Category Archives: Computer Science
Lessons in leadership: Removing barriers to get more women in tech – McKinsey
For all the talk of the need for more women in tech, data suggests that meaningfully moving the needle requires better innovation. Thirty-five years ago, women earned roughly a third of computer science degrees. By 2016, that share had fallen to less than 20 percent. Although that number appears to have marked the bottomin 2021 women were earning 22 percent of computing degreesclosing the gender gap in tech, especially for women of color, still has a long way to go.
But Judith Spitz has landed on a promising approach to accelerate progress. After 30 years at Verizon, where she rose through the ranks to become its chief information officer, she left in 2016 to oversee a City University of New York initiative that led to a 94 percent increase in undergraduate women enrolled in computer science classes. In 2020, she built on that success by founding Break Through Tech, a nonprofit housed at Cornell Tech, which works with academia and industry to get more undergraduate women into computer science and connect them with companies that might not otherwise find them.
Spitz recently sat down with Sarah Gitlin, an associate partner in McKinseys Washington, DC, office, to talk about one of Break Through Techs foundational programsSprinternshipsand how it is helping to launch undergraduate women from underrepresented backgrounds into tech careers.
This interview has been edited for clarity and brevity.
Sarah Gitlin: When you founded Break Through Tech in 2020, what was your North Star?
Judith Spitz: We had two. Number one, I believed thenand I believe nowthat every student should be exposed to computer science in their undergraduate years. This should be considered basic literacy in the digital age. You may never write a line of code, but you are certainly going to be impacted by people who do, working with people who do, and trying to conceive of solutions that require writing code. I believed, and research shows, that if you teach that introductory class in a way thats inclusive and more mission-drivenlearning how to write code to solve a problem that were passionate about, as opposed to an end unto itselfsignificantly more of the 58 percent of the undergraduate population who are women will be interested in studying computer science.
Second, we wanted to open the floodgates between the incredible talent pool of undergraduate women who go to nontop-ranked schools and all the companies, large and small, that say theyre looking for them. These companies say they want more women; Black, Latina, and Native American women; first-generation college students; and students from low-income households. They want them, but theyre looking in the wrong placesbecause the vast majority of those women are going to schools other than the ones that most companies are recruiting from.
Sarah Gitlin: How did you get started on the first of those north stars?
Judith Spitz: We found that women coming into these undergraduate schools werent necessarily looking for computer science classesbecause nobody had coached them or told them that this was a real possibility for them. So, we created something called The Guild. It was a program for entering freshman and rising sophomores who hadnt yet chosen a major. The goal was to get them interested in taking that first class, by teaching them enough code to get them excited and having them work on a real-world project with company advisers to give them a sense of empowerment from solving a real problem.
We discovered that magic happens when you get company advisers together with these students. It was eye-opening on both sides. The students were incredibly excited to see how they could use this technology to do real things. And the companies were completely blown away by these studentsbecause they dont normally see them.
Sarah Gitlin: Beyond those company advisers, what else did you do on the second North Star? How did you build a bridge between company recruiters and women studying computer science at schools that arent top-ranked?
Judith Spitz: We wanted to connect our students to paid summer internships. All the research shows that the single largest predictor of a student landing a job within six months of graduating is whether they had a paid tech internship. We sent rsums to companies, but fewer than 4 percent of those students were offered a summer internship. When we went back to the companies, they said, Look, these students have nothing on their rsums. They didnt participate in hackathons on the weekends. They dont have apprenticeships.
What it boiled down to is that all those things are the result of the privilege of free time, when youre not working one or more jobs as you go through college to support yourself, sometimes to support your family. In essence, the companies were looking for things on rsums that were more attributes of privilege than they were of potential. So, we literally sat down with some industry partners and we said, How are we going to crack this nut? And from those discussions, we landed on Sprinternships.
the companies were looking for things on rsums that were more attributes of privilege than they were of potential.
Sarah Gitlin: How exactly do Sprinternships work?
Judith Spitz: Think sprint. Its a three-week, paid (by the companies) microinternship thats designed to create an experience that gives these students a rsum credential that will make them competitive when they apply for regular summer internships. There are two programs a yearone in January and one in Mayduring an academic break.
Its not a substitute for an internship. Think of it as a preinternship that gives our students some rsum juice. It gives them a project and experience they can talk about when they apply for a summer internship. And it also gives them confidence.
Sarah Gitlin: How has the program evolved?
Judith Spitz: Theres some secret sauce that we have iterated on since we launched the program. First, we put the students into a host company in a cohort together, rather than one student at a time. We do that because theyre not ready to work by themselves and because theres power in numbers. They do better as a group. Its also easier for the companies. Its much easier for them to say, OK, the five of you go off into that conference room and work on this project, than it is to come up with a challenge project that can be done alone.
Students are not interviewed. Theyre matched with companiesbecause it would take companies longer to interview them than [the students] would be there, and because we know that theres interview bias. We also prep the students beforehand, to make sure theyre ready to walk in the door and hit the ground running, whether its virtual or otherwise.
We did a pilot the first year, placing five students in one company. At the end of the three weeks, [the company] offered all five a summer internship. And we thought, OK, were onto something here.
Sarah Gitlin: What kind of results have you seen as the program has scaled?
Judith Spitz: Were now running the program in four cities. Over 150 companies have participated to date, and the results are consistent. About 60 percent of the Sprinterns land a paid summer tech internship.
Sarah Gitlin: So, its gone from 4 percent before the Sprinternships to 60 percent?
Judith Spitz: Correct. And theres more. This past year, 80 percent of the Sprinterns who applied for a summer internship at their host company received an offer. Theres no recruitment event, no job fair, no conference companies can go to where they get to interview somebody for five minutes and have that kind of return on investment, in terms of meeting a student, making an offer, and having the student accept the offer. The flip side of it is that about 64 percent of our students who get offers get an offer someplace other than their Sprinternship hostwhich says to me theyve got a hugely valuable rsum credential they can shop around.
Sarah Gitlin: What kind of feedback have you gotten from the employers who participate in Sprinternships?
Judith Spitz: The feedback is almost universally consistent. They are incredibly surprised by what these students can accomplish in three weeks, and they think theyre terrific. Without the Sprinternship, the employers would simply never meet these students. This is the problem were solving. The best estimates show that more than 90 percent of women studying computer science in this countryand 97 percent of Black, Latina, and Native American women studying computer scienceare going to colleges other than the top 25. They are spread out all over the country, and its not economical for industry recruiters to try and recruit from hundreds, if not thousands, of different colleges.
Without the Sprinternship, the employers would simply never meet these students.
Sarah Gitlin: What are the demographics of the participants in the Sprinternship program?
Judith Spitz: There is a small percentage of men in the program, from underrepresented communities in tech. But between 90 and 94 percent of them are women. Sixty to 70 percent of them are from underrepresented communities, which we define as Black, Latina, and Native American, or first-generation college students, or students from low-income households.
Sarah Gitlin: How many students have gone through Sprinternships at this point?
Judith Spitz: Just over 1,500. But we are starting to make a pivot now. We have a company thats taking 100 Sprinterns this year because they are positioning this program as a strategic part of their tech-talent recruitment plan. They know how many interns they want, and they know how many Sprinterns itll take to get the pull-through into their hiring process. And were expecting to scale up from there once we go to what we call a direct-to-student model.
Sarah Gitlin: How does that model work?
Judith Spitz: As an example, we had spots for about 50 Sprinterns for one of our companies in a geography where we dont have a specific university partnership. We put out minimal direct marketing, calling all interested students, and we got 250 applications for it. So, we filled 50 spots with virtually no marketing.
We know that this thing can and will scale. And thats also part of my heritage. You grow up at a company like Verizon, and you do everything at scale. We think this is a programmatic intervention that isnt just for a few companies and isnt targeted at just a few schools. It can scale across the industry and enable systemic change in how companies recruit diverse tech talent.
We know that this thing can and will scale.
Sarah Gitlin: Could you ever see a Sprinternship model applying beyond tech?
Judith Spitz: Absolutely. The City University of New York, which is the first place we started, is very interested in doing just that. You need the right ground elements to make this work, which means it would have to be an industry thats having persistent diversity problems. What this is solving for is an industry where theres what I call a feeding frenzy at a small number of schools and an unwillingness or an inability to tap into talent outside of that.
Sarah Gitlin: Turning to a slightly less rosy topic As we know, tech talent was in short supply, and now were seeing a wave of layoffs. Are you considering any changes to the Sprinternship program to adapt to these shifting labor market dynamics?
Judith Spitz: Most of the announced layoffs are by the companies often called Big Tech. But those are not the only companies that have really outstanding tech organizations with great career opportunities. I am a firm believer in the adage Every company is a tech company. And it doesnt matter whether youre talking about the Fortune 50, 100, 500 companies; they all have large tech organizations, and most are not overstaffed. There are still huge opportunities in all those other companies. These organizations have super-cool tech organizations that are doing really interesting things.
I am a firm believer in the adage Every company is a tech company.
Sarah Gitlin: Does Break Through Tech have other programs that complement Sprinternships?
Judith Spitz: We work with our partner universities on curriculum innovations, and to clear barriers students often face trying to get into computer science classes. Theres our Guild program, and Guild students often become Sprinterns. We also have a new programBreak Through Tech AIthat focuses specifically on underrepresented undergraduate women from institutions employers typically overlook, and who have a specific interest in machine learning and AI data science.
We asked our industry partners what they are looking for on student rsums for entry-level machine learning engineering jobs. And they said three things: they need to know some industry tools, they need to have a portfolio of things theyve built, and they need the wherewithal to get through a tech interview. Most students who have those things are getting them outside a standard university curriculum. They are learning the industry tools on their own. Theyre getting portfolio projects during their free time because they have a connection, and they can work on something without getting paid. And of course, those experiences give them the training and confidence to get through an interview.
So, we created this program that has those three elements. We give participants a stipend to attend a nine-week summer course specifically focused on machine learning industry tools. Not theoryindustry tools. Then in the fall, we match them to an industry machine learning project with an industry adviser. Its like a Sprinternship program, only its done over the course of a semester. We have about 160 women in the program now. The target is 1,500 women a year.
Sarah Gitlin: What is next on the horizon for Break Through Tech?
Judith Spitz: Our big focus right now is how to scale even more. Were not talking about a couple of thousand, but about tens of thousands. And we think the way to get to real scale is to have a direct-to-student model, where we can invite and welcome students who go to any university. So, the program will have to switch to being more hybrid.
Were also trying to figure out how to pivot companies from thinking about this as a social-good engagement to a strategic solution to their diversity pipeline problem. Some companies are no longer requiring a college degree and, instead, are looking at skilled-based hiring or apprenticeships to try to diversify their numbers. And thats good. But what theyre doing is going outside the higher education universe, and they are missing out on an incredible opportunity pool of amazing students who are doing exactly what society has told them to do. Theyre getting their four-year degrees. Theyre studying computer science. Theyre doing everything the companies are saying they should. Its just that theyre off the recruitment radar screen.
Sarah Gitlin: Youve found a way to put them on the companies radar.
Judith Spitz: Exactly. What we want to do is help companies see that while no college degree required is one way to achieve diversity in your tech organization, there are about 170,000 women studying computing at 4-year institutions today. And more than 150,000 of them are going to schools that are off of many companies radar.This is an opportunity pool just waiting to be tapped.
See original here:
Lessons in leadership: Removing barriers to get more women in tech - McKinsey
Grant Will Help Break Down Barriers in Access to Technology in … – University of Connecticut
A collaborative effort between the Research on Resilient Cites, Racism, and Equity (RRCRE) initiative at UConn Hartford, and the Computer Science and Engineering Department in the UConn School of Engineering has resulted in the institution receiving a federal grant that will help provide technology and internet access to traditionally underserved students in the Hartford area.
UConn is one of 61 college and universities from around the country to receive this grant from the Department of Commerces National Telecommunications and Information Administration. UConn is receiving approximately $2.86 million over a two-year period to launch a pilot program.
The essence of the idea is to reach out to students in Hartford that have little or no access to internet or computer equipment and create an opportunity for these folks, says associate professor of sociology and Africana studies David Embrick, who also oversees the RRCRE at UConn Hartford. We want to create a realistic pipeline for students who are interested in fields of engineering and computer science, and even those that dont even realize that they have that interest.
The UConn program will focus on students in Hartford entering high school, those at the end of the high school career, and students just starting college at UConn.
The grant will help fund internet access at home for these students, and provide them with basic computer equipment and support, such as workshops and instruction.
The success of Dr. Embrick and UConn Hartfords Research on Resilient Cities, Racism, and Equity highlights the strength of conducting research in collaboration with community organizations, says Mark Overmyer-Velzquez, the director of UConn Hartford. This grant will provide access to high impact learning opportunities for our UConn students and support Hartford schools to attain vital access to broadband technology and related education.
Embrick says faculty members in the Department of Computer Science and Engineering learned about the grant opportunity and approached him about a joint effort for applying. Embrick thought it would be a perfect fit for UConn Hartford, and went to work with professor Laurent Michel, associate professor Zhijie Jerry Shi, and assistant professor Qian Yang, in the School of Engineering, along with UConn Hartford Director of Finance and Operations Cynthia Miranda-Donnelly in the application process.
There is a shortage of talent in the computer engineering field on both a national and state basis, says Laurent. However, there are many people from different walks of life who have the capabilities to be successful at it. Very often, the more privileged ones get so much more exposure at a young age and can recognize that they have this talent. The others dont have these opportunities, so we want to nurture that natural inclination that exists in these groups, but right now is untapped. We want to give them access to these resources for them to reach their potential, and follow career paths that are very rewarding both intellectually and financially.
Embrick says that young scholars who dont have internet access readily available can lack the capacity to see what career paths are truly available to them. The level of inequities, just based on lack of access to the internet, is just immense, especially in this day and age.
The cooperative effort that resulted in earning the grant will continue in its practice. The computer science faculty members will be creating workshops to help and guide the students by providing them ways to navigate the internet and offer them practical skills which they can use in their future studies.
We will be in charge of the budget and managing the operations and evaluations of the program here at UConn Hartford to make sure there is long-term success, says Embrick. The School of Engineering will be building the program and workshops for the students themselves, so together its a powerful force. Its a good illustration of a strong collaboration in the way UConn wants it to be.
While the grant is only for two years, there are long-term goals beyond that timeframe for this program to continue by offering students guidance and resources in all parts of their lives to develop successful careers. There are also long-term goals of hiring three IT staff members and server equipment to benefit the program.
Laurent says the group will monitor cohorts in the program as their time progresses from early high school through college.
As a land-grant institution, UConn has the responsibility to the people of Connecticut, and UConn Hartford, as an urban campus, has a specific responsibility to the people of Hartford, says Embrick. There are real needs to do community engagement in a way that not just facilities one-way conversation between academic and the community. It must be done in a way that engages the community and builds upon the mission of the Research on Resilient Cities, Racism, and Equity initiative.
The rest is here:
Grant Will Help Break Down Barriers in Access to Technology in ... - University of Connecticut
LBCC budget cuts will eliminate criminal justice and computer … – KEZI TV
ALBANY, Ore. Linn-Benton Community College will be dropping some of its programs at the end of the 2024-25 academic because it does not have the funds to continue to offer them, college officials said.
Linn-Benton Community College (LBCC) officials said that its criminal justice and computer science programs will be eliminated at the end of the 2024-25 school year due to budget cuts. An emphasis in criminal justice or computer science for an Associate of Arts Oregon Transfer will no longer be an option, the college said.
LBCC officials also said that the LBCC Board of Education approved a 6% tuition increase for the 2023-24 school year.
Students currently enrolled have the next two years to complete their degrees in either program, LBCC said. Options include an associate or applied science degree in computer science or systems administration, an applied science degree in criminal justice, or a one-year certificate in juvenile corrections, the college said.
LBCC also said library staffing will be reduced in June but the library will remain open, the college said.
College officials also said that its Adult Basic Skills programs budget will be reduced with division staff overseeing the program, grant management and related support services.
There are also six open positions at LBCC that officials said will not be filled, but will be re-evaluated in the fall.
Continue reading here:
LBCC budget cuts will eliminate criminal justice and computer ... - KEZI TV
Uncovering the unheard: Researchers reveal inaudible remote … – UTSA
"The technically interesting thing about this project is that the defense solution is simple; however, in order to get the solution, we must discover what the attack is first, said Xu.
The most popular approach that hackers use to access devices is social engineering, Chen explained. Attackers lure individuals to install malicious apps, visit malicious websites or listen to malicious audio.
For example, an individuals smart device becomes vulnerable once they watch a malicious YouTube video embedded with NUIT audio or video attacks, either on a laptop or mobile device. Signals can discreetly attack the microphone on the same device or infiltrate the microphone via speakers from other devices such as laptops, vehicle audio systems, and smart home devices.
If you play YouTube on your smart TV, that smart TV has a speaker, right? The sound of NUIT malicious commands will become inaudible, and it can attack your cell phone too and communicate with your Google Assistant or Alexa devices. It can even happen in Zooms during meetings. If someone unmutes themselves, they can embed the attack signal to hack your phone thats placed next to your computer during the meeting, Chen explained.
Once they have unauthorized access to a device, hackers can send inaudible action commands to reduce a devices volume and prevent a voice assistants response from being heard by the user before proceeding with further attacks. The speaker must be above a certain noise level to successfully allow an attack, Chen noted, while to wage a successful attack against voice assistant devices, the length of malicious commands must be below 77 milliseconds (or 0.77 seconds).
This is not only a software issue or malware. Its a hardware attack that uses the internet. The vulnerability is the nonlinearity of the microphone design, which the manufacturer would need to address, Chen said. Out of the 17 smart devices we tested, Apple Siri devices need to steal the users voice while other voice assistant devices can get activated by using any voice or a robot voice.
NUIT can silence Siris response to achieve an unnoticeable attack as the iPhones volume of the response and the volume of the media are separately controlled. With these vulnerabilities identified, Chen and team are offering potential lines of defense for consumers. Awareness is the best defense, the UTSA researcher says. Chen recommends users authenticate their voice assistants and exercise caution when they are clicking links and grant microphone permissions.
She also advises the use of earphones in lieu of speakers.
If you dont use the speaker to broadcast sound, youre less likely to get attacked by NUIT. Using earphones sets a limitation where the sound from earphones is too low to transmit to the microphone. If the microphone cannot receive the inaudible malicious command, the underlying voice assistant cant be maliciously activated by NUIT, Chen explained.
Research toward the development of NUIT was partially funded by a grant from the Department of Energy National Nuclear Security Administrations (NNSA) Minority Serving Institutions Partnership Program (MSIPP). The $5 million grant supports research by the Consortium On National Critical Infrastructure Security (CONCISE) and allows the creation of certification related to leveraging Artificial Intelligence (AI) and block-chain technology to enhance critical infrastructure cybersecurity posture.
UTSA is a nationally recognized leader in cybersecurity. It is one of few colleges or universities in the nation and the only Hispanic Serving Institution to have three National Centers of Academic Excellence designations from the U.S. Department of Homeland Security and National Security Agency.
Additionally, the university is home to five cybersecurity research centers and institutes the Cybersecurity Manufacturing Innovation Institute, the National Security Collaboration Center, the Institute for Cyber Security, the Center for Infrastructure Assurance and Security and the Cyber Center for Security and Analytics.
Read the rest here:
Uncovering the unheard: Researchers reveal inaudible remote ... - UTSA
Computer science alum reflects on his role in building the Internet in … – Dal News
Dan MacKay (BCS89) remembers New Years Day, 1983 well. He was in the Sculpture Court at the Dalhousie Arts Centre and about to make history by helping bring Nova Scotia online for the first time.
The usual ceremonial flourishes wouldnt do for such a special occasion.
We had our equipment set up in the Sculpture Court, and the premier was there, and instead of cutting a ribbon, I had him connect two pieces of ethernet together an old kind of ethernet called 10base2, recalls MacKay, who was a key player on the technical team that built the Internet in Nova Scotia and across Canada.
While the day the team officially connected Nova Scotia to the transcontinental network stands out as a highlight in MacKays mind, there were many exciting and challenging moments during the project.
Every day there was a new challenge, the Faculty of Computer Science alum says. We were building and improving the speed of the internet across Canada, and I got to talk to tech people at schools, libraries and businesses all across the province about exciting new installations and improvements.
MacKay also played a role in developing the technological process that syncs time across every clock, computer and watch connected all over the world.
MacKay pictured in 1991 during an Internet hookup at Park View school in Bridgewater, N.S.
Theres no wonder MacKay was involved in building the internet. From a young age, he was immersed in the world of technology thanks to his two older brothers, one of whom graduated a member of the Class of '75 with a degree in physics.
By the time I was 5 years old, I had a home physics, chemistry and engineering lab to play with, says MacKay. When I was just barely a teen, I got to try out programming on paper tape on the new Intel 8080 chip in my brother Michaels lab.
Building the Internet in a time before it was widely available came with its own set of challenges.
Everything was new, he says. The very first routers we started working with were built in Burnside using very experimental software and had all kinds of serious problems that made them unusable. The next batch was from the USA but had software built in Ontario which had never been connected to the Internet before. The tools we had for diagnosing problems with the internet were very primitive they still are and so we got really good at reading the nuances of what tools we had."
When asked how the Internet has changed since those early days, he replies: "It would be easier to document the things that havent changed! That is e-mail and the underlying protocol, TCP/IP."
MacKay says the biggest revolutions to the Internet since its inception are the development of the World Wide Web and advances in Internet-wide search engines.
Recommended reading:Dal computer science students hack their way to national competition
This past January, MacKay held a party in the Goldberg Computer Science Building to mark the 40th anniversary of bringing Canada online.
The event inspired MacKay to work on a project documenting the history of local public, free, subsidized, and egalitarian access to the Internet through organizations like The Chebucto Community Net and C@P and a piece of software called C-Suite.
When asked about the future of the Internet and its evolution, MacKay sees some major new shifts underway.
"That answer has changed drastically in the last few months, and it will continue to do so. It seems a great deal of our lives will be mediated by artificial intelligence which will vary from administration tasks to advanced medical consultations.
While the Internet continues to evolve, one thing is certain: MacKays contributions to the tech industry and connecting Nova Scotia to the internet will always be remembered and celebrated.
Link:
Computer science alum reflects on his role in building the Internet in ... - Dal News
How Latin America’s genomics revolution began and why the … – Nature.com
Citrus trees can be infected with the bacterium Xylella fastidiosa. Its genome was sequenced by a Brazilian team in 2000.Credit: Courtesy of Fundo de Defesa da Citricultura - FUNDECITRUS
Daniela Robles-Espinoza was a first-year undergraduate at the National Autonomous University of Mexicos (UNAMs) newly established Center for Genomic Sciences in Cuernavaca when she got a front-row seat to the dawn of genomics in her country.
The year was 2005. Scientists in Cuernavaca, nestled in the highlands 50 kilometres southwest of Mexico City, led a government-funded project to sequence the genome of Rhizobium etli, a bacterium that lives on the roots of some bean plants, helping them to fix nitrogen. Mirroring a Brazilian effort at the University of So Paulo to sequence the bacterial plant pathogen Xylella fastidiosa five years earlier, the project was an ambitious attempt to build up the countrys biotechnology infrastructure, providing Robles-Espinoza and her fellow students with an opportunity to watch cutting-edge genomics at first hand.
I had this perception that if you want to do good science, you have to go abroad, says Robles-Espinoza, who is now a group leader at UNAMs International Laboratory for Human Genome Research in Quertaro, 200 km northwest of Mexico City. It was kind of in the air that people want to leave. But I would say, not any more.
Two decades later, the sequencing of a bacterium no longer sounds like much of a milestone, but with a US$11.6-million grant from the So Paulo government, the projects leaders say the X. fastidiosa research received more state funding than any other single piece of Brazilian science. The Mexican project received $2 million, also a major investment. To scientists across South and Central America, these projects represented more than just a loosening of governmental purse strings. By funding Mexican and Brazilian scientists to sequence agriculturally important bacteria, which were significant to their own economies, the projects have helped to spark the regions biotech revolution.
The X. fastidiosa work created a network and a buzz within the So Paulo community. That was really important, says Lygia da Veiga Pereira, director of the National Laboratory for Embryonic Stem Cell Research at the University of So Paulo. The greatest impact was in making these tools more available not just sequencing but also molecular biology.
Collection: Young scientists
Both Mexico and Brazils initial, time-limited sequencing projects also helped to train a new generation of genomics researchers, says Rafael Palacios, one of the directors of the R. etli sequencing effort and coordinator of UNAMs International Laboratory for Human Genome Research. Mexico created a specialized undergraduate programme for future geneticists. And, in Brazil, the number of students earning masters- and doctoral-level degrees in science doubled between 2000 and 2008 (see go.nature.com/3rfim1e).
Yet without greater investment, those gains are in danger. Although some large institutes have secured sustainable funding, not all researchers are so lucky. Brazils former president Jair Bolsonaro repeatedly cut science funding during his administration; in 2021, Brazils science budget was 4.4 billion reais (US$852 million), compared with 14 billion reais in 2015, the countrys peak. Researchers hope that Brazils newly elected president, Luiz Incio Lula da Silva, who took office on 1 January, will reverse this trend. Mexico invests less than 1% of its gross domestic product in scientific research1 (compared with more than 3% in the United States and nearly 5% in Israel), and according to the World Bank, Mexico has just 327 scientists for every one million people (compared with 4,821 per million in the United States). Still, both Brazil and Mexico host small but vibrant biotech communities, says Palacios.
There are very good scientists doing very good genomics in Mexico, says Palacios. They are the ones that will change the image of Mexican genomics.
From his office in sprawling So Paulo, Fernando Reinach watched a revolution unfold.
By the mid-1990s, US and European researchers had begun making huge strides in genome sequencing first the laboratory bacterium Escherichia coli, then the nematode worm, the fruit fly and a flowering plant. At the same time, two international teams were racing to complete the human genome. As the biochemistry coordinator at the So Paulo Research Foundation (FAPESP), the scientific funding agency for the state of So Paulo, Reinach wanted to spark a revolution of his own. But this one would be completely Brazilian.
In these new areas where fields were booming, it was clear that Brazil was being left behind, says Reinach. There were just two to three people in Brazil who were able to sequence a genome.
Brazil election: Scientists cheer Lula victory over Bolsonaro
The country had geneticists and bioinformaticians, but most of them trained abroad and in many cases stayed there. Those who returned often collaborated on European or US projects rather than leading their own. Fuelled by optimism and a desire to prove his countrys scientific mettle on the global stage, in 1997 Reinach invited 191 scientists from across So Paulo to participate in the sequencing and analysis of the bacterium X. fastidiosa.
The bacterium causes citrus variegated chlorosis, a disease that has infected more than 100 million citrus trees in Brazil since 1987. Yet, although scientists had begun to tackle human-associated bacteria, no one had yet sequenced a plant pathogen. Previous work had shown that X. fastidiosa had a genome of 2.7 million base pairs. That placed it in the genomics Goldilocks zone: enough DNA to challenge scientists but small enough to be manageable.
Steven Lindow, a microbiologist at the University of California, Berkeley, recalls wondering about the projects expense. I knew it could be worthwhile, but it was also hideously expensive, he says. But in less than two years, the Brazilian team had sequenced, annotated and analysed the X. fastidiosa genome, on time and under budget. (It took a team of researchers five-and-a-half years to sequence E. coli2.) The resulting paper3 was published on 13 July 2000, just months after the human genome, and made the cover of Nature. Joo Carlos Setubal, a bioinformatics researcher at the University of So Paulo who co-led the project, says this might have been a first for Brazilian scientists.
The simple fact that a group of Brazilian scientists were able to organize a project, carry it out according to plan, and publish their results in one of the best scientific journals in the world those are things that back then almost never happened, Setubal says.
Joo Carlos Setubal is a bioinformatics researcher at the University of So Paulo, Brazil.Credit: Aldrey Olegario
Lindow says the project changed the field by providing key insights into the complex genomics and metabolism of pathogens such as X. fastidiosa, which have to survive both their plant host and an insect vector. The fact that such a discovery came from Brazilian scientists was a bonus, he says.
Before that genome, there were very few research papers from Brazil, adds Leonardo De La Fuente, a plant pathologist at Auburn University in Alabama, who was born in Uruguay. That motivated a lot of people to work more in biology.
Nearly 7,500 km north of So Paulo in Cuernavaca, Palacios was conscious that both genomic sequencing and computer science in South and Central America was lagging decades behind the United States and Europe.
After completing his PhD at UNAM in 1970, Palacios began a postdoctoral fellowship at Stanford University in California. Working abroad was a rite of passage for many Mexican scientists at the time, and his stint at Stanford opened his eyes to what scientists could accomplish with the right support. In 1974, Palacios returned to Mexico to dedicate his career not just to genomics, but also to improving his countrys scientific infrastructure to help mould the people that would be the future leaders of genomic sciences in Mexico.
Six years later, he was tapped to co-lead UNAMs Nitrogen Fixation Research Center in Cuernavaca. The institutes immediate goal was to learn more about Rhizobium. In 2000, Palacios team learnt that the R. etli genome was segmented, with one-third sitting on six large circular DNA molecules called plasmids4. This partitioning, Palacios and his colleagues reasoned, provided genetic and metabolic flexibility that enabled the species to survive a range of challenging environments.
Frustration builds over lengthy delay in revamping Mexicos science law
Still, by the early 2000s, no one had attempted to sequence the organism. Palacios and his colleague Guillermo Dvila, a genomics researcher at UNAM, proposed the project to Mexicos National Council of Science and Technology (CONACYT), Mexicos equivalent of the US National Science Foundation, and in 2004, received a $2 million grant. Genomics laboratories across Mexico with appropriate expertise could apply to receive a state-of-the-art DNA sequencer with no restrictions on how it was to be used. The scientists would repay the equipment cost by sequencing a certain number of bases of the R. etli genome.
Published in 2006, the completed R. etli sequence revealed the complex arrangement of genes that were needed for nitrogen-fixing bacteria to convert an inert gas into usable nutrients5. But the masterpiece for Palacios and Dvila was the establishment of a four-year undergraduate degree in genomics at UNAM in 2003, which is taught at its Center for Genomic Sciences. From day one, the students would be immersed in a hands-on, research-intensive course on everything from genetics and molecular biology to statistics and computer science. A small cohort of students were admitted each year, but Palacios wanted the programme to educate Mexicos future genomics leaders. More than three-quarters of its graduates totalling nearly 300 so far are now developing their careers in Mexico, after some moved abroad to gain experience after graduating.
Robles-Espinoza was one of the first students to be enrolled in the UNAM programme. It was very exciting as a young student to see that all of these breakthroughs can happen around me, she says about the genome sequencing she saw in her home country. Its like, I can do this, too!
Some of the worlds leading geneticists gave talks to the students, she says, and after a research trip to the United Kingdom in 2009, when Robles-Espinoza began to work in the field of cancer genetics, she gained a doctorate position at the University of Cambridge, UK, and graduated in February 2015. After completing a postdoctoral fellowship, Robles-Espinoza returned to Mexico as a junior researcher at Palacios newest facility, UNAMs International Laboratory for Human Genome Research.
Her work now focuses on a type of melanoma that has long been overlooked by US and European scientists. Known as acral lentiginous melanoma, the cancer comprises only a few percent of melanoma cases in people of European descent but is much more common in darker-skinned populations, including those in Mexico. Because the cancer is common locally, she has ready access to patient samples. She has also teamed up with scientists at the Karolinska Institute in Stockholm.
In many cases, the priorities of a project are set by the countries who are leading it, says Robles-Espinoza. Although Mexican scientists frequently collaborated with colleagues around the world, they werent the ones setting the agenda, nor were they receiving investments in training and infrastructure. It was important to see that you can not only participate in what others are doing, you can lead and direct it.
Daniela Robles-Espinoza (right) studies genetic predisposition to skin cancer.Credit: Jess Ren Wong
One of Robles-Espinozas classmates, Maria Gutierrez-Arcelus, also credits the UNAM programme with her career trajectory. An immunogeneticist at Boston Childrens Hospital and Harvard Medical School in Boston, Massachusetts, Gutierrez-Arcelus studies the genomic contributions to autoimmune diseases such as systemic lupus erythematosus, asthma and arthritis. Other alumni study everything from ancient DNA to plant breeding, she says.
The [sequencing] project has really promoted genomics in Mexico, and I think a lot of credit should go to Dr Palacios for having that vision, Gutierrez-Arcelus says.
Indeed, both the Brazilian and Mexican teams say that their greatest impact was in inspiring young scientists. Of the X. fastidiosa project, Setubal says, It was very clear that the project was to be a platform on which researchers in So Paulo would get up to speed on genome sequencing technology.
And that impact extends far beyond Mexico and Brazil. As a young graduate student at the University of Chile in Santiago in the mid-2000s, Alvaro Lladser often questioned his ability to do groundbreaking science in his home country. A three-year postdoctoral fellowship at the Karolinska Institute working on cancer vaccines reinforced his doubts.
The current technology is always more advanced abroad than at home. Were always a little bit behind, he says.
Lladsers work depends on single-cell sequencing, a technology that wasnt readily available when he returned to Chile in 2010 to study the tumour microenvironment at the Science and Life Foundation in Santiago. But his knowledge of what the Mexican and Brazilian teams did during the previous decade told him that he could help to build this type of capacity in Chile. He has focused on the countrys genome analytics capacity in areas such as single-cell RNA sequencing by hosting courses for fellow Chilean scientists.
The new generation of scientists who trained on these early sequencing projects are helping Pereira to run a biotech start-up called gen-t, which she launched in 2021. The goal of gen-t is to provide researchers from pharmaceutical companies and academia with the as-yet-unsequenced genetic diversity in Brazils population. Historically, other nations have plundered Brazils natural resources, which has made it hard for Brazilians to benefit from their own biodiversity. Pereira hopes gen-t will help Brazilians to share the profit from their genomic diversity, and like Robles-Espinoza, help to develop biomedical solutions for the countrys heterogeneous population, which includes people of European, African and Native American descent. Less than 1% of all genomic data includes people from Central or South America6. The value of gen-ts goal is reflected in the funding it secured in 2021, valued at 10 million reais.
NatureTech hub
This is an opportunity because Brazil has something to offer the world in our genetic diversity, Pereira says.
Today, however, funding and political realities have taken some of the shine off Setubals and Palacios original ideals. Palacios says that even if he could find the money for a one-off biotech moonshot project like he did in the early 2000s, without continued government investment, Mexicos biotech community is at risk of floundering. Nor does Brazil have enough professorships and other permanent positions to keep its best and brightest researchers in the country, say Reinach and Setubal, and job opportunities and more lucrative funding elsewhere in the world have made it hard to keep the talent that they train. Its one of the reasons Gutierrez-Arcelus says she has remained in Boston rather than returning home.
Its important to be able to study all populations in the world. Having genomics well developed in Mexico can really benefit both Mexicans and the rest of the world, she says.
The sequencing of X. fastidiosa and R. etli showed the world just how much scientists in South and Central America could achieve with proper funding. The regions political will to build on those early investments will determine how well future generations can maintain the progress that has already been made.
Young people are the future, says Palacios.
See the rest here:
How Latin America's genomics revolution began and why the ... - Nature.com
Exploring the nanoworld of biogenic gems | MIT News … – MIT News
A new research collaboration with The Bahrain Institute for Pearls and Gemstones (DANAT) will seek to develop advanced characterization tools for the analysis of the properties of pearls and to explore technologies to assign unique identifiers to individual pearls.
The three-year project will be led by Admir Mai, associate professor of civil and environmental engineering, in collaboration with Vladimir Bulovi, the Fariborz Maseeh Chair in Emerging Technology and professor of electrical engineering and computer science.
Pearls are extremely complex and fascinating hierarchically ordered biological materials that are formed by a wide range of different species, says Mai. Working with DANAT provides us a unique opportunity to apply our labs multi-scale materials characterization tools to identify potentially species-specific pearl fingerprints, while simultaneously addressing scientific research questions regarding the underlying biomineralization processes that could inform advances in sustainable building materials.
DANAT is a gemological laboratory specializing in the testing and study of natural pearls as a reflection of Bahrains pearling history and desire to protect and advance Bahrains pearling heritage. DANATs gemologists support clients and students through pearl, gemstone, and diamond identification services, as well as educational courses.
Like many other precious gemstones, pearls have been human-made through scientific experimentation, says Noora Jamsheer, chief executive officer at DANAT. Over a century ago, cultured pearls entered markets as a competitive product to natural pearls, similar in appearance but different in value.
Gemological labs have been innovating scientific testing methods to differentiate between natural pearls and all other pearls that exist because of direct or indirect human intervention. Today the world knows natural pearls and cultured pearls. However, there are also pearls that fall in between these two categories, says Jamsheer. DANAT has the responsibility, as the leading gemological laboratory for pearl testing, to take the initiative necessary to ensure that testing methods keep pace with advances in the science of pearl cultivation.
Titled Exploring the Nanoworld of Biogenic Gems, the project will aim to improve the process of testing and identifying pearls by identifying morphological, micro-structural, optical, and chemical features sufficient to distinguish a pearls area of origin, method of growth, or both. MIT.nano, MITs open-access center for nanoscience and nanoengineering will be the organizational home for the project, where Mai and his team will utilize the facilitys state-of-the-art characterization tools.
In addition to discovering new methodologies for establishing a pearls origin, the project aims to utilize machine learning to automate pearl classification. Furthermore, researchers will investigate techniques to create a unique identifier associated with an individual pearl.
The initial sponsored research project is expected to last three years, with potential for continued collaboration based on key findings or building upon the projects success to open new avenues for research into the structure, properties, and growth of pearls.
The rest is here:
Exploring the nanoworld of biogenic gems | MIT News ... - MIT News
Computing with Creativity | Harvard Graduate School of Education – Harvard Graduate School of Education
Doctoral Candidate Paulina Haduong has had an on-again, off-again relationship with coding.
It began organically, with informal, self-taught website building. Growing up, theyhelped theirparents run the website for their small business. It was fun, low-stakes, and entirely separate from theirformal academic life. Things changed when Haduongtook theirfirst computer science (CS) course as an undergraduate student.
The first computer science class I took was such a demoralizing experience that I dropped it, Haduong says. It was really isolating and really confusing. It was very much lecture-based, in this giant class, so computer science became a thing where I thought, OK, I'm just not good at this thing, Im not going todo it.
Despite this experience, Haduong gave CS another chance. The next course theytook was completely different, for the better: Itwas structured in a way to help people learn together. With every assignment, students were able to work with as many people as wewanted, as long as we credited each other, Haduong says. That experience really stuck with me, being able to work on projects with other people and work through the frustrations of learning to program. That has really carried me to what I ended up doing in the master's program when I came to [HGSE] for the first time, and how I ended up in research afterwards.
As a Ph.D. student at HGSE, Haduong conducts research that seeks to understand the challenges that K12 teachers and students face in learning computing together, and how supports can be designed and implemented to meet those challenges.
Here, Haduong discusses their dissertation research, the importance of teaching technology in schools, and theirhopes for the future.
Tell me about your work at the Creative Computing Lab with Professor Karen Brennan.
There are many programming languages in the world, and there are many that are designed for young learners. The one that we mainly work with is called Scratch. Scratch is both a programming language and an online community for kids, which is really cool, because they can make projects and then they can share those projects and connect with other kids online.
There are many reasons that people put forward for why we should learn to code or why everyone should learn to code. The reason I ammost excited about is for young people to be able to learn to creatively express themselves through code. This form of creative expression can help young people get their ideas out in the world and can help them learn to participate in our technologically mediated society.
You wrote an article, I Like Computers, I Hate Coding, which touched upon how learning CS can sometimes be demoralizing. How does your work try to counter that feeling for learners?
Learning to program, for many people, is really frustrating. You're trying to create something, and it's a process of getting stuck and also getting unstuck. So you're encountering bugs, you're trying to figure out what to make and how to make it.
When learners don't have sufficient support, that frustration can affect their identities as computer programmers it's not justI'm not able to make this thing, but I'm bad at computer programming. I'm the problem. We want to shift that to help learners understand that they might notknow how to do something yet. Also, other people can help them achieve their goals.
In that particular project [I wrote about], young people were saying, I use technology all the time. I use computers all the time. I love my computer, I use it to access the internet, but coding itself is a boring and frustrating subject for me. We hope to create opportunities for kids to realize that they can use [coding] to make anything they want, and hopefully that will be something that's exciting to them.
How does your dissertation research look at those frustrations?
People are really excited about computing education, and we're excited to create more opportunities for it. Students, sometimes, have these frustrating experiences with it. Teachers are also being asked to teach computing, even though they haven't necessarily been given enough resources and enough professional learning to support them in feeling like they can teach the way that they might want to teach.
My hope is that with this dissertation work, we can create more opportunities for teachers and students to build creative communities, and to support one another.
What does that work look like?
All of this work in my dissertation is happening within the context of Getting Unstuck, which is a design-based research project. Over the last several years, we've been working with elementary school teachers at Title I and rural schools all over the United States to collaboratively design a computing curriculum that helps students create projects that only have one creative constraint. So, each project must use a specific programming concept, butwhat students want to make is entirely up to them.
This is partly a response to teachers saying, I want kids to make things that are personally meaningful, but how do I make sure that they're actually learning anything? That's why we have this programming concept that they have to try to incorporate into their project. This design-based research project encourages students and teachers to develop a collaborative studio culture to learning to program. So, we are trying to use this creative computing design studioframework of helping students explore, create, share, and reflect on their computational creations.
In [one paper of the dissertation], I look more closely at a single classroom from the curriculum pilot. We've built this curriculum, we've helped all these teachers learn to use the curriculum, but what is actually happening in the classroom when teachers and students use the curriculum together?
I worked with this one teacher and her fourth-grade students, which was delightful, for four months, and looked at the different activities that they engaged in that enabled them to learn collaboratively.For example, some students had a lot of success in re-mixing other people's projects and reusing other people's ideas. Other students really struggled with that; they saw things that they were excited about, but they couldn't quite figure out how to incorporate that into their own projects.
This teacher just did a really wonderful job of creating space for students to talk about their work and share their vulnerabilities. There were moments where the teacher would ask about highs and lows, and students would share, My high is, I've made progress on my project and My low is that I don't feel great about my project. Then, she would ask, Who else doesn't feel great about the project? Just creating space for students to see that other students felt the same way went a long way towards helping students feel excited about computing and realizing that they werent alone in the challenges they encountered. It wasn't that students were bad at programming. Its that learning to program by creating projects is a hard thing that we're trying to do.
Are you trying to promote the teaching of computer science in early education or elementary schools, or is that shift happening independently?
That's a good question.Access to computing education is not tracked super well at the elementary school level. How much computer science is happening is tracked better at the high school level how many AP courses are happening, for example. We know that a lot of teachers and elementary schools are trying to include computer science, but we dont know a lot about what that looks like across the U.S.
"People are really excited about computing education, and we're excited to create more opportunities for it."
The other specific thing that we're trying to address with the Getting Unstuck curriculum is to create more of an intermediate, bridging experience. There are a lot of wonderful curricula and resourcesthat help students try computing for the first time and there are well-developed sequences for high school computing education, [but] there isn't a lot of support for learners in-between those two stages. What happens after you can make that first project? How can you keep working on learning to program before you enter one of these high school courses?
This curriculum is also designed to fill some of that gap, which is why it's designed for upper elementary grades. It's not meant to be a student's first experience learning to program, but it can also be, if needed.
What are your next steps with this work?
One thing that I'm excited about doing next is spending more time with kids. This wasnt really possible before because I didthe data collection during the pandemic. When we think about creating opportunities for learners to create things that they care about, it would be helpful to know more about what they are actually interested in. So, being able to take a closer look at what kids are making, what kids are thinking about what they're making, and what kinds of frustrations kids are encountering between what they want to make and what they're actually currently able to make within the time constraints of school.
For example, there was a student who made this beautiful project about a blue wolf on Scratch. It had these pictures of wolves and then this long narrative that she did a voiceover for. You look at this project, and you think, Okay, so this girl must like wolves. That's cool. But when I actually had a chanceto talk to her about her project and asked, Why did you make what you made? she talked about how this was a story she had made up for her little sister.
She had been telling some version of the story to her little sister for two years. She decided to record this story for hersister and to make this project and share this with other people. You can learnsome things about the project creator and her motivationfrom interacting with the project itself, but you can't learnall of these other things, about how her story has evolved, who she made it for, and why. That was just one student, with one project, that I was able to talk to for 20 minutes. So, I would love to talk to more kids about what they've made.
See original here:
Presenting the Gold Star to Jesse W. Thacker’s Family – Congressman Steve Cohen
Dear Friend,
This week, I presented the Gold Star citation to the proud son of World War II veteran Jesse W. Thacker who fought in the campaigns in Tunisia and Sicily and returned home to Tennessee in late 1944 after distinguished service. I also toured a refurbished shelter for our homeless and disabled veterans, announced plans to host a roundtable discussion on housing issues this Tuesday with a senior U.S. Department of Housing and Urban Development (HUD) leader; met with cancer care advocates; announced a Federal Emergency Management Agency (FEMA) fire prevention grant to the City of Memphis; congratulated the University of Memphis and a star Computer Science professor on being awarded a National Science Foundation (NSF) grant; met with representatives of the National Federation of the Blind; and offered a Womens History Month-related set of health tips. Keep reading and follow me on Twitter, Facebook and Instagram to see what I am doing as it happens.
Presenting the Gold Star to Jesse W. Thackers Family
Touring Homeless and Disabled Veterans Shelter
Holding a Housing Issues Roundtable with HUD Regional Administrator
Meeting with West Cancer Foundation
Announcing City of Memphis Fire Prevention and Safety Grant
Congratulating the University of Memphis on Prestigious National Science Foundation Grant
Meeting with National Federation of the Blind
Weekly Health Tip
Quote of the Week
Presenting the Gold Star to Jesse W. Thackers Family
Mr. Bernis Dale Thacker, Congressman Cohen and Mr. Thackers daughter, Tina Collins.
On Wednesday, I presented the Bronze Star to Mr. Bernis Dale Thacker for his father, the late Jesse W. Thacker, a World War II veteran of the Tunisian and Sicilian campaigns. Jesse Thacker passed way in 1968 at the age of 45 but his son only recently discovered his 1944 discharge papers behind his portrait in a picture frame. The Gold Star citation is awarded to those who demonstrated heroic achievement in a combat zone. I am pleased to have played a role in securing this recognition for a proud Thacker family.
Touring Homeless and Disabled Veterans Shelter
From left: Vicki Azlin, Alpha Omegas director of development; PZ Horton III, Lt. Col., USAF (Ret.), Chairman, Board of Directors; Congressman Cohen; and Cordell Walker, executive director of Alpha Omega.
On Tuesday, I toured the new facility that Alpha Omega Veterans Services Inc. is refurbishing to expand its services for homeless and disabled veterans. They are doing great work with these deserving service men and women who need our support after serving our country.
Holding a Housing Issues Roundtable with HUD Regional Administrator
On Tuesday, I will host a roundtable discussion on housing issues with U.S. Department of Housing and Urban Development Regional Administrator Jose Alverez and local stakeholders. I expect a lively and productive exchange of ideas and will report on its outcome to you next week.
Meeting with West Cancer Foundation
Left to right: Rachel Brown Community Outreach & Engagement; Lori Guyton Partner, On Brand Communications; Congressman Cohen; Leighanne Soden Executive Director; Steve Wishnia President, Board of Directors
On Tuesday, I met with representatives of the West Cancer Foundation, a group dedicated to advancing the fight against cancer by providing accessible patient resources, early detection and education, and community-based research to improve treatment and recovery outcomes. The Memphis-based nonprofit was founded in 2020 and is committed to developing collaborative partnerships and innovative patient-centered initiatives that remove barriers to cancer care. It was a productive meeting and I am glad that we have the foundation here in Memphis to guide patients through their treatments.
Announcing City of Memphis Fire Prevention and Safety Grant
Also on Tuesday, I announced a Fire Prevention and Safety Grant Award from the Federal Emergency Management Administration (FEMA) to the City of Memphis for $171,761. The program supports projects that enhance the safety of the public and firefighters from fire and related hazards.See my release here.
Congratulating the University of Memphis on Prestigious National Science Foundation Grant
On Thursday, I commended the University of Memphis Department of Computer Science and Professor Xiaolei Huang for winning a significant research grant to study data-driven health care from the National Science Foundation (NSF). See that release here.
Meeting with National Federation of the Blind
I met with Allison Donald and others from the National Federation of the Blind on Wednesday to discuss the Medical Device Nonvisual Accessibility Act, the Software Applications Accessibility Act, and the Blind Americans Return to Work Act. Also attending a productive meeting were Craig McFarland and Teresa Williams.
Weekly Health Tip
During this Womens History Month, I am pleased to take note of important initiatives aimed at women. The National Institute for Environmental Health Sciences is calling attention to what it is calling a Womens Health Awareness campaign, promoting evidence-based community interventions to promote wellness, environmental health literacy, and environmental public health and advancing health equity by improving health care access and quality. Read about the institutes plans here.
Quote of the Week
We need, in every community, a group of angelic troublemakers. -- Civil Rights activist and March on Washington organizer Bayard Rustin, born on this day in 1910.
I wish all my friends, neighbors and constituents of Irish ancestry or not a very Happy St. Patricks Day.
Go Tigers!
As always, I remain.Most sincerely,
Steve CohenMember of Congress
View original post here:
Presenting the Gold Star to Jesse W. Thacker's Family - Congressman Steve Cohen
What Is A Computer Worm: Examples And More – Dataconomy
What is a computer worm? It is a type of malware that can cause significant damage to computer systems and networks by replicating itself and spreading autonomously. With the rise of technology and the increasing dependence on computers for everyday tasks, cybersecurity has become more critical than ever before.
In a world where cyber threats are evolving and becoming more sophisticated, it is essential to have effective cybersecurity measures in place to protect against the threat of computer worms and other types of malware. In this article, we will explore the world of computer worms, the damage they can cause, and the strategies that individuals and organizations can use to prevent, detect, and remove these threats.
A computer worm is a type of malware that replicates itself and spreads throughout a computer network without the need for a host program or user interaction. It works by exploiting vulnerabilities in the operating system or other software on the target machine to gain access and create copies of itself. Worms can quickly spread to other devices connected to the same network, causing widespread damage and disrupting normal operations.
In computer science, the term worm stands for Write Once, Read Many. This term refers to a type of data storage device that can be written only once but read many times. The term worm was first used in the 1970s to describe early forms of optical storage media that used lasers to etch data onto the surface of a disk. These disks could be read many times but could not be modified once the data had been written.
However, in the context of computer security, the term worm is used to refer to a self-replicating malware program that spreads through a network, as described in the previous section. The term is used to describe the way in which the malware worms its way through a network, infecting as many devices as possible.
A computer worm typically works in the following way:
Some key characteristics of computer worms include:
While computer worms and viruses are both types of malware, there are some key differences between the two. Here is a summary table comparing the two:
Here are some examples of famous computer worms:
These examples illustrate the significant impact that computer worms can have on computer systems and networks, as well as the need for effective cybersecurity measures to prevent and mitigate these threats.
Computer worms can cause significant damage to computer systems and networks, as well as the data and information they contain. Here are some key impacts of computer worms:
Computer worms can affect a wide range of systems and data, including:
The costs associated with worm attacks can be significant and include the following:
Computer worms can have a significant impact on computer systems and networks, causing damage to data, applications, and networks, as well as financial and other costs to organizations that fall victim to these attacks. It is therefore essential for individuals and organizations to implement effective cybersecurity measures to prevent and mitigate the damage caused by computer worms.
Preventing computer worms requires a multi-layered approach that includes both technical and behavioral measures. Here are some key strategies for preventing computer worms:
Anti-virus software is a key tool in preventing computer worms. It can detect and remove known worms, as well as other types of malware, before they can cause damage. Some key features of anti-virus software include:
Cyberpsychology: The psychological underpinnings of cybersecurity risks
Firewalls are another important tool in preventing computer worms. A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Some key features of firewall protection include:
In addition to technical measures, there are also several best practices that individuals and organizations can follow to protect against computer worms:
Keeping software and operating systems up to date is critical in preventing computer worms. This is because worms often exploit vulnerabilities in software to gain access to computer systems and networks. By regularly updating software and operating systems with the latest security patches and updates, individuals and organizations can ensure that known vulnerabilities are patched and protected against. This can significantly reduce the risk of infection from computer worms and other types of malware.
Preventing computer worms requires a multi-layered approach that includes technical measures such as anti-virus software and firewall protection, as well as behavioral measures such as following best practices and keeping the software and operating systems up to date with the latest security patches and updates. By implementing these strategies, individuals and organizations can significantly reduce the risk of infection from computer worms and other types of malware.
Detecting and removing computer worms can be challenging, as worms are often designed to evade detection and spread quickly throughout a network. Here are some key strategies for detecting and removing computer worms:
Some common symptoms of a computer worm attack include:
If you suspect that your computer has been infected with a worm, it is important to take immediate action to prevent further damage. Here are some steps you can take:
Here are some common tools and techniques that can be used to detect and remove computer worms:
Detecting and removing computer worms requires a combination of tools and techniques, including anti-virus software, firewall protection, malware scanners, rootkit detection tools, and system restore. It is important to be aware of the symptoms of a worm attack and to take immediate action to prevent further damage. By following best practices for cybersecurity and staying vigilant, individuals and organizations can help protect against the threat of computer worms and other types of malware.
Here are five examples of famous computer worms:
Back to our original question: What is a computer worm? Well, a computer worm is a type of malware that can spread rapidly through computer systems and networks, causing significant damage to data and systems.
As we have seen, computer worms can be difficult to detect and remove, and they can cause a range of problems, from data loss to network disruptions. The best way to protect against computer worms is to implement a multi-layered approach that includes technical measures such as anti-virus software and firewalls, as well as behavioral measures such as following best practices and staying vigilant.
By keeping software and systems up to date and being aware of the latest threats and trends in computer worm attacks, individuals and organizations can help to prevent, detect, and mitigate the damage caused by these malicious programs. In the end, it all comes down to effective cybersecurity practices and the constant need to stay one step ahead of the ever-evolving threat of computer worms and other types of malware.
Yes, computer worms can be harmful. A computer worm is a type of malware that spreads copies of itself from computer to computer, often using the internet or other computer networks. Worms can consume bandwidth and system resources, causing computers to slow down or crash. In addition, some worms may be designed to carry out malicious actions, such as stealing sensitive information or damaging computer systems.
Generally speaking, worms are faster than viruses because they are self-replicating and can spread quickly through a network without the need for human intervention. Viruses, on the other hand, need to be attached to a file or program in order to spread, which can slow down the replication process.
The phishing email detection tool can help users avoid cyber-attacks
Ransomware is a type of malware that encrypts files on a computer or network, rendering them inaccessible to the user. The attacker then demands payment, typically in the form of cryptocurrency, in exchange for providing the decryption key to restore access to the files. Ransomware attacks can be devastating to individuals and organizations, as they can result in the loss of important data and financial resources.
Phishing is a type of social engineering attack that involves tricking individuals into divulging sensitive information, such as passwords or credit card numbers, by posing as a trustworthy entity in an electronic communication, such as an email or text message. Phishing attacks can be difficult to detect, as they often use convincing-looking logos and branding to appear legitimate. It is important to be cautious when receiving unexpected electronic messages and to verify the authenticity of any requests for sensitive information.
Read the rest here: