  • the maximum number of entries is small enough due to memory size limitations, that we won't waste too much memory with the root directory entry
  • different entries would have different levels, and thus different access times
  • tree rotations would likely make caching more complicated
Video 1.
Introduction to Spintronics by Aurélien Manchon (2020) giant magnetoresistance section
. Source.
Describes how giant magnetoresistance was used in magnetoresistive disk heads in the 90's providing a huge improvement in disk storage density over the pre-existing inductive sensors
Faster-than-light by Ciro Santilli 37 Updated 2025-07-16
One argument of why, is that if you could travel faster than light, then you could send a message to a point in Spacetime that is spacelike-separated from the present. But then since the target is spacelike separated, there exists a inertial frame of reference in which that event happens before the present, which would be hard to make sense of.
Even worse, it would be possible to travel back in time:
RSA vs Diffie-Hellman by Ciro Santilli 37 Updated 2025-07-16
As its name indicates, Diffie-Hellman key exchange is a key exchange algorithm. TODO verify: this means that in order to transmit a message, both parties must first send data to one another to reach a shared secret key. For RSA on the other hand, you can just take the public key of the other party and send encrypted data to them, the receiver does not need to send you any data at any point.

There are unlisted articles, also show them or only show them.