Hackers Are Breaking into Medical Databases to Protect Patient Data
Hackers Are Breaking into Medical Databases to Protect Patient Data
Agencies such as the NIH reward the discovery of vulnerabilities in their computer systems—before criminals can exploit them.
Hackers Are Breaking into Medical Databases to Protect Patient Data
Hackers Are Breaking into Medical Databases to Protect Patient Data

Agencies such as the NIH reward the discovery of vulnerabilities in their computer systems—before criminals can exploit them.

Agencies such as the NIH reward the discovery of vulnerabilities in their computer systems—before criminals can exploit them.

computer programming
Researchers React to Microsoft’s Acquisition of GitHub
Researchers React to Microsoft’s Acquisition of GitHub
Anna Azvolinsky | Jun 7, 2018
Computational biologists are optimistic that the purchase of the world’s largest hub for open-source computer code will not affect the way they use GitHub for science.
Parasitologist, Reprogrammed: A Profile of David Roos
Parasitologist, Reprogrammed: A Profile of David Roos
Anna Azvolinsky | Mar 1, 2018
After discovering a novel organelle found in protozoan parasites, the University of Pennsylvania’s Roos created a widely used eukaryotic pathogen database.
Researchers Hijack a Computer Using DNA Malware
Researchers Hijack a Computer Using DNA Malware
Catherine Offord | Aug 11, 2017
Malicious code written with nucleic acids could one day threaten sequencing facilities, the team warns.
Learning Bioinformatics
Learning Bioinformatics
Esther Landhuis | Jul 1, 2016
In today’s data-heavy research environment, wet-lab scientists can benefit from new computational skills.
Get With the Program
Get With the Program
Jeffrey M. Perkel | Aug 1, 2015
DIY tips for adding coding to your analysis arsenal
Mistaken Identities
Mistaken Identities
Kerry Grens | Jan 1, 2015
Researchers are working to automate the arduous task of identifying—and amending—mislabeled sequences in genetic databases.
A Face to Remember
A Face to Remember
Sarah Lewin | Apr 17, 2014
Researchers show that a tuning algorithm can make one’s profile photo more memorable.
Ada Lovelace Day
Ada Lovelace Day
Abby Olena | Oct 15, 2013
Scientists around the world celebrate the computing pioneer by focusing on women in STEM.
Identifying Wolves by Their Howls
Identifying Wolves by Their Howls
Kate Yandell | Jul 23, 2013
Researchers can tell wolves apart by analyzing the pitch and volume of their vocalizations.