NASA Feature Article: Theresa Beech – A Passion for her Son and for Science
By Danny Baird August 21, 2018
Basically, when looking at a communications network for vulnerabilities you identify choke points, areas of high traffic. If one of these nodes goes down, you could have a major interruption in service, so you build redundancy around it. A network could have many of these choke points depending on its complexity.
Traditionally, cancer researchers talk about cell signaling pathways. I thought, “Well, it doesn’t really behave like a pathway. What if it’s not a pathway? What if it’s a network? If it’s a network, can I identify a choke point and exploit that vulnerability?”
Read the rest here.