Russian Scientists Have Solved Light-Based Computers

Electromagnetic spectrum and visible light

High-performance microprocessors that harness photons rather than electrons promise to make computers up to a thousand times more efficient because electrons typically move at a low fraction of the speed of light.

Problem: scaling down conventional electronic microprocessors is easy; doing the same with photonic components is hard because of the difficulty of getting light to turn corners. So scientists have turned to plasmonic components, which take advantage of the unique oscillating interactions of photons and electrons on the surface of metal.

Unfortunately, plasmonic components get too hot and you can’t just throw a fan on them. You need a cooling system that works on the scale of the photonic chip’s key features, less than a billionth of a meter in size. It’s one reason why many don’t consider fully light-based transistors a practical possibility for decades. It’s also why there is such excitement around a new paper by a team of Russian researchers showing a new method for cooling photonic components.

Optoelectronics are already emerging as a key research area for companies like Oracle and IBM. IBM’s Zurich-based photonics research group explains why: “Based on the current trend toward ever more powerful high-end computers, it is expected that supercomputers comprising nearly 100 million computation modules and featuring exaflop performance rates, i.e. one trillion (1018) operations per second, will be developed within that timeframe. Without improved energy efficiency on all levels, however, a future supercomputer would require its own dedicated power plant.”

It’s no wonder the Defense Advanced Research Projects Agency, or DARPA, has also funded optoelectronic research.

What’s so hard about scaling down optoelectronic components? In order for your on-chip optoelectronic components to work with bulk light waves, it would have to be enormous, which destroys the efficiency gain you were going for. You can confine light to smaller dimensions by converting it into surface Plasmon polaritons, electromagnetic waves that propagate on the surface of a the chip’s metal and dielectric layers.

But these can cause overheating, a lot of overheating:  temperature increases of 100 Kelvin, a big enough temperature differential to take frozen water to boiling. The Russian researchers claim that their method, published this week in the journal ACS Photonics, can limit temperature increases to within just a few degrees K.

Such components “will give a possibility to create high-performance computers and analyze information many orders of magnitude faster than it is done today. However, in order to design computers based on these microprocessors (ranging from onboard computer for fighter aircrafts to exascale and zettascale supercomputers, which are required for data analysis and simulation of combat situations), the microprocessors should be efficiently cooled,” Dmitry Fedyanin, one of the authors of the paper, said in an email.

Business Insurance: http://bit.ly/20PwREg

« Cybersecurity Skill Shortage Has Industry Worried
Hard Lessons From The Cyberattack On Ukraine »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

LogRhythm

LogRhythm

LogRhythm's security platform unifies SIEM, log management, network and endpoint monitoring, user behaviour analytics, security automation and advanced security analytics.

Venable

Venable

Venable is an American Lawyer 100 law firm with nine offices across the USA, Practice areas include Cybersecurity.

Cybersecurity Credentials Collaborative (C3)

Cybersecurity Credentials Collaborative (C3)

C3 provides a forum for collaboration among vendor-neutral information security and privacy and related IT disciplines certification bodies.

Cradlepoint

Cradlepoint

With Cradlepoint customers leverage the speed and economics of wired and wireless Internet broadband for branch, mobile, and IoT networks while maintaining end-to-end visibility, security and control.

Ntrepid

Ntrepid

Ntrepid products provide protection from web threats and enable organizations to safely conduct their online activities.

ThreatBook

ThreatBook

ThreatBook is dedicated to providing real-time, accurate and actionable threat intelligence to block, detect and prevent attacks.

CyberGRX

CyberGRX

The CyberGRX Exchange and our risk assessments-as-a-service help Enterprises and Third Parties cost-effectively identify, prioritize and mitigate risk.

Flipside

Flipside

Information Security training provider specialized in personalized training and security awareness campaigns.

Institute of Informatics and Telematics (IIT)

Institute of Informatics and Telematics (IIT)

IIT carries out activities of research, assessment, technology transfer and training in the field of Information and Communication Technologies and of Computational Sciences.

ChainSecurity

ChainSecurity

ChainSecurity provides products and services for securing smart contracts and blockchain protocols and conducts R&D in the areas of security, program analysis, and machine learning.

Responsible Cyber

Responsible Cyber

Protect yourself with Responsible Cyber’s 360° platform, IMMUNE, arming you with comprehensive support for your business.

Huntington Ingalls Industries (HII)

Huntington Ingalls Industries (HII)

Huntington Ingalls Industries is America’s largest military shipbuilding company and a provider of professional services to partners in government and industry.

Open Quantum Safe (OQS)

Open Quantum Safe (OQS)

The Open Quantum Safe (OQS) project is an open-source project that aims to support the development and prototyping of quantum-resistant cryptography.

NetTech

NetTech

NetTech’s Managed CyberSecurity and Compliance/HIPAA services are designed to help your company prevent security breaches and quickly remediate events if they do happen to occur.

OX Security

OX Security

OX is a DevOps software supply chain security solution. Teams can verify the integrity and security of every artifact using a pipeline bill of materials (PBOM).

Ronet Cyber Security

Ronet Cyber Security

Ronet Cyber Security offers crypto forensics services for regulators, law enforcement, companies and individuals to ensure that your transactions are safe and secure.