Connect with us

The Conversation

Is DOGE a cybersecurity threat? A security expert explains the dangers of violating protocols and regulations that protect government computer systems

Published

on

theconversation.com – Richard Forno, Teaching Professor of Computer Science and Electrical Engineering, and Assistant Director, UMBC Cybersecurity Institute, University of Maryland, Baltimore County – 2025-02-06 17:54:00

Is DOGE a cybersecurity threat? A security expert explains the dangers of violating protocols and regulations that protect government computer systems

People protest DOGE’s access to sensitive personal data.
AP Photo/Jose Luis Magana

Richard Forno, University of Maryland, Baltimore County

The Department of Government Efficiency (DOGE), President Donald Trump’s special commission tasked with slashing federal spending, continues to disrupt Washington and the federal bureaucracy. According to published reports, its teams are dropping into federal agencies with a practically unlimited mandate to reform the federal government in accordance with recent executive orders.

As a 30-year cybersecurity veteran, I find the activities of DOGE thus far concerning. Its broad mandate across government, seemingly nonexistent oversight, and the apparent lack of operational competence of its employees have demonstrated that DOGE could create conditions that are ideal for cybersecurity or data privacy incidents that affect the entire nation.

Traditionally, the purpose of cybersecurity is to ensure the confidentiality and integrity of information and information systems while helping keep those systems available to those who need them. But in DOGE’s first few weeks of existence, reports indicate that its staff appears to be ignoring those principles and potentially making the federal government more vulnerable to cyber incidents.

Technical competence

Cybersecurity and information technology, like any other business function, depend on employees trained specifically for their jobs. Just as you wouldn’t let someone only qualified in first aid to perform open heart surgery, technology professionals require a baseline set of credentialed education, training and experience to ensure that the most qualified people are on the job.

Currently, the general public, federal agencies and Congress have little idea who is tinkering with the government’s critical systems. DOGE’s hiring process, including how it screens applicants for technical, operational or cybersecurity competency, as well as experience in government, is opaque. And journalists investigating the backgrounds of DOGE employees have been intimidated by the acting U.S. attorney in Washington.

DOGE has hired young people fresh out of – or still in – college or with little or no experience in government, but who reportedly have strong technical prowess. But some have questionable backgrounds for such sensitive work. And one leading DOGE staffer working at the Treasury Department has since resigned over a series of racist social media posts.

YouTube video
Wired’s Katie Drummond explains what the magazine’s reporters have uncovered about DOGE staffers and their activities.

According to reports, these DOGE staffers have been granted administrator-level technical access to a variety of federal systems. These include systems that process all federal payments, including Social Security, Medicare and the congressionally appropriated funds that run the government and its contracting operations.

DOGE operatives are quickly developing and deploying major software changes to very complex old systems and databases, according to reports. But given the speed of change, it’s likely that there is little formal planning or quality control involved to ensure such changes don’t break the system. Such actions run contrary to cybersecurity principles and best practices for technology management.

As a result, there’s probably no way of knowing if these changes make it easier for malware to be introduced into government systems, if sensitive data can be accessed without authorization, or if DOGE’s work is making government systems otherwise more unstable and more vulnerable.

If you don’t know what you’re doing in IT, really bad things can happen. A notable example is the failed launch of the healthcare.gov website in 2013. In the case of the Treasury Department’s systems, that’s fairly important to remember as the nation careens toward another debt-ceiling crisis and citizens look for their Social Security payments.

On Feb. 6, 2025, a federal judge ordered that DOGE staff be restricted to read-only access to the Treasury Department’s payment systems, but the legal proceedings challenging the legality of their access to government IT systems are ongoing.

DOGE email servers

DOGE’s apparent lack of cybersecurity competence is reflected in some of its first actions. DOGE installed its own email servers across the federal government to facilitate direct communication with rank-and-file employees outside official channels, disregarding time-tested best practices for cybersecurity and IT administration. A lawsuit by federal employees alleges that these systems did not undergo a security review as required by current federal cybersecurity standards.

There is an established process in the federal government to configure and deploy new systems to ensure they are stable, secure and unlikely to create cybersecurity problems. But DOGE ignored those practices, with predictable results.

For example, a journalist was able to send invitations to his newsletter to over 13,000 National Oceanic and Atmospheric Administration employees through one of these servers. In another case, the way in which employee responses to DOGE’s Fork in the Road buyout offer to federal employees are collected could easily be manipulated by someone with malicious intent – a simple social engineering attack could wrongly end a worker’s employment. And DOGE staff members reportedly are connecting their own untrusted devices to government networks, which potentially introduces new ways for cyberattackers to penetrate sensitive systems.

However, DOGE appears to be embracing creative cybersecurity practices in shielding itself. It’s reorganizing its internal communications in order to dodge Freedom of Information Act requests into its work, and it’s using cybersecurity techniques for tracking insider threats to prevent and investigate leaks of its activities.

Lacking management controls

But it’s not just technical security that DOGE is ignoring. On Feb. 2, two security officials for the U.S. Agency for International Development resisted granting a DOGE team access to sensitive financial and personnel systems until their identities and clearances were verified, in accordance with federal requirements. Instead, the officials were threatened with arrest and placed on administrative leave, and DOGE’s team gained access.

The Trump administration also has reclassified federal chief information officers, normally senior career employees with years of specialized knowledge, to be general employees subject to dismissal for political reasons. So there may well be a brain drain of IT talent in the federal government, or a constant turnover of both senior IT leadership and other technical experts. This change will almost certainly have ramifications for cybersecurity.

DOGE operatives now have direct access to the Office of Personnel Management’s database of millions of federal employees, including those with security clearances holding sensitive positions. Without oversight, this access opens up the possibilities of privacy violations, tampering with employment records, intimidation or political retribution.

Support from all levels of management is crucial to provide accountability for cybersecurity and technology management. This is especially important in the public sector, where oversight and accountability is a critical function of good democratic governance and national security. After all, if people don’t know what you’re doing, they don’t know what you’re doing wrong.

At the moment, DOGE appears to be operating with very little oversight by anyone in position willing or able to hold it responsible for its actions.

Mitigating the damage

Career federal employees trying to follow legal or cybersecurity practices for federal systems and data are now placed in a difficult position. They either capitulate to DOGE staffers’ instructions, thereby abandoning best practices and ignoring federal standards, or resist them and run the risk of being fired or disciplined.

The federal government’s vast collections of data touch every citizen and company. While government systems may not be as trustworthy as they once were, people can still take steps to protect themselves from adverse consequences of DOGE’s activities. Two good starting points are to lock your credit bureau records in case your government data is disclosed and using different logins and passwords on federal websites to conduct business.

It’s crucial for the administration, Congress and the public to recognize the cybersecurity dangers that DOGE’s activities pose and take meaningful steps to bring the organization under reasonable control and oversight.The Conversation

Richard Forno, Teaching Professor of Computer Science and Electrical Engineering, and Assistant Director, UMBC Cybersecurity Institute, University of Maryland, Baltimore County

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Read More

The post Is DOGE a cybersecurity threat? A security expert explains the dangers of violating protocols and regulations that protect government computer systems appeared first on theconversation.com

The Conversation

Scientists found a potential sign of life on a distant planet – an astronomer explains why many are still skeptical

Published

on

theconversation.com – Daniel Apai, Associate Dean for Research and Professor of Astronomy and Planetary Sciences, University of Arizona – 2025-04-18 17:44:00

An illustration of the exoplanet K2-18b, which some research suggests may be covered by deep oceans.
NASA, ESA, CSA, Joseph Olmsted (STScI)

Daniel Apai, University of Arizona

A team of astronomers announced on April 16, 2025, that in the process of studying a planet around another star, they had found evidence for an unexpected atmospheric gas. On Earth, that gas – called dimethyl sulfide – is mostly produced by living organisms.

In April 2024, the James Webb Space Telescope stared at the host star of the planet K2-18b for nearly six hours. During that time, the orbiting planet passed in front of the star. Starlight filtered through its atmosphere, carrying the fingerprints of atmospheric molecules to the telescope.

A diagram showing planets and stars emitting light, which goes through JWST detectors, where it's split into different wavelengths to make a spectrum. Each spectrum suggests the presence of a different element.
JWST’s cameras can detect molecules in the atmosphere of a planet by looking at light that passed through that atmosphere.
European Space Agency

By comparing those fingerprints to 20 different molecules that they would potentially expect to observe in the atmosphere, the astronomers concluded that the most probable match was a gas that, on Earth, is a good indicator of life.

I am an astronomer and astrobiologist who studies planets around other stars and their atmospheres. In my work, I try to understand which nearby planets may be suitable for life.

K2-18b, a mysterious world

To understand what this discovery means, let’s start with the bizarre world it was found in. The planet’s name is K2-18b, meaning it is the first planet in the 18th planetary system found by the extended NASA Kepler mission, K2. Astronomers assign the “b” label to the first planet in the system, not “a,” to avoid possible confusion with the star.

K2-18b is a little over 120 light-years from Earth – on a galactic scale, this world is practically in our backyard.

Although astronomers know very little about K2-18b, we do know that it is very unlike Earth. To start, it is about eight times more massive than Earth, and it has a volume that’s about 18 times larger. This means that it’s only about half as dense as Earth. In other words, it must have a lot of water, which isn’t very dense, or a very big atmosphere, which is even less dense.

Astronomers think that this world could either be a smaller version of our solar system’s ice giant Neptune, called a mini-Neptune, or perhaps a rocky planet with no water but a massive hydrogen atmosphere, called a gas dwarf.

Another option, as University of Cambridge astronomer Nikku Madhusudhan recently proposed, is that the planet is a “hycean world”.

That term means hydrogen-over-ocean, since astronomers predict that hycean worlds are planets with global oceans many times deeper than Earth’s oceans, and without any continents. These oceans are covered by massive hydrogen atmospheres that are thousands of miles high.

Astronomers do not know yet for certain that hycean worlds exist, but models for what those would look like match the limited data JWST and other telescopes have collected on K2-18b.

This is where the story becomes exciting. Mini-Neptunes and gas dwarfs are unlikely to be hospitable for life, because they probably don’t have liquid water, and their interior surfaces have enormous pressures. But a hycean planet would have a large and likely temperate ocean. So could the oceans of hycean worlds be habitable – or even inhabited?

Detecting DMS

In 2023, Madhusudhan and his colleagues used the James Webb Space Telescope’s short-wavelength infrared camera to inspect starlight that filtered through K2-18b’s atmosphere for the first time.

They found evidence for the presence of two simple carbon-bearing molecules – carbon monoxide and methane – and showed that the planet’s upper atmosphere lacked water vapor. This atmospheric composition supported, but did not prove, the idea that K2-18b could be a hycean world. In a hycean world, water would be trapped in the deeper and warmer atmosphere, closer to the oceans than the upper atmosphere probed by JWST observations.

Intriguingly, the data also showed an additional, very weak signal. The team found that this weak signal matched a gas called dimethyl sulfide, or DMS. On Earth, DMS is produced in large quantities by marine algae. It has very few, if any, nonbiological sources.

This signal made the initial detection exciting: on a planet that may have a massive ocean, there is likely a gas that is, on Earth, emitted by biological organisms.

An illustration of what scientists imagine K2-18b to look like, which looks a little like Earth, with clouds and a translucent surface.
K2-18b could have a deep ocean spanning the planet, and a hydrogen atmosphere.
Amanda Smith, Nikku Madhusudhan (University of Cambridge), CC BY-SA

Scientists had a mixed response to this initial announcement. While the findings were exciting, some astronomers pointed out that the DMS signal seen was weak and that the hycean nature of K2-18b is very uncertain.

To address these concerns, Mashusudhan’s team turned JWST back to K2-18b a year later. This time, they used another camera on JWST that looks for another range of wavelengths of light. The new results – announced on April 16, 2025 – supported their initial findings.

These new data show a stronger – but still relatively weak – signal that the team attributes to DMS or a very similar molecule. The fact that the DMS signal showed up on another camera during another set of observations made the interpretation of DMS in the atmosphere stronger.

Madhusudhan’s team also presented a very detailed analysis of the uncertainties in the data and interpretation. In real-life measurements, there are always some uncertainties. They found that these uncertainties are unlikely to account for the signal in the data, further supporting the DMS interpretation. As an astronomer, I find that analysis exciting.

Is life out there?

Does this mean that scientists have found life on another world? Perhaps – but we still cannot be sure.

First, does K2-18b really have an ocean deep beneath its thick atmosphere? Astronomers should test this.

Second, is the signal seen in two cameras two years apart really from dimethyl sulfide? Scientists will need more sensitive measurements and more observations of the planet’s atmosphere to be sure.

Third, if it is indeed DMS, does this mean that there is life? This may be the most difficult question to answer. Life itself is not detectable with existing technology. Astronomers will need to evaluate and exclude all other potential options to build their confidence in this possibility.

The new measurements may lead researchers toward a historic discovery. However, important uncertainties remain. Astrobiologists will need a much deeper understanding of K2-18b and similar worlds before they can be confident in the presence of DMS and its interpretation as a signature of life.

Scientists around the world are already scrutinizing the published study and will work on new tests of the findings, since independent verification is at the heart of science.

Moving forward, K2-18b is going to be an important target for JWST, the world’s most sensitive telescope. JWST may soon observe other potential hycean worlds to see if the signal appears in the atmospheres of those planets, too.

With more data, these tentative conclusions may not stand the test of time. But for now, just the prospect that astronomers may have detected gasses emitted by an alien ecosystem that bubbled up in a dark, blue-hued alien ocean is an incredibly fascinating possibility.

Regardless of the true nature of K2-18b, the new results show how using the JWST to survey other worlds for clues of alien life will guarantee that the next years will be thrilling for astrobiologists.The Conversation

Daniel Apai, Associate Dean for Research and Professor of Astronomy and Planetary Sciences, University of Arizona

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Read More

The post Scientists found a potential sign of life on a distant planet – an astronomer explains why many are still skeptical appeared first on theconversation.com

Continue Reading

The Conversation

As views on spanking shift worldwide, most US adults support it, and 19 states allow physical punishment in schools

Published

on

theconversation.com – Christina Erickson, Associate Dean in the College of Nursing and Professional Disciplines, University of North Dakota – 2025-04-18 07:39:00

Spanking in the U.S. generally ends around age 12, when children become big enough to resist or fight back.
Sandro Di Carlo Darsa/Brand X Pictures via Getty Images

Christina Erickson, University of North Dakota

Nearly a half-century after the Supreme Court ruled that school spankings are permissible and not “cruel and unusual punishment”, many U.S. states allow physical punishment for students who have misbehaved.

Today, over a third of the states allow teachers to paddle or spank students. More than 100,000 students are paddled in U.S. schools each year.

Christina Erickson, an associate dean and professor of social work at the University of North Dakota, wrote a book on the subject: “Spanked: How Hitting Our Children is Harming Ourselves.” She discussed the scope of the practice and its effects with The Conversation.

What spanking legislation exists worldwide?

Around the world, 68 countries have banned the hitting of children in any form, including spanking. This movement began in 1979 with Sweden’s ban on all forms of physical punishment, including spanking in any setting, and including in the family home.

The pace of change quickened in the early 2000s when more countries adopted similar laws. For example, the legal language of countries like Nepal rests on an emerging definition of children as rights holders similar to adults and as humans worth protecting from harm.

Back view of students sitting at desks inside a classroom.
Spanking in schools is legal in 19 states.
Maskot/Getty Images

What are US policies toward spanking?

Each state in the U.S. has its own child abuse laws, and all states, tribes and territories aim to protect children from abuse. But all state laws also allow parents to hit their children if it does not leave an injury or a mark.

A typical example is Oklahoma’s definition of child abuse and neglect. It includes an exception that permits parents to use ordinary force as a means of discipline, including spanking, using an implement like a switch or a paddle. However, leaving evidence of hitting, such as welts, bruises, swelling or lacerations, is illegal and considered child abuse in all states.

Parental spanking of children is considered unique from other physical violence because of the relational context and the purpose. Laws entitle parents to hit their children for the purpose of teaching a lesson or punishing them to improve behavior. Children are the only individuals in society who can be hit by another person and the law does not regard it as assault.

Spanking’s impact on a child is unfortunately similar to abusive hitting. Spanking has been labeled as an “Adverse Childhood Experience,” or ACE. These are events that cause poor health outcomes over the span of one’s life.

The practice of spanking also affects parents. Acceptance of the physical discipline of spanking puts parents at risk for the escalation of physical punishment that leads to abuse.

Parents who spank their child have the potential to abuse them and be caught in a legal and child protection system that aims to protect children from harm. It is unclear what triggers a parent to cross over from discipline into abuse. Research shows that spanking at a young age, such as a 1-year-old, increases the chance of involvement by Child Protective Services by 33%.

Some school districts require permission from parents to allow disciplinary paddling in school, while others do not require any communication. State law does not assure agreement between parents and school districts on what offenses warrant a paddling. Parents may feel they have no alternative but to keep their child in school, or fear reprisal from school administrators. Some students are old enough to denounce the punishment themselves.

YouTube video
In this school district, physical punishment is used only when parents give written permission.

Is spanking considered the same as hitting?

The term spank conceals the concept of hitting and is so commonplace it goes unquestioned, despite the fact that it is a grown adult hitting a person much smaller than them. The concept is further concealed because hitting a child’s bottom hides any injuries that may occur.

Types of hitting that are categorized as spanking have narrowed over the years but still persist. Some parents still use implements such as tree switches, wooden spoons, shoes or paddles to “spank” children, raising the chances for abuse.

Most spanking ends by the age of 12, partly because children this age are able to fight back. When a child turns 18, parental hitting becomes the same as hitting any other adult, a form of domestic violence or assault throughout the U.S.

There is a lack of a consistent understanding of what constitutes a spanking. The definition of spanking is unique to each family. The number of hits, clothed or not, or using an implement, all reflect geographical or familial differences in understanding what a spanking is.

How do US adults view spanking?

People in the United States generally accept spanking as part of raising children: 56% of U.S. adults strongly agree or agree that “… it is sometimes necessary to discipline a child with a good, hard spanking.” This view has been slowly changing since 1986, when 83% of adults agreed with that statement.

The laws worldwide that protect children from being hit usually begin by disallowing nonparental adults to hit children. This is happening in the U.S. too, where 31 states have banned paddling in schools.

At a national level, efforts have been made to end physical punishment in schools. However, 19 states still allow spanking of children in public schools, which was upheld by a 1977 Supreme Court case.

With the slow but steady drop of parents who believe that sometimes children need a good hard spanking, as well as the ban of paddling in schools in 31 states, one could argue that the U.S. is moving toward a reduction in spanking.

What does research say about spanking?

Spanking’s negative influence on children’s behavior has been documented for decades. Spanking seems to work in the moment when it comes to changing or stopping the immediate behavior, but the negative effects are hidden in the short term and occur later in the child’s life. Yet because the spanking seemed to work at the time, the parent doesn’t connect the continued bad behavior of the child to the spanking.

An abundance of research shows that spanking causes increased negative behaviors in childhood. Spanking lowers executive functioning for children, increases dating violence as teenagers and even increases struggles with mental health and substance abuse in adulthood. Spanking does not teach new or healthy behaviors, and is a stress-inducing event for the child and the adult hitting them.

No studies have shown positive long-term benefits from spanking. Because of the long-standing and expansive research findings showing a range of harm from spanking and the increased association with child abuse, the American Psychological Association recommends that parents should never spank their children.

What are some resources for parents?

Consider these questions when choosing a discipline method for your child:

  • Is the expectation of your child developmentally accurate? One of the most common reasons parents spank is because they are expecting a behavior the child is not developmentally able to execute.

  • Can the discipline you choose grow with your child? Nearly all spanking ends by age 12, when kids are big enough to fight back. Choose discipline methods you can use over the long term, such as additional chores, apologies, difficult conversations and others that can grow with your child.

  • Might there be another explanation for your child’s behavior? Difficulty of understanding, fear or miscommunication? Think of your child as a learner and use a growth mindset to help your child learn from their life experiences.

Parents are the leaders of their families. Good leaders show strength in nonthreatening ways, listen to others and explain their decisions. Don’t spoil your kids. But being firm does not have to include hitting.

Is spanking children good for parents?

Doubtful. Parents who hit their kids may be unaware that it influences their frustration in other relationships. Expressing aggression recharges an angry and short-tempered internal battery that transfers into other parts of the adults’ lives.

Practicing calm when with your children will help you be calmer at work and in your other relationships. Listening to and speaking with a child about challenges, even from a very early age, is the best way to make it part of your relationship for the rest of your life.

Choose a method that allows you to grow. Parents matter too.The Conversation

Christina Erickson, Associate Dean in the College of Nursing and Professional Disciplines, University of North Dakota

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Read More

The post As views on spanking shift worldwide, most US adults support it, and 19 states allow physical punishment in schools appeared first on theconversation.com

Continue Reading

The Conversation

How does your brain create new memories? Neuroscientists discover ‘rules’ for how neurons encode new information

Published

on

theconversation.com – William Wright, Postdoctoral Scholar in Neurobiology, University of California, San Diego – 2025-04-17 13:00:00

Neurons that fire together sometimes wire together.
PASIEKA/Science Photo Library via Getty Images

William Wright, University of California, San Diego and Takaki Komiyama, University of California, San Diego

Every day, people are constantly learning and forming new memories. When you pick up a new hobby, try a recipe a friend recommended or read the latest world news, your brain stores many of these memories for years or decades.

But how does your brain achieve this incredible feat?

In our newly published research in the journal Science, we have identified some of the “rules” the brain uses to learn.

Learning in the brain

The human brain is made up of billions of nerve cells. These neurons conduct electrical pulses that carry information, much like how computers use binary code to carry data.

These electrical pulses are communicated with other neurons through connections between them called synapses. Individual neurons have branching extensions known as dendrites that can receive thousands of electrical inputs from other cells. Dendrites transmit these inputs to the main body of the neuron, where it then integrates all these signals to generate its own electrical pulses.

It is the collective activity of these electrical pulses across specific groups of neurons that form the representations of different information and experiences within the brain.

Diagram of neuron, featuring a relatively large cell body with a long branching tail extending from it
Neurons are the basic units of the brain.
OpenStax, CC BY-SA

For decades, neuroscientists have thought that the brain learns by changing how neurons are connected to one another. As new information and experiences alter how neurons communicate with each other and change their collective activity patterns, some synaptic connections are made stronger while others are made weaker. This process of synaptic plasticity is what produces representations of new information and experiences within your brain.

In order for your brain to produce the correct representations during learning, however, the right synaptic connections must undergo the right changes at the right time. The “rules” that your brain uses to select which synapses to change during learning – what neuroscientists call the credit assignment problem – have remained largely unclear.

Defining the rules

We decided to monitor the activity of individual synaptic connections within the brain during learning to see whether we could identify activity patterns that determine which connections would get stronger or weaker.

To do this, we genetically encoded biosensors in the neurons of mice that would light up in response to synaptic and neural activity. We monitored this activity in real time as the mice learned a task that involved pressing a lever to a certain position after a sound cue in order to receive water.

We were surprised to find that the synapses on a neuron don’t all follow the same rule. For example, scientists have often thought that neurons follow what are called Hebbian rules, where neurons that consistently fire together, wire together. Instead, we saw that synapses on different locations of dendrites of the same neuron followed different rules to determine whether connections got stronger or weaker. Some synapses adhered to the traditional Hebbian rule where neurons that consistently fire together strengthen their connections. Other synapses did something different and completely independent of the neuron’s activity.

Our findings suggest that neurons, by simultaneously using two different sets of rules for learning across different groups of synapses, rather than a single uniform rule, can more precisely tune the different types of inputs they receive to appropriately represent new information in the brain.

In other words, by following different rules in the process of learning, neurons can multitask and perform multiple functions in parallel.

Future applications

This discovery provides a clearer understanding of how the connections between neurons change during learning. Given that most brain disorders, including degenerative and psychiatric conditions, involve some form of malfunctioning synapses, this has potentially important implications for human health and society.

For example, depression may develop from an excessive weakening of the synaptic connections within certain areas of the brain that make it harder to experience pleasure. By understanding how synaptic plasticity normally operates, scientists may be able to better understand what goes wrong in depression and then develop therapies to more effectively treat it.

Microscopy image of mouse brain cross-section with lower middle-half dusted green
Changes to connections in the amygdala – colored green – are implicated in depression.
William J. Giardino/Luis de Lecea Lab/Stanford University via NIH/Flickr, CC BY-NC

These findings may also have implications for artificial intelligence. The artificial neural networks underlying AI have largely been inspired by how the brain works. However, the learning rules researchers use to update the connections within the networks and train the models are usually uniform and also not biologically plausible. Our research may provide insights into how to develop more biologically realistic AI models that are more efficient, have better performance, or both.

There is still a long way to go before we can use this information to develop new therapies for human brain disorders. While we found that synaptic connections on different groups of dendrites use different learning rules, we don’t know exactly why or how. In addition, while the ability of neurons to simultaneously use multiple learning methods increases their capacity to encode information, what other properties this may give them isn’t yet clear.

Future research will hopefully answer these questions and further our understanding of how the brain learns.The Conversation

William Wright, Postdoctoral Scholar in Neurobiology, University of California, San Diego and Takaki Komiyama, Professor of Neurobiology, University of California, San Diego

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Read More

The post How does your brain create new memories? Neuroscientists discover ‘rules’ for how neurons encode new information appeared first on theconversation.com

Continue Reading

Trending