BioSec: CDN: Difference between revisions
No edit summary  | 
				|||
| (One intermediate revision by the same user not shown) | |||
| Line 13: | Line 13: | ||
http://io9.com/5886406/scientists-confirm-alan-turings-50+year+old-theory-for-why-tigers-have-stripes  | http://io9.com/5886406/scientists-confirm-alan-turings-50+year+old-theory-for-why-tigers-have-stripes  | ||
== Chapters for in-class discussion ==  | |||
*March 14th  | |||
**Annie  | |||
**Elizabeth  | |||
**Cheryl  | |||
**Daniel  | |||
**Luc  | |||
**Mohamed: Chapter 22, Information Flow  | |||
*March 16th  | |||
Latest revision as of 19:15, 13 March 2012
Amusements / Other References:
Media:look.jpg Is this what is meant by biological approaches to computer security?
Media:dogs.jpg Are different breeds descended from the same ancestor or different ancestors?
Media:cats.jpg What about cats? How has interbreeding (non human selected breeding affected variations?)
Media:axolotl.jpg This animal is an evolutionary question?
Interesting to note about Alan Turing, Biology and animal patterns:
Chapters for in-class discussion
- March 14th
- Annie
 - Elizabeth
 - Cheryl
 - Daniel
 - Luc
 - Mohamed: Chapter 22, Information Flow
 
 
- March 16th