Talk:Biological networks: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Anthony.Sebastian
(Create start of new article on biological networks)
 
imported>Howard C. Berkowitz
(→‎Interesting topic: new section)
Line 2: Line 2:
==Create start of new article on biological networks==
==Create start of new article on biological networks==
Create start of new article: [[Biological networks]]. [[User:Anthony.Sebastian|Anthony.Sebastian]] 04:26, 12 January 2010 (UTC)
Create start of new article: [[Biological networks]]. [[User:Anthony.Sebastian|Anthony.Sebastian]] 04:26, 12 January 2010 (UTC)
== Interesting topic ==
You've actually touched on one of my areas of interest. As you know, I've spent many years working with computers in medicine, but, especially in security and reliability, I've had personal interests in applying biomedical concepts to computer networks. 
When the first Internet worm propagated in (umm) 1987?, I watched a lot of very smart people running around reinventing a number of concepts of epidemiology. At one point, I asked one of the best security people around if he had considered the work of [[John Snow]], and got the response of "who?"
If you look at [[Virtual Router Redundancy Protocol]], one familiar with both can imagine the backup router acting as an AV node backing up the SA node. I've applied epidemiological contact tracing principles to try to look for the patterns characteristic of secondary infection, of multiple infection sources, etc., but gotten relatively little interest. A few network security engineers think of "quarantine", most commonly citing SARS, but don't go into anything like the hierarchy of immunologic responses. Yet, I see parallels in the way we deal initially with distributed denial of service and a nonspecific [[macrophage]] response, while we divert the suspicious flow to analysis and start to develop the equivalent of immunoglobulins (e.g., blackhole routes). Too bad I can't find anyone interested in sponsoring an interdisciplinary team in this area. --[[User:Howard C. Berkowitz|Howard C. Berkowitz]] 05:09, 12 January 2010 (UTC)

Revision as of 23:10, 11 January 2010

This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
To learn how to update the categories for this article, see here. To update categories, edit the metadata template.
 Definition Networks having no human designer, having emerged from nature by organic evolutionary processes, its foundational system a biological cell, the cell a computationally-enabled information-processing bio-computer, designed basically to live and reproduce itself, self-assembling and self-organizing, autonomous, capable of cooperating with other cells to generate multicellular structures that can intelligently design other networks. [d] [e]
Checklist and Archives
 Workgroup categories Biology and Chemistry [Please add or review categories]
 Subgroup category:  Physiology
 Talk Archive none  English language variant American English

Create start of new article on biological networks

Create start of new article: Biological networks. Anthony.Sebastian 04:26, 12 January 2010 (UTC)

Interesting topic

You've actually touched on one of my areas of interest. As you know, I've spent many years working with computers in medicine, but, especially in security and reliability, I've had personal interests in applying biomedical concepts to computer networks.

When the first Internet worm propagated in (umm) 1987?, I watched a lot of very smart people running around reinventing a number of concepts of epidemiology. At one point, I asked one of the best security people around if he had considered the work of John Snow, and got the response of "who?"

If you look at Virtual Router Redundancy Protocol, one familiar with both can imagine the backup router acting as an AV node backing up the SA node. I've applied epidemiological contact tracing principles to try to look for the patterns characteristic of secondary infection, of multiple infection sources, etc., but gotten relatively little interest. A few network security engineers think of "quarantine", most commonly citing SARS, but don't go into anything like the hierarchy of immunologic responses. Yet, I see parallels in the way we deal initially with distributed denial of service and a nonspecific macrophage response, while we divert the suspicious flow to analysis and start to develop the equivalent of immunoglobulins (e.g., blackhole routes). Too bad I can't find anyone interested in sponsoring an interdisciplinary team in this area. --Howard C. Berkowitz 05:09, 12 January 2010 (UTC)