Russian Scientists Have Solved Light-Based Computers

Electromagnetic spectrum and visible light

High-performance microprocessors that harness photons rather than electrons promise to make computers up to a thousand times more efficient because electrons typically move at a low fraction of the speed of light.

Problem: scaling down conventional electronic microprocessors is easy; doing the same with photonic components is hard because of the difficulty of getting light to turn corners. So scientists have turned to plasmonic components, which take advantage of the unique oscillating interactions of photons and electrons on the surface of metal.

Unfortunately, plasmonic components get too hot and you can’t just throw a fan on them. You need a cooling system that works on the scale of the photonic chip’s key features, less than a billionth of a meter in size. It’s one reason why many don’t consider fully light-based transistors a practical possibility for decades. It’s also why there is such excitement around a new paper by a team of Russian researchers showing a new method for cooling photonic components.

Optoelectronics are already emerging as a key research area for companies like Oracle and IBM. IBM’s Zurich-based photonics research group explains why: “Based on the current trend toward ever more powerful high-end computers, it is expected that supercomputers comprising nearly 100 million computation modules and featuring exaflop performance rates, i.e. one trillion (1018) operations per second, will be developed within that timeframe. Without improved energy efficiency on all levels, however, a future supercomputer would require its own dedicated power plant.”

It’s no wonder the Defense Advanced Research Projects Agency, or DARPA, has also funded optoelectronic research.

What’s so hard about scaling down optoelectronic components? In order for your on-chip optoelectronic components to work with bulk light waves, it would have to be enormous, which destroys the efficiency gain you were going for. You can confine light to smaller dimensions by converting it into surface Plasmon polaritons, electromagnetic waves that propagate on the surface of a the chip’s metal and dielectric layers.

But these can cause overheating, a lot of overheating:  temperature increases of 100 Kelvin, a big enough temperature differential to take frozen water to boiling. The Russian researchers claim that their method, published this week in the journal ACS Photonics, can limit temperature increases to within just a few degrees K.

Such components “will give a possibility to create high-performance computers and analyze information many orders of magnitude faster than it is done today. However, in order to design computers based on these microprocessors (ranging from onboard computer for fighter aircrafts to exascale and zettascale supercomputers, which are required for data analysis and simulation of combat situations), the microprocessors should be efficiently cooled,” Dmitry Fedyanin, one of the authors of the paper, said in an email.

Business Insurance: http://bit.ly/20PwREg

« Cybersecurity Skill Shortage Has Industry Worried
Hard Lessons From The Cyberattack On Ukraine »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

InAuth

InAuth

InAuth Security Platform delivers advanced device identification, risk detection, and analysis capabilities to help organizations limit risk and reduce fraud.

KoolSpan

KoolSpan

KoolSpan’s security and privacy solutions address the growing threat of loss or theft of intellectual property, information, and proprietary assets.

Cybercom Group

Cybercom Group

Cybercom offers strategic advice, testing & quality assurance, security solutions, system development, integration, management and operation services.

Cyber Risk Agency

Cyber Risk Agency

Cyber Risk Agency is a cybersecurity consulting firm specializing in managing cyber risks for SMEs.

Swimlane

Swimlane

Swimlane is a leader in security automation and orchestration (SAO). Our platform empowers organizations to manage, respond and neutralize cyber threats with adaptability, efficiency and speed.

Infosistem

Infosistem

Infosistem is a Croatian ICT company with extensive expertise and experience in enterprise and SMB ICT projects and solutions.

SwiftSafe

SwiftSafe

SwiftSafe is a cybersecurity consulting company providing auditing, pentesting, compliance and managed security services.

European Cyber Security Conference

European Cyber Security Conference

EU Cyber Security Conference will debate what Europe’s response to evolving threats in a dynamic global risk landscape should look like and what the next steps for all actors of the ecosystem.

Mendoza Ventures

Mendoza Ventures

Mendoza Ventures is a venture capital fund focusing on pre-seed Artificial Intelligence (AI), Fintech, and Cybersecurity startups.

BoldCloud

BoldCloud

BoldCloud's award winning Cybersecurity Advisory services and Layered Security approach adds new critical layers of protection for your data and your business.

Fortress Information Security

Fortress Information Security

Fortress Information Security is one of the largest cyber security providers of supply chain risk management and vulnerability risk management in the US.

Jericho Security

Jericho Security

Jericho Security is on a mission to defend the world from the new threats of generative AI cyber attacks.

Framework Security

Framework Security

With Framework Security, you get more than a consultancy; you get a partner dedicated to simplifying cybersecurity and protecting your business in the most efficient way possible.

BlazeGuard

BlazeGuard

At BlazeGuard, we understand that navigating the complex world of cybersecurity can be challenging. That’s why we make it our mission to simplify the process for you.

Capzul

Capzul

Capzul are transforming the network security landscape with a new approach; creating virtually impenetrable networks, precluding cybercriminal attacks on your network ecosystem.

Hydden

Hydden

Hydden gives security teams the ability to create a solid foundation to build a truly next-gen identity security practice by bridging the gaps between siloed teams and technologies.

Socket

Socket

Socket protects software applications and critical services from malware and security threats originating in open source code.