Menu

Blog

Page 34

Nov 16, 2024

Optoacoustic Entanglement in a Continuous Brillouin-Active Solid State System

Posted by in category: quantum physics

Entanglement in hybrid quantum systems comprised of fundamentally different degrees of freedom, such as light and mechanics, is of interest for a wide range of applications in quantum technologies. Here, we propose to engineer bipartite entanglement between traveling acoustic phonons in a Brillouin active solid state system and the accompanying light wave. The effect is achieved by applying optical pump pulses to state-of-the-art waveguides, exciting a Brillouin Stokes process. This pulsed approach, in a system operating in a regime orthogonal to standard optomechanical setups, allows for the generation of entangled photon-phonon pairs, resilient to thermal fluctuations. We propose an experimental platform where readout of the optoacoustics entanglement is done by the simultaneous detection of Stokes and anti-Stokes photons in a two-pump configuration.

Nov 16, 2024

A new system of logic could boost critical thinking and AI

Posted by in categories: mathematics, robotics/AI

The rigid structures of language we once clung to with certainty are cracking. Take gender, nationality or religion: these concepts no longer sit comfortably in the stiff linguistic boxes of the last century. Simultaneously, the rise of AI presses upon us the need to understand how words relate to meaning and reasoning.

A global group of philosophers, mathematicians and have come up with a new understanding of logic that addresses these concerns, dubbed “inferentialism”

One standard intuition of logic, dating back at least to Aristotle, is that a logical consequence ought to hold by virtue of the content of the propositions involved, not simply by virtue of being “true” or “false”. Recently, the Swedish logician Dag Prawitz observed that, perhaps surprisingly, the traditional treatment of logic entirely fails to capture this intuition.

Nov 16, 2024

Quantum Leap: Innovative Breakthrough in Entangling Light and Sound

Posted by in categories: computing, quantum physics

A new quantum entanglement approach by Max-Planck-Institute scientists uses Brillouin scattering to link photons with acoustic phonons, enhancing stability and operating at higher temperatures.

Quantum entanglement is essential for many cutting-edge quantum technologies, including secure quantum communication and quantum computing. Researchers at the Max Planck Institute for the Science of Light (MPL) have developed an efficient new method to entangle photons with acoustic phonons. Their approach overcomes one of the most significant challenges in quantum technology—vulnerability to external noise. This groundbreaking research, published on November 13 in Physical Review Letters, opens new possibilities for robust quantum systems.

Exploring Optoacoustic Entanglement

Nov 16, 2024

Revolutionizing AI: The Tiny Tech Powering Brain-Like Computers

Posted by in categories: futurism, robotics/AI

Researchers are developing atomically precise memristors for advanced neuromorphic computing systems.

The University of Kansas and University of Houston, backed by $1.8 million from the National Science Foundation’s Future of Semiconductor program (FuSe2), are collaborating to develop atomically tunable memory resistors, known as “memristors.” These advanced components are designed for brain-inspired computing applications and will support workforce development in the semiconductor industry.

Launched in 2023, the FuSe2 program addresses key challenges in semiconductor research and development, with industry partners including Micron, Intel, and Samsung.

Nov 16, 2024

Northeastern University Research Says Quantum Computing is a ‘Big Deal’ For Massachusetts, World

Posted by in categories: computing, quantum physics

Recent investments could position Massachusetts as a leader in this transformative technology, according to Northeastern Global News.

Nov 16, 2024

Computeritis, n. meanings, etymology and more | Oxford English Dictionary

Posted by in category: computing

The excessive use of computers or the fact of being detrimentally influenced by computers.


computeritis, n. meanings, etymology, pronunciation and more in the Oxford English Dictionary.

Nov 16, 2024

New DoD Report: UAP “Not Attributable to Foreign Adversaries”

Posted by in category: futurism

A release today of the Department of Defense annual report on Unidentified Anomalous Phenomena (UAP) comes one day after a witness-based Congressional hearing on the topic.

The All-domain Anomaly Resolution Office’s Annual Report on Unidentified Anomalous Phenomena is required by the National Defense Authorization Act (NDAA) for Fiscal Year 2022, as amended by the NDAA for Fiscal Year 2023.

“Analyzing and understanding the potential threats posed by UAP is an ongoing collaborative effort involving many departments and agencies,” said a DoD statement.

Nov 16, 2024

AI tool predicts cancer gene activity from biopsy images

Posted by in categories: biotech/medical, genetics, robotics/AI

To determine the type and severity of a cancer, pathologists typically analyze thin slices of a tumor biopsy under a microscope. But to figure out what genomic changes are driving the tumor’s growth—information that can guide how it is treated—scientists must perform genetic sequencing of the RNA isolated from the tumor, a process that can take weeks and costs thousands of dollars.

Now, Stanford Medicine researchers have developed an artificial intelligence-powered computational program that can predict the activity of thousands of genes within based only on standard microscopy images of the biopsy.

The tool, described online in Nature Communications Nov. 14, was created using data from more than 7,000 diverse tumor samples. The team showed that it could use routinely collected biopsy images to predict genetic variations in breast cancers and to predict .

Nov 16, 2024

Six US Banks Issue Urgent Debit Card Alerts, Forcing Mandatory Replacements for Many, After Third-Party Security Breach

Posted by in categories: finance, government, security

Six US banks are reporting potential security breaches of debit cards, with several forcing affected customers to get replacements.

In new filings with the Massachusetts state government, Mainstreet Bank, Savers Bank, The Village Bank, Watertown Savings Bank, Webster Five Cents Savings Bank and Eagle Bank say some debit cards may have been compromised following a security breach of a merchant’s payment card platform.

A copy of a notice sent to Eagle Bank customers was recently posted on the government site, stating an unnamed Mastercard merchant allowed unauthorized access to account information.

Nov 16, 2024

Identity Security Is The Cornerstone Of Modern Cyber Defense

Posted by in categories: cybercrime/malcode, innovation

The Semperis Hybrid Identity Protection conference kicked off today in New Orleans, gathering identity security experts, practitioners, and thought leaders to explore the evolving world of hybrid identity. This year’s conference, more relevant than ever, highlights a fundamental shift in how organizations approach identity—not just as a tool for managing user access but as a critical layer of cybersecurity that shapes an organization’s defensive posture. In an era of remote work, cloud adoption, and advanced cyber threats, identity has become the new perimeter, making events like HIP essential for fostering innovation, resilience, and collective knowledge in the industry.

Historically, identity management was an IT utility—a straightforward way to grant employees access to necessary resources. However, as digital transformations swept through organizations, the role of identity shifted dramatically. Identity is now central to security strategies, especially with the explosion of SaaS applications, remote access, and mobile workforces. For many organizations, identity is not just about provisioning accounts; it’s the first and last line of defense against unauthorized access and data breaches.

This transition has led to a realignment within organizations, where identity management is increasingly overseen by CISOs rather than traditional IT teams. CISOs recognize that identity management is a security function with direct implications on risk mitigation, compliance, and resilience.

Page 34 of 12,043First3132333435363738Last