Page 3,537«..1020..3,5363,5373,5383,539..3,5503,560..»

Bolton book can be released, but conduct ‘raises grave national security concerns’ – ABC News

June 20, 2020, 6:25 PM

6 min read

6 min read

A federal judge ruled Saturday that former national security adviser John Bolton may move forward in publishing his memoir "The Room Where It Happened," while at the same time arguing Bolton's conduct in releasing the book "raises grave national security concerns."

"For reasons that hardly need to be stated, the Court will not order a nationwide seizure and destruction of a political memoir.," D.C. district judge Royce Lamberth said in his ruling Friday. "In taking it upon himself to publish his book without securing final approval from national intelligence authorities, Bolton may indeed have caused the country irreparable harm. But in the Internet age, even a handful of copies in circulation could irrevocably destroy confidentiality."

A copy of the book, "The Room Where It Happened," by former national security adviser John Bolton, is photographed outside the White House, June 18, 2020.

The ruling is only a temporary victory for Bolton, in that the civil case brought by the government against him over his alleged breach of his non-disclosure agreement remains ongoing. In his ruling, Lamberth strongly indicates Bolton's hopes of keeping profits from the book are not only endangered, but he could potentially face criminal prosecution for disclosure of classified information.

"This was Boltons bet: If he is right and the book does not contain classified information, he keeps the upside mentioned above; but if he is wrong, he stands to lose his profits from the book deal, exposes himself to criminal liability, and imperils national security. Bolton was wrong," Lamberth says.

Former U.S. national security advisor John Bolton speaks during his lecture at Duke University in Durham, NC., Feb. 17, 2020.

Lamberth, who was given a private review Friday of information identified by the government in Bolton's book that it has argued remains classified, said in his ruling that the review left him "persuaded that Defendant Bolton likely jeopardized national security by disclosing classified information in violation of his nondisclosure agreement obligations."

"We welcome todays decision by the Court denying the Governments attempt to suppress Ambassador Boltons book," Bolton's attorney Chuck Cooper said in a statement to ABC News. "We respectfully take issue, however, with the Courts preliminary conclusion at this early stage of the case that Ambassador Bolton did not comply fully with his contractual prepublication obligation to the Government, and the case will now proceed to development of the full record on that issue."

Cooper added, "The full story of these events has yet to be toldbut it will be."

President Trump took to Twitter to offer his own reaction to the ruling, describing it as a "BIG WIN" even though the judge denied the Justice Department's motion to halt the book's release.

Instead, Trump zeroed in on Lamberth's comments that Bolton's book may have unlawfully disclosed classified information.

Lamberth was considering an extraordinary request from the DOJ that would have carried sweeping constitutional implications -- the department sought an injunction that would bar Bolton's publisher, along with thousands of distributors and bookstores around the country already in possession of Bolton's memoir, from selling it to customers next Tuesday.

The Justice Department, citing sworn statements from a cadre of the nation's top intelligence officials, argued the book still contains multiple paragraphs-worth of classified information and could cause "grave" damage to U.S. national security if released.

White House press secretary Kayleigh McEnany said in a written statement Saturday that the U.S. government "intends to hold Bolton to the further requirements of his agreements and to ensure that he receives no profits from his shameful decision to place his desire for money and attention ahead of his obligations to protect national security."

She quoted the judges comments that raised national security concerns, saying: "Bolton bet wrong, and the downside of his losing bet is that he 'stands to lose his profits from the book deal, exposes himself to criminal liability, and imperils national security.'"

ABC News' Ben Gittleson contributed to this report

Read the rest here:
Bolton book can be released, but conduct 'raises grave national security concerns' - ABC News

Read More..

Indias digital workforce needs secure software. Testing, not banning apps, is the answer – ThePrint

Text Size:A- A+

Over the last couple of months, the Narendra Modi government has proactively issued orders and advisories that implicate routinely used digital platforms. On 12 April 2020, the Ministry of Home Affairs Cyber Coordination Centre issued an advisory, which asked government officials to avoid using Zoom, a popular video conferencing app. The governments advisory came after the company admitted that some calls were mistakenly routed via China. Media reports claimed that hackers broke into a Zoom meeting and posted obscene content.

On May 18, the Department of Telecommunications (DoT) banned WeTransfer, a service used to transfer heavy files, according to multiple media reports. In both instances, the Modi government did not reveal the technical details behind its decisions. The Cyber Coordination Centres advisory simply said that Zoom was not safe to use and outlined steps individuals should take to ensure the security of their virtual meetings. The DoT order said it banned WeTransfer in the interest of national security or public interest.

Also read: Taxes without borders: Govt revises tax on digital transactions, but ambiguities remain

Such decisions heighten the need to create a robust testing mechanism for certain applications, whose security (or lack of it) might directly affect users. The coronavirus crisis and consequent lockdowns have forced people to work remotely. As a result, they expect stable, secure and efficient applications, which help them transfer files, conduct conferences, share screens, manage large projects, and use cloud storage services. The Ministry of Electronics and Information Technology (MeitY) is supposed to develop policy and regulatory frameworks for electronics and issues related to them, in accordance with government rules.

In this context, a MeitY Compulsory Registration Order, in effect since July 2013, aims to improve the quality of electronic goods available in India. This framework mandates that products such as mobile handsets and set-top boxes, among others, also be tested. Besides MeitY, the DoT also has a testing regime. In 2017, an amendment to the Indian Telegraph Rules created the Mandatory Testing and Certification of Telecom Equipment (MTCTE) procedure, to test and certify this hardware, prior to its sale or import in India. The Telecommunications Engineering Centre (TEC), under the Department of Telecommunications, administers this process. The safety of equipment with radio interface, its immunity to electrostatic discharge, operating frequency, output power and conformance to receiver and transmitter parameters, are some aspects that are tested as part of this process.

Critically, the focus of both the MTCTE regime and MeitYs Order is limited to testing only network hardware and consumer devices. These exclude the testing of digital applications such as Zoom and WeTransfer completely. International standards, designed by expert organisations such as the International Organisation for Standardisation (ISO), the International Electrotechnical Commission, the Internet Engineering Task Force, and the Institute of Electrical and Electronics Engineers are reflected only in parts of Indias domestic standards and testing frameworks.

Unfortunately, the countrys participation in these global bodies, especially in the context of network and information security, remains limited. For instance, India sent a small three-member delegation to ISOs Committee on IT Security techniques in 2015. A small delegation size means that each member has outsized responsibilities and is unable to match the depth and breadth of representation of their counterparts from other countries. As a result, they often have to choose between two parallel negotiation sessions that cover different aspects under consideration at such fora.

The 2017 list of equipment/products to be examined under the MTCTE included software and service applications. However, the latest list includes only hardware equipment such as Internet of Things (IoT) gateways, tracking devices, smartwatches and equipment that operates under 2.4 GHz and 5 GHz frequency bands. Software and service applications do not find a place in it, despite the apparent need.

Also read: India can be a digital economic powerhouse if new IT Act removes ambiguity around e-commerce

Despite being notified in 2017, the MTCTE regime came into effect only in October 2019. This delay was primarily due to the ambiguity over the status, functioning, capacity and competence of TEC-designated laboratories. According to the MTCTE, TEC-recognised labs and facilities, designated as Conformity Assessment Bodies (CAB), are to test and certify equipment. Although the TEC targets having over 100 such facilities pan-India, it has, thus far, recognised only 54 CABs.

Such labs should possess the ability to disassemble telecom gear and review the components at application and hardware levels. At present, these labs test and certify specific telecom products, against specific standards. For instance, the capacity of a lab may be limited to testing only switching systems. Consequently, it is unlikely that a single lab can test multiple products.

Multiple stakeholders have highlighted concerns about their capacity shortages. In 2018, almost 70 mobile phone companies, including Samsung, Oppo, and Micromax, wrote a letter to the DoT highlighting challenges such as lack of testing infrastructure and limited number of test labs. The DoT appears to have recognised some of these deficiencies, which could be a reason why the MTCTEs implementation was delayed. To date, the TEC has notified that only six equipment, including fax machines and cordless telephones, should be tested an indicator of capacity shortages.

Also read: India has to toe a fine line in defining non-personal data between public interest and IPR

India can learn from the approaches of other countries in order to better design its own framework. Jurisdictions such as the UK and Singapore use the principle of security-by-design (updated throughout product lifecycles), to develop device and application-level cybersecurity standards. More specifically, testing benchmarks tend to be based on the ISO and IECs Common Criteria for Information Technology Security Evaluation. Further, in order to ensure robustness of such processes, both countries have embraced working arrangements with security experts.

Global best-practices can also serve as a guide to manage inadequate testing capacities. For instance, countries such as Australia, Singapore, UK and the US have tied up with Information Security Assurance experts CREST for cybersecurity accreditation and certification arrangements. Germany has an independent trust centre (TViT), which assesses ICT security against globally recognised standards and criteria. The centre closely collaborates with other cybersecurity testing authorities from countries such as the US, Japan, Netherlands and Switzerland. Most importantly, TViT works in close coordination with various security laboratories.

As workforces across geographies migrate online, they will expect a secure virtual office environment, in which trade secrets are protected, conversations arent intruded upon and data isnt misused. Employers and industries, for whom virtual offices are a new reality, will expect the government to evolve standards on which digital work environment applications are reviewed.

The first step to set those standards is to expand current testing mechanisms to include critical software applications, in line with global best-practices. Such a move will help address cybersecurity concerns, ensure certainty in the app ecosystem, and create consumer awareness. For India to assume a leadership role and craft a template for the future of work, it must set standards to assuage the concerns of its digital workforce.

The authors work at Koan Advisory Group, a technology policy consulting firm. This article is part of ThePrint-Koan Advisory series that analyses emerging policies, laws and regulations in Indias technology sector. Views are personal.

Read all articles in the series here.

ThePrint is now on Telegram. For the best reports & opinion on politics, governance and more, subscribe to ThePrint on Telegram.

Subscribe to our YouTube channel.

Read more from the original source:
Indias digital workforce needs secure software. Testing, not banning apps, is the answer - ThePrint

Read More..

Broadband Connection Disconnected: Things You Can Do To Fix It – TelecomTalk

Broadband internet connection is used by many people in their homes and offices. It can offer great speeds and many people can connect to it at the same time. One of the most frustrating things is you might find your broadband connection disconnected at sometimes. No one likes it when they open a webpage and it is unresponsive. However, the good thing is, you can check what the problems are and with the help of a few simple tips and tricks, you can solve them on your own. Read ahead to find out the tips and tricks.

If you have a cable connection and cant get a steady or stable connection, then you can try out power cycling because that might resolve the issue you are facing. Another thing that you should do is that you should check if all the cables connected to your ethernet ports and router are undamaged. Also, check the wires outside your home. Sometimes it may happen that the cables or wires outside your home might get damaged due to bad weather or any other external factors.

If you try to access the internet and find your broadband connection disconnected, then you should try restarting the modem. Just remove the power cord from the back of the router and keep it like that for at least one minute before you attach the cord back. Also, restarting the modem refreshes the network and brings back the stability of the internet.

Viruses and malware are not just bad for your computer, but also for your broadband connection. If you find your broadband connection disconnected too often then you need to see if there are viruses and malware in your system. They can severely impact your broadband connection and also the speed of your browser. Keep your anti-virus system updated and your system clean and clear.

If you are witnessing frequent broadband connection drops, then you can do one smart thing and check your data pack. It may feel like to you that your connection has dropped, but in reality, you might have exhausted your data pack. But if your internet pack is not exhausted, then you should contact your service provider and tell them that you are facing problems.

Micro-filter is the thing which connects with your smartphones, desktops, and modems. So you should try disconnecting every device from the micro-filter because that can be a problem for your broadband connection. Then, when you are reconnecting the devices, do so one by one and not all at the same time.

You should also consider upgrading the firmware and modem. Older versions of firmware and modem can be a threat to your internet security and can result in slow internet and frequent broadband disconnections. Firmware is something which is installed in your computer and is a part of the software of your modem or internet router. If you face problems even after upgrading the modem and firmware, then you should contact your internet service provider.

Your internet service provider may be providing you with less than average service. You should ask your ISP to check if there are problems from their side of services. Sometimes it may happen that there might not be any issue from your side but from the side of your ISP. You should also ask for suggestions from your internet service provider on how to improve your internet connection.

Continued here:
Broadband Connection Disconnected: Things You Can Do To Fix It - TelecomTalk

Read More..

Former Google CEO Eric Schmidt says there’s ‘no question’ Huawei routed data to Beijing – CNBC

Eric Schmidt, former executive chairman of Alphabet

Photo by Bloomberg

Huawei is a national security risk and has engaged in unacceptable acts like routing network information to the Chinese government, former Google CEO Eric Schmidt has claimed.

"There's no question that Huawei has engaged in some practices that are not acceptable in national security," Schmidt said in a documentary to be aired on BBC radio.

"There's no question that information from Huawei routers has ultimately ended up in hands that would appear to be the state," he added. "However that happened, we're sure it happened."

The telecommunications giant has often been accused of posing a risk to national security, with U.S. officials worried it could enable Chinese espionage. Washington has put significant pressure on allies to bar Huawei from accessing their next-generation 5G mobile networks. The U.K. is now reviewing a decision to allow the firm a restricted role in its 5G rollout.

Experts say that Huawei would haveno choicebut to hand over network data to Beijing if it is requested due to Chinese espionage and national security laws. But Huawei has repeatedly denied accusations that it passes data to Beijing and insists it's independent from government.

The firm hit back at Schmidt for his comments Thursday, disputing the suggestion that it hands customer data to the Chinese authorities.

"The allegations made by Eric Schmidt, who now works for the US government, are simply not true and as with similar assertions in the past, are not backed by evidence," Huawei Vice President Victor Zhang told CNBC.

Schmidt, who led Google from 2001 to 2011, is now chair of the Pentagon's Defense Innovation Board.

In his interview with the BBC, he said he had previously held "prejudices" about China, such as the belief that tech firms in the country are "very good at copying things." He added that these prejudices now "need to be thrown out."

"The Chinese are just as good, and maybe better, in key areas of research and innovation as the West," Schmidt told the U.K. state-backed broadcaster. He urged Western countries to keep pace with the world's second-largest economy by investing more in research funding, ensuring increased public-private sector collaboration and remaining open to international talent.

It's not the first time Schmidt has commented on China. In 2018, the billionaire warned of a "bifurcation" of the internet into two separate models one led by the U.S., and the other by China. He also admitted to having advocated for Google's work in China when it originally pulled out of the country. Google nixed plans to launch a censored search engine in China in 2018 following outrage from employees.

For more on Schmidt's views about Huawei, read the BBC's report here.

More:
Former Google CEO Eric Schmidt says there's 'no question' Huawei routed data to Beijing - CNBC

Read More..

Dating Apps Exposed 845 GB of Explicit Photos, Chats, and More – WIRED

It's painfully common for data to be exposed online. But just because it happens so often that doesn't make it any less dangerous. Especially when that data comes from a slew of dating apps that cater to specific groups and interests.

Security researchers Noam Rotem and Ran Locar were scanning the open internet on May 24 when they stumbled upon a collection of publicly accessible Amazon Web Services "buckets." Each contained a trove of data from a different specialized dating app, including 3somes, Cougary, Gay Daddy Bear, Xpal, BBW Dating, Casualx, SugarD, Herpes Dating, and GHunt. In all, the researchers found 845 gigabytes and close to 2.5 million records, likely representing data from hundreds of thousands of users. They are publishing their findings today with vpnMentor.

The information was particularly sensitive and included sexually explicit photos and audio recordings. The researchers also found screenshots of private chats from other platforms and receipts for payments, sent between users within the app as part of the relationships they were building. And though the exposed data included limited "personally identifying information," like real names, birthdays, or email addresses, the researchers warn that a motivated hacker could have used the photos and other miscellaneous information available to identify many users. The data may not have actually been breached, but the potential was there.

"We were amazed by the size and how sensitive the data was," Locar says. "The risk of doxing that exists with this kind of thing is very realextortion, psychological abuse. As a user of one of these apps you dont expect that others outside the app would be able to see and download the data."

As the researchers traced the exposed S3 buckets they realized that all of the apps seemed to come from the same source. Their infrastructure was fairly uniform, the websites for the apps all had the same layout, and many of the apps listed "Cheng Du New Tech Zone" as the developer on Google Play. On May 26, two days after the initial finding, the researchers contacted 3somes. The next day, they got a brief response, and all of the buckets were locked down simultaneously.

WIRED reached out to 3somes and Herpes Dating and attempted to reach Cheng Du New Tech Zone, but did not receive a reply.

Everything you ever wanted to know about Equifax, Mariott, and the problem with social security numbers.

This was not a hack; it was sloppily stored data. The researchers don't know whether anyone else discovered the exposed trove before they did. That's always crux of the issue with data exposures: mistakenly making data accessible is at best an inconsequential mistake, but at worst can hand hackers a data breach on a silver platter. And in the case of this cadre of dating apps in particular, the information could have a real impact on user safety if it was stolen before the developer locked it down. So many breaches contain data like email addresses and passwords, which is bad enough. But when data leaks from sites like Ashley Madison, Grindr, or Cam4, it creates the potential for doxing, extortion, and other dire online abuse. In this case, Herpes Dating could even potentially reveal someone's health status.

"It's so difficult to navigate. How much trust are we putting into apps to feel comfortable putting up that sensitive dataSTD information, videos," says Nina Alli, executive director of the Biohacking Village at Defcon and biomedical security researcher. "This is a detrimental way to out someones sexual health status. It's not something to be ashamed of, but there's stigma, because it's easier to yuck at someone elses proclivities. When it comes to STD status the outing of this data would mean that other people won't want to get tested. That is a big peril of this situation."

Originally posted here:
Dating Apps Exposed 845 GB of Explicit Photos, Chats, and More - WIRED

Read More..

This Is the First Universal Language for Quantum Computers – Popular Mechanics

Przemyslaw Klos / EyeEmGetty Images

A quantum computing startup called Quantum Machines has released a new programming language called QUA. The language runs on the startups proprietary Quantum Orchestration Platform.

Quantum Machines says its goal is to complete the stack that includes quantum computing at the very bottom-most level. Yes, those physical interactions between quantum bits (qubits) are what set quantum computers apart from traditional hardwarebut you still need the rest of the hardware that will turn physical interactions into something that will run software.

And, of course, you need the software, too. Thats where QUA comes in.

The transition from having just specific circuitsphysical circuits for specific algorithmsto the stage at which the system is programmable is the dramatic point, CEO Itavar Siman told Tech Crunch. Basically, you have a software abstraction layer and then, you get to the era of software and everything accelerated.

The language Quantum Machine describes in its materials isnt what you think of when you imagine programming, unless youre a machine language coder. Whats machine language? Thats the lowest possible level of code, where the instructions arent in natural or human language and are instead in tiny bits of direct instruction for the hardware itself.

Coder Ben Eater made a great video that walks you through a sample program written in C, which is a higher and more abstract language, and how that information translates all the way down into machine code. (Essentially, everything gets much messier and much less readable to the human eye.)

This content is imported from YouTube. You may be able to find the same content in another format, or you may be able to find more information, at their web site.

Machine code acts as a reminder that, on a fundamental level, everything inside your computer is passing nano-Morse code back and forth to do everything you see on the screen as well as all the behind the scenes routines and coordination. Since quantum computers have a brand new paradigm for the idea of hardware itself, theres an opening for a new machine code.

Quantum Machines seems to want to build the entire quantum system, from hardware to all the software to control and highlight it. And if that sounds overly proprietary or like some unfair version of how to develop new technology, we have some bad news for you about the home PC wars of the 1980s or the market share Microsoft Windows still holds among operating systems.

By offering a package deal with something for everyone when quantum computing isnt even a twinkle in the eye of the average consumer, Quantum Machines could be making inroads that will keep it ahead for decades. A universal language, indeed.

QUA is what we believe the first candidate to become what we define as the quantum computing software abstraction layer, Sivan told TechCrunch. In 20 years, we might look back on QUA the way todays users view DOS.

This content is created and maintained by a third party, and imported onto this page to help users provide their email addresses. You may be able to find more information about this and similar content at piano.io

This commenting section is created and maintained by a third party, and imported onto this page. You may be able to find more information on their web site.

See more here:
This Is the First Universal Language for Quantum Computers - Popular Mechanics

Read More..

The Period of the Universe’s Clock – Physics

June 19, 2020• Physics 13, 99

Theorists have determined 1033 seconds as the upper limit for the period of a universal oscillator, which could help in constructing a quantum theory of gravity.

diuno/iStock/Getty Images

diuno/iStock/Getty Images

A trio of theorists has modeled time as a universal quantum oscillator and found an upper bound of 1033 seconds for the oscillators period. This value lies well below the shortest ticks of todays best atomic clocks, making it unmeasurable. But the researchers say that atomic clocks could be used to indirectly confirm their models predictions.

Physics has a time problem: In quantum mechanics, time is universal and absolute, continuously ticking forward as interactions occur between particles. But in general relativity (the theory that describes classical gravity), time is malleableclocks located at different places in a gravitational field tick at different rates. Theorists developing a quantum theory of gravity must reconcile these two descriptions of time. Many agree that the solution requires that time be defined not as a continuous coordinate, but instead as the ticking of some physical clock, says Flaminia Giacomini, a quantum theorist at Canadas Perimeter Institute for Theoretical Physics (PITP).

Such a fundamental clock would permeate the Universe, somewhat like the Higgs field from particle physics. Similar to the Higgs field, the clock could interact with matter, and it could potentially modify physical phenomena, says Martin Bojowald of Pennsylvania State University in University Park.

But researchers have yet to develop a theory for such a clock, and they still dont understand the fundamental nature of time. Aiming to gain insights into both problems, Bojowald and his colleagues imagined the universal clock as an oscillator and set out to derive its period. Their hope was that doing so might offer ideas for how to probe times fundamental properties.

In the model, the team considers two quantum oscillators, which act like quantum pendulums oscillating at different rates. The faster oscillator represents the universal, fundamental clock, and the slower one represents a measurable system in the lab, such as the atom of an atomic clock. The team couples the oscillators to allow them to interact. The nature of this coupling is different from classical oscillators, which are coupled through a common force. Instead, the coupling is imposed by requiring that the net energy of the oscillators remains constant in timea condition derived directly from general relativity.

The team finds that this interaction causes the two oscillators to slowly desynchronize. The desynching means that it would be impossible for any physical clock to indefinitely maintain ticks of a constant period, placing a fundamental limit on the precision of clocks. As a result, the ticks of two identically built atomic clocks, for example, would never completely agree, if measured at this precision limit. Observing this behavior would allow researchers to confirm that time has a fundamental period, Bojowald says.

Bojowald and his colleagues used the desynchronization property to derive an upper limit of 1033 seconds for the period of their fundamental oscillating clock. This limit is 1015 times shorter than the tick of todays best atomic clocks and 1010 times longer than the Planck time, a proposed length for the shortest measurable unit of time.

Resolving a unit of Planck time is far beyond current technologies. But the new model potentially allows researchers to get much closer than before, says Bianca Dittrich, who studies quantum gravity at PITP. Bojowald agrees. Using the timescale of the desynchronization between clocks to make time measurements, rather than the clocks themselves, could allow for measurements on much shorter timescales, he says.

Another bonus of choosing an oscillating quantum system as the model for a fundamental clock is that such a system closely resembles clocks used in the lab, says Esteban Castro-Ruiz, of the Universit Libre de Bruxelles, who studies problems involving quantum clocks and gravity. The resemblance is key, says Castro-Ruiz, because it brings the question of a fundamental period of time to a more concrete setting, where one can actually start thinking about measurable consequences.

This research is published in Physical Review Letters.

Katherine Wright

Katherine Wright is a Senior Editor of Physics.

Demonstrating quantum weirdness with vibration quanta called phonons shows that the particles can complement photons in quantum information technology. Read More

Read more:

The Period of the Universe's Clock - Physics

Read More..

8.13 and 8.14: Physics Junior Lab – MIT Technology Review

In 8.13 and 8.14, the 18-credit-hour classes known as Physics Junior Lab, students are introduced to experimental physics by replicating classic early-20th-century discoveries in such things as special relativity, quantum mechanics, and nuclear physics. The labs involve a lot of finessing of equipment, connecting of cables, and twiddling of knobsnot the sort of thing you can easily put online.

But Junior Lab professors Gunther Roland and Phil Harris, PhD 11, both regularly collaborate with researchers around the globe on particle physics experiments requiring the analysis of enormous data sets. These big projects require that all of them be able not just to communicate across time zones but also to access experiments and data remotely.

So when the classes went online, they had students use data from the Large Hadron Collider at CERN to replicate the analysis that confirmed the existence of the Higgs boson. Students also got to work with data from the Laser Interferometer Gravitational-Wave Observatory (LIGO) and repeat the analysis that identified the gravitational waves caused by the collision of two black holeswork published in 2016 that led to a Nobel Prize for MIT professor Rainer Weiss.

Junior Lab students, who work in pairs, could no longer look at each others notebooks in the lab, but Roland says having lab partners use a shared online notebook encouraged more collaboration, an essential skill for experimental physicists. Students both edited the same document, and instructors could scroll through their notebooks in Zoom meetings and see their plots and calculations. Roland and Harris plan to keep the online shared notebooksand may add a menu of projects like those using LIGO and LHC datawhen everyones back on campus.

I dont think it should be the only thing, Roland says, since that sort of analysis-based work lacks what he calls the fiddling-with-the-knobs part so essential in experimental physics. The hands-on component is also very important. But it allows the students to do things that are cutting-edge right now instead of cutting-edge in the 1920s.

Read more from the original source:

8.13 and 8.14: Physics Junior Lab - MIT Technology Review

Read More..

Physicists have proposed a new theory for Bose-Einstein condensates – Tech Explorist

Bose-Einstein condensate (BEC) is considered as the fifth state of matter in which separate atoms or subatomic particles, cooled to near absolute zero coalesce into a single quantum mechanical entitythat is, one that can be described by a wave functionon a near-microscopic scale.

First predicted in 1924 by Albert Einstein based on the quantum formulations of the Indian physicist Satyendra Nath Bose, the exact properties of Bose-Einstein condensates are notoriously challenging to study.

Physicists from Martin Luther University Halle-Wittenberg (MLU) and Ludwig Maximilian University Munich now have proposed a new theory to describe these quantum systems more effectively and comprehensively.

Dr. Carlos Benavides-Riveros from the Institute of Physics at MLU, said,Many attempts were made to prove their existence experimentally. Finally, in 1995, researchers in the U.S. succeeded in producing the condensates in experiments. In 2001 they received the Nobel Prize for Physics for their work. Since then, physicists around the world have been working on ways to define better and describe these systems that would enable their behavior to be more accurately predicted.

Benavides-Riveros said,In quantum mechanics, the Schrdinger equation is used to describe systems with many interacting particles. But because the number of degrees of freedom increases exponentially, this equation is not easy to solve. This is the so-called many-body problem, and finding a solution to this problem is one of the major challenges of theoretical and computational physics today.

Co-author Jakob Wolff from MLU said,The working group at MLU is now proposing a comparatively simple method. One of our key insights is that the particles in the condensate interact only in pairs. This enables these systems to be described using much simpler and more established methods, like those used in electronic quantum systems.

Jakob Wolff said,Our theory is in principle exact and can be applied to different physical regimes and scenarios, for example, strongly interacting ultracold atoms. And it looks like it will also be a promising way to describe superconducting materials.

See the original post:

Physicists have proposed a new theory for Bose-Einstein condensates - Tech Explorist

Read More..

‘Everything was centered around Sara, he was lost’: Abhishek Kapoor on Sushant Singh Rajput after ‘Kedarnath’ – DNA India

Sushant Singh Rajput died by suicide at the age of 34 on June 14 and since then there have been a lot of theories floating around why he took such a drastic step. Filmmaker Abhishek Kapoor who has worked with Sushant in debut film 'Kai Po Che' and later in 'Kedarnath', in a recent interview said that he was a "troubled man, whose mind was systematically dismantled by the industry."

As per reports on BollywoodLife, Abhishek said, "Its a systematic dismantling of a fragile mind. Sushant was brilliant, he was an engineer, he was into astrophysics and quantum physics. But because we couldnt box him into stereotypes we called him off. He was off, just off your radar. Theres this thing that if youre not like us then you cant be with us. There are so many camps that if youre not part of a camp, even if youre in the middle of a room, you will be ignored. It is true, especially for actors. I, as a filmmaker, can isolate myself. I can warn a young actor but he cannot see it at the time because the lights are so bright. You lose yourself."

The director further added how Sushant was trobled while shooting for 'Kedarnath' but when it was time to shoot he was 100% in the scene. For the uninformed, 'Kedarnath' was the debut film of actress Sara Ali Khan. The filmmaker said that Sushant felt that all the media attention had diverted towards her and he became reclusive.

"I had not spoken to him for about a year and a half. There were times, you talk and then youd go away to do a film. He must have changed his number 50 times and I remember when Kedarnath was coming out, the media had just slammed it. I dont know what happened, he could see that he was not getting the kind of love because everything was centered around Sara at that time. He was just kind of lost. When the film released and it did really well, I sent him a message saying, 'Bro I have been trying to reach you, Im not sure if you are upset, or just busy, but call me so we can chat. We made a super film together, again. If we are not going to celebrate it then what the hell are we going to celebrate in life? So please call me, I love you' to which he didn't respond. He didnt respond to me on his birthday. I said to myself just let it be. I could see he was not in a good place but you cannot cross a line," he stated.

Abhishek was present at Sushant's funeral along with his wife. He was cremated at Mumbais Vile Parle crematorium on Monday.

Go here to read the rest:

'Everything was centered around Sara, he was lost': Abhishek Kapoor on Sushant Singh Rajput after 'Kedarnath' - DNA India

Read More..