Computers With Light-Speed Capabilities

Imagine a world where data can be processed at the speed of light, where complex calculations are completed in a fraction of a second -  a new type of computer that uses light rather than electricity could perform calculations faster, using less energy and less space.

This is no longer just a dream, but a promising reality that is within reach. Now, scientists have now recently created a reprogrammable light-based processor, a world-first, that they say could usher in a new era of quantum computing and communication.

Technologies in these emerging fields that operate at the atomic level are already realising big benefits for drug discovery and other small-scale applications. In the future, large-scale quantum computers promise to be able to solve complex problems that would be impossible for today's computers.

Lead researcher Professor Alberto Peruzzo from RMIT University in Australia said the team's processor, a photonics device that uses light particles to carry information, could help enable successful quantum computations by minimizing "light losses."

"Our design makes the quantum photonic quantum computer more efficient in terms of light losses, which is critical for being able to keep the computation going," said Peruzzo, who heads the ARC Centre of Excellence for Quantum Computation and Communication Technology (CQC2T) node at RMIT. "If you lose light, you have to restart the computation."

Other potential advances included improved data transmission capabilities for "unhackable" communications systems and enhanced sensing applications in environmental monitoring and health care, Peruzzo said.

The team reprogrammed a photonics processor in a range of experiments, achieving a performance equivalent to 2,500 devices, by applying varying voltages. Their results and analysis are published in Nature Communications."This innovation could lead to a more compact and scalable platform for quantum photonic processors," Peruzzo said.

Computers with light-speed capabilities represent a promising leap forward in the world of technology. As researchers continue to push the boundaries of what is possible, we can look forward to a future where data is processed at the speed of light.

Phys.org     |     RMIT University     |     Life Technology     |     Nature     |     New Scientist

Image: BlenderTimer

You Might Also Read: 

Quantum Computer Power Threatens Encryption:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« China Is Predicted To Expand Its Cyber Espionage Operations
Humanoid Robot Startup Valued At $2.6 Billion »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Council on Foreign Relations (CFR)

Council on Foreign Relations (CFR)

CFR is dedicated to better understanding the world and the foreign policy choices facing the USA and other countries. Cyber security is covered within the CFR topic areas.

National Crime Agency (NCA) - United Kingdom

National Crime Agency (NCA) - United Kingdom

The NCA's Cyber Crime Unit focuses on critical cyber incidents in the UK as well as longer-term activity against the criminals and the services on which they depend.

Ixia

Ixia

Ixia provides testing, visibility, and security solutions to strengthen applications across physical and virtual networks.

CERT.AZ

CERT.AZ

The national Cyber Security Center of the Republic of Azerbaijan.

CSIRT Panama

CSIRT Panama

CSIRT Panama is the national Computer Incident Response Team for Panama.

Alan Turing Institute

Alan Turing Institute

Alan Turing Institute is the UK national institute for data science. A major focus is Big Data analysis with applications including cyber security.

Norton

Norton

NortonLifeLock is dedicated to helping secure the devices, identities, online privacy, and home and family needs of approximately 50 million consumers.

Ensconce Data Technology (EDT)

Ensconce Data Technology (EDT)

EDT’s focus is on providing solutions to properly sanitize Solid State Drives (SSD) and Magnetic Drives (HDD) before they are disposed or redeployed.

CentricalCyber

CentricalCyber

CentricalCyber is a cyber risk consultancy and NIST CSF specialist set up to help business leaders better understand and manage cyber risk.

Valence Security

Valence Security

Valence manages and secures your Business Application Mesh by delivering visibility, reducing unauthorized access and preventing data loss.

Twingate

Twingate

Twingate help organizations secure and manage access to their technology resources in a world where people work from anywhere.

senhasegura

senhasegura

senhasegura is a global Privileged Access Management vendor. Our mission is to eliminate privilege abuse in organizations around the globe and build digital sovereignty.

Applied Connective Technologies

Applied Connective Technologies

Applied Connective is one team for all your technology needs, from IT to phones, cyber security to physical security, audio/video and the infrastructure to support it.

Resemble AI

Resemble AI

Resemble AI is an innovator in Generative Voice AI technology and tools to combat AI fraud including audio watermarking and deepfake detection.

SOCRadar

SOCRadar

SOCRadar is an Extended Threat Intelligence (XTI) SaaS platform that combines External Attack Surface Management (EASM), Digital Risk Protection Services (DRPS), and Cyber Threat Intelligence (CTI).

METCLOUD

METCLOUD

METCLOUD is driving a cloud evolution. A cloud that promises relentless cybersecurity, performance, resilience and sustainability.