The control of modern infrastructure, such as intelligent power grids, needs lots of computing capacity. Scientists have developed an algorithm that might revolutionize these processes. With their new software, researchers are able to forego the use of considerable amounts of computing capacity, enabling what they call micro mining.
In the digital age in which we live, monitoring, security breaches and hacks of sensitive data...
Playing violent video games in 3-D makes everything seem more real — and that may have troubling...
Bio-engineers are working on the development of biological computers with the aim of designing...
Russian scientists have developed a theoretical model of quantum memory for light, adapting the concept of a hologram to a quantum system. The authors demonstrate for the first time that it is theoretically possible to retrieve, on demand, a given portion of the stored quantized light signal of a holographic image — set in a given direction in a given position in time sequence.
The supply chain is ground zero for several recent cyber breaches. Hackers, for example, prey on vendors that have remote access to a larger company's global IT systems, software and networks. In the 2013 Target breach, the attacker infiltrated a vulnerable link: a refrigeration system supplier connected to the retailer's IT system. A counter-measure, via a user-ready online portal, has been developed at the Supply Chain Management Center.
EPFL scientists have designed a first-ever experiment for demonstrating quantum entanglement in the macroscopic realm. Unlike other such proposals, the experiment is relatively easy to set up and run with existing semiconductor devices. Interest in entanglement is increasing today, as it challenges the foundations of quantum mechanics itself.
A Purdue-based startup is developing high-temperature "plasmonic metamaterials" that could dramatically increase data-storage capabilities, improve solar-cell and waste-heat recovery performance and provide a new avenue for clinical therapeutics.
Where are the quantum computers? Aren’t they supposed to be speeding up decryption and internet searches? After two decades of research, you still can’t find them in stores. Well, it took two decades or more of research dedicated to semiconductors and circuit integration before we had digital computers. For quantum computers too it will take technology more time to catch up to the science.
Researchers have brought ultra-fast, nano-scale data storage within striking reach, using technology that mimics the human brain. They have built a novel nano-structure that offers a new platform for the development of highly stable and reliable nanoscale memory devices.
A researcher proposes to construct a new quantum computer, able to perform multiple operations in a few seconds, which is based on the diamond structure to process information similarly to regular computers but with their own units of information called qubits that allow much faster data processing, equal to one thousand computers working simultaneously.
Researchers have shown that information stored in quantum bits can be exponentially compressed without losing information. The achievement is an important proof of principle, and could be useful for efficient quantum communications and information storage. Compression is vital for modern digital communication. It helps movies to stream quickly over the Internet and millions of telephone calls to bounce off of satellites.
New research by biomedical engineers at the University of Minnesota shows that people who practice yoga and meditation long-term can learn to control a computer with their minds faster and better than people with little or no yoga or meditation experience. The research could have major implications for treatments of people who are paralyzed or have neurodegenerative diseases.
Electricity and magnetism rule our digital world. Semiconductors process electrical information, while magnetic materials enable long-term data storage. A University of Pittsburgh research team has discovered a way to fuse these two distinct properties in a single material, paving the way for new ultrahigh density storage and computing architectures.
Building on previous research that twisted light to send data at unheard-of speeds, scientists at University of Southern California (USC) have developed a similar technique with radiowaves, reaching high speeds without some of the hassles that can go with optical systems.
The interaction between atoms and light is well-known and has been studied extensively in the field of quantum optics. However, to achieve the same kind of interaction with sound waves has been a more challenging undertaking. In collaboration between experimental and theoretical physicists, Chalmers University of Technology researchers have succeeded in making acoustic waves couple to an artificial atom.
Electrons that break the rules and move perpendicular to the applied electric field could be the key to delivering next generation, low-energy computers, a collaboration of scientists from The University of Manchester and the Massachusetts Institute of Technology have found. They report a material in which electrons move at a controllable angle to applied fields, similar to sailboats driven diagonally to the wind.
Some mysteries of science can only be explained on a nanometer scale — even smaller than a single strand of human DNA, which is about 2.5 nanometers wide. At this scale, scientists can investigate the structure and behavior of proteins that help our bodies fight infectious microbes, and even catch chemical reactions in action. To resolve these very fine details, they rely on synchrotron light sources like the ALS at Berkeley Lab.
CAPTCHA services that require users to recognize and type in static distorted characters may be a method of the past, according to studies published by researchers at the University of Alabama at Birmingham. Nitesh Saxena led a team that investigated the security and usability of the next generation of CAPTCHAs that are based on simple computer games.
Intel Corporation unveiled its first eight-core desktop processor, the Intel Core i7-5960X processor Extreme Edition, formerly code-named "Haswell-E," targeted at power users who demand the most from their PCs. Intel's first client processor supports 16 computing threads.
How do you prevent an earthquake from destroying expensive computer systems? That’s the question earthquake engineer Claudia Marin-Artieda aims to answer through a series of experiments conducted at the University at Buffalo.
The 22nd International Molecular Medicine Tri-Conference is the industry's Preeminent Event on Molecular Medicine, focusing on Drug Discovery, Genomics, Diagnostics and Information Technology. Spanning six days this year, the Tri-Conference includes an expanded program that includes 6 symposia, over 20 short courses, and 17 conference programs.
The 2015 Bio-IT World Conference & Expo plans to unite 3,000+ life sciences, pharmaceutical, clinical, healthcare, and IT professionals from 32+ countries. The Expo provides the perfect venue to share information and discuss enabling technologies that are driving biomedical research and the drug development process.
Researchers in Bangladesh have designed a computer program that can accurately recognize users’ emotional states as much as 87 percent of the time, depending on the emotion. Writing in the journal Behaviour & Information Technology, A.F.M. Nazmul Haque Nahin and his colleagues describe how their study combined — for the first time — two established ways of detecting user emotions: keystroke dynamics and text-pattern analysis.
High-profile security breaches, data thefts and cyberattacks are increasing in frequency, ferocity and stealth. They result in significant loss of revenue and reputation for organizations, destabilize governments, and hit everyone’s wallets. Cybersecurity is in the global spotlight and, now more than ever, organizations must understand how to identify weaknesses and protect company infrastructure from incursions.
According to a group of journalists, a spy program known as "Hacienda" is being used by five western intelligence agencies to identify vulnerable servers across the world in order to control them and use them for their own purposes. However, scientists at the Technische Universität München have developed free software that can help prevent this kind of identification and, thus, the subsequent capture of systems.
A photo is worth a thousand words, but what if the image could also represent thousands of other images? New software seeks to tame the vast amount of visual data in the world by generating a single photo that can represent massive clusters of images. This tool can give users the photographic gist of a kid on Santa’s lap or housecats. It works by generating an image that literally averages the key features of the other photos.
The Research Data Alliance seeks to build the social and technical bridges that enable open sharing and reuse of data, so as to address cross-border and cross-disciplinary challenges faced by researchers. This September, the RDA will be hosting its Fourth Plenary Meeting. Ahead of the event, iSGTW spoke to Gary Berg-Cross, general secretary of the Spatial Ontology Community of Practice and a member of the US advisory committee for RDA.
Just about everything you ever wanted to know about quantum simulators is summed up in a new review. As part of a Thematic Series on Quantum Simulations, the open access journal European Physical Journal Quantum Technology has published an overview of just what a quantum simulator is, namely a device that actively uses quantum effects to answer questions on model systems.
- Page 1