Menu

Blog

Page 6280

Jun 9, 2020

Novel photovoltaics generate electrical power from thermal sources

Posted by in categories: chemistry, nuclear energy

Devices based on photon-assisted tunnelling could harvest energy from nuclear power stations, chemical manufacturing facilities and other sources of waste heat.

Jun 9, 2020

Scientists Apply Revolutionary 30 Year-Old Principle and Find Black Holes Could Be Like Holograms

Posted by in categories: cosmology, holograms, quantum physics

According to new research, black holes could be like a hologram, where all the information is amassed in a two-dimensional surface able to reproduce a three-dimensional image.

We can all picture that incredible image of a black hole that traveled around the world about a year ago. Yet, according to new research by SISSA, ICTP and INFN, black holes could be like a hologram, where all the information is amassed in a two-dimensional surface able to reproduce a three-dimensional image. In this way, these cosmic bodies, as affirmed by quantum theories, could be incredibly complex and concentrate an enormous amount of information inside themselves, as the largest hard disk that exists in nature, in two dimensions. This idea aligns with Einstein’s theory of relativity, which describes black holes as three dimensional, simple, spherical, and smooth, as they appear in that famous image. In short, black holes “appear” as three dimensional, just like holograms. The study which demonstrates it, and which unites two discordant theories, has recently been published in Physical Review X.

The mystery of black holes.

Jun 9, 2020

How Covid-19 changes the geopolitics of semiconductor supply chains

Posted by in category: biotech/medical

Devoted to the principle of comparative advantage in the pursuit of efficiency, this industry had forsaken resilience. As a result, this lean and agile supply chain made itself vulnerable not just to a global risk event such as Covid-19 but also to export controls such as the ones directed against Huawei. The events of the past six months are likely to force a re-evaluation of this trade-off towards building more redundancy.

Specifically, the semiconductor supply chain is susceptible to four risks.


Covid-19 is likely to accelerate the move towards more resilience in the semiconductor industry.

Continue reading “How Covid-19 changes the geopolitics of semiconductor supply chains” »

Jun 9, 2020

No, The Laws Of Physics Are Not The Same Forwards And Backwards In Time

Posted by in category: physics

This corresponds to a certain symmetry of nature: T-symmetry, or time-reversal invariance. Our everyday experience indicates to us, quite strongly, that the laws of physics must violate this symmetry, but for decades, we couldn’t demonstrate it. But a few years ago, we experimentally proved the laws of physics are different depending on which direction time runs. Here’s how we know.

Jun 9, 2020

Russia will open nuclear disarmament talks with US

Posted by in categories: nuclear weapons, treaties

But Moscow warns against insisting on including China in New Start negotiations.

Jun 9, 2020

A supernumerary robotic arm adds functionality for carrying out common tasks

Posted by in categories: robotics/AI, wearables

A team of researchers at Université de Sherbrooke with assistance from a group at Exonetik Inc., has created a wearable supernumerary robotic arm that adds functionality for common human tasks. In their paper published in IEEE Spectrum, the group describes their robotic arm, its abilities and their plans for expanding its functionality.

A supernumerary robotic device is of a type that adds functionality to an existing system. In this case, the team in Canada added a third arm and associated three-fingered hand to a human subject.

Continue reading “A supernumerary robotic arm adds functionality for carrying out common tasks” »

Jun 9, 2020

Google Maps to display virus-related transit alerts

Posted by in categories: biotech/medical, mobile phones, transportation

A new version of Google’s mapping service being rolled out will display pandemic-related transit alerts and let people know when buses or trains might be crowded.

Updated versions of the free app for smartphones powered by Apple or Google-backed Android software will also let drivers know about COVID-19 checkpoints or restrictions on their routes.

“We’re introducing features to help you easily find important information if you need to venture out, whether it’s by car or public transportation,” Google Maps product management director Ramesh Nagarajan said in a blog post.

Jun 9, 2020

This Is Why Black Holes Must Spin At Almost The Speed Of Light

Posted by in categories: cosmology, mathematics

Many of them are spinning at nearly the speed of light. When you do the math, there’s no other way it could have been.

Jun 9, 2020

Synthetic red blood cells mimic natural ones, plus have new abilities

Posted by in category: biotech/medical

Scientists have created blood cell replicas – using a combination of polymers and silica – which not only mimic the real thing, but are also capable of delivering new cargoes.

Jun 9, 2020

DARPA invites hackers to break hardware to make it more secure

Posted by in categories: cybercrime/malcode, military

For more than two years, the Pentagon’s research arm has been working with engineers to beef up the security of computer chips before they get deployed in weapons systems or other critical technologies.

Now, the research arm — the Defense Advanced Research Projects Agency (DARPA) — is turning the hardware over to elite white-hat hackers who can earn up to $25,000 for bugs they find. The goal is to throw an array of attacks at the hardware so its foundations are more secure before production.

“We need the researchers to really roll their sleeves up and dig into what we’re doing and try to break it,” said Keith Rebello, a DARPA program manager. Hardware hacks often involve identifying vulnerabilities in how a computer chip handles information, like the flaw uncovered in Intel microprocessors in March that could have allowed attackers to run malicious code early in the boot process.