Category Physics

Could New Technique for ‘Curving’ Light be the Secret to Improved Wireless Communication?

A study that could help revolutionize wireless communication introduces a novel method to curve terahertz signals around an obstacle. Illustration provided by the Mittleman Group

A study that could help revolutionize wireless communication introduces a novel method to curve terahertz signals around an obstacle.

While cellular networks and Wi-Fi systems are more advanced than ever, they are also quickly reaching their bandwidth limits. Scientists know that in the near future they’ll need to transition to much higher communication frequencies than what current systems rely on, but before that can happen there are a number of — quite literal — obstacles standing in the way.

Researchers from Brown University and Rice University say they’ve advanced one step closer to getting around t...

Read More

Quantinuum Quantum Computer using Microsoft’s ‘Logical Quantum Bits’ runs 14,000 Experiments with No Errors

Quantinuum quantum computer using Microsoft's 'logical quantum bits' runs 14,000 experiments with no errors
High-level depiction of the logical program of the Bell resource-state preparation using the Steane code. Credit: arXiv (2024). DOI: 10.48550/arxiv.2404.02280

A team of computer engineers from quantum computer maker Quantinuum, working with computer scientists from Microsoft, has found a way to greatly reduce errors when running experiments on a quantum computer. The combined group has published a paper describing their work and results on the arXiv preprint server.

Computer scientists have been working for several years to build a truly useful quantum computer that could achieve quantum supremacy. Research has come a long way, most of which has involved adding more qubits.

But such research has been held up by one main problem—quantum computers make a lot of errors...

Read More

Computer Scientists discover Gap in the Latest Security Mechanisms used by some Chips

computer chips
Credit: CC0 Public Domain

Over the past few years, hardware manufacturers have developed technologies that ought to make it possible for companies and governmental organizations to process sensitive data securely using shared cloud computing resources. Known as confidential computing, this approach protects sensitive data while it is being processed by isolating it in an area that is impenetrable to other users and even to the cloud provider. But computer scientists at ETH Zurich have now proven that it is possible for hackers to gain access to these systems and to the data stored in them.

The researchers ran two attack scenarios, both using what’s known as the interrupt mechanism, which temporarily disrupts regular processing—for instance to prioritize a different computing task...

Read More

Universal Brain-Computer Interface lets People Play Games with just their Thoughts

Texas Engineering student wearing electrode cap at computer desk
Hussein Alawieh, a graduate student in Dr. José del R. Millán’s lab, wears a cap packed with electrodes that is hooked up to a computer. The electrodes gather data by measuring electrical signals from the brain, and the decoder interprets that information and translates it into game action.

Engineers have created a brain-computer interface that doesn’t require calibration for each user, paving the way for widespread clinical applicability.

Imagine playing a racing game like Mario Kart, using only your brain to execute the complex series of turns in a lap.

This is not a video game fantasy, but a real program that engineers at The University of Texas at Austin have created as part of research into brain-computer interfaces to help improve the lives of people with motor disabiliti...

Read More