The Conversation
-
We’re simply having an analogue Christmas time
We’ve found that despite the torrent of phones, tablets, laptops and other gizmos that might be given as gifts, the Christmas holiday has not yet been thoroughly infiltrated by technology […]
-
Milk bottle-raiding birds pass on thieving ways to their flock
Great tits are opportunistic copycats. Entire populations can be found performing the same arbitrary behaviour simply because birds copy one another, following a fashion. And it’s this behaviour, reported in […]
-
Where’s the proof in science? There is none
What do we actually mean by research and how does it help inform our understanding of things? Those people looking for proof to come from any research in science will […]
-
Monster telescope needs mind-bending mathematics to uncover secrets of the universe
The Square Kilometre Array (SKA) will be made up of an unprecedented number of antennae spread across two continents for the first time (Australia and Africa). The SKA will see the […]
-
Clumped cancer cells spread more efficiently through the body than lone ones
Nine out of ten cancer patients die because cancer cells enter the blood circulation, spread and form tumours at distant organs. In circulation, cells can move individually or in a […]
-
Spiders disguise themselves as ants to hide and hunt their prey
All spiders are predators, but most of them are small and have rudimentary defences against larger animals that in turn prey on them. Spiders have thus evolved a range of […]
-
Playing video games is good for your brain – here’s how
To add to a long line of studies demonstrating the more positive effects of video games is a study in the Proceedings of the National Academy of Sciences by Vikranth Bejjanki […]
-
Scientific research can be prone to bubbles too – neuroscience risks being the next one
Science, like any other field that attracts investment, is prone to bubbles. Overly optimistic investments in scientific fields, research methods and technologies generate episodes comparable to those experienced by financial […]
-
In cybersecurity, the weakest link is … you
A chain is only as strong as its weakest link. Computer security relies on a great number of links, hardware, software and something else altogether: you. The greatest threat to […]