Following the people and events that make up the research community at Duke

Students exploring the Innovation Co-Lab

Category: Computers/Technology Page 2 of 19

The Brain Science of Tiny Birds With Amazing Memories

A black-capped chickadee. Dmitriy Aronov, Ph.D., brought wild black-capped chickadees into the lab to study their memories.
Black-Capped Chickadee” by USFWS Mountain Prairie is licensed under CC BY 2.0.

Black-capped chickadees have an incredible ability to remember where they’ve cached food in their environments. They are also small, fast, and able to fly.

So how exactly can a neuroscientist interested in their memories conduct studies on their brains? Dmitriy Aronov, Ph.D., a neuroscientist at the Zuckerman Mind Brain Behavior Institute at Columbia University, visited Duke recently to talk about chickadee memory and the practicalities of studying wild birds in a lab.

Black-capped chickadees, like many other bird species, often store food in hiding places like tree crevices. This behavior is called caching, and the ability to hide food in dozens of places and then relocate it later represents an impressive feat of memory. “The bird doesn’t get to experience this event happening over and over again,” Aronov says. It must instantly form a memory while caching the food, a process that relies on episodic memory. Episodic memory involves recalling specific experiences from the past, and black-capped chickadees are “champions of episodic memory.”

They have to remember not just the location of cached food but also other features of each hiding place, and they often have only moments to memorize all that information before moving on. According to Aronov, individual birds are known to cache up to 5,000 food items per day! But how do they do it?

Chickadees, like humans, rely on the brain’s hippocampus to form episodic memories, and the hippocampus is considerably bigger in food-caching birds than in birds of similar size that aren’t known to cache food. Aronov and his team wanted to investigate how neural activity represents the formation and retrieval of episodic memories in black-capped chickadees.

Step one: find a creative way to study food-caching in a laboratory setting. Marissa Applegate, a graduate student in Aronov’s lab, helped design a caching arena “optimized for chickadee ergonomics,” Aronov says. The arenas included crevices covered by opaque flaps that the chickadees could open with their toes or beaks and cache food in. The chickadees didn’t need any special training to cache food in the arena, Aronov says. They naturally explore crevices and cache surplus food inside.

Once a flap closed over a piece of cached food (sunflower seeds), the bird could no longer see inside—but the floor of each crevice was transparent, and a camera aimed at the arena from below allowed scientists to see exactly where birds were caching seeds. Meanwhile, a microdrive attached to the birds’ tiny heads and connected to a cable enabled live monitoring of their brain activity, down to the scale of individual neurons.

An artistic rendering of one of the cache sites in an arena. “Arenas in my lab have between 64 and 128 of these sites,” Aronov says.
Drawing by Julia Kuhl.

Through a series of experiments, Aronov and his team discovered that “the act of caching has a profound effect on hippocampal activity,” with some neurons becoming more active during caching and others being suppressed. About 35% percent of neurons that are active during caching are consistently either enhanced or suppressed during caching—regardless of which site a bird is visiting. But the remaining 65% of variance is site-specific: “every cache is represented by a unique pattern of this excess activity in the hippocampus,” a pattern that holds true even when two sites are just five centimeters apart—close enough for a bird to reach from one to another.

Chickadees could hide food in any of the sites for retrieval at a future time. The delay period between the caching phase (when chickadees could store surplus food in the cache sites) and the retrieval phase (when chickadees were placed back in the arena and allowed to retrieve food they had cached earlier) ranged from a few minutes to an hour. When a bird returned to a cache to retrieve food, the same barcode-like pattern of neural activity reappeared in its brain. That pattern “represents a particular experience in a bird’s life” that is then “reactivated” at a later time.

Aronov said that in addition to caching and retrieving food, birds often “check” caching sites, both before and after storing food in them. Of course, as soon as a bird opens one of the flaps, it can see whether or not there’s food inside. Therefore, measuring a bird’s brain activity after it has lifted a flap makes it impossible to tell whether any changes in brain activity when it checks a site are due to memory or just vision. So the researchers looked specifically at neural activity when the bird first touched a flap—before it had time to open it and see what was inside. That brain activity, as it turns out, starts changing hundreds of milliseconds before the bird can actually see the food, a finding that provides strong evidence for memory.

What about when the chickadees checked empty caches? Were they making a memory error, or were they intentionally checking an empty site—even knowing it was empty—for their own mysterious reasons? On a trial-by-trial basis, it’s impossible to know, but “statistically, we have to invoke memory in order to explain their behavior,” he said.

A single moment of caching, Aronov says, is enough to create a new, lasting, and site-specific pattern. The implications of that are amazing. Chickadees can store thousands of moments across thousands of locations and then retrieve those memories at will whenever they need extra food.

It’s still unclear how the retrieval process works. From Aronov’s study, we know that chickadees can reactivate site-specific brain activity patterns when they see one of their caches (even when they haven’t yet seen what’s inside). But let’s say a chickadee has stored a seed in the bark of a particular tree. Does it need to see that tree in order to remember its cache site there? Or can it be going about its business on the other side of the forest, suddenly decide that it’s hungry for a seed, and then visualize the location of its nearest cache without actually being there? Scientists aren’t sure.

Post by Sophie Cox, Class of 2025

How Research Helped One Pre-med Discover a Love for Statistics and Computer Science

If you’re a doe-eyed first-year at Duke who wants to eventually become a doctor, chances are you are currently, or will soon, take part in a pre-med rite of passage: finding a lab to research in.

Most pre-meds find themselves researching in the fields of biology, chemistry, or neuroscience, with many hoping to make research a part of their future careers as clinicians. Undergraduate student and San Diego native Eden Deng (T’23) also found herself plodding a similar path in a neuroimaging lab her freshman year.

Eden Deng T’23

At the time, she was a prospective neuroscience major on the pre-med track. But as she soon realized, neuroimaging is done through fMRI. And to analyze fMRI data, you need to be able to conduct data analysis.

This initial research experience at Duke in the Martucci Lab, which looks at chronic pain and the role of the central nervous system, sparked a realization for Deng. “Ninety percent of my time was spent thinking about computational and statistical problems,” she explained to me. Analysis was new to her, and as she found herself struggling with it, she thought to herself, “why don’t I spend more time getting better at that academically?”

Deng at the Martucci Lab

This desire to get better at research led Deng to pursue a major in Statistics with a secondary in Computer Science, while still on the pre-med track. Many people might instantly think about how hard it must be to fit in so much challenging coursework that has virtually no overlap. And as Deng confirmed, her academic path not been without challenges.

For one, she’s never really liked math, so she was wary of getting into computation. Additionally, considering that most Statistics and Computer Science students want to pursue jobs in the technology industry, it’s been hard for her to connect with like-minded people who are equally familiar with computers and the human body.

“I never felt like I excelled in my classes,” Deng said. “And that was never my intention.” Deng had to quickly get used to facing what she didn’t know head-on. But as she kept her head down, put in the work, and trusted that eventually she would figure things out, the merits of her unconventional academic path started to become more apparent.

Research at the intersection of data and health

Last summer, Deng landed a summer research experience at Mount Sinai, where she looked at patient-level cancer data. Utilizing her knowledge in both biology and data analytics, she worked on a computational screener that scientists and biologists could use to measure gene expression in diseased versus normal cells. This will ultimately aid efforts in narrowing down the best genes to target in drug development. Deng will be back at Mount Sinai full-time after graduation, to continue her research before applying to medical school.

Deng presenting on her research at Mount Sinai

But in her own words, Deng’s most favorite research experience has been her senior thesis through Duke’s Department of Biostatistics and Bioinformatics. Last year, she reached out to Dr. Xiaofei Wang, who is part of a team conducting a randomized controlled trial to compare the merits of two different lung tumor treatments.

Generally, when faced with lung disease, the conservative approach is to remove the whole lobe. But that can pose challenges to the quality of life of people who are older, with more comorbidities. Recently, there has been a push to focus on removing smaller sections of lung tissue instead. Deng’s thesis looks at patient surgical data over the past 15 years, showing that patient survival rates have improved as more of these segmentectomies – or smaller sections of tissue removal – have become more frequent in select groups of patients.

“I really enjoy working on it every week,” Deng says about her thesis, “which is not something I can usually say about most of the work I do!” According to Deng, a lot of research – hers included – is derived from researchers mulling over what they think would be interesting to look at in a silo, without considering what problems might be most useful for society at large. What’s valuable for Deng about her thesis work is that she’s gotten to work closely with not just statisticians but thoracic surgeons. “Originally my thesis was going to go in a different direction,” she said, but upon consulting with surgeons who directly impacted the data she was using – and would be directly impacted by her results – she changed her research question. 

The merits of an interdisciplinary academic path

Deng’s unique path makes her the perfect person to ask: is pursuing seemingly disparate interests, like being a Statistics and Computer Science double-major on the pre-med, track worth it? And judging by Deng’s insights, the answer is a resounding yes.

At Duke, she says, “I’ve been challenged by many things that I wouldn’t have expected to be able to do myself” – like dealing with the catch-up work of switching majors and pursuing independent research. But over time she’s learned that even if something seems daunting in the moment, if you apply yourself, most, if not all things, can be accomplished. And she’s grateful for the confidence that she’s acquired through pursuing her unique path.

Moreover, as Deng reflects on where she sees herself – and the field of healthcare – a few years from now, she muses that for the first time in the history of healthcare, a third-party player is joining the mix – technology.

While her initial motivation to pursue statistics and computer science was to aid her in research, “I’ve now seen how its beneficial for my long-term goals of going to med school and becoming a physician.” As healthcare evolves and the introduction of algorithms, AI and other technological advancements widens the gap between traditional and contemporary medicine, Deng hopes to deconstruct it all and make healthcare technology more accessible to patients and providers.

“At the end of the day, it’s data that doctors are communicating to patients,” Deng says. So she’s grateful to have gained experience interpreting and modeling data at Duke through her academic coursework.

And as the Statistics major particularly has taught her, complexity is not always a good thing – sometimes, the simpler you can make something, the better. “Some research doesn’t always do this,” she says – she’s encountered her fair share of research that feels performative, prioritizing complexity to appear more intellectual. But by continually asking herself whether her research is explainable and applicable, she hopes to let those two questions be the North Stars that guide her future research endeavors.

At the end of the day, it’s data that doctors are communicating to patients.

Eden Deng

When asked what advice she has for first-years, Deng said that it’s important “to not let your inexperience or perceived lack of knowledge prevent you from diving into what interests you.” Even as a first-year undergrad, know that you can contribute to academia and the world of research.

And for those who might be interested in pursuing an academic path like Deng, there’s some good news. After Deng talked to the Statistics department about the lack of pre-health representation that existed, the Statistics department now has a pre-health listserv that you can join for updates and opportunities pertaining specifically to pre-med Stats majors. And Deng emphasizes that the Stats-CS-pre-med group at Duke is growing. She’s noticed quite a few underclassmen in the Statistics and Computer Science departments who vocalize an interest in medical school.

So if you also want to hone your ability to communicate research that you care about – whether you’re pre-med or not – feel free to jump right into the world of data analysis. As Deng concludes, “everyone has something to say that’s important.”

Post by Meghna Datta, Class of 2023

Origami Robots: How Technology Moves at the Micro Level

Imagine a robot small enough to fit on a U.S. penny. Or even small enough to rest on Lincoln’s chest. It sounds preposterous enough. Now, imagine a robot small enough to rest on the chest of Lincoln – not the Lincoln whose head decorates the front side of the penny, but the even tinier version of him on the back. 

Before it was changed to a Union Shield, the tail side of pennies contained the Lincoln Memorial, including a miniscule representation of the seated Lincoln statue that rests inside. Barely visible to the naked eye, this miniature Lincoln is on the order of a few hundred micrometers wide. As incredible as it sounds, this is the scale of robots being built by Professor Itai Cohen and his lab at Cornell University. On February 22, Cohen shared several of his lab’s cutting-edge technologies with an audience in Duke’s Schiciano Auditorium. 

Dr. Itai Cohen from Cornell University begins his presentation by demonstrating the scale of the microrobots being developed by his lab.

To begin, Cohen describes the challenge of building robots as consisting of two distinct parts: the brain of the robot, and the brawn. The brain refers to the microchip, and the brawn refers to the “legs,” or actuating limbs of the robot. Between these two, the brain – believe it or not – is the easy part. As Cohen explains, “fifty years of Moore’s Law has solved this problem.” (In 1965, Gordon Moore theorized that roughly every two years, the number of transistors able to fit on microchips will double, suggesting that computational progress will become exponentially more efficient over time.) We now possess the ability to create ridiculously small microcircuits that fit on the footprint of a few micrometers. The brawn, on the other hand, is a major challenge. 

This is where Cohen and his lab come in. Their idea was to use standard fabrication tools used by the semiconductor industry to build the chips, and then build the robot around the chip by folding the robot into the 3D shape they desired. Think origami, but at the microscopic scale. 

Like any good origami artist, the researchers at the Cohen lab recognized that it all starts with the paper. Using the unique tools at the Cornell Nanoscale Facility, the Cohen team created the world’s thinnest paper, including one made out of a single sheet of graphene. To clarify, that’s a single atom thickness.

Next, it came to the folding.  As Cohen describes, there’s really two main options. The first is to shrink down the origami artist to the microscopic level. He concedes that science doesn’t know how to do that quite yet. Alas, the second strategy is to have the paper fold itself. (I will admit that as an uneducated listener, option number two sounds about as absurd as the first one.) Regardless, this turns out to be the more reasonable option.

Countless different iterations of microrobots can be fabricated using the origami folding technique.

The basic process works like this: a seven nanometer thick platinum layer is coated on one side with an inert material. When put in a solution and voltage applied, ions that are dissociated in the solvent will absorb onto the platinum surface. When this happens, a stress is created that bends the device. Reversing the voltage drives away the ions and unbends the device. Applying stiff elements to certain regions restricts the bending to occur only in desired locations. Devices about the thickness of a hair diameter can be created (folded and unfolded) using this method. 

This microscopic origami duck developed by the Cohen Lab graced the covered of Science Robotics in March 2021.

As incredible as this is, there is still one defect: it requires a wire to an external power source that attaches onto the device. To solve this problem, the Cohen lab uses photovoltaics (mini solar panels) that attach directly onto the device itself. When light is shined on the photovoltaic (via sunlight or lasers), it moves the limb. With this advance and some continuous tweaking, the Cohen lab was able to develop the world’s smallest walking robot. 

At just 40 microns by 70 microns by 2 microns thick, the smallest walking microrobot in the world is able to fold itself up and walk off the page.

The Cohen Lab also achieved “BroBot” – a microrobot that “flexes his muscles” when light is shined on the front photovoltaics and truly “looks like he belongs on a beach somewhere.”

The “BroBot,” complete with “chest hair,” was one of the earlier versions of the robot that eventually was refined into the world record-winning microrobot.

The Cohen Lab successfully eliminated the need for any external wire, but there was still more left to be desired. These robots, including “BroBot” and the Guinness World Record-winning microrobot, still required lasers to activate the limbs. In this sense, as Cohen explains, the robots were “still just marionettes” being controlled by “strings” in the form of laser pulses.

To go beyond this, the Cohen Lab began working with a commercial foundry, X-Fab, to create microchips that would act as a brain that could coordinate the limb movements. In this way, the robots would be able to move on their own, without using lasers pointed at specific photovoltaics. Cohen describes this moment as “cutting the strings on the marionette, and bringing Pinocchio to life.”

This is the final key step in the development of Ant Bot: a microrobot that moves all on its own. It uses a hexapod gate, meaning a tripod on each side. All that has to be done is placing the robot in sunlight, and the brain does the rest of the coordination.

“Ant Bot,” one of the most advanced of all microrobots to come out of the Cohen Lab, is able to move autonomously, without the aid of lasers.

The potential for these kinds of microrobots is nearly limitless. As Cohen emphasizes, the application for robots at the microscale is “basically anything you can imagine doing at the macroscale.” Cleaning surfaces, transporting cargo, building components. Perhaps conducting microsurgeries, or exploring new worlds that appear inaccessible. One particularly promising application is a robot that mimics that movement of cilia – the microscopic cellular hair responsible for countless locomotion and sensory functions in the body. A cilia-covered chip could become the basis of new portable diagnostic devices, enabling field testing that would be much easier, cheaper, and more efficient.

The researchers at the Cohen Lab envision a possible future where microscopic robots are used in swarms to restructure blood vessels, or probe large swathes of the human brain in a new form of healthcare based on quantum materials. 

Until now, few would have imagined that the ancient art of origami would predict and enable technology that could transform the future of medicine and accelerate the exploration of the universe.

Post by Kyla Hunter, Class of ’23

How Concerned Should You Be About AirTags?

Photograph of an AirTag from Wikimedia Commons. Image licensed under Creative Commons Attribution-Share Alike 4.0 International. Creator: KKPCW.

I didn’t even know what an AirTag was until I attended a cybersecurity talk by Nick Tripp, senior manager of Duke’s IT Security Office, but according to Tripp, AirTag technology is “something that the entire Duke community probably needs to be aware of.”

An AirTag is a small tracking device that can connect to any nearby Apple device using Bluetooth. AirTags were released by Apple in April 2021 and are designed to help users keep track of items like keys and luggage. Tripp himself has one attached to his keys. If he loses them, he can open the “Find My” app on his phone (installed by default on Apple devices), and if anyone else with an Apple device has been near his keys since he lost them, the Bluetooth technology will let him see where his keys were when the Apple device user passed them—or took them.

According to Tripp, AirTags have two distinct advantages over earlier tracking devices. First, they use technology that lets the “Find My” app provide “precise location tracking”—within an inch of the AirTag’s location. Second, because AirTags use the existing Apple network, “every iPhone and iPad in the world becomes a listening device.”

You can probably guess where this is going. Unfortunately, the very features that make AirTags so useful for finding lost or stolen items also make them susceptible to abuse. There are numerous reports of AirTags being used to stalk people. Tripp has seen that problem on Duke’s campus, too. He gives the example of someone going to a bar and later finding an AirTag in their bag or jacket without knowing who put it there. The IT Security Office at Duke sees about 2-3 suspected cyberstalking incidents per month, with 1-2 confirmed each year. Cyberstalking, Tripp emphasizes, isn’t confined to the internet. It “straddles the internet and the real world.” Not all of the cyberstalking reports Duke deals with involve tracking devices, but “the availability of low-cost tracking technology” is a concern. In the wrong hands, AirTags can enable dangerous stalking behavior.

As part of his IT security work, and with his wife’s permission, Tripp dropped an AirTag into his wife’s bag to better understand the potential for nefarious use of AirTags by attackers. Concerningly, he found that he was able to track her movement using the app on his phone—not constantly, but about every five minutes, and if a criminal is trying to stalk someone, knowing their location every five minutes is more than enough.

Fortunately, Apple has created certain safety features to help prevent the malicious use of AirTags. For instance, if someone has been near the same AirTag for several hours (such as Tripp’s wife while there was an AirTag in her bag), they’ll get a pop-up notification on their phone after a random period of time between eight and twenty-four hours warning them that “Your current location can be seen by the owner of this AirTag.” Also, an AirTag will start making a particular sound if it has been away from its owner for eight to twenty-four hours. (It will emit a different sound if the owner of the AirTag is nearby and actively trying to find their lost item using their app.) Finally, each AirTag broadcasts a certain Bluetooth signal, a “public key,” associated with the AirTag’s “private key.” To help thwart potential hackers, that public key changes every eight to twenty-four hours. (Are you wondering yet what’s special about the eight-to-twenty-four hour time period? Tripp says it’s meant to be “frequently enough that Apple can give some privacy to the owner of that AirTag” but “infrequently enough that they can establish a pattern of malicious activity.”)

But despite these safety features, a highly motivated criminal could get around them. Tripp and his team built a “DIY Stealth AirTag” in an attempt to anticipate what measures criminals might take to deactivate or counteract Apple’s built-in security features. (Except when he’s presenting to other IT professionals, Tripp makes a point of not revealing the exact process his team used to make their Stealth AirTag. He wants to inform the public about the potential dangers of tracking technology while avoiding giving would-be criminals any ideas.) Tripp’s wife again volunteered to be tracked, this time with a DIY Stealth AirTag that Tripp placed in her car. He found that the modified AirTag effectively and silently tracked his wife’s car. Unlike the original AirTag, their stealthy version could create a map of everywhere his wife had driven, complete with red markers showing the date, time, and coordinates of each location. An AirTag that has been modified by a skilled hacker could let attackers see “not just where a potential victim is going but when they go there and how often.”

“The AirTag cat is out of the bag, so to speak,” Tripp says. He believes Apple should update their AirTag design to make the safety features harder to circumvent. Nonetheless, “it is far more likely that someone will experience abuse of a retail AirTag” than one modified by a hacker to be stealthier. So how can you protect yourself? Tripp has several suggestions.

  1. Know the AirTag beep indicating that an AirTag without its owner is nearby, potentially in your belongings.
  2. If you have an iPhone, watch for AirTag alerts. If you receive a notification warning you about a nearby AirTag, don’t ignore it.
  3. If you have an Android, Tripp recommends installing the “Tracker Detect” app from Apple because unlike iPhone users, Android users don’t get automatic pop-up notifications if an AirTag has been near them for several hours. The “Tracker Detect” Android app isn’t a perfect solution—you still won’t get automatic notifications; you’ll have to manually open the app to check for nearby trackers. But Tripp still considers it worthwhile.
  4. For iPhone users, make sure you have tracking notifications configured in the “Find My” app. You can go into the app and click “Me,” then “Customize Tracking Notifications.” Make sure the app has permission to send you notifications.
  5. Know how to identify an AirTag if you find one. If you find an AirTag that isn’t yours, and you have an iPhone, go into the “Find My” app, click “Items,” and then swipe up until you see the “Identify Found Item” option. That tool lets you scan the AirTag by holding it near your phone. It will then show the AirTag’s serial number and the last four digits of the owner’s phone number, which can be useful for the police. “If I found one,” Tripp says, “I think it’s worth making a police report.”

It’s worth noting that owning an AirTag does not put you at higher risk of stalking or other malicious behavior. The concern, whether or not you personally use AirTags, is that attackers can buy AirTags themselves and use them maliciously. Choosing to use AirTags to keep track of important items, meanwhile, won’t hurt you and may be worth considering, especially if you travel often or are prone to misplacing things. Not all news about AirTags is bad. They’ve helped people recover lost items, from luggage and wallets to photography gear and an electric scooter.

“I actually think this technology is extremely useful,” Tripp says. It’s the potential for abuse by attackers that’s the problem.

Post by Sophie Cox, Class of 2025

“Of Sound Mind”: a Discussion of the Hearing Brain

“To me [this image] captures the wonder, the awe, the beauty of sound and the brain that tries to make sense of it,” said professor Nina Kraus, Northwestern University researcher and author of “Of Sound Mind: How Our Brain Constructs a Meaningful Sonic World.”

Stop. What do you hear?

We might not always think about the sounds around us, but our brains are always listening, said Northwestern University professor Nina Kraus.

Kraus, auditory researcher and author of “Of Sound Mind: How Our Brain Constructs a Meaningful Sonic World,” spoke via Zoom to a Duke audience in October. She has published more than four hundred papers on the auditory system in humans and other animals and how it’s affected by conditions like autism, aging, and concussion. She discussed some of her findings and how “the sound mind” affects us in our day-to-day lives.

One of the slides from Kraus’s presentation. We can think of sound as having many “ingredients.”

“I think of the sound mind as encompassing how we think, how we move, how we sense, and how we feel,” Kraus said. We live in a “visually dominated world,” but for hearing people, sound plays an important role in language, music, rhythm, and how we perceive the world.

One of the slides from Kraus’s presentation. The human auditory system involves not just the ears but also several regions of the brain. The “hearing brain” engages movement, cognition, and emotions along with interpreting direct sensory input from all senses.

Kraus discussed the auditory system and how much of what we think of as hearing takes place in the brain. We can think of sound as signals outside the head and electricity as signals inside the head (neural processing). When those two merge, learning occurs, and we can make sound-to-meaning connections.

Another slide from Kraus’s presentation. In an experiment, teaching rabbits to associate a sound with meaning (in this case, more carrots) changed patterns of neuron firing in the auditory cortex, even in individual neurons. “Same sound, same neuron, and yet the neuron responded differently… because now there’s a sound-to-meaning connection,” Kraus said.

Despite how sensitive our neurons and brains are to sound, things can get lost in translation. Kraus studies how conditions like concussions and hearing loss can adversely affect auditory processing. Even among healthy brains, we all hear and interpret sounds differently. People have unique “sonic fingerprints” that are relatively stable over time within an individual brain but differ between people. These patterns of sound recognition are apparent when scientists record brain responses to music or other sounds.

“One of the biological measures that we have been using in human and in animal models,” Kraus said, is FFR (frequency following response) to speech. FFR-to-speech can be used to analyze an individual’s auditory processing system. It also allows scientists to convert brain responses back into sound waves. “The sound wave and the brainwave resemble each other, which is just remarkable.”

One of Kraus’s slides. Technology called frequency following response (FFR) can be used to convert brain waves back into original sound (like a song).

This technology helps reveal just how attuned our brains are to sound. When we hear a song, our brain waves respond to everything from the beat to the melody. Those brain waves are so specific to that particular song or sound that when scientists convert the brain waves back into sound, the resulting music is still recognizable.

When scientists try this on people who have experienced a concussion, for instance, the recreated music can sound different or garbled. Experiments that compare healthy and unhealthy brains can help reveal what concussions do to the brain and our ability to interpret sound. But not everything that affects auditory processing is bad.

Musical training is famously good for the brain, and experiments done by Kraus and other scientists support that conclusion. “The musician signature—something that develops over time—” has specific patterns, and it can enhance certain components of auditory processing over time. Making music might also improve language skills. “The music and language signatures really overlap,” Kraus said, “which is why making music is so good for strengthening our sound mind.” Kids who can synchronize to a beat, for example, tend to have better language skills according to some of the experiments Kraus has been involved with.

Musicians are also, on average, better at processing sound in noisy environments. Musicians respond well in quiet and noisy environments. Non-musicians, on the other hand, respond well in quiet environments, but that response “really breaks down” in noisy ones.

Interestingly, “Making music has a lifelong impact. Making music in early life can strengthen the sound mind when one is seventy or eighty years old.”

A slide from Kraus’s presentation. Musicians tend to be better at processing sounds in noisy environments.

Exercise, too, can improve auditory processing. “Elite division 1 athletes have especially quiet brains” with less neural noise. That’s a good thing; it lets incoming information “stand out more.”

In experiments, healthy athletes also have a more consistent response over time across multiple trials, especially women.

These benefits aren’t limited to elite athletes, though. According to Kraus, “Being fit and flexible is one of the best things you can do for your brain,” Kraus said.

Kraus and her team have a regularly updated website about their work. For those who want to learn more about their research, they have a short video about their research approach and an online lecture Kraus gave with the Kennedy Center.

Nina Kraus with a piano. “Science is a deeply human endeavor,” she said, “and I think we often forget that. It’s made by people.”
Photo courtesy of Kraus and colleague Jenna Cunningham, Ph.D.
Post by Sophie Cox, Class of 2025

“Brains are Weird… and the World is Difficult”

Institute for Consumer Money Management, and Duke University’s Center for Advanced Hindsight.

Intending to do the right thing doesn’t always lead to actually doing it, a tendency formally known as the “intention-behavior gap.” We can intend to go to bed early and still go to bed late. We can want to exercise and still choose not to. We can recognize the importance of saving extra money and still choose to spend it instead. So why is it so hard to change our behavior? Because, says Jonathan Corbin, Ph.D., “brains are weird” and “the world is difficult.”

Corbin is a senior behavioral researcher at the Center for Advanced Hindsight at Duke University. The Center for Advanced Hindsight recently partnered with NOVA Labs, Thought Cafè, and the Institute for Consumer Money Management to create the NOVA Financial Lab, a group of financial literacy games targeted at adolescents and emerging adults. In each game, players practice managing money while taking care of a pet. You may never have to sneak a cat into a concert or prepare a retirement plan for a dog in real life, but you will need to understand concepts like budgeting, interest, and debt. “What we hope people start to do,” Corbin says, “is really think about, ‘What decisions should I make now to make better decisions later?’”

Essentially, “Money spent now is money that can’t be spent later.” As intuitive as that might seem, “The way we think about money is relative, and it’s not linear.” When you’re already spending thousands of dollars on a car, for instance, an extra five hundred dollars for a feature you may or may not need “feels like a very small amount of money,” but in a different situation, its value can seem higher. How many times, Corbin points out, could you go out to eat with five hundred dollars?

The three games combine financial literacy with behavioral science to explore why people make the decisions they do and how they can start to make better ones.
Source: https://advanced-hindsight.com/wp-content/uploads/2022/03/CAH-NOVA.pdf

There are three games: Shopportunity Cost, Budget Busters, and Exponential Potential. (“One of the people from PBS helped us come up with these cute names,” Corbin says.) They each involve different skills, but they all focus on “financial literacy from a behavioral science perspective.” Players have to contend with both external obstacles and common behavioral biases to make financial decisions for a pet. “I always choose the dog,” Corbin adds, “but I understand other people might choose the cat.” (I chose the cat.)

The first game, Shopportunity Cost, focuses on short-term financial planning. It involves dressing a pet up like a person in order to sneak them into a concert for the night. “You have to make decisions that optimize the pet’s happiness while also being able to make it to the concert and back home,” but you have a limited amount of money to spend. If you spend too much money too soon, you’ll run out, but if you’re too frugal, your pet won’t enjoy the evening. As goofy as the concert scenario is, it introduces players to an important concept known as opportunity cost, which refers to the potential benefits we miss out on when we choose one alternative over another. Say you’re debating between a $50 outfit and a $30 one. The opportunity cost of choosing the more expensive outfit is $20, but shoppers don’t always consider that. “Opportunity cost neglect is the simple idea that when we’re faced with financial decisions, we tend not to consider alternative uses for that money.” Reframing the $30 outfit as “a $30 dress that I’m okay with plus 20 extra dollars” that could be spent elsewhere might lead you to choose the cheaper outfit. Or it might not. “Sometimes you want the $50 outfit, and that’s perfectly fine… but a lot of the time that might not be the right decision.” Like many things, taking opportunity cost into account is a balancing act. “We shouldn’t obsess over every possible opportunity that there is,” Corbin cautions, but “consider[ing] opportunity costs can lead to better financial decisions.”

Budget Busters, meanwhile, involves medium-term planning. Players have to manage checking, credit, and savings accounts while caring for their pet over a six-month period. Along with purchasing essential and non-essential items to attend to their pet’s basic needs and happiness, players have to contend with unforeseen circumstances like medical emergencies. The game introduces people to the 50-30-20 rule, a budgeting concept that involves devoting 50% of income to essentials, 30% to non-essentials, and 20% to savings. Budget Busters also explores the principle of mental accounting, the idea that aside from formal budgets, we have “categories in our head” that change our perception of money. “Let’s say you get birthday money from your relative. That money tends to be a different kind of spending money to you than money you get from your paycheck,” Corbin explains, because “money feels different in different contexts.” 

There are parallels in Budget Busters. Sometimes players receive unexpected windfalls like gifts or prizes. (My cat won $40 for being “Best in Show” at the local pet pageant.) Players get to decide whether to use the extra money on a “fun” item for their pet or put it into savings. Corbin says “gift money” is a classic example of a misleading mental account. “We tend to overspend… because it feels like it’s not even our money in a way.” In reality, though, money has “fungibility,” meaning it’s “exchangeable… across any account.” In other words, “money is money,” regardless of where it comes from.  A $10 bill, for instance, can be exchanged for two fives without changing its value. (Non-fungible tokens, or NFTs, lack this property. “You can’t exchange the picture of a cat you bought from the internet for Chipotle.”) Like Shopportunity Cost, Budget Busters focuses on both traditional financial concepts and common behavioral tendencies that affect decision-making. “None of these things are necessarily bad,” Corbin emphasizes, “but they’re things that one should be aware of… when that natural proclivity may be swaying them in the wrong way.”

Budget Busters, which focuses on monthly budgeting, also encourages players to look closely at discounts when shopping. “Sometimes the discount that looks really good from a  percentage-off perspective isn’t actually the better discount” in terms of overall budgeting and total amount of money saved, Corbin warns.

The last game, Exponential Potential, explores concepts like compound interest, debt, and investment. The premise of the game involves traveling back in time to balance debts and investments. The goal is to make your pet a millionaire. By showing players how investment decisions can affect future net worth, the game seeks to increase understanding of processes involving exponential growth. Exponential Potential introduces the concept of exponential growth bias. According to Corbin,  “We tend to underestimate things that grow exponentially.” He cites the coronavirus pandemic as an example: “Even the people who were making the graphs of Covid’s growth… it’s really hard for them to figure out how to show that to people.” Log-transformed graphs are one option, but they can be deceptive by making the slope look flatter. Similarly, when dealing with exponential growth in the financial world, “People are going to underestimate how badly they’re going to get burned” by debt, but they may also underestimate how much they’ll benefit by saving for retirement.

With compound interest, for instance, “The interest gets applied both to principle and to interest from the last time, and that’s where exponential growth happens.” In the game, players have the opportunity to adjust how much money to put toward paying off debts, investing, and saving for retirement each month. Then they travel decades into the future to see how their decisions have affected their pet’s net worth.  “We’re hoping that that kind of feedback allows you to think through… what you might have done wrong and try to correct,” Corbin says. Once again, though, raw numbers aren’t the only factor at play. “We just want people to understand what the optimal way to do this is, and if there’s a better way for them to do that psychologically, that’s fine.” Debt account aversion, for example, refers to the fact that people want to have fewer debt accounts, meaning they are often eager to pay off accounts in full when they can. Some financial advisers suggest that “because they think it’ll get the ball rolling and you’ll be more likely to pay off the next one.” According to Corbin, there isn’t a lot of evidence for that, and sometimes paying everything off at the outset isn’t ideal. For instance, “It is optimal to start thinking about retirement as soon as you can… but if you’re delaying putting money into retirement because you’re so concerned with your student loan debt,” that can be problematic. Still, Corbin understands the appeal of closing debt accounts. “I am risk-averse, which means if I have a debt I’m probably going to put more money toward that debt that I necessarily should given what the interest rates are and what I could potentially make by investing that money instead.” Financially speaking, “There’s a decent likelihood that I should just pay the minimum on my mortgage… [but] I’ve decided I’m willing to trade off those future gains for the peace of mind that if something goes wrong… I’ll be ahead on my mortgage payment.” Even in Exponential Potential, the right choices aren’t always clear-cut. Corbin describes it as a “sandbox approach” where players are given more opportunity to play around. “This is the trickiest game because there’s no perfect answer for anything,” he says. “Everything has risk.”

Another bias that can affect our financial decisions is known as present bias, the tendency to discount the future in favor of the present. Corbin offers the everyday example of staying up too late. “Nighttime Me wants to stay up and read…. Morning Me is going to be really ticked off at Nighttime Me when they’re exhausted and don’t want to get up.” Research suggests that people can have a harder time identifying with their future selves. That can easily affect our financial decisions, too. “I’m going to let future me worry about that. That guy. Whoever that is.” However, “If you can get people to identify more with that person,” they can sometimes make better decisions. Ultimately, “The game isn’t trying to force people to become investment robots.” We are biased for the present because we live in it, and that’s normal. The purpose of the game is simply “to nudge people… to worry just a little more about the future.”

“Money is basically for safety, security, and happiness,” Corbin says. The ultimate objective is to balance needs, wants, and savings to achieve those three goals both in the present and the future.

By Sophie Cox
By Sophie Cox

Duke First-Year Founds Cryptocurrency Security Startup, Harpie

“Crypto is scaling so quickly but security systems are still the same as they were in 2013.” Those are the words of Daniel Chong, a recent Duke student whose new startup aims to change that.

One of the largest challenges within cryptocurrency is security. The most impactful application of cryptocurrency thus far is decentralized finance (DeFi). DeFi eliminates intermediaries by allowing people and businesses to conduct financial transactions through blockchain technology as opposed to working through banks or other corporations. However, as a result, people are personally responsible for securing their assets. 

Graphic from the Harpie.io Website

When engaging with cryptocurrency people generally use a trading platform and a wallet. Cryptocurrency trading platforms like Coinbase, Binance, and Crypto.com allow people to buy and sell cryptocurrencies using USD or other cryptocurrencies. However, in order to use crypto, one must transfer some of it into a wallet.

As with conventional currency, crypto wallets are not required in order to use cryptocurrency but they allow individuals to store their tokens in one place, easily retrieve them and send it to other individuals or organizations (i.e. buying non-fungible tokens).  Some of the most popular wallets include Coinbase wallet, Metamask, and Electrum. 

Screenshot of a Metamask Wallet

These wallets are not only password-protected but provide each user with a seed phrase or a series of words generated by one’s cryptocurrency wallet. This phrase, like a password, provides access to the crypto associated with that wallet.

An example seed phrase

The catch is, if an individual gets locked out of their wallet and cannot remember or does not have access to their seed phrase, all of their money will be lost. This is a major problem in the space and people have lost millions of dollars to lost seed phrases and inaccessible wallets. In fact, 20% of all existing Bitcoin tokens have been misplaced. 

Furthermore, in the past, it was already hard enough to secure one’s crypto wallets but now people have several wallets, each with their own unique seed phrase and passcodes making it all the more difficult. In the Fall of 2020, Daniel Chong, a Duke first-year at the time, identified this wallet security problem. 

“Crypto is scaling so quickly but security systems are still the same as they were in 2013.”

Daniel Chong

Having grown up in Las Vegas, Chong was used to fast-paced environments and unique challenges. During high school, Chong started coding as a hobby. 

“I just wanted to build something,” he explained

The first project he built was a website for a research paper he had in his high school psychology class. In 2018 Chong was introduced to solidity, a programming language that’s main purpose is to develop smart contracts for the Ethereum blockchain. If you are unfamiliar with blockchain, please refer to my previous article here

Chong matriculated to Duke during a period of transition, the Fall of 2020. As a result of being sent home due to COVID-19 in the Spring and having to shift to online meetings, many on-campus clubs were struggling. Early on Chong met Manmit Singh, a Junior at the time and the President of the Duke Blockchain Lab.

Even though Chong was only a first-year, he had experience coding in solidity and ended up aiding Singh in revamping Duke Blockchain Lab so students could continue engaging with and learning about blockchain despite the pandemic. Additionally, he ran a virtual course on web3 and solidity development for other club members. 

Despite the fact that Chong was attending classes, involved in clubs, and working part-time, he began talking to his brother Noah who was a senior at Georgia Tech about once again, building something. 

After working on building a security solution for crypto wallets for about a year, Chong and his brother received venture capital funding for their startup Harpie: a simple crypto protection plan that scales with you. 

Chong explained that venture capitalists are very excited about crypto right now, especially back in November of 2021 when crypto was in a bull market and bitcoin was at a market high of 60,000. 

Harpie is a web app that allows users to connect all of their wallets to individualized protection plans. This means that if you have a Harpie protection plan and someone hacks your wallet or you get locked out, you can go to the Harpie web app and transfer your funds from the unusable wallet to a new one.

Additionally, users are able to choose the degree of security their Harpie account has. Users can regain access to their fund via email, phone, or (personal recommendation) 2-factor authentication. Ultimately, for $8.99/month you can protect as many wallets, with any sum of funds, as you want.

Why Harpie is a better backup Solution

After working for just over a year, Harpie launched on February 14th, 2022. The next weekend Chong and his brother headed to ETHDenver, the largest Ethereum conference, to promote Harpie and compete in the Hackathon. For those who are unfamiliar, hackathons are competitive, sprint-like events where computer programmers and others are involved in software development work to build something over a condensed period of time. 

Over 10,000 people participated in the ETHDenver hackathon in person and over 30,000 participated virtually for over $1 million in bounties and prizes, as well as up to $2 million in investment capital.

While the teams had 36 hours to build a project, Chong and his brother managed to build there’s in 4-5 hours. They did this by quickly creating a front-runner bot/flash bot to help people avoid getting hacked by detecting and halting transactions to unauthorized addresses.

The brothers not only successfully built the bot but also placed top 10 in the overall hackathon and had the opportunity to present their project.

While presenting, Chong also received questions from Vitalik Buterin, the founder of Ethereum. He explained this as a very “nerve-wracking experience” and added that Buterin asked very technical questions such as what the miners’ extractable value would be.

Chong and his brother (left) onstage with Vitalik Buterin (right) presenting at ETHDenver

In the future, Chong would be open to entering more hackathons but right now is more interested in growing his startup. Currently, Chong is taking time off from school to focus on Harpie and to, ultimately, revolutionize security systems as they relate to online assets.

“Rest easy knowing your crypto is safe.”

Daniel Chong

What’s Up In Space? 3 Experts Weigh In

On Friday, February 25th, 2022 the brand-new Duke Space Diplomacy Lab (SDL) had an exciting launch with its first panel event: hosting journalists Ramin Skibba, Loren Grush, and Jeff Foust for a conversation on challenges in space within the next year. Moderated by Benjamin L. Schmitt of Harvard University, the conversation was in line with the SDL’s goals to convene a multidisciplinary group of individuals for the development of research, policy proposals, and solutions to mitigate risks in space.

In conversation, three key themes arose:

  1. U.S Russia Relations

With the current Russian invasion in Ukraine and the subsequent strain on U.S-Russia relations, the geopolitics of space has been in the limelight. Control of outer space has been a contentious issue for the two countries since the Cold War, out of which an uneasy yet necessary alliance was forged. Faust remarked that he doesn’t see U.S-Russia space relations lasting beyond the end of the International Space Station (ISS) in 2030. Grush added that before then, it will be interesting to see whether U.S-Russia relations will sour in the realm of space, simply because it’s questionable whether the ISS could continue without Russian support. However, Russia and NASA have historically acted symbiotically when it comes to space, and it’s unlikely that either party can afford to break ties.

2. Space debris

Major global players, from the U.S to China to India to Russia, are all guilty of generating space debris. Tons of dead satellites and bits of spacecraft equipment litter the areas around Earth – including an estimated 34,000 pieces of space junk bigger than 10 centimeters – and if this debris hit something, it could be disastrous. Grush paints the picture well by comparing spacecrafts to a car on a road – except we just trust that the satellite will maneuver out of the way in the event of a collision, autonomously, and there are absolutely no rules of the road to regulate movement for any other vehicles.

A computer-generated graphic from NASA showing objects in Earth orbit that are currently being tracked. 95% of the objects in this illustration are orbital debris, i.e., not functional satellites.

Skibba suggests that the best thing to do might be to make sure that more stuff doesn’t enter space, since the invention of technologies to clean up existing space debris will take a while. He also points to efforts to program new spacecrafts with graveyard orbit and deorbit capabilities as a necessary step.

3. Who is in charge of space?

Faust explained that commercial space exploration is moving incredibly fast, and legal regulations are struggling to keep up. Tons of companies are planning to launch mega-constellations in the next few years, for reasons that include things like providing higher-speed Internet access – something that we can all benefit from. Yet with new players in space comes the question of: who is in charge of space? The Artemis Accords are the existing rules that govern space at an international level, but they function as an agreement, not law, and with more players in space comes a need for legally binding terms of conduct. But as Grush puts it, “there’s a tension between the nimble, rapid commercial environment and a regulatory environment that wasn’t quite prepared to respond.”

The eight signees of the Artemis Accords

Beyond who rules over space, there’s also the question of decolonizing space. Skibba brings up that amidst a growing number of mega-constellations of satellites being launched, there are key questions being asked about who has access to space, and how we can level the playing field for more countries and companies to enter space exploration.

Space is uncharted territory, and to understand it is no small feat. While science has come incredibly far in terms of technological capabilities in space, it’s clear that we don’t know what we don’t know. But with a more multilateral, global approach to exploring space, we may just be able to go even farther.

Post by Meghna Datta, Class of 2023

What is The Duke Summer Experiences Database?

Graphics courtesy of Catherine Angst, Director of Communications in the Division of Experiential Education at Duke University.

Pre-pandemic, Duke undergraduates looking for a good summer experience might have seen something good at an in-person fair or maybe heard about an opportunity from a favorite professor. But there was a lot of luck involved.

Now, thanks to the Duke Summer Experiences database, which launched in late January, undergrads can view a variety of summer opportunities in one centralized place. They can search by area of interest, type of program, program cost, year in school, and several other filters.

“Duke Summer Experiences is a resource for all of Duke,” says Catherine Angst, Director of Communications in the Division of Experiential Education, “because it’s an easily searchable, permanent database that allows people to select the features of an opportunity that are important to them.”

Angst explains that the new database is “an evolution of the Duke summer opportunities fair and the ‘Keep Exploring’ project.”

In previous years, Duke organized an in-person fair with representatives from various summer programs. During the pandemic, the “Keep Exploring” project was created to “[provide] students with summer opportunities and mentorship during a time when not a lot of traditional opportunities were operating because of COVID.” The two programs joined forces, she said, and ultimately expanded into the Duke Summer Experiences website.

By aggregating opportunities into one place, the database should increase awareness and access for summer programs.

Dean Sarah Russell, Director of the Undergraduate Research Support Office, thinks this might be especially valuable for research opportunities, which she says tend to be less publicized. “Previously,” she says, “students might know about DukeEngage, GEO, or summer courses, but would have to rely on word of mouth or, if they were lucky, a tip from faculty or advisors to find out about smaller, lesser-known programs.”

Ms. Leigh Ann Muth-Waring, Assistant Director in Employer Relations at the Career Center, sees similar benefits to the new database: “Prior to the website’s creation, students had to actively search for information about summer programs by contacting individual departments on campus,” sometimes causing students to miss deadlines. The Duke Summer Experiences website, on the other hand, provides easy-to-navigate and up-to-date information.

Another goal of the Duke Summer Experiences database, Ms. Angst says, is to “build a community of practice where administrators can share best practices, resources, and lessons learned.”

Dr. Karen Weber, Executive Director of the Office of University Scholars and Fellows, hopes this will “enable administrators across campus to collaborate more effectively together and improve programmatic outcomes.” For instance, “They can communicate on shared initiatives, such as developing successful recruitment and marketing strategies, creating student applications, editing participation agreements, addressing student and administrative issues, engaging with faculty, and assessing programs.”

Along with making summer opportunities easier to find and encouraging administrative collaboration, Duke Summer Experiences is also beta-testing a new application process that would allow students to use one application to apply for multiple opportunities at once. Muth-Waring said the Duke Experiences Application “allows the student to complete one questionnaire with general information (name, major, etc.) which then can be used to apply to multiple Duke-sponsored summer programs.” It also provides links to other programs students might be interested in.

Ms. Angst also sees the new application system as a valuable tool. She hopes that it will reduce “application fatigue” among students looking for summer opportunities.

The Career Center is already using the new application platform for their summer Internship Funding Program, which encourages participation in unpaid or low-paying summer internships by providing financial support to students. According to Ms. Muth-Waring, the new application system “has helped us streamline our program’s application process so that it is easier and less burdensome for students.” Streamlining the process of finding summer opportunities is a major goal of the Summer Experiences website as well. Ultimately, Ms. Muth-Waring says, “both the Duke Summer Experiences Database and the Duke Experiences Application are creating an easier way for students to learn about and apply to university-sponsored summer programs, research opportunities, internships, and funding sources.” For students seeking summer opportunities through Duke, the Summer Experiences website can make the process easier.

Post by Sophie Cox, Class of 2025

2019 Duke Grad Founds Cryptocurrency Startup Fei Protocol

As cryptocurrency gains popularity, people continue to question “How and where can these tokens be used?” A November 2021 study by Pew Research reported that 86% of Americans claimed to have heard about cryptocurrency and 16% say they personally have invested in, traded, or otherwise used it

Despite this, there are still very few places where one can make purchases directly using crypto. This means that in order to use cryptocurrency, people must first convert it back to US dollars, which can cost a lot due to transaction fees. Additionally, the exchange rate between any given crypto token and USD changes by the second, resulting in a lack of price stability.

(If you are unfamiliar with cryptocurrency or transaction (gas) fees please refer to my prior article here.)

Duke Alum, Joey Santoro, sensed this gap and saw an opportunity. Santoro graduated from Duke in 2019 with a major in Computer Science. There needed to be a volatility-free token with a stable valuation (i.e. matching the USD), to move between the worlds of crypto and fiat currency. This is also known as a stablecoin. While several were already in existence, Santoro wanted to create a more scalable and decentralized one.

Thus, in December of 2020, Joey founded the Fei Protocol. Fei is a stablecoin in Ethereum native decentralized finance (DeFi). Stablecoins are a type of token that aids in maintaining a liquid market by pegging the token’s value to the USD.  Fei is able to achieve this through various stability mechanisms. Stablecoins can be used for real-life transactions while still benefiting from instant processing and the security of cryptocurrency payments.

When asked why he chose to work in crypto as opposed to Machine Learning (ML) or Artificial Intelligence (AI) Joey explained that it came down to how much impact he could have.

“The barrier for making an avenue of innovation in crypto is so much lower than something like a machine learning. Higher risk, higher reward.”

joey santoro

Santoro did not come to Duke with the plan of founding a web3 DeFi protocol. In fact, when he matriculated he was actually pre-med and originally only took CS 101 because it was a pre-requisite for the Neuroscience major.

However, it did not take long for Joey to realize he wanted to work in the crypto space. In his second semester, he joined the Duke Blockchain Lab and ended up teaching a blockchain course in his junior and senior years.

Because decentralized finance is still so new, no one completely knows what they are doing, which creates considerable opportunities for innovation. Additionally, because the crypto space is decentralized, it is inherently collaborative and community-driven. 

“Being able to write code that’s immediately interoperable with dozens of financial protocols is the coolest thing ever,” Santoro said

Joey argues anyone can become an expert in a particular area in crypto in a couple of months. He said economists and mechanism designers are increasingly moving into the crypto space. 

When the Fei Protocol launched in 2020 it was the height of a bull market for crypto and there was heavy demand for a decentralized stablecoin. While there were several other stablecoins in existence, USDC and tether were the most popular and they were both centralized, meaning they were owned by companies. 

“What so important to me and why I do this is because I want people to be able to do whatever they want with their money.”

JOey santoro

The demand for a decentralized stablecoin created excitement around Feio but also a highly compressed timescale. The Fei Protocol ended up having the largest token launch for an Ethereum DeFi protocol in history, raising $1.25B. However, when it launched,  the peg broke due to issues with the incentive mechanism and bugs in the code.

Santoro recalled the surreal and challenging experience of watching the protocol he spent countless weeks working on fall apart before his eyes. However, his team and investors decided to stick it through and try to salvage what they had built. It took over a month just to fix everything that had gone wrong. In the meantime, people were threatening Santoro and his team. 

While the Fei protocol faced challenges while launching,  Joey and his team were able to adapt, learn from their mistakes, and come back stronger. They recently conducted a multi-billion-dollar merge with Rari Capital and launched Fei version2 (V2).

Additionally, this is the first multi-billion dollar merger in DeFi meaning that the decision to merge was voted on by members of the respective Decentralized Autonomous Organizations (DAOs). This is a huge milestone in the world of DeFi and sets a precedent for the potential of decentralized business operations. 

Joey Santoro Presenting at the ETHDenver Convention

Moving forward Joey explained, “I’m obsessed with simplicity now; I still move fast but more carefully.”

Post by Anna Gotskind, Class of 2022

Page 2 of 19

Powered by WordPress & Theme by Anders Norén