Russia is one of the few countries in the world & the only major power to still field Railway Troops

We often discuss the all important supply lines, & in the case of #Russia, the railways. RU is one of the few countries in the world & the only major power to still field Railway Troops (In NATO, only Italy has a small regiment w 2 railway engineer companies). Given Russia’s vast

geography, heavy use of artillery, especially rocket artillery (very supply intensive), limited number of military trucks, and relatively sparse road system the army depends on the railways. From their Imperial Tsarist beginnings, through the Soviet era & up until today, the

Railway Troops have undergone many changes & been part of various ministries. Their modern iteration begins in 1995 when they are established as an independent Federal Service & strengthened. By 1999 they include 4 railway corps, with 28 railway brigades (+ other elements).

Continue reading “Russia is one of the few countries in the world & the only major power to still field Railway Troops”

AI identifies speech patterns in children with autism that were consistent between English and Cantonese

…“When you have languages that are so structurally different, any similarities in speech patterns seen in autism across both languages are likely to be traits that are strongly influenced by the genetic liability to autism,” said Losh, who is the Jo Ann G. and Peter F. Dolle Professor of Learning Disabilities at Northwestern.

“But just as interesting is the variability we observed, which may point to features of speech that are more malleable, and potentially good targets for intervention.”

Lau added that the use of machine learning to identify the key elements of speech that were predictive of autism represented a significant step forward for researchers, who have been limited by English language bias in autism research and humans’ subjectivity when it came to classifying speech differences between people with autism and those without.

link

Homeland Security Admits Dominion Voting Systems Have Inherent Vulnerabilities Easily Manipulated by Local Election Officials

Last week we highlighted how the U.S. intelligence community public relations firm, The Washington Post, was getting out ahead of an election security report. {GO DEEP} There was a blitz of media reporting with transparent timing in advance of the Dept of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), releasing their findings of Dominion voting systems.

Late Friday the DHS report and advisory was released [SEE HERE].  Within the advisory CISA admitted there are major vulnerabilities within the Dominion electronic voting system.  However, they also claim there is “no evidence that these vulnerabilities have been exploited in any elections,” and they base that on a very thin defense.

The DHS-CISA claim toward the security of the Dominion system is predicated on the assertion that in order to modify the voting results, the local election officials would have to be participating in the election manipulation, therefore the systems are safe.  Seriously, that’s the statement.

link

Our country cannot continue with so much nonsense like this. China is ready to swoop down on us now more than ever due to US rampant official malfeasance and incompetence. We see it in virtually every federal department and agency, and most states are no better. ABN

“How xi jinping and CCP with less than 100 millions members can control more than 1.3 billions chinese people?”

How xi jinping and CCP with less than 100 millions members can control more than 1.3 billions chinese people?
The answer is world first qr code vaccine passport. Xi put an electronic monitoring noose around people’s neck since February 2020.
You are under 24-hour surveillance.

Continue reading ““How xi jinping and CCP with less than 100 millions members can control more than 1.3 billions chinese people?””

New thermal management technology for electronic devices reduces bulk while improving cooling

Electronic devices generate heat, and that heat must be dissipated. If it isn’t, the high temperatures can compromise device function, or even damage the devices and their surroundings.

Now, a team from UIUC and UC Berkeley have published a paper in Nature Electronics detailing a new cooling method that offers a host of benefits, not the least of which is space efficiency that offers a substantial increase over conventional approaches in devices’ power per unit volume.

link

EXCLUSIVE: Former Trump aide posts online a searchable database containing a huge trove of more than 120,000 emails from Hunter Biden’s abandoned laptop, calling them ‘a modern day Rosetta Stone of white and blue collar crime’

Garrett Ziegler, 26, who worked under Peter Navarro in Trump’s office of Trade and Manufacturing uploaded 128,775 emails

Using the name Marco Polo, Ziegler described the emails as ‘a modern Rosetta Stone of white and blue collar crime’

Included in the posts is one from Biden’s former business partner James Gilliar which talked of ‘H’ holding 10% of the equity in a Chinese deal ‘for the Big Guy’

That has widely been assumed to mean that Joe Biden would benefit from the deal

Nearly 15,000 emails, that DailyMail.com has verified, are missing from Ziegler’s database

link

The Twitter Bot Inquiry Intensifies as Musk is Seemingly Stiff Armed

…Taking Twitter private as a company, eliminating bots (which is essentially removing fraudulent users) then carries the potential benefits of both lowering costs and positioning the company to increase genuine ad revenue from authenticated users as real people.

Many people suspect the size of the political left on the Twitter platform is manipulated by programatic bots.  Meaning there seems to be more people on the left side of the spectrum because bots are deployed to give the impression of like-minded users.  I am one of the people who believe this suspicion is accurate, because it would be a typical way the ideological left operates.

The bots would be in addition to the deployment of algorithms that are designed to suppress speech the platform operators do not like.

I have long suspected the Twitter algorithm process is essentially assigning certain users into specifically designed data-processing containers where their voice is suppressed.   Some people call this ‘shadow-banning,’ I simply call it suppression.

link

Behold: The First Image of Our Galaxy’s Central Black Hole

The Event Horizon Collaboration, the group behind the first-ever image of a black hole, just achieved another huge accomplishment: an image of Sagittarius A*, the black hole at the center of the Milky Way. This is a breakthrough in our understanding of our home galaxy and the astrophysics of its center.

The Event Horizon Telescope (EHT) is a consortium of radio telescopes around the world. By combining the observations of these telescopes, the team is able to see black holes, regions of spacetime with such intense gravity that not even light can escape them. The image released today shows the shadow of Sagittarius A* (pronounced “A star”) as well as the high-energy region around it.

link

The night I met Hunter Biden: Mac Shop owner John Mac Isaac recounts fateful encounter in exclusive excerpt

…The 13-inch 2015 MacBook Pro was in slightly better shape. It could boot up, but the keyboard was unresponsive. I pulled out an external keyboard and asked for permission to log in.

Hunter started laughing.

“My password is f–ked up. Don’t be offended!” he said, before announcing that it was “analf–k69” or something to that extent. His inebriated condition made it difficult to understand is speech. My eyes widened a bit, and I told him that maybe it would be best if he tried to log in himself.

link