Рубрика: TopTech

  • Scientists harness chaos to protect devices from hackers

    Researchers have found a way to use chaos to help develop digital fingerprints for electronic devices that may be unique enough to foil even the most sophisticated hackers. Just how unique are these fingerprints? The researchers believe it would take longer than the lifetime of the universe to test for every possible combination available. Just…

  • Heat-free optical switch would enable optical quantum computing chips

    In a potential boost for quantum computing and communication, a European research collaboration reported a new method of controlling and manipulating single photons without generating heat. The solution makes it possible to integrate optical switches and single-photon detectors in a single chip. Publishing in Nature Communications, the team reported to have developed an optical switch…

  • Laser system generates random numbers at ultrafast speeds

    Scientists have developed a system that can generate random numbers over a hundred times faster than current technologies, paving the way towards faster, cheaper, and more secure data encryption in today’s digitally connected world. The random generator system was jointly developed by researchers from Nanyang Technological University, Singapore (NTU Singapore), Yale University, and Trinity College…

  • Cybersecurity researchers build a better ‘canary trap’

    This new tool uses an artificial intelligence system to generate fake documents that foil IP theft by fooling adversaries. The «canary trap» technique in espionage spreads multiple versions of false documents to conceal a secret. Canary traps can be used to sniff out information leaks, or as in WWII, to create distractions that hide valuable…

  • Quantum computing: When ignorance is wanted

    Quantum technologies for computers open up new concepts of preserving the privacy of input and output data of a computation. Scientists have shown that optical quantum systems are not only particularly suitable for some quantum computations, but can also effectively encrypt the associated input and output data. Different quantum protocols have been proposed, all of…

  • Blueprint for fault-tolerant qubits

    Building a quantum computer is a challenging task because of the fragility of quantum bits. To deal with this problem, various types of active error correction techniques have been developed. In contrast, researchers have now proposed a design for an inherently fault protected circuit with passive error correction that could significantly accelerate the construction of…

  • Artificial emotional intelligence: a safer, smarter future with 5G and emotion recognition

    The combination of new 5G communication technologies with AI-based systems are ushering in a ‘smart generation’ of vehicles, drones, and even entire cities. Now, researchers take things one step further by introducing a 5G-assisted emotion detection system that uses wireless signals and body movement. In their latest publication, they outline its working principle, application prospects,…

  • Cybersecurity vulnerabilities of common seismological equipment

    Seismic monitoring devices linked to the internet are vulnerable to cyberattacks that could disrupt data collection and processing, say researchers who have probed the devices for weak points. Common security issues such as non-encrypted data, insecure protocols, and poor user authentication mechanisms are among the biggest culprits that leave seismological networks open to security breaches,…

  • Physicists observe competition between magnetic orders

    Two-dimensional materials, consisting of a single layer of atoms, have been booming in research for years. They possess novel properties that can only be explained with the help of the laws of quantum mechanics. Researchers have now used ultracold atoms to gain new insights into previously unknown quantum phenomena. They found out that the magnetic…

  • Misinformation or artifact: A new way to think about machine learning

    Machine learning has delivered amazing results, but there also have been failures, ranging from the harmless to potentially deadly. New work suggests that common assumptions about the cause behind these supposed malfunctions may be mistaken, information that is crucial for evaluating the reliability of these networks. They are capable of seemingly sophisticated results, but they…