Computers With Light-Speed Capabilities

Imagine a world where data can be processed at the speed of light, where complex calculations are completed in a fraction of a second -  a new type of computer that uses light rather than electricity could perform calculations faster, using less energy and less space.

This is no longer just a dream, but a promising reality that is within reach. Now, scientists have now recently created a reprogrammable light-based processor, a world-first, that they say could usher in a new era of quantum computing and communication.

Technologies in these emerging fields that operate at the atomic level are already realising big benefits for drug discovery and other small-scale applications. In the future, large-scale quantum computers promise to be able to solve complex problems that would be impossible for today's computers.

Lead researcher Professor Alberto Peruzzo from RMIT University in Australia said the team's processor, a photonics device that uses light particles to carry information, could help enable successful quantum computations by minimizing "light losses."

"Our design makes the quantum photonic quantum computer more efficient in terms of light losses, which is critical for being able to keep the computation going," said Peruzzo, who heads the ARC Centre of Excellence for Quantum Computation and Communication Technology (CQC2T) node at RMIT. "If you lose light, you have to restart the computation."

Other potential advances included improved data transmission capabilities for "unhackable" communications systems and enhanced sensing applications in environmental monitoring and health care, Peruzzo said.

The team reprogrammed a photonics processor in a range of experiments, achieving a performance equivalent to 2,500 devices, by applying varying voltages. Their results and analysis are published in Nature Communications."This innovation could lead to a more compact and scalable platform for quantum photonic processors," Peruzzo said.

Computers with light-speed capabilities represent a promising leap forward in the world of technology. As researchers continue to push the boundaries of what is possible, we can look forward to a future where data is processed at the speed of light.

Phys.org     |     RMIT University     |     Life Technology     |     Nature     |     New Scientist

Image: BlenderTimer

You Might Also Read: 

Quantum Computer Power Threatens Encryption:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« China Is Predicted To Expand Its Cyber Espionage Operations
Humanoid Robot Startup Valued At $2.6 Billion »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Juniper Networks

Juniper Networks

Juniper Networks is the industry leader in network innovation. We provide network infrastructure and network security solutions.

CloudCodes Software

CloudCodes Software

CloudCodes is a cloud security solutions provider focused on providing cloud security solutions to enterprise customers.

Apomatix

Apomatix

Apomatix is a platform that simplifies the complexity of cyber risk audit and management.

SailPoint

SailPoint

SailPoint provides identity governance solutions with on-premises and cloud-based identity management software for the most complex challenges.

StrongKey

StrongKey

StrongKey (formerly StrongAuth) is a leader in Enterprise Key Management Infrastructure, bringing new levels of capability and data security at a price point significantly lower than other solutions.

Procilon Group

Procilon Group

Procilon Group specialize in the development of cryptographic software as well as strategic advice on information security and data protection.

CyberArts

CyberArts

CyberArts is founded on the belief that every single organization deserves and requires the creme de la creme when there is a need for Cyber services.

Clym

Clym

Clym is the data privacy platform that helps organisations meet their data protection obligations. Cookies, Consent, Requests, Policies and more are all managed in a secure and adaptive application.

ENLIGHTENi

ENLIGHTENi

ENLIGHTENi are the platform to develop next-gen talent in Technology, Risk, and Cybersecurity. Our mission is to develop next-gen talent through challenge-based learning and team collaboration.

Shift5

Shift5

Shift5 focus on securing operational technology (OT) by building best-in-class, dual-use products serving military and commercial entities.

Nokia

Nokia

Nokia is a proven leader in fixed, mobile and IoT security offering capabilities that range from systems design to integration and support.

BlueHalo

BlueHalo

BlueHalo is purpose-built to provide industry capabilities in the domains of Space Superiority and Directed Energy, Missile Defense and C4ISR, and Cyber and Intelligence.

PlexTrac

PlexTrac

PlexTrac is a cybersecurity reporting and workflow management platform that supercharges security programs, making them more effective, efficient, and proactive.

Proaxiom

Proaxiom

Proaxiom are focused on erasing cyber driven panic paralysis for Small and Medium Enterprises through brilliant cyber technologies which drive productivity and support growth.

Vorlon

Vorlon

Vorlon's agentless patent-pending solution facilitates risk profiling of apps, and provides AI-driven behavioral analytics with response recommendations.

Amplifier Security

Amplifier Security

Amplifier Security are on a mission to empower security teams to modernize their practice by connecting the dots between their security stack and their people.