Page 3,298«..1020..3,2973,2983,2993,300..3,3103,320..»

Quantum Technology: Harnessing the Power of Quantum Mechanics – Analytics Insight

Over the years, quantum mechanics has paved the way of humans understanding of the physical world. From the interaction of light and matter to pervasive inventions like lasers and semiconductor transistors, it provides an account of the physical properties of nature at the scale of atoms and subatomic particles. In todays digital age, every business and even country is racing to achieve quantum supremacy. Last year, tech giant Google claimed that it has achieved quantum supremacy by developing a quantum computer called Sycamore. It has the ability to perform a test computation in just 200 seconds against the most powerful supercomputers that likely to take thousands of years to accomplish.

Despite decades of research, the quantum world still remains enigmatic and far away from the human imagination. Quantum technology refers to an emerging field of physics and engineering, relying on the principles of quantum physics. It was first delineated in a 1997 book by Gerard J. Milburn. After that, the technology has accepted immensely from the influx of new ideas from the field of quantum information processing, especially quantum computing.

When it comes to technology, advancements in both business and technological applications have always progressed hand in hand. The field of quantum technology which has been around for decades promises dramatic applications such as the creation of novel materials, advanced metrology, secure communication, and more. Many organizations realize the benefits of quantum technologies to society, industry and academia. Governments are also investing in research and commercialization of these technologies, while universities are exploring implausible applications.

China, for instance, recently demonstrated secure quantum communication links between terrestrial stations and satellites. In the journalNature, the team of 24 scientists reported new progress of successfully testing the transmission of a secret key for encrypting and decrypting messages between a satellite and two ground stations located roughly 700 miles apart. The method enlisted quantum entanglement, an idea of modern physics that seems ridiculously at odds with common sense.

In anarticle, Paul Martin, Quantum Technology Expert noted that with the latest feats of engineering harnessing more of the potential of quantum mechanics, quantum technology is gaining new hype 50 years later it became a part of human lives through nuclear power. According to him, we are now starting to control quantum entanglement and quantum superposition. That means quantum technology promises improvements to a broad range of everyday gadgets, including more reliable navigation and timing systems; more secure communications; more accurate healthcare imaging; and more powerful computing.

Along with private companies capital investments, government support of quantum technologies has created an optimistic environment for the future of this technology. For example, the UK Government has invested around 400 million in the UK National Quantum Technologies Programme to develop the countrys strong research capabilities in Quantum Technologies. The programme is a collaborative initiative to advance technology and provide long-term benefits to society. Within the programme, four quantum technology hubs were created, each with a particular focus.

On the other side, the Indian Government in the recent 2020 budget announced plans to invest US$1.12 billion in quantum computing research over the next five years. The US, China, Japan, Germany, and Canada have already announced ambitious schemes to bolster quantum computing programs.

Go here to read the rest:

Quantum Technology: Harnessing the Power of Quantum Mechanics - Analytics Insight

Read More..

Will the Universe Remember Us after We’re Gone? – Scientific American

Im a compulsive journal-scribbler. This habit, which goes back to my teens, has proved useful to my career. All my articles and books start as journal entries. But my motivation is not merely professional. If I dont record my thoughts, I wont remember them, and they wont matter. So I fear. This feeling has grown as Ive aged.

Compounding my concern is the possibilityno, probabilitythat one day humanity and all its residues will vanish. Our works of science, mathematics, philosophy, art, music and, yes, journalism will slip back into the void whence they came. Everything we have thought and done will be for naught. If nothing about us endures, if nothing is remembered, we might as well never have existed.

No wonder so many of us, even in this age of scientific materialism, still believe in God. An immortal, omniscient being watches over each and every one of us, and not just celebrities like Einstein and Beyonce. He/she/it/they also surely remembers us after were gone, like a cosmic backup device with infinite storage capacity. Supposedly. If this divine entity does not exist, and someday all traces of us disappear forever, in what sense do our lives matter?

Scientists are not immune to such anxieties. Existential angst, I suspect, accounts for physicists belief in conservation of information. I first heard about this proposition years ago, but Ive only given it serious consideration over the last few months, which Ive spent trying to learn quantum mechanics.

Two of my main texts are The Theoretical Minimum books on classical and quantum mechanics by Stanford physicist Leonard Susskind (with two co-authors). Susskind imparts what you need to know to start doing physics. One thing we definitely need to know, according to Susskind, is that information is never lost. This law, Susskind asserts, underlies everything else.

Conservation of information is more fundamental, he says, than Newtons first law (motion is conserved); the first law of thermodynamics (energy is conserved); and what is sometimes called the zeroth law of thermodynamics (if systems A and B are in equilibrium with C, then A and B are in equilibrium with each other). Hence Susskind calls conservation of information the minus-first law.

The minus-first law encompasses the principle of determinism, which holds that if you know the current state of a system, you know all of its past and future. The French polymath Simon-Pierre LaPlace famously spelled out the implications of determinism over 200 years ago:

An intellect which at a certain moment would know all forces that set nature in motion, and all positions of all items of which nature is composed, if this intellect were also vast enough to submit these data to analysis, it would embrace in a single formula the movements of the greatest bodies of the universe and those of the tiniest atom; for such an intellect nothing would be uncertain and the future just like the past would be present before its eyes.

This omniscient intellect has come to be known as LaPlaces demon. Susskind insists that quantum mechanics, although not deterministic in the same way as classical mechanics, still conforms to the minus-first law. In a 2008 interview he said the minus-first law underpins everything, including classical physics, thermodynamics, quantum mechanics, energy conservation, that physicists have believed for hundreds of years.

In the 1980s Stephen Hawking challenged the minus-first law, claiming that black holes destroy information. Hawkings hypothesis touched off a crisis in physics, a clash of basic principles like no other since Einstein was young, Susskind said in 2008. He rebutted Hawking in papers and a popular book, The Black Hole War: My Battle with Stephen Hawking to Make the World Safe for Quantum Mechanics.

All the information sucked into a black hole, Susskind argues, is preserved in its outer membrane, or event horizon, where space and time undergo bizarre distortions. In a review of Black Hole War, journalist George Johnson bravely takes a stab at explaining Susskinds thesis: A description of everything that falls into a black hole, whether a book or an entire civilization, is recorded on the surface of its horizon and radiated back like imagery on a giant drive-in movie screen.

Susskind, as you might guess from Johnsons review, is fond of theories that cannot be empirically tested and hence potentially falsified. In his 2005 book The Cosmic Landscape, Susskind contends that our universe is just a hillock in an infinite landscape of universes. This proposal is pure speculation, and hence arguably unscientific, because we have no way to prove or disprove the existence of other universes.

Perhaps Susskind and other physicists dont want us lay folk to take ideas like the multiverse or minus-first law too seriously. Maybe these are just metaphors, poetic fancies, like the Holy Ghost in Catholicism. But physicists seem to pride themselves on saying what they mean. So, Im going to take Susskind at his word when he declares that information is never lost.

Let me tease out the implications of that remarkable statement. First, as I have argued previously, the concept of information doesnt make any sense in the absence of something to be informed, that is, a mind. Information requiresit presupposesconsciousness. So, if information is conserved, so is consciousness. If consciousness exists now, it must always exist. Or so the minus-first law implies.

In fact, many scientists and philosophers have proposed that consciousness is as fundamental as matter, or even more fundamental. Ive lumped these speculations together under the label neo-geocentrism, because they resurrect the ancient, narcissistic notion that the universe revolves around us. Neo-geocentric theories represent attempts to sneak a consoling religious assumptionthis universe is all about usback into science, and so does conservation of information.

If I had to rank laws of physics, Id go with the second law of thermodynamics, which holds that disorder, or entropy, always increases. Our expanding cosmos is headed toward heat death, a state of terminal boringness, in which nothing ever happens. The second law of thermodynamics, evidence for which I see whenever I look in the mirror or read the news, trumps the minus-first law.

Actually, Im suspicious of all laws of physics, which strike me as manifestations of scientific hubris. Scientists take an assumption that applies under certain very tightly controlled conditions, usually with lots of qualifications, and transform it into a cosmic principle that applies to all things at all times in all places. But Im especially skeptical of the minus-first law.

Never mind Hawkings conjecture that black holes destroy information. Im worried about far more mundane processes. Three years ago, strokes severely damaged my fathers memory, making it hard for him to recognize me and my siblings. Last June he died, at the age of 96, and my stepmother had his body cremated. My father persists, sort of, in the fragmentary, fading recollections of those who loved him. Polymath Douglas Hofstadter coined the heartbreaking phrase soular coronas to describe our memories of those eclipsed by death. But one day well die too.

The minus-first law implies that the universe will bear the imprint of my fathers life forever. Long after our sun and even the entire Milky Way have flickered out, aliens with the godlike powers of LaPlaces demon could in principle (that handy, all-purpose hedge) reconstruct the lives of my father and every other person who has ever lived.

Thats a nice thought (which inspired the 1996 book The Physics of Immortality by physicist Frank Tipler.) But I dont buy conservation of information any more than I buy reincarnation or heavenor a god who cherishes us. These propositions, scientific and religious, represent understandable but finally unpersuasive attempts at consolation. My contemplation of the inevitable loss of everyone and everything I love unsettles me. But Id rather face death squarely than take refuge in false assurances from priests or physicists.

In The Black Hole War, Susskind strikes a rare (for him) note of humility: Very likely we are still confused beginners with very wrong mental pictures, and ultimate reality remains far beyond our grasp. (I found this quote in a blog post by physicist Peter Woit.) On this point, Susskind and I agree.

Meanwhile, as my end looms, I keep frantically filling up notebooks.

Further Reading:

The Twilight of Science's High Priests

The Delusion of Scientific Omniscience

Multiverse Theories Are Bad for Science

Can Mysticism Help Us Solve the Mind-Body Problem?

The Rise of Neo-Geocentrism

Why information can't be the basis of reality

Quantum Escapism

My Quantum Experiment

See also Strange Loops All the Way Down, a chapter in my free online bookMind-Body Problems.

Original post:

Will the Universe Remember Us after We're Gone? - Scientific American

Read More..

Threat of Quantum Computing to Bitcoin Should be Taken Seriously, But theres Enough Time to Upgrade Current Security Systems, Experts Claim -…

LocalBitcoins, a leading peer to peer (P2P) Bitcoin exchange, notes that with the advent of quantum computing, there have been concerns that this new technology could be a threat to existing online protocols. Some experts claim that powerful quantum computers might become a legitimate threat to the security of Bitcoin (BTC) and the current encryption algorithms that it uses.

According to LocalBitcoins:

While the threat of quantum computing to Bitcoin is to be taken seriously, experts believe that Bitcoin [and other cryptocurrencies] have time to adapt to the quantum age without compromising [their] security in the process.

As explained in a blog post by LocalBitcoins, Bitcoin or BTC and its blockchain-based network is secured by cryptographic algorithms, which is why its called a cryptocurrency. Cryptography allows developers to protect certain sensitive data and communication on a platform so that only the parties authorized to view the information can access it. The LocalBitcoins team notes that cryptography uses several different algorithms, and Bitcoin depends on them to function properly.

At present, these algorithms are almost impossible to break, but quantum computers may spell trouble to these algorithms in various ways, according to LocalBitcoins.

They explain that the idea or concept behind quantum computing is to go beyond the power of traditional computers by leveraging quantum mechanics, a field in physics that describes behaviors on a subatomic scale. They also noted that when unobserved, subatomic particles can exist in multiple places at once, however, when [they have been] detected, they collapse into a single point in space-time.

They further explain:

Traditional computers operate with bits which encode either a 0 or a 1, while quantum computers use quantum bits, or qubits, which can be both a 0 or a 1 at the same time. This phenomenon is known as superposition which allows a huge amount of calculations to be carried out simultaneously.

They continued:

Bitcoins algorithm most at risk from quantum computing is its signature algorithm that uses ECDSA (Elliptic Curve Digital Signature Algorithm) [which] is used to generate the public/private key pair to sign Bitcoin transactions securely (sending and receiving coins). ECDSA uses asymmetric encryption, and the reason for it being secure comes from the need to factor multiple large prime numbers to break the algorithm. Breaking ECDSA and deriving a private key from a public key using current computers would take such an astronomical amount of time that it wouldnt even be realistic to try it out.

But with quantum computers that support parallel calculation, this same process can be carried out a lot more efficiently, and multiple types of attacks then become possible, the LocalBitcoins team noted.

They explained that the first one of these potential attacks aims to target re-used addresses. When a transaction is performed, your public key becomes visible on the blockchain or a distributed ledger technology (DLT) network. The LocalBitcoins team adds that knowing your public key, an attacker whos using quantum computers may then use your public key to derive your private key. After theyve determined what your private key might be, they can begin signing transactions on your behalf which means they can also spend your Bitcoins or any other cryptocurrency.

LocalBitcoins clarifies that addresses that have not been used to send transactions are quantum-safe because quantum computers cant read their public key.

LocalBitcoins further noted that another possible attack is the double-spend attack. This measures how fast a quantum computer can derive your private key from the already visible public key. They pointed out that if an attacker can do this before your transaction is confirmed multiple times in a block, you are essentially both trying to spend the same bitcoin, and the attacker wins.

They also mentioned:

Bitcoins hashing function used in the block creation is even more robust in the face of a quantum threat than its signature algorithm. The algorithm Bitcoin uses in its mining process is called SHA-256. When a miner solves a block and receives the right to add it to the blockchain, that miners transactions become confirmed, and part of the ledger.

They further explained:

To solve a block, a miner needs to guess a nonce, or a value that after a hash is applied, results in a number that has a certain number of leading zeroes. As a miner, you cant start from a valid result and then generate the correct nonce from it. You have to randomly guess it. This takes a lot of computing power and is behind the proof-of-work securing Bitcoins network. If the SHA-256 was broken somehow, an attacker could mine new blocks at will and earn all Bitcoin block rewards.

LocalBitcoins notes that existing quantum computers are only operated in labs and still appear to be a long way from becoming a legitimate threat to Bitcoin and other cryptocurrencies. According to estimates, a quantum computer of around 4000 qubits would be required to break Bitcoins code, while the most powerful quantum computers available right now operate with only about 50 qubits.

Industry experts predict that quantum computing machines may begin to break binary based encryption algorithms within the next decade unless theres an unexpected mathematical or physical breakthrough before that.

The LocalBitcoins team added:

When the quantum threat becomes more imminent, cryptography will have moved to more quantum-proof algorithms. In the process, Bitcoins algorithms would have become quantum-resistant as well. This can be achieved by hard-forking (backwards incompatible upgrade) the Bitcoin blockchain by consensus among the Bitcoin nodes, so it will be secure from quantum attacks.

They continued:

As long as multiple users have access to a quantum computer, no single entity will be able to gain dominance over Bitcoin mining. Perhaps in the future Bitcoins blockchain will be operated completely by nodes running on quantum computers.

Original post:

Threat of Quantum Computing to Bitcoin Should be Taken Seriously, But theres Enough Time to Upgrade Current Security Systems, Experts Claim -...

Read More..

Pablo Jarillo-Herrero receives the Lise Meitner Distinguished Lecture and Medal – MIT News

Pablo Jarillo-Herrero, the Cecil and Ida Green Professor of Physics, was awarded the Lise Meitner Distinguished Lecture and Medal, for his groundbreaking work on twistronics, a technique that adjusts the electronic properties of graphene by rotating adjacent layers of the material.

His breakthrough research in twisted bilayer graphene research discovered unique electrical properties with the potential to create innovative superconducting materials and novel quantum devices for advanced quantum sensing, photonics, and computing applications.

The medal, sponsored by theRoyal Swedish Academy of Sciences through its Nobel Committee for Physics, recognizes the work by Jarillo-Herrero and his group that helped launch a new field: strongly correlated physics in 2D moir superlattices.

Pablos work has really changed the way physicists think about materials and it has created a great opportunity for theorists to develop new ideas, says Peter Fisher, professor and head of MITs Department of Physics.

Jarillo-Herrero will give his lecture and receive his medal at the annual colloquium-style event at AlbaNova University Center in Stockholm, at a date to be determined next year. The lecture commemorates Lise Meitner, an Austrian-Swedish physicist who contributed to the discoveries of the element protactinium and nuclear fission.

The list of previous recipients is very distinguished, Jarillo-Herrero says, noting fellow recipients including Nobel Prize winners Frank Wilczek, the MIT physics professor who was the first recipient of the prize,in 2015, and Princeton Universitys Duncan Haldanein 2017. So for me it's a great, and humbling, honor to see my name in the same list!

TheJarillo-Herrero Groupexplores quantum transport in novel condensed matter systems such as graphene and topological insulators.

A native of Valencia, Spain, Jarillo-Herrero joined MIT as an assistant professor of physics in 2008, where he received tenure in 2015, and was promoted to full professor of physics in 2018.

In October he received the RSEF Medal, the highest scientific recognition of the Spanish Royal Physics Society. Other awards include anAlfred P. Sloan Fellowship; a David and Lucile Packard Fellowship; a DoE Early CareerAward; a Presidential Early Career Award for Scientists and Engineers; an ONR Young Investigator Award; a Moore Foundation Experimental Physics in QuantumSystems Investigator Award; ThePhysics World2018 Breakthrough of the Year; the 2020 Oliver E. Buckley Condensed Matter PhysicsPrize; and the 2020 Wolf Prize in Physics. In 2018, Jarillo-Herrero was elected a fellow of the American Physical Society.

See more here:

Pablo Jarillo-Herrero receives the Lise Meitner Distinguished Lecture and Medal - MIT News

Read More..

Lighting up the ion trap – MIT News

Walk into a quantum lab where scientists trap ions, and you'll find benchtops full of mirrors and lenses, all focusing lasers to hit an ion trapped in place above a chip. By using lasers to control ions, scientists have learned to harness ions as quantum bits, or qubits, the basic unit of data in a quantum computer. But this laser setup is holding research back making it difficult to experiment with more than a few ions and to take these systems out of the lab for real use.

Now, MIT Lincoln Laboratory researchers have developed a compact way to deliver laser light to trapped ions. In a recent paper published in Nature, the researchers describe a fiber-optic block that plugs into the ion-trap chip, coupling light to optical waveguides fabricated in the chip itself. Through these waveguides, multiple wavelengths of light can be routed through the chip and released to hit the ions above it.

It's clear to many people in the field that the conventional approach, using free-space optics such as mirrors and lenses, will only go so far, says Jeremy Sage, an author on the paper and senior staff in Lincoln Laboratory's Quantum Information and Integrated Nanosystems Group. If the light instead is brought onto the chip, it can be directed around to the many locations where it needs to be. The integrated delivery of many wavelengths may lead to a very scalable and portable platform. We're showing for the first time that it can be done.

Multiple colors

Computing with trapped ions requires precisely controlling each ion independently. Free-space optics have worked well when controlling a few ions in a short one-dimensional chain. But hitting a single ion among a larger or two-dimensional cluster, without hitting its neighbors, is extremely difficult. When imagining a practical quantum computer requiring thousands of ions, this task of laser control seems impractical.

That looming problem led researchers to find another way. In 2016, Lincoln Laboratory and MIT researchers demonstrated a new chip with built-in optics. They focused a red laser onto the chip, where waveguides on the chip routed the light to a grating coupler, a kind of rumble strip to stop the light and direct it up to the ion.

Red light is crucial for doing a fundamental operation called a quantum gate, which the team performed in that first demonstration. But up to six different-colored lasers are needed to do everything required for quantum computation: prepare the ion, cool it down, read out its energy state, and perform quantum gates. With this latest chip, the team has extended their proof of principle to the rest of these required wavelengths, from violet to the near-infrared.

With these wavelengths, we were able to perform the fundamental set of operations that you need to be able to control trapped ions, says John Chiaverini, also an author on the paper. The one operation they didn't perform, a two-qubit gate, was demonstrated by a team at ETH Zrich by using a chip similar to the 2016 work, and is described in a paper in the same Nature issue. This work, paired together with ours, shows that you have all the things you need to start building larger trapped-ion arrays, Chiaverini adds.

Fiber optics

To make the leap from one to multiple wavelengths, the team engineered a method to bond a fiber-optic block directly to the side of the chip. The block consists of four optical fibers, each one specific to a certain range of wavelengths. These fibers line up with a corresponding waveguide patterned directly onto the chip.

Getting the fiber block array aligned to the waveguides on the chip and applying the epoxy felt like performing surgery. It was a very delicate process. We had about half a micronof tolerance and it needed to survive cooldown to4 kelvins, says Robert Niffenegger, who led the experiments and is first author on the paper.

On top of the waveguides sits a layer of glass. On top of the glass are metal electrodes, which produce electric fields that hold the ion in place; holes are cut out of the metal over the grating couplers where the light is released. The entire device was fabricated in the Microelectronics Laboratory at Lincoln Laboratory.

Designing waveguides that could deliver the light to the ions with low loss, avoiding absorption or scattering, was a challenge, as loss tends to increase with bluer wavelengths. It was a process of developing materials, patterning the waveguides, testing them, measuring performance, and trying again. We also had to make sure the materials of the waveguides worked not only with the necessary wavelengths of light, but also that they didn't interfere with the metal electrodes that trap the ion, Sage says.

Scalable and portable

The team is now looking forward to what they can do with this fully light-integrated chip. For one, make more, Niffenegger says. Tiling these chips into an array could bring together many more ions, each able to be controlled precisely, opening the door to more powerful quantum computers.

Daniel Slichter, a physicist at the National Institute of Standards and Technology who was not involved in this research, says, This readily scalable technology will enable complex systems with many laser beams for parallel operations, all automatically aligned and robust to vibrations and environmental conditions, and will in my view be crucial for realizing trapped ion quantum processors with thousands of qubits.

An advantage of this laser-integrated chip is that it's inherently resistant to vibrations. With external lasers, any vibration to the laser would cause it to miss the ion, as would any vibrations to the chip. Now that the laser beams and chip are coupled together, the effects of vibrations are effectively nullified.

This stability is important for the ions to sustain coherence, or to operate as qubits long enough to compute with them. It's also important if trapped-ion sensors are to become portable. Atomic clocks, for example, that are based on trapped ions could keep time much more precisely than today's standard, and could be used to improve the accuracy of GPS, which relies on the synchronization of atomic clocks carried on satellites.

We view this work as an example of bridging science and engineering, that delivers a true advantage to both academia and industry, Sage says. Bridging this gap is the goal of the MIT Center for Quantum Engineering, where Sage is a principal investigator.We need quantum technology to be robust, deliverable, and user-friendly, for people to use who aren't PhDs in quantum physics, Sage says.

Simultaneously, the team hopes that this device can help push academic research. We want other research institutes to use this platform so that they can focus on other challenges like programming and running algorithms with trapped ions on this platform, for example. We see it opening the door to further exploration of quantum physics, Chiaverini says.

Originally posted here:

Lighting up the ion trap - MIT News

Read More..

University of Kansas Team Explore Heavy-Ion Particle Physics – Pagosa Daily Post

By Brendan M. Lynch

Daniel Tapia Takaki, associate professor of physics & astronomy at the University of Kansas, has created a new research team at KU to exploit the unique opportunities to research physics at high energies available at the ALICE experiment at the Large Hadron Collider (LHC).

The largest and most complex particle accelerator in the world, the LHC is located in Geneva and operated by the European Organization for Nuclear Research, or CERN. With the formation of the new research group, KU is developing further its participation with CERN, which until now was solely focused on the CMS project.

ALICE, an acronym standing for A Large Ion Collider Experiment, is one of the largest LHC projects, where 1,927 members from 39 countries and 174 institutions participate. At present, the other LHC programs include ATLAS, CMS, FASER, LHCb, MoEDAL and TOTEM projects. On July 11, the Collaboration Board of ALICE accepted KU as a new full-member institution.

Tapia Takaki is not new to ALICE. He contributed to the design of the experiment, as well as its installation, commissioning and first experimental analyses for a decade before he joined the CMS project to spearhead its forward heavy-ion physics program in 2014.

The ALICE Time Projection Chamber. Photo credit: CERN.

For his new research program at ALICE, Tapia Takaki recently earned a $447,000, two-year award from the Nuclear Physics program in the Office of Science at the Department of Energy. The award is titled Research in Heavy-Ion Nuclear Physics: Studying the Initial State of QCD Matter. He has also received funding to serve as a visiting professor at Lawrence Berkeley National Laboratory and University of California-Berkeley during the 2020-2021 academic year.

ALICE has a unique research program in many ways, Tapia Takaki said. It was originally designed to answer the question, What happens when the most dense and hottest matter waves of lead ions interact with each other? Tackling this question implies studying the primordial hot and dense matter of quarks and gluons, known as the quark gluon plasma, that is thought to have existed a few microseconds after the Big Bang.

Since December 2018, all LHC experiments have been on hold for maintenance. When the heavy-ion collisions resume again by 2022, ALICE will start a new phase with a major upgrade of its detector, data-taking and date-processing systems. There will be new pixel sensors with an improved resolution, a new muon forward tracker system and a new fast interaction trigger.

All this combined with the excellent tracking and particle identification capabilities makes the ALICE experiment a superb device to study fundamental physics unavailable elsewhere, Tapia Takaki said.

In contrast to most physicists at the LHC, Tapia Takaki is studying reactions that occur when there are no collisions, just near misses, yet the strong electromagnetic fields of the accelerated lead ions produce particles. Such reactions often require a different data-taking strategy and can be used to search for new particles or physics processes that are beyond the current theoretical framework, including Higgs and dark matter candidates.

Weve been preparing experiments to observe fine features of the glue that binds quarks and gluons together, to understand fundamental questions such as why quark and gluons are never found as free matter waves a phenomenon called confinement, Tapia Takaki said.

His research also will probe very strong fluctuations in the distribution of gluons inside the proton. The current knowledge of such fluctuations is very limited a serious impediment to scientific progress in large numbers of physics analyses.

Moreover, Tapia Takaki is exploring new techniques purely based on quantum mechanics, a field of physics today experiencing a renaissance. With John Ralston, KU professor of physics & astronomy, and KU graduate student John Martens, he has recently developed a quantum tomography procedure for analyzing collider data.

Using this technique, the KU team is analyzing data to probe quantum entanglement and other quantum mechanical effects in a model-independent way for the first time in colliders. The KU research could call into question assumptions that underpin quantum mechanics and uncover quantum features in the LHC data that have been overlooked.

U.S. institutions participating in the ALICE Collaboration include the Lawrence Berkeley National Laboratory, Los Alamos National Laboratory, Oak Ridge National Laboratory, California Polytechnic State University, Chicago State University, Creighton University, Ohio State University, Purdue University, KU, University of California-Berkeley, University of Houston, University of Tennessee, University of Texas at Austin, Wayne State University and Yale University.

Brendan M. Lynch is Public Affairs Officer, University of Kansas, and the host of When Experts Attack!

Special to the Post

The Pagosa Daily Post welcomes submissions, photos, letters and videos from people who love Pagosa Springs, Colorado. Call 970-903-2673 or email pagosadailypost@gmail.com

Read the original:

University of Kansas Team Explore Heavy-Ion Particle Physics - Pagosa Daily Post

Read More..

For Thomas Searles, a passion for people and science at HBCUs and MIT – MIT News

When Thomas Searles was assigned a book report in the first grade, he initially had trouble choosing a topic. He really didnt like fiction books. After a bit of indecision, he chose to write his report on a book about Black astronauts. Though he didnt realize it at the time, his journey to becoming a physicist at MIT had just begun.

I looked in the book, and there was Ronald E. McNair, who happens to be an MIT alum, randomly; he got his PhD here, Searles says. And it said that he was a laser physicist. So, I said, Well, that's what I'm going to be, because I want to be an astronaut.

Searles is now a member of the 2020-21 Martin Luther King (MLK) Visiting Professors and Scholars Program cohort at MIT. Since 1995, the MLK Scholars Program has brought in a total of 67 visiting professors and 21 visiting scholars from across all academic disciplines. Individuals of any underrepresented minority group are eligible to apply, and scholars are selected for their contributions both to their fields and their potential contributions to MIT.

It's something that was always on my radar as a young Black scientist, Searles said. It was something that was on my five- to 10-year plan.

Searles is currently an associate professor in the Department of Physics at Howard University, a historically Black college and university (HBCU) located in Washington. There, he established a new research program in applied and materials physics. He is also the director of a new academic partnership between IBM and 13 other HBCUs called the IBM-HBCU Quantum Center.

Searles research career began as an undergraduate in mathematics and physics at Morehouse College, a HBCU in Atlanta. Before graduating in 2005, he worked in an optics lab, examining the properties of light and its interactions with matter.

A lot of us had an interest in optics, because that was the only experimental lab that we had at Morehouse at the time, Searles says. So naturally, I applied to graduate schools that were optics-related.

That interest led him to pursue his PhD in applied physics in the Department of Electrical and Computer Engineering at Rice University in Houston, Texas, from which he graduated. Before graduating in 2011, he studied light-matter interactions, and completed a thesis about the magneto-optical properties of carbon nanotubes, tiny cylinders comprised of a single layer of carbon atoms. Carbon nanotubes are extremely strong, lightweight, and electrically conductive, making them promising for a variety of applications.

In 2015, Searles started at Howard University. I wanted to go back and work at an HBCU. I thought of my experience working in the Morehouse optics lab and how they kind of shaped my experience, Searles says. So then I was like, What can I do that's different from everyone else that will also provide opportunities to a lot of Black students? So, I set out to start a terahertz experimental lab, knowing that it was going to be difficult. And it was difficult. But we were able to do it.

In the terahertz spectroscopy lab at Howard University, researchers work with matter that has a large wavelength, and a frequency between several hundred gigahertz and several terahertz. During the first so-called quantum age in the mid-1900s, silicon was the new, exciting material used to develop transistors. Now, researchers in fields like chemistry and physics are on the hunt for the next material to be a platform for a new generation of quantum technologies.

The primary goal is to study materials for new computers, making them either safer, faster, or more secure, Searles says. This whole idea of quantum computing is what we're focusing our lab on, moving towards this idea of quantum advantage.

Quantum computing relies upon the use of quantum materials which have unique electronic and magnetic properties to build faster, stronger, and more powerful computers. Such machines are likely to provide this quantum advantage for new developments in medicine, science, finance, chemistry, and many other fields.

In 2016, Searles met MIT associate professor of physics and Mitsui Career Development Professor in Contemporary Technology Joseph Checkelsky at an event through the National Science Foundation Center for Integrated Quantum Materials.

The idea was to try to find people that we wanted to collaborate and work with, Checkelsky says. And I think I even wrote down in my notepad Thomas' name and put a big underline that I should work with this guy. Searles says the best thing that can ever happen to a spectroscopist like himself is to find a crystal-growth person that provides samples, who you also really vibe with and like as a person. And that person for me has been Joe. The two have been collaborating ever since.

Checkelskys lab works to discover new crystalline materials that enable quantum phenomena. For instance, one material that has previously been of interest to Checkelsky is a kagome crystal lattice, a 2D arrangement of iron and tin molecules. Both Checkelsky and Searles are interested in applying a branch of mathematics called topology to solids, particularly semimetals.

One of the roles Thomas plays is to examine the optical properties of these new systems to understand how light interacts with quantum materials, Checkelsky says. Its not only fundamentally important, it can also be the bridge that connects to new technologies that interfaces light with quantum science.

Searles expertise on the optics side of the research enables him to identify which materials are ideal for further study, while Checkelskys group is able to synthesize materials with certain properties of interest.

It's a cycle of innovation where his lab knows how it can be tested and my lab knows how to generate the material, Checkelsky says. Each time we get through the cycle is another step toward answering questions in fundamental science that can also bring us to new platforms for quantum technology.

Checkelsky nominated Searles for the MLK Scholars Program in hopes of further expanding their academic partnership. He now serves as Searles host researcher through the program.

I hope to extend my collaboration with Joe to not only [explore] this condensed matter, experimental side of my group, but to expand this into Lincoln Laboratory and the quantum information portion that MIT has, Searles says. I think that's critical, research-wise.

In addition to their research goals, Searles and Checkelsky are excited to strengthen the general connection between MIT and Howard.

I think there are opportunities for Thomas to see, for example, the graduate school process in our department, Checkelsky says. Along the same lines, it is a great opportunity for MIT and our department to learn more how to connect to the people and science within HBCUs. It is a great chance for information to flow both ways.

Searles also hopes to encourage more HBCU students to pursue graduate study at MIT. The goal of increasing the number of qualified applicants [from HBCUs] I think that's something that I can measure metrically from the first year, Searles says. And if there's anything that I can do to help with that number, I think that would be awesome.

See the rest here:

For Thomas Searles, a passion for people and science at HBCUs and MIT - MIT News

Read More..

Global Internet Security Market 2020 | Know the Companies List Could Potentially Benefit or Loose out From the Impact of COVID-19 | Top Companies:…

Internet Security Market Reports provide results and potential opportunities and challenges to future Internet Security industry growth. Internet Security market research reports offers five-year revenue forecasts through 2024 within key segments of the Internet Security industry.

The Global Internet Security Market is poised to grow strong during the forecast period 2017 to 2026. Internet Security market is the definitive study of the global Internet Security industry. The report content includes technology, industry drivers, geographic trends, market statistics, market forecasts, producers, and raw material/equipment suppliers.

If you are planning to invest into new products or trying to understand this growing market, this report is your starting point.Download Free Exclusive Sample PDF Copy:https://inforgrowth.com/sample-request/6133568/internet-security-market

The Internet Security industry study concludes with a list of leading companies/suppliers operating in this industry at different stages of the value chain.

Major Classifications of Internet Security Market:

Major Key players covered in this report:

By Product Type:

By Applications:

Get Chance of 20% Extra Discount, If your Company is Listed in Above Key Players Listhttps://inforgrowth.com/discount/6133568/internet-security-market

The Internet Security market research report provides a concise and clear overview of this complex and often dynamic industry. The report dives into the trends in the specialty Internet Security industry by looking at the market from a regional perspective, application perspective, and materials point of view. As a market with significant growth potential, we look not only at the market today, but also at how it will develop over the next three years and the trends and developments that will drive growth.

Internet Security Market Overview:

Impact of COVID-19:Internet Security Market report analyses the impact of Coronavirus (COVID-19) on the Internet Security industry. Since the COVID-19 virus outbreak in December 2019, the disease has spread to almost 180+ countries around the globe with the World Health Organization declaring it a public health emergency. The global impacts of the coronavirus disease 2019 (COVID-19) are already starting to be felt, and will significantly affect the Internet Security market in 2020.

The outbreak of COVID-19 has brought effects on many aspects, like flight cancellations; travel bans and quarantines; restaurants closed; all indoor events restricted; emergency declared in many countries; massive slowing of the supply chain; stock market unpredictability; falling business assurance, growing panic among the population, and uncertainty about future.

COVID-19 can affect the global economy in 3 main ways: by directly affecting production and demand, by creating supply chain and market disturbance, and by its financial impact on firms and financial markets.

Get Brief Information on Pre COVID-19 Analysis and Post COVID-19 Opportunities in Internet Security Market 2020.https://inforgrowth.com/CovidImpact-Request/6133568/internet-security-market

Why Buy This Internet Security Market Report?

Get accurate data and strategic insights on the worldwide Internet Security market & key players.

What is the market share and respective growth rate between the various application segments? Between developed and emerging economic regions?

Apprehend the magnitude of latest manufacturing trends (future trends, upcoming technologies etc).

As global capacity for and production in Internet Security market to increase, which geographic regions will have the largest volume and highest growth rates for Internet Security consumption?

For investors & private equity firms: identify the best companies to invest in.

FOR ALL YOUR RESEARCH NEEDS, REACH OUT TO US AT:Address: 6400 Village Pkwy suite # 104, Dublin, CA 94568, USAContact Name: Rohan S.Email:[emailprotected]Phone: +1-909-329-2808UK: +44 (203) 743 1898

Original post:
Global Internet Security Market 2020 | Know the Companies List Could Potentially Benefit or Loose out From the Impact of COVID-19 | Top Companies:...

Read More..

Misinformation, not vote tampering, is our most critical election threat – SecurityInfoWatch

Election equipment is generally secure, disconnected from the Internet, and would require an extremely large-scale hacking attack to alter votes in a way that would meaningfully change the results of an election. Once you vote, the risk of it being electronically changed is extremely low.

Courtesy of Getty Images -- Credit: 400tmax

The enthusiasm for tomorrows 2020 U.S. election is at an all-time high, and a great beacon of strength for the democracy we all hold dear. With so many Americans taking part in the vote, in what is now record early numbers, the questions How safe is my voter information? and How safe is my vote? are at the forefront of many concerns about election security. Americans are worried about their vote being hacked, whether it be by State actors like the Russians or Iranians, who weve heard about recently in the news, or by other actors that the general public isnt as familiar with. These are legitimate concerns, with many layers we need to unwrap to fully understand, appreciate and address the threat.

First let us discuss the definition of election hacking, which entails both the security of our voting equipment and the security of our voting information and results. Security of our voting equipment is fairly straightforward once I vote, is it recorded correctly, and can it be changed? In terms of voting equipment, the risk to the security of your vote is low. Election equipment is generally secure, disconnected from the Internet, and would require an extremely large-scale hacking attack to alter votes in a way that would meaningfully change the results of an election. Once you vote, the risk of it being electronically changed is extremely low. On the latter topic, it is much more likely that our voter information and results as reportedcould be stolen or altered. This type of hack would not change your vote but would allow our adversaries to execute an information operation capable of influencing elections or seeding doubt in our election process.

In most states, the State Board of Election is responsible for storing voter information. As opposed to actual voting machines, systems used to maintain voter information are inherently connected to the Internet so that it can be made available for legitimate purposes. Lack of sufficient funding combined with legacy IT equipment and practices has left much of this information at risk of being hacked by our adversaries. A week before the 2020 election, the FBI confirmed that at least one states voter information was hacked by the Iranians and used to send emails to voters in an attempt to influence their vote. One hypothetical scenario for election night is a states election result website being hacked to display incorrect results and sow doubt in the election outcomes. The state would have the correct, unchanged results at their State Board of Election, but every time they put them on the web the adversary would alter the reporting to show different results to the public. These kinds of attacks, which combine an electronic hack with an Information Operation, are not difficult for State-level actors to execute and are very likely to occur on an increasing level unless we make the investments to secure voter information and the platforms we use to communicate election results.

So, what steps can we take to avoid hacks of voter information and platforms used to report election results? A layered approach will provide the best security. At a federal level, we must have a coordinated effort to protect state systems from foreign adversaries. This means government agencies such as the FBI, DHS, and members of the Intelligence Community need to do what they can to stop the attackers from getting to the information we want to protect or influencing the election. Most of the information about those activities are going to be classified, and the federal government needs to find a way to get that information to the states in an actionable manner that will prevent attacks. Each state should have at least one person that is cleared to have access to the classified information from the federal government.

On a tactical Information Security level, the states need to prioritize investment in the proper staff and systems to secure their voting rolls. One challenge states run into is that securing voter information gains a lot of attention around election time but is not a top priority in between elections. It needs to be.

There is no novel approach needed, instead states need to enact IT best practices and the work needs to be prioritized, funded, and executed. Standard practices the states should follow for IT security include but are not limited to, leveraging industry to host and secure systems, applying regular patches and updates to systems, storing regular backups, conducting vulnerability scanning and penetration testing, and have a third-party auditor that is continuously working to ensure the technology and processes in place are working.

Modernizing the IT environments used by the states for election activities is very important to avoid security pitfalls. The cloud environments provided by American companies such as Amazon, Google and Microsoft are very secure, and states should leverage those environments as cost-effective secure environments. Given their size, multiple customers, and positioning on the Internet, these providers have visibility into security threats before most others and are able to secure their clouds sooner than our states could if they hosted their own on-premises systems. They also automate most of the security functions that need to be done to maintain best practices. These same cloud environments can more securely host platforms states would use to report results and communicate to voters on Election Day, reducing the risk that bad actors would be able to interfere.

Americans should rest easy with the knowledge that our voting machines are secure, and their vote is secure from electronic manipulation. They should be concerned with their states ability to secure their personal information and contact their state representatives to make sure it is a continual priority. In the case of a breach, they should be aware of the threat from Information Operations meant to influence or suppress their vote. On any election night, we should expect false information via the Internet, and be smart and patient enough to filter it out. While Americans may not always agree on politics, we can all agree that election security must be a national priority moving forward in order to protect each of us and the democratic process we all hold dear.

About the author: Wayne Schmidt is EVP for Cyber Operations at Federal Data Systems (FedData), a Maryland defense contractor. He has over 20 years of experience within Government and Industry in Cybersecurity and can be reached at wayne.schmidt@feddata.com

Read the rest here:
Misinformation, not vote tampering, is our most critical election threat - SecurityInfoWatch

Read More..

Top 7 Ways to Hide Your IP Address in 2021 – Techstory

Hiding your Internet Protocol (IP) address is not rocket science; you only need to have the right tools for the job.

In fact, millions of people today choose to hide their IP as a measure for internet security; it helps you to anonymously surf the internet reducing the risk of being targeted by cybercriminals.

Besides, you get access to geo-blocked sites and negate IP bans. Well, for whatever reason you are looking to hide your IP, there are a whole lot of different ways that you can implement to achieve internet anonymity.

Below are some of the most effective methods to hide your IP address.

Prior to that, lets try and understand the very basics of IP technology.

The Internet Protocol(IP) is the principal technology of the internet. It is tasked with defining, structuring, and disseminating info packages for point A to B.

All devices with the ability to connect to the internet have a unique IP address number. In other words, an IP address is a pathway to access the internet; you cannot access the internet without it.

Besides, just like your car registration number, the IP address is your online identifier; it shows your physical location and browsing history, among other things. So, do you know your IP address? You can simply Google, What is my IP address?.

Below are some of the easiest, efficient, and effective ways to mask your IP address. Check them out!

It is somewhat one of the most effective ways to maintain anonymity when using the internet. A VPN client works to provide you with a virtual IP address, a different one from that of your device.

The Virtual IP tends to spoof the original one. Literally, the VPN provider will assign you a different IP address, tunneling your internet traffic to the virtual IP.

Besides hiding your IP address, VPN helps encrypt internet traffic, keeping off internet spies. Some of the best VPN software in the market include ExpressVPN, Surfshark, and NordVPN.

It is also a good idea to use VPN for your business. It has a large number of additional features that are highly important for many companies.

Check the ranking of VPNs for iOS

Typically, proxies are most similar to VPNs; they both act as middlemen between your device and the public internet. Proxy technology works to provide you with a second IP address; on that is different from the real one.

In truth, VPNs can be said to be proxies; only that proxies only serve one purpose while VPN clients provide for a range of functions. Unlike VPNs, proxy services are web-based.

Practically, the proxy servers only work to deliver virtual addresses only.

They do not provide for additional layers of internet security or encrypt internet traffic data. Some of the most common proxy clients include SSL, SSH, or SOCKS proxy.

A TOR is an open-source software that allows for anonymous communication through the public network. It can be said to a decentralized network run by thousands of volunteers.

When you connect to the internet using TOR, your internet traffic is routed through a sequence of nodes; they are some sort of proxy servers. TOR internet connection is heavily encrypted.

For instance, if you access a website using a TOR, the website will only see the last server in the sequence, often referred to as an exit node. The sequence of host servers makes it practically difficult for anyone trying to trace the original IP address.

The easiest way to use TOR is to download the Tor browser. However, it is essential to note that some websites may restrict access when you use Tor as they are often associated with internet criminal activities.

You might not have noticed this, but each time you change your network, your IP address changes as well. In the event that you have IP address issues such as IP blocks, then you might consider changing your network.

For instance, you can choose to access the internet through a private or a public WI-FI network. You can also choose to create a network using your smartphones mobile data connection.

If you choose to connect to a public WI-FI hotspot, it is vital to note that they are unsafe and are often hunting ground for hackers looking to steal personal data. If you have to use one, go for a WI-FI network with a password.

Using a VPN, you can connect to public Wi-Fi safely.

Learn how businesses can

Typically, Internet Service Providers decide who gets what IP address. Conversely, if you feel that your IP address is compromised, then you should consider calling them with a request to change it. The process is relatively easy. However, do not expect it to be a static one.

Most IP addresses are dynamic; they keep on changing. Remember, IP addresses are recycled to preserve their limited number.

If you need a static one, then it might take some time and more paperwork.

This is only practical for people using a wireless router to connect to the internet. If you fall under this category, then you are most likely using a Network Address Translation (NAT) Firewall.

Typically, a NAT Firewall allows many devices to use the same public IP but unique private IP addresses.

Lets say; the public IP address acts as a mask to the private IP addresses for the various connected devices, which prevents unsolicited inbound communication with other dangerous computer networks on the internet.

Did you know unplugging your modem and reconnecting it could facilitate an IP change?

Well, this, however, does not always happen. It only works if your ISP is using dynamic IP addresses, whereby IP addresses are recycled when they are not in use.

For instance, you could have your old IP recycled for a new IP address when you reconnect your modem. The longer you leave your modem unplugged, the more likely this method will work; lets say several hours.

Hiding has proven to be an essential step towards ensuring internet security.

And while the reasons to hide ones IP address may vary from person to person, the methods are often either of the above.

They have all proven effective in helping internet users hide their internet identity or show a different IP.

Among them, I would like to recommend the use of VPN clients. It is much easy to use, safer and has additional benefits all the same.

View original post here:
Top 7 Ways to Hide Your IP Address in 2021 - Techstory

Read More..