Tuesday, September 09, 2014
Brain Mapping
Medial view of a halved human brain, labeled in latin. (Photo credit: Wikipedia) |
Brain Mapping
At the start of the 20th century, a German neuroanatomist named Korbinian Brodmann parceled the human cortex into nearly 50 different areas by looking at the structure and organization of sections of brain under a microscope. “That has been pretty much the reference framework that we’ve used for 100 years,” Evans says. Now he and his coworkers are redoing Brodmann’s work as they map the borders between brain regions. The result may show something more like 100 to 200 distinct areas, providing scientists with a far more accurate road map for studying the brain’s different functions.
Related articles
Genetic Maps of the Brain Lead to Surprises
First MR images to show complete borders in human cerebral cortex
Two new brain areas mapped
Free Editor Choice: Korbinian Brodmann (1868-1918) and His Contributions to Mapping the Cerebral Cortex
NeuroPod on updating ye olde brain map
The Future of the Most Important Human Brain
3D map reveals human brain in greatest detail ever
Do Sciences and Humanities Students' Brains Differ?
Complex brain landscape controls speech
Indian scientist gets grant to map the brain
Ultraprivate Smartphones
I guess we live in the Snowden era.
Ultraprivate Smartphones
Mobile phones for the consumer market that transmit minimal personal information. ... On January 21 a text message flashed on phones held by the protesters thronging Kiev’s Independence Square. Ukraine’s president, Viktor Yanukovych, was then still clinging to power and brutalizing opponents. The message—from the number 111—read: “Dear subscriber, you are registered as a participant in a mass disturbance.” ...... the NSA gathers huge amounts of information from cloud computing platforms and wireless carriers, including the numbers ordinary people called and the times they called them. Not only could the government be watching you: so could websites, advertisers, and even retailers trying to track your movements within stores. Modern smartphones and the apps running on them are engineered to collect and disseminate enormous amounts of user data—such as location, Web browsing histories, search terms, and contact lists. ....... Traditional crypto required the parties in an encrypted conversation to possess the same unique decoding tool (or “key”). The new approach was fundamentally different: it involved two mathematically linked keys, one private, the other public. Suddenly, applications such as digital signatures became possible. You could use a private key to “sign” a document; later, anyone else could use the public key to verify that you were indeed the author.
Related articles
Terrorists are turning to Android encryption post-Snowden
Big Brother Strikes Again: 17 Fake Cell Phone Towers Across America
Kiev court rules to confiscate property belonging to ex-president Yanukovych
Archaic but widely used crypto cipher allows NSA to decode most cell calls | Ars Technica
Top NSA Whistleblower: We Need a New 9/11 Investigation
New ultra secure cell phone, Blackphone, is reportedly flying off the shelves
Secure Email Provider Tutanota Goes Open Source
As evidence mounts, it's getting harder to defend Edward Snowden
Subscribe to:
Posts (Atom)