The BBVA Foundation awarded three MIT professors Frontiers of Knowledge Awards for their work in climate change, biology and biomedicine, and quantum computation. Department of Earth, Atmospheric, and Planetary Sciences Professor Kerry A. Emanuel, Department of Biology Professor David Sabatini, and Department of Mathematics Professor Peter Shor were recognized in the 12th edition of this annual award.
Kerry Emanuel
Emanuel, the Cecil and Ida Green Professor of Atmospheric Science, earned the BBVAs Climate Change award for his fundamental contributions to the understanding of tropical cyclones and how they are affected by climate change, according to the committees citation. By understanding the essential physics of atmospheric convection he has unraveled the behavior of tropical cyclones hurricanes and typhoons as our climate changes. He was also lauded for extraordinary effectiveness in communicating the science of climate change to the public and policymakers.
Emanuel is the co-founder (with Daniel H. Rothman) and co-director of the MIT Lorenz Center, a climate think tank that fosters creative approaches to learning how climate works. He was the first to link greater hurricane intensity to climate change-induced warming of sea surface waters.
It is hard to imagine an area of climate science where one persons leadership is so incontestable, says Bjorn Stevens, BBVA Foundation committee chairman and director of the Max Planck Institute for Meteorology.
Hurricanes have long been known as destructive natural events, but the underlying physics of them was still largely unknown. Throughout the 1980s and 1990s, after completing degrees at MIT and later joining the EAPS faculty, Emanuel pinned down the mechanisms behind hurricanes. In his research detailing how warming surface oceans fuel storms and increase the intensity, he called them massive, natural machines that convert the heat they extract from the ocean into wind energy.
A changing climate will see more powerful hurricanes. Emanuel warns that this will complicate the already-tough task of making accurate forecasts, and predicts that hurricanes will spread into more regions of the planet.
His models currently predict a 5 percent increase in hurricane intensity (i.e., wind speed) for each 1-degree rise in ocean temperatures. Three degrees of warming would makehurricanes 15 percent more intense, but their destructive potential would actually triple; in other words, with this15percent increasein wind speed, thedamage would increase by around 45 percent, says Emanuel, the author of "Divine Wind: The History and Science of Hurricanes" (Oxford Unviersity Press, 2005) and "What We Know about Climate Change" (MIT Press, 2018).
Todays most intense hurricanes may have a wind speed at the surface of 85 meters per second, but by the end of this century, unless we curb greenhouse gas emissions, we could start to see speeds of up to 90-92 meters per second. A hurricanes destructive potential is determined by its wind speed, so in fact, the destructiveness of these storms for human populations would be considerably greater.
Emanuel says that the international community is not doing nearly enough to combat climate change. We need to stop listening to the voices of denial, and instead listen to our own children, who are crying out for us to act.
David Sabatini
Sabatini, an MIT professor of biology and member of the Whitehead Institute for Biomedical Research and the Koch Institute for Integrative Cancer Research, shares his Frontiers of Knowledge Award in Biology and Biomedicine with Michael Hall of the University of Basel, for the discovery of a protein kinase that regulates cellular metabolism and growth.
Their discovery of mTOR is used in the study of a wide array of health conditions, including obesity, aging, cancer, diabetes, epilepsy, Alzheimers, and Parkinsons. Research has suggested that 60 percent of cancers have some mechanism for turning on the mTOR pathway, Sabatini says. I could never have imagined the implications of that first discovery.
Sabatini began his PhD thesis on understanding the mechanism of action of rapamycin, a natural anti-fungal agent proved to have immunosuppressive and anti-cancer properties. It is used to prevent organ rejection in transplant patients.
The two scientists arrived at their findings independently. Hall discovered the target of rapamycin (TOR) protein in yeast cells in 1993 during his time as a senior investigator; Sabatini isolated it in mammals while still a doctoral student, in 1994, and gave it the name mTOR.
In mammalian cells, mTOR which stands for mechanistic target of rapamycin, an immunosuppressant drug that inhibits cell growth is the keystone molecule in a pathway that regulates cellular metabolic processes in response to nutrients.
Sabatini explains that mTOR is a switch that turns on in the presence of nutrients, so the body can build material, and when there are no nutrients available it breaks the material down. The on/off switch of the mTOR switch controls a cascade of hundreds of molecular signals, many of which are still unknown to science.
The molecular mechanisms that regulate the growth of organisms and coordinate it with the availability of nutrients were unknown until two decades ago, said the committee.
After the molecule was isolated in yeast and mammals, both researchers began the task of unraveling its multiple organismal functions. Sabatinis lab has since identified most of the components of the mTOR pathway and shown how they contribute to the function of cells and organisms. His discoveries have opened avenues for identifying disease vulnerabilities and treatment targets for diverse conditions notably including key metabolic vulnerabilities in pancreatic and ovarian cancer cells and neurodevelopmental defects. He is currently working to exploit those vulnerabilities as targets for new therapies.
Rapamycin is used as an immunosuppressant to prevent rejection of transplanted organs and as an anti-cancer agent. In the treatment of cardiovascular diseases, it is used as a coating for coronary stents to stop new blockages forming in the bloodstream.
Because mTOR is a nutrient sensor, additional research points to caloric restriction for increasing longevity. TOR was the first known protein that influences longevity in all of the four species that scientists commonly use to study aging: yeast, worms, flies, and mice. We are just scratching the surface of possible mTOR applications, he says. I dont know if it will help us live to be 120, but I think it will have beneficial effects on different physiological systems, and I am practically sure that it will ameliorate aspects of aging-related diseases.
Peter Shor
Shor, the Morss Professor of Applied Mathematics, was recognized in the Basic Sciences category for his role in the development of quantum computation and cryptology. He shares this award with IBM Researchs chemical physicist Charles H. Bennett and University of Montreal computer scientist Gilles Brassard.
The award committeeremarked on the leap forward in quantum technologies, an advance that draws heavily on the new laureates pioneering contributions. The committee stated that their work spans multiple disciplines and brings together concepts from mathematics, physics, and computer science. Their ideas are playing a key role in the development of quantum technologies for communication and computation.
Bennett and Brassard invented quantum cryptography in the 1980s to ensure the physical inviolability of data communications. The importance of this work became apparent 10 years later when Shor discovered that a hypothetical quantum computer would render effectively useless the conventional cryptography systems underpinning the privacy and security of todays internet communications.
Bennett and Brassards BB84 protocol generally acknowledged as the first practical application of the science of quantum information underpins the security of all our internet communications and transactions, and is based on the existence of mathematical problems that computers cannot solve. Until, as the citation states, Shor discovered that quantum computers could factorize integers much faster than any supercomputer, therefore compromising the security of conventional cryptographic schemes.
Says Brassard, The importance of our work became much more evident after Shor destroyed everything else. Shors Algorithm is now one of the quantum algorithms that comprise the fast-developing language to be spoken by tomorrows quantum computers.
Another of Shors contributions is an algorithm used to correct quantum computer errors, an essential requirement for enabling and scaling quantum computations, the committee wrote.
Quantum computers are exposed to a large volume of noise, causing numerous errors. Everyone thought that you couldnt correct errors on quantum computers, recalls Shor, because as soon as you try to measure a quantum system you disturb it. In other words, if you try to measure the error so as to correct it, you disturb it and computation is interrupted. My algorithm showed that you can isolate and fix the error and still preserve the computation.
Quantum cryptography is one of the most advanced branches of quantum technology, which the laureates view as a long-term prospect. It will be five or 10 years before a quantum computer can do anything approaching useful, says Shor. With time, however, he is convinced that these machines will deliver revolutionary applications. For example, in biomedicine, it takes enormous amounts of computer time to simulate the behavior of molecules, he says. But quantum computers could achieve that, and help design new drugs.
The BBVA Foundation promotes knowledge based on research and artistic and cultural creation, and supports activity on the analysis of emerging issues in five strategic areas: environment, biomedicine and health, economy and society, basic sciences and technology, and culture. The Frontiers of Knowledge Awards, spanning eight prize categories, recognize research and creative work of excellence as embedded in theoretical advances, technological developments, or innovative artistic works and styles, as well as fundamental contributions in addressing key challenges of the 21st century.
Since its launch in 2009, the BBVA also has given awards to MITs Susan Solomon for climate change; Marvin Minsky, Adi Shamir,Silvio Micali,Shafi Goldwasser, and Ronald Rivest for information and computer technologies; Stephen Buchwald for basic sciences; Edward Boyden for biology and biomedicine; and Daron Acemoglu for economics.
See the rest here:
Kerry Emanuel, David Sabatini, and Peter Shor receive BBVA Frontiers of Knowledge awards - MIT News
- To Foil NSA Spies, Encrypt Everything [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- What is cryptography? - A Word Definition From the ... [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- cryptography: Definition from Answers.com [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography - Wikipedia, the free encyclopedia [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography - CISSP Domain 07 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography Advanced Encryption Standard AES Tutorial,fips 197 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Faraday Project for Network Security and Cryptography - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- An Overview of Cryptography - Gary C. Kessler [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- An Open Letter from US Researchers in Cryptography and ... [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets Part 4 8 Private Key Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets Part 1 8 What is Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Public Key Cryptography RSA Encryption Algorithm - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Public Key Cryptography Diffie Hellman Key Exchange - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Intro to Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Caesar Cipher Ancient Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- 50 top US cyber security experts write open letter calling for end to NSA 'snoop-ops' [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Prominent cryptography and security researchers deplore NSA's surveillance activities [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- Obama Stays Silent on Reform of NSA's Crypto Subversion [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography experts sign open letter against NSA surveillance [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- US crypto researchers to NSA: If you must track, track responsibly [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Java Cryptography Architecture (JCA) Overview - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography - Part 1 - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography - Part 2 - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- International Journal on Cryptography and Information Security ( IJCIS) - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Bitcoin Lowdown: Block Chain Cryptography Trumps Human Trust, Deal With It - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Bitcoin Lowdown: Block Chain Cryptography Trumps Human Trust - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- NSA and GCHQ spoofed LinkedIn to hack Belgian cryptography professor [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Lecture 17: Elliptic Curve Cryptography (ECC) - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Cryptography event - Pravega 2014 - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Lecture 1: Introduction to Cryptography - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- US and UK spy agencies accused of swoop on Belgian cryptography expert [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Conceal: Facebook's new Java APIs for cryptography on Android [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Cryptography Apps: How To Keep Your Personal Info Private [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Cryptography Breakthrough Could Make Software Unhackable [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Oi, Android devs! Facebook wants your apps to be more secure [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Lecture 19: Elgamal Digital Signature - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Lecture 18: Digital Signatures and Security Services - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Cryptography 1. List some of the attacks on the Diffie ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography Breakthrough Could Make Software Unhackable ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography: Secret Coding, Spying, and E-Commerce - Video [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography - Video [Last Updated On: February 9th, 2014] [Originally Added On: February 9th, 2014]
- Public Key Cryptography: RSA Encryption Algorithm - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Is Bitcoin Anonymous? Arvind Narayanan | Princeton University | Real World Cryptography Workshop - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- A Competitive Study of Cryptography Techniques over Block Cipher - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- How Quantum Computing Will Change Cryptography [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- REALITY LOST - EXCERPT SIX (QUANTUM CRYPTOGRAPHY) - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Introduction to Cryptography of Bitcoin, Explained! - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- [FOSDEM 2014] USE OTR or how we learned to start worrying and love cryptography - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- Reshif's Cryptography Challenge Solution/Walkthrough - Video [Last Updated On: February 20th, 2014] [Originally Added On: February 20th, 2014]
- [DEFCON 19] Steganography and Cryptography 101 - Video [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- A Brief Rundown Of The Spying Questions Intel's CEO Won't Answer [Last Updated On: February 25th, 2014] [Originally Added On: February 25th, 2014]
- DEF CON 8 - Jon Erickson - Number Theory Complexity, Theory, Cryptography, and Quantum Computing. - Video [Last Updated On: February 26th, 2014] [Originally Added On: February 26th, 2014]
- Was YOUR iPhone at risk of being hacked? Bug in Apple update left mobiles open to identity theft for up to 18 months ... [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- Security researchers urge tech companies to explain their cryptographic choices [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- Apple reveals algorithm behind 'encrypted' iMessages [Last Updated On: February 28th, 2014] [Originally Added On: February 28th, 2014]
- Wiliest Ways to Keep the NSA at Bay [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- How to Pronounce Cryptography - Video [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- cryptography in DNS - Video [Last Updated On: March 3rd, 2014] [Originally Added On: March 3rd, 2014]
- Who is the reclusive billionaire creator of Bitcoin? [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- How to say cryptography in Italian - Video [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- Massive Linux security flaw dwarfs Appleās cryptography problems of just last week [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Security lessons from RSA [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Visual Cryptography - Video [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Classical Computing Embraces Quantum Ideas [Last Updated On: March 6th, 2014] [Originally Added On: March 6th, 2014]
- Quantum Cryptography Conquers Noise Problem [Last Updated On: March 6th, 2014] [Originally Added On: March 6th, 2014]
- REALITY LOST Bonus scene 4. Quantum cryptography Founding Fathers. - Video [Last Updated On: March 7th, 2014] [Originally Added On: March 7th, 2014]
- Quantum Cryptography: From Theory to Practice - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Forcing Trust: Nonlocal Games and Untrusted-device Cryptography - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- TrustyCon 2014 - New Frontiers in Cryptography - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- REALITY LOST Bonus scene 3. Christian Kurtsiefer on hacking quantum cryptography. - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Nerlens Noel Tweets Date for Potential NBA Debut [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- CISSP SG Cryptography - Video [Last Updated On: March 10th, 2014] [Originally Added On: March 10th, 2014]
- More secure communications thanks to quantum physics [Last Updated On: March 13th, 2014] [Originally Added On: March 13th, 2014]
- New Cryptography Scheme Secured By Quantum Physics [Last Updated On: March 13th, 2014] [Originally Added On: March 13th, 2014]
- History Of Cryptography - Video [Last Updated On: March 14th, 2014] [Originally Added On: March 14th, 2014]
- avc 19 Cryptography x264 - Video [Last Updated On: March 15th, 2014] [Originally Added On: March 15th, 2014]
- Edward Snowden Speaks at SXSW [Last Updated On: April 10th, 2017] [Originally Added On: March 15th, 2014]
- Tor is building an anonymous instant messenger [Last Updated On: April 10th, 2017] [Originally Added On: March 15th, 2014]
- learn cryptography learn the following pkcs refrences - Video [Last Updated On: March 16th, 2014] [Originally Added On: March 16th, 2014]
- [Lec-2][Part-2] Shift Cipher - Symmetric ciphers - Video [Last Updated On: March 16th, 2014] [Originally Added On: March 16th, 2014]