Toggle light / dark theme

Circa 2018


A major challenge in treating type 1 diabetes is figuring out how to overcome the destruction of insulin-producing beta cells. The body mistakenly targets and destroys these cells leaving the body unable to manage blood sugar levels on its own. Individuals with this disease must be vigilant about checking their blood sugar and administering insulin as needed, which can be an exhausting task.

Current treatment options include injection of insulin, use of continuous glucose monitors and insulin pumps, stem cell therapies and implants, partial transplants, and other strategies. These treatments vary in effectiveness from person to person as well as how long they last. In addition, some require patients to continue taking anti-rejection drugs which can be hard on the body.

However, a new treatment may offer longer lasting, more effective results in the battle against type 1 diabetes. A recent study found that by using gene therapy targeting two specific genes, insulin-producing cells may be able to be recreated in the body using existing alpha cells. A healthy pancreas contains both alpha and beta cells. In those with type 1 diabetes, insulin-producing beta cells are destroyed. But when mice were injected with gene therapy to reprogram some alpha cells to take over the function of these beta cells, they were once again able to produce insulin and manage blood sugar.

Chameleons have long been a symbol of adaptation because of their ability to adjust their iridophores—a special layer of cells under the skin—to blend in with their surroundings.

In a new study published today in Nature Communications, researchers from South Korea have created a robot chameleon capable of imitating its biological counterpart, paving the way for new artificial camouflage technology.

The NIH-led Brain Research through Advancing Innovative Neurotechnologies® (BRAIN) Initiative continues to teach us about the world’s most sophisticated computer: the human brain. This striking image offers a spectacular case in point, thanks to a new tool called Visual Neuronal Dynamics (VND).

VND is not a camera. It is a powerful software program that can display, animate, and analyze models of neurons and their connections, or networks, using 3D graphics. What you’re seeing in this colorful image is a strip of mouse primary visual cortex, the area in the brain where incoming sensory information gets processed into vision.

This strip contains more than 230,000 neurons of 17 different cell types. Long and spindly excitatory neurons that point upward (purple, blue, red, orange) are intermingled with short and stubby inhibitory neurons (green, cyan, magenta). Slicing through the neuronal landscape is a neuropixels probe (silver): a tiny flexible silicon detector that can record brain activity in awake animals [1].

The goal is to pre-empt the fall of traditional cryptography likely to follow the quantum revolution.


A research team with the Technical University of Munich (TUM) have designed a quantum cryptography chip aimed at the security demands of the quantum computing revolution. The RISC-V chip, which was already sent to manufacturing according to the researchers’ design, aims to be a working proof of concept for protecting systems against quantum computing-based attacks, which are generally considered to be one of the most important security frontiers of the future. Alongside the RISC-V based hardware implementation (which includes ASIC and FPGA structures), the researchers also developed 29 additional instructions for the architecture that enable the required workloads to be correctly processed on-chip.

Traditional cryptography is generally based on both the sender and receiver holding the same “unlock” key for any given encrypted data. These keys (which may include letters, digits, and special characters) have increased in length as time passes, accompanying increases in hardware performance available in the general computing sphere. The idea is to thwart brute-force attacks that would simply try out enough character combinations that would allow them to eventually reach the correct answer that unlocks the encrypted messages’ contents. Given a big enough size of the security key (and also depending on the encryption protocol used), it’s virtually impossible for current hardware — even with the extreme parallelization enabled by the most recent GPUs — to try out enough combinations in a short enough timeframe to make the effort worthwhile.