Menu

Blog

Page 4889

Apr 11, 2022

Study highlights the possibility of building wave-shape-tolerant qubit gates

Posted by in categories: computing, quantum physics

Quantum computers, machines that leverage quantum states to perform computations and store data, could soon revolutionize the computing industry, achieving significantly greater speeds and performance than existing computers. While countless companies worldwide, including Google and IBM as well as smaller start-ups, have started working on quantum technologies, the exact architecture that will lead to their mass production remains unclear.

Researchers at Leibniz University Hannover have recently conducted a theoretical study investigating the possibility of realizing flying-qubit gates for quantum computers that are insensitive to the wave shapes of , and also fully preserve these shapes during processing. Their paper, published in Physical Review Letters, could serve as the basis for the development of new gates that can process entangled photonic wave packets more effectively than unentangled ones.

“There are several candidate architectures for the development of quantum technology, including superconductors, ion traps, , optical, and so on,” Ihar Babushkin, one of the researchers who carried out the study, told Phys.org. “Regardless of what architecture we consider, photons, the quanta of light, will play an important role, since in almost all architectures the mediators between quantum information bits (qubits) are photons.”

Apr 11, 2022

Call For Papers & Stuff

Posted by in categories: cybercrime/malcode, education, ethics

Closes July 31st at Midnight

The Texas Cyber Summit is a three day multi-track novice to ninja technical cybersecurity event held annually with an expectation of over 1,200 participants in-person. Note that the in-person will take place in September 22nd – 24th, and the Virtual Conference will take place in November 5th. Featuring five dedicated learning tracks for the aspiring Cybersecurity novice to the expert operator. Deeply technical, research and management briefings that address the entire cyber threat landscape. The Texas Cyber Summit is held in Austin, Tx and is a IRS 501C3 Non-Profit Organization.

Austin is home to major fortune 500 companies, Cyber Futures Command, Defense Logistics Agency, and Air force logistics. We host Specialized tracks include teaching, training, responsibilities, and ethics in specialized fields such as digital forensics, Scada, Supply Chain, Red Team Tools, Tactics and Procedures, Blue Team and the Art of Defense, and much more.

Apr 11, 2022

Optical vortex crystals for photonic simulations of complex systems

Posted by in categories: climatology, nanotechnology, space

The system developed in Milano is robust and it also has the potential to process information encoded in different coupled systems, including far and enormous galaxies. Thanks to these new results, it is now possible to simulate in the lab complex coupled systems, with order altered by stable defects, difficult to be reproduced otherwise since involving ginormous scale, like galaxies, or part of extreme hydrodynamic systems.


Water whirlpools, smoke rings, violent tornados and spiral galaxies are all examples of twists in fluids, although very different each other. Analogous twists, but in the realm of light, have been created by the research group coordinated by Antonio Ambrosio at the IIT-Istituto Italiano di Tecnologia (Italian Institute of Technology), in Milano (Italy). The results, published in the journal Nature Photonics, show the realization of 100 light vortices, coupled to form an ordered structure, a light crystal.

Mutual interaction of light and nanostructured materials is the focus of the research of Antonio Ambrosio, Principal Investigator of the research line Vectorial Nano-imaging at IIT in Milano and grantee of the ERC Consolidator project “METAmorphoses.”

Continue reading “Optical vortex crystals for photonic simulations of complex systems” »

Apr 11, 2022

Thousands of new viruses discovered in the ocean

Posted by in categories: biotech/medical, genetics

More than 5,000 new virus species have been identified in the world’s oceans, according to a new study.

The study researchers analyzed tens of thousands of water samples from around the globe, hunting for RNA viruses, or viruses that use RNA as their genetic material. The novel coronavirus, for instance, is a type of RNA virus. These viruses are understudied compared with DNA viruses, which use DNA as their genetic material, the authors said.

Apr 11, 2022

No small measure: Probing the mechanics of gold contacts at the nanoscale

Posted by in categories: nanotechnology, particle physics, quantum physics

Miniaturization lies at the heart of countless technological advances. It is undeniable that as devices and their building blocks get smaller, we manage to unlock new functionalities and come up with unprecedented applications. However, with more and more scientists delving into materials with structures on the atomic scale, the gaps in our current understanding of nanomaterial physics are becoming more prominent.

For instance, the nanomaterial’s surface represents one such knowledge gap. This is because the influence of surface quantum effects becomes much more apparent when the surface-to-volume ratio of a material is high. In nanoelectromechanical systems (NEMS), a current hot topic in research, the physical properties of the nanomaterials greatly differ from their bulk counterparts when their size is reduced to a few atoms. A solid understanding of the mechanical properties of nanowires and nanocontacts—integral components of NEMS—is essential for advancing this technology. But, measuring them has proven a challenging task.

Against this backdrop, a research team from Japan recently achieved an unprecedented feat when they managed to precisely measure the elastic modulus of gold nanocontacts stretched down to a few atoms. The study, published in Physical Review Letters, was led by Prof. Yoshifumi Oshima of Japan Advanced Institute of Science and Technology (JAIST). The rest of the team included post-doctoral research fellow Jiaqi Zhang and Professor Masahiko Tomitori from JAIST, and Professor Toyoko Arai of Kanazawa University.

Apr 11, 2022

Extraterrestrial Intelligence Messaging Has Changed Recently

Posted by in category: alien life

On April 1st this year, a team of scientists led by NASA’s Jet Propulsion Laboratory posted a proposed new message to be sent to prospective intelligent extraterrestrials. The coincidence of April Fool’s Day in this case should be ignored. This actually is very real. The rationale for the message can be found in an article entitled, “A Beacon in the Galaxy: Updated Arecibo Message for Potential FAST and SETI Projects,” which has been submitted to the journal Galaxy and is currently posted on a pre-print server for review.

The article title includes the terms FAST and SETI. If you are not familiar with FAST, the acronym stands for the Five-Hundred-meter Aperture Spherical Telescope being built in China (see picture above) that will be the largest parabolic radio telescope in the world and capable of intercepting the faintest radio signals from across the Universe. SETI, the Search for Extraterrestrial Intelligence, is far better known and was featured prominently in the science fiction movie, Contact, based on a Carl Sagan novel.

What kind of message is being sent? And how will intelligent aliens be able to decipher it? Since the first radios and television signals were broadcast, humanity has been streaming information into outer space with no thought of how the information would be perceived by an intelligent technically advanced civilization on the receiving end. And even before radios, sending a message to intelligent aliens was proposed. In the early 1800s an Austrian astronomer wanted to carve out a geometric pattern of trenches in the Sahara Desert, fill them with kerosene and then light it all up tobe a beacon for any aliens living nearby.

Apr 11, 2022

NREL Researchers Plot Energy Storage Under Our Feet

Posted by in category: energy

Oil and gas wells no longer in use could be the answer.


NREL researchers Chad Augustine (left) and David Young, along with former colleague Henry Johnston, have been examining the idea of using depleted oil and gas wells as a reservoir for the storage of natural gas. The gas can then be released, as needed, to spin a turbine and generate electricity. Photo by Werner Slocum, NREL.

Chad Augustine and his colleagues at the National Renewable Energy Laboratory (NREL) see opportunity where others might simply see a hole in the ground.

Continue reading “NREL Researchers Plot Energy Storage Under Our Feet” »

Apr 11, 2022

Cloud server leasing can leave sensitive data up for grabs

Posted by in categories: business, computing, engineering, security, space

Renting space and IP addresses on a public server has become standard business practice, but according to a team of Penn State computer scientists, current industry practices can lead to “cloud squatting,” which can create a security risk, endangering sensitive customer and organization data intended to remain private.

Cloud squatting occurs when a company, such as your bank, leases space and IP addresses—unique addresses that identify individual computers or computer networks—on a public server, uses them, and then releases the space and addresses back to the public server company, a standard pattern seen every day. The public server company, such as Amazon, Google, or Microsoft, then assigns the same addresses to a second company. If this second company is a bad actor, it can receive information coming into the address intended for the original company—for example, when you as a customer unknowingly use an outdated link when interacting with your bank—and use it to its advantage—cloud squatting.

“There are two advantages to leasing server space,” said Eric Pauley, doctoral candidate in computer science and engineering. “One is a cost advantage, saving on equipment and management. The other is scalability. Leasing server space offers an unlimited pool of computing resources so, as workload changes, companies can quickly adapt.” As a result, the use of clouds has grown exponentially, meaning almost every website a user visits takes advantage of cloud computing.

Apr 11, 2022

Researchers discover how to improve eyesight naturally

Posted by in category: life extension

The world is aging, and with age comes vision decline. New research may have found how to improve eyesight in an accessible way.

Apr 11, 2022

Android banking malware takes over calls to customer support

Posted by in categories: cybercrime/malcode, finance, robotics/AI

A banking trojan for Android that researchers call Fakecalls comes with a powerful capability that enables it to take over calls to a bank’s customer support number and connect the victim directly with the cybercriminals operating the malware.

Disguised as a mobile app from a popular bank, Fakecalls displays all the marks of the entity it impersonates, including the official logo and the customer support number.

When the victim tries to call the bank, the malware breaks the connection and shows its call screen, which is almost indistinguishable from the real one.