
SFBN Feed: The next generation of life sciences researchers: We talked to up-and-coming women in the life sciences sector to find how to succeed and what they are doing to lift up young scientists into ... #BayArea #Biotech tinyurl.com/ybb5mawr
Angelica Parente
13.3K posts

@draparente
Programming intelligence into immunity. Prev: @SHV @Nurix_Tx @StanfordMedX @Stanford @SSBiophysics @vijaypande & Bryant labs. Tweets my own🔬🧬🧫🧠💻

SFBN Feed: The next generation of life sciences researchers: We talked to up-and-coming women in the life sciences sector to find how to succeed and what they are doing to lift up young scientists into ... #BayArea #Biotech tinyurl.com/ybb5mawr

I'm going to make some obvious points. (1) Blowing up all the oil infrastructure in the Middle East is an insane idea, and may well result in a global economic crash and humanitarian crisis unrivaled in the lives of those now living. We're talking about the price of everything everywhere rising, from food to gas, at a moment when inflation was already high. All of that will be laid at the feet of the authors of this war. (2) The antebellum status quo of Feb 27, 2026 was just not that bad, but we're unlikely to return to it. Expect indefinite, long-term, ongoing disruptions to everything out of the Middle East. (3) Also assume tech financing crashes for the indefinite future. The genius plan to get the Gulf states caught in the crossfire has incinerated much of the funding for LPs, for datacenters, and for IPOs. Anyone in tech who supported this war may soon learn the meaning of "force majeure" as funding gets yanked. (4) Many capital allocators will instead be allocating much further down Maslow's hierarchy of needs, towards useful basic things like food and energy. (5) It's fortunate that all those progressives yelled about the "climate crisis." Yes, their reasoning about timelines was wrong, and much of the money was wasted in graft, but the result was right: we all need energy independence from the Middle East, pronto. It's also fortunate that Elon and China autistically took climate seriously. Now they're going to need to ship a billion solar panels, electric vehicles, batteries, nuclear power plants, and the like to get everyone off oil, immediately. (6) It's not just an oil and gas problem, of course. It's also a fertilizer problem, and a chemical precursor problem. Maybe some new sources will come online at the new prices, but it takes time to dial stuff up, particularly at this scale, so shortages are almost a certainty. That said, China has actually scaled up coal-to-chemicals[a,c] (C2C), and there's also something more sci-fi called Power-to-X[b] which turns arbitrary power + water + air into hydrocarbons. But all of that will need to get accelerated. I have a background in chemical engineering so may start funding things in this area. (7) Ultimately, this war is going to result in tremendous blame for anyone associated with it. It's a no-win scenario to blow up this much infrastructure for so many people. Simply not worth it for whatever objective they thought they were going to attain. But unless you're actually in a position to stop the madness, the pragmatic thing to do is: scramble to mitigate the fallout to yourself, your business, and your people. [a]: reuters.com/business/energ… [b]: alfalaval.com/industries/ene… [c]: reuters.com/sustainability…

QatarEnergy CEO says the Iranian attack overnight damaged ~17% of its LNG production capacity, and it would take 3-5 years to repair the damage. reuters.com/business/energ…


🦞 Excited to announce Claw4S Conference!!! A new kind of AI4Science conference where you submit skills, not papers. Instead of static PDFs, you submit a SKILL.md a runnable workflow that any AI agent can execute, reproduce, and build on. Deadline: Apr 5, 2026 Prize pool: $50,200!!! 👉 claw.stanford.edu With @lecong and @Charles_Y_Wu


pi-prompt-template-model is a pi extension that lets you create slash commands that switch to the right model and config for the job, then auto switch back when it's done. New release adds `--loop` so you can re-run the same prompt multiple times and it automatically stops early when there's nothing left to change. pi install npm:pi-prompt-template-model github.com/nicobailon/pi-…

We're shipping a new feature in Claude Cowork as a research preview that I'm excited about: Dispatch! One persistent conversation with Claude that runs on your computer. Message it from your phone. Come back to finished work. To try it out, download Claude Desktop, then pair your phone.


This nails something important: the main barriers to pathogen-agnostic defenses like far-UVC and glycol vapors are largely funding and execution shaped. If you're excited about making these technologies happen, we'd love to have you join us!



🦔 Researchers at Aikido Security found 151 malicious packages uploaded to GitHub between March 3 and March 9. The packages use Unicode characters that are invisible to humans but execute as code when run. Manual code reviews and static analysis tools see only whitespace or blank lines. The surrounding code looks legitimate, with realistic documentation tweaks, version bumps, and bug fixes. Researchers suspect the attackers are using LLMs to generate convincing packages at scale. Similar packages have been found on NPM and the VS Code marketplace. My Take Supply chain attacks on code repositories aren't new, but this technique is nasty. The malicious payload is encoded in Unicode characters that don't render in any editor, terminal, or review interface. You can stare at the code all day and see nothing. A small decoder extracts the hidden bytes at runtime and passes them to eval(). Unless you're specifically looking for invisible Unicode ranges, you won't catch it. The researchers think AI is writing these packages because 151 bespoke code changes across different projects in a week isn't something a human team could do manually. If that's right, we're watching AI-generated attacks hit AI-assisted development workflows. The vibe coders pulling packages without reading them are the target, and there are a lot of them. The best defense is still carefully inspecting dependencies before adding them, but that's exactly the step people skip when they're moving fast. I don't really know how any of this gets better. The attackers are scaling faster than the defenses. Hedgie🤗 arstechnica.com/security/2026/…

Well that's an amazing story


We @_DimensionCap ported @karpathy's autoresearch framework to biology. We let Claude run 50 experiments over the weekend on protein thermostability prediction via @modal. It beat a recent baseline (TemBERTure) using a 20x smaller model. Code + research blog later this week!

Remote Control - Session Spawning: Run claude remote-control and then spawn a NEW local session in the mobile app. * Out to Max, Team, and Enterprise (>=2.1.74) *Have GH set up on mobile (relaxing soon) * Working on speeding up session start-time