As worms and jellyfish wriggle, new AI tools track their neurons
Peer-Reviewed Publication
Updates every hour. Last Updated: 24-Feb-2026 13:11 ET (24-Feb-2026 18:11 GMT/UTC)
Orbitronics devices use an electron’s orbital angular momentum to store and process more information, much more efficiently. Typically, generating orbital currents requires magnetic metals that are heavy and expensive. For the first time ever, researchers prove that atomic vibrations can transfer orbital angular momentum directly to electrons in a non-magnetic material, quartz. The method will work on other chiral materials, such as tellurium, selenium and hybrid organic/inorganic perovskites, and is the most streamlined system yet for orbitronics research.
AI users and developers can now measure the amount of electricity various AI models consume to complete tasks with open-source software and an online leaderboard developed at the University of Michigan.
When a plant's immune system is triggered, its growth is stunted. Colorado State University researchers have discovered how to turn on a hormone that allows plants to keep growing as they defend against disease and pests – a breakthrough that could increase crop production.
A new project in the School of Information Sciences at the University of Illinois aims to strengthen research security by using structured role-playing games (RPG) to model the threats facing academic research environments. The NSF-funded project, titled "REDTEAM: Research Environment Defense Through Expert Attack Modeling," addresses a growing challenge: balancing the open, collaborative nature of academic research with increasing national security risks and sophisticated adversarial threats. Traditional cybersecurity and compliance frameworks often overlook the human factors that shape real-world decision-making in research environments, where collaboration pressures, funding incentives, and international partnerships can introduce unexpected risks. This project aims to help universities better understand these dynamics by examining the human and behavioral dimensions of research security.